5.In the Server Name box, enter the Sybase database you want to monitor.

6.In the Port Number box, enter the port that Sybase is using.

7.Select SYBASE from the Database Type menu.

8.Click OK.

IMPORTANT: Perform Discovery Data Collection for your inputs to take effect. See Step 3 — Discovering Applications” on page 123.

Deleting Sybase Information

If you do not want the management server to monitor a Sybase instance, you can remove its information, as described in the following steps:

1.Select Options > Protocol Settings > Storage Essentials > System Application Discovery Settings.

To select a target, you must have at least one element designated as a server, workstation or desktop. If you see the message, “No Targets Currently Selected,” change your element from unknown to either a server, workstation or desktop. See the documentation for HP Systems Insight Manager. Select a target, and then, click Run Now.

2.In the Database Information table, click the button, corresponding to the Sybase instance you do not want the management server to monitor.

3.Perform Discovery Data Collection to make the management server aware of your changes.

Monitoring Microsoft Exchange

NOTE: If you are planning to monitor Microsoft Exchange Clusters, see Monitoring Microsoft Exchange Failover Clusters” on page 113.

To monitor Microsoft Exchange, you must make the management server aware of domain controller access. After information for controller access has been added, discover Microsoft Exchange and perform Discovery Data Collection. To save time, delay these steps until you have added the configurations for your other applications and hosts.

To monitor Microsoft Exchange, you must:

Add information for Microsoft Exchange Domain Controller Access

Discover the application (”Step 3 — Discovering Applications” on page 123).

Adding Microsoft Exchange Domain Controller Access

Before adding a domain controller, note the following:

The hosts should recognize the management server by name, because a reverse look-up is required by both operating system security and Microsoft Exchange. Make sure the domain controller, Exchange server host, and management server are accessible to one other using the host name and the fully-qualified domain name.

112 Discovering Applications, Backup Hosts and Hosts