Use the Locations tab to configure network locations that you would like to use for monitoring and reporting media quality. You can also use this tab to change the threshold levels that are used to control alerting at the network locations.
Location Discovery Mode
Locations can be automatically discovered from the endpoint call quality reports, or you can specify which locations you would like to monitor. The locations that are configured on this page are also used within Monitoring Server reports to make report queries more granular and to properly target queries for your organization.
By default, the Monitoring Server will automatically create subnet locations for monitoring according to the subnet mask and IP address that are sent from supported Voice over IP (VoIP) endpoints at the end of the call. This approach is ideal if your organization has fewer than 100 well-organized subnets. However, depending on the size of your organization and how your organization manages subnets, you may want to configure the locations.
For Automatic discovery, you can select how you want Monitoring Server to create the subnet locations. If you choose Endpoint subnets, the Monitoring Server creates subnet locations based on the subnet mask and IP address sent from supported VoIP endpoints at the end of a call. If you choose Single subnet mask, the Monitoring Server creates subnet locations by applying a single configured subnet mask to the IP addresses that are sent from supported endpoints.
You can use imported locations to logically group one or more subnets together, such as all wireless networks for a building or all subnets for a site. Click Import,and a wizard will help you import a comma-separated values (CSV) file. For details about CSV files, see the Operations section of the Microsoft Office Communications Server 2007 R2 Technical Library on TechNet.
Note: To enable effective monitoring and reporting, importing fixed locations is highly recommended for medium to large size organizations.
Click Locations to use custom monitoring thresholds or use the default monitoring thresholds.
Learn More Online
Click to expand or collapse