Policies - Settings tab - Checkin
NAVIGATION Policy Management > Policies > Settings tab > Checkin checkbox
The Checkin category assigns agent check-in settings to a policy.
Primary KServer
Enter the IP address or fully qualified host name of the machine ID's primary Kaseya Server. This setting is displayed in the Primary KServer column.
Kaseya agents initiate all communication with the Kaseya Server. For this reason the agents must always be able to reach the domain name or IP (Internet Protocol) address assigned to the Kaseya Server. Choose an IP address or domain name which can be resolved from all desired network(s), both on the local LAN and across the internet.
Best Practices: Although a public IP address may be used, Kaseya recommends using a domain name server (DNS) name for the Kaseya Server. This practice is recommended as a precaution should the IP address need to change. It is easier to modify the DNS entry than redirecting orphaned agents.
Primary Port
Enter the port number of either the primary Kaseya Server or a virtual system server. This setting is displayed in thePrimary KServercolumn.
IMPORTANT Do NOT use a computer name for your server. The agent uses standard WinSock calls to resolve a fully qualified host name into an IP address, which is used for all agent connections. Resolving a computer name into an IP address is done by NETBIOS, which may or may not be enabled on each computer. NETBIOS is an optional last choice that the Windows will attempt to use to resolve a name. Therefore, only fully qualified names or IP addresses are supported.
Secondary KServer
Enter the IP address or fully qualified host name of the machine ID's secondary Kaseya Server. This setting is displayed in the Secondary KServer column.
Secondary Port
Enter the port number of either the secondary Kaseya Server or a virtual system server. This setting is displayed in theSecondary KServercolumn.
Check-In Period
Enter the time interval for an agent to wait before performing a quick check-in with the Kaseya Server. A check-in consists of a check for a recent update to the machine ID account. If a recent update has been set by a VSA user, the agent starts working on the task at the next check-in. This setting is displayed in the Check-In Period column. The minimum and maximum check-in periods allowed are set using System > Check-in Policy.
Best Practices: The agent maintains a persistent connection to the Kaseya Server. As a result, quick check-in times do not effect response times from the agent. The quick check-in time sets the maximum time to wait before re-establishing a dropped connection. Setting all your machine's quick check-in time to 30 seconds guarantees each agent recovers from a dropped connection within 30 seconds, assuming connectivity is successful.
Bind to Kserver
If checked, the agent is bound to a unique Kaseya Server ID. Bound agents cannot check-in successfully unless the unique Kaseya Server ID they are bound to using the Agent > Check-in Control page matches the unique ID assigned to the Kaseya Server using the System > Configure > Change ID option. Prevents IP address spoofing from redirecting agent check-ins. A lock icon in the paging areas shows the agent is bound. To unbind agents, select machines IDs, ensure Bind to Kserver is unchecked and click Update. The lock icon no longer displays for selected machines.
Bandwidth Throttle
Limit the agent to consuming a maximum amount of bandwidth on the system with this control. By default the agent shares bandwidth with all other running applications so you typically do not need bandwidth throttle enabled. Disable bandwidth throttle by entering a 0.
Warn if multiple agents use same account
The Kaseya Server can detect if more than one agent is connecting to the Kaseya Server and using the same machine ID.group ID.Organization ID. This problem could be caused by installing an agent install package pre-configured with the machine ID on more than one machine. Check this box to receive notifications of more than one agent using the same account each time you log into the Kaseya Server as a user.
Warn if agent on same LAN as KServer connects through gateway
If you are managing machines that share the same LAN as your Kaseya Server then you may get this alert. By default all agents connect back to the Kaseya Server using the external name/IP address. TCP/IP messages from these agents travel through your internal LAN to your router, and then back to the Kaseya Server. Some routers do a poor job of routing internal traffic back through themselves. Check this box to receive a notification when the Kaseya Server detects an agent may be on the same LAN but connecting through the router.
NOTE Agents on the same LAN as the Kaseya Server should specify the internal IP address shared by both the agent and the Kaseya Server on the Check-In Control page.