DEV Community

Cover image for #DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host
Samuel Adeduntan
Samuel Adeduntan

Posted on

#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

Integrating Windows into a Unified Monitoring Framework

Introduction

Operating systems are rarely the only option in contemporary IT environments. Cross-platform monitoring that unifies disparate systems into a single framework is necessary to provide true visibility and control. By incorporating a Windows host into the current configuration on Days 8 & 9, I broadened the reach of my monitoring. Through constant monitoring of both the Linux and Windows platforms, this integration made it possible for centralized oversight, streamlined management, and thorough insights into availability and performance throughout the whole infrastructure.

By installing the required tools and protocols, such as granting WMI or SSH access, and configuring the monitoring agent or service to gather and report data, cross-platform monitoring enables you to add and monitor a Windows host.

Objective

Integrating a Linux machine, a Windows server, and a Windows 10 computer into the monitoring system was my objective for Days 8 & 9. I successfully set up communication between the Windows host and the monitoring dashboard, configured the necessary monitoring agent, and confirmed that performance statistics and important system metrics were being appropriately gathered. By adding cross-platform infrastructure support to my monitoring environment, this step increased visibility and ensured operational consistency.

Detailed Procedure

Adding a Linux Machine to the Windows Host Group

screenshot1a

screenshot1aa

screenshot1

screenshot2

screenshot3

Windows server

Configured Windows Firewall to Allow Monitoring
On the Windows Server or Windows 10 machine:

I opened Windows Defender Firewall with Advanced Security.

screenshot4

I navigated to Inbound Rules → New Rule → Custom → ICMPv4-I

screenshot5

screenshot6

I allowed ICMP Echo Requests (Also Known as Pings).

screenshot1

screenshot2

screenshot3

I saved the rule and ensured it was enabled.
screenshot4

screenshot5

screenshot6

screenshot7

Enabled a Service to Monitor (IIS Example)

I opened PowerShell as Administrator. I installed the IIS Web Server:
Install-WindowsFeature -name Web-Server -IncludeManagementTools

screenshot1

screenshot2

I verified IIS by opening a browser on the Windows host:
http://192.168.92.10

screenshot3

Added Windows Host to Uptime Kuma

On the Uptime Kuma dashboard:

I clicked Add New Monitor.
I chose Ping.
Name: Windows Host - Ping
Hostname: 192.168.92.10
Interval: 60 seconds
I clicked Save.

Image1

Image2

Image3

I repeated the process to add an HTTP monitor:

Type: HTTP(s)
Name: Windows Host - IIS
URL: http://192.168.92.10

Image4

Image5

Image6

Verified Monitoring

I returned to the Uptime Kuma Dashboard. Both Ping and HTTP monitors displayed an 'UP' status.

Image7

I also opened the IIS default webpage from another machine to confirm accessibility.

Image8

Key Activities

  • I enabled ICMP (Ping) in Windows Firewall.
  • I installed and enabled IIS as a test web service.
  • I added Ping and HTTP monitors in Uptime Kuma for the Windows host IP.

Simulation of outage
I turned off the Windows server, and this was the prompt alert notification I got.

Image1

Telegram pop-up Alert notification
Image11

Image2

Up time Kuma Dashboard notification
Image3

Image4

Windows 10 Monitoring Setup

Configured Windows 10 Firewall to Allow Monitoring

I enabled the File and Printer Sharing (Echo Request – ICMPv4-In) rule in Windows Security → Firewall & Network Protection → Advanced Settings.
This allowed the Windows 10 machine to respond to Ping requests.
In Uptime Kuma, I added a Ping monitor pointing to the Windows 10 IP address.
This confirmed basic “is the host alive?” monitoring.

These are my procedures with screenshots.
I opened Windows Security → Firewall & Network Protection → Advanced Settings.

Image2

Image3

Image4

I enabled ICMP Echo Requests (Ping-In) to allow Uptime Kuma to ping the system.

Image5

I confirmed the rule was applied to the active network profile.

Image6

Added IIS (HTTP Web Page) for Service Monitoring

I pressed Win + R, typed optionalfeatures, and opened the Windows Features dialog.

Image1

I checked Internet Information Services (IIS) and also enabled the IIS Management Console.
I clicked OK, and Windows installed IIS.

Image2

Image3

Image4

I verified IIS by opening a browser on the Windows 10 machine and navigating to: http://192.168.92.142.

Image5

I also confirm this by accessing the local host from my laptop's Chrome web browser.

Image1
The default IIS landing page was displayed.

In Uptime Kuma, I added a new HTTP(s) monitor with the machine’s IP:

Image1

Image2

Image3

This gave me visibility into whether the Windows 10 host was alive and also serving a web page.

Monitored Another Built-in Service

In addition to Ping and IIS, I configured Uptime Kuma to monitor other built-in Windows 10 services.

SMB Monitoring (TCP 445)

I confirmed file sharing was enabled on the Windows 10 machine and allowed through the firewall.
I opened Control Panel → Network and Sharing Center → Advanced sharing settings.

Image1

Image2

Under my active network profile, I turned on File and Printer Sharing and Network discovery. I saved the changes.

Image3

Allowed SMB Through Windows Firewall

I opened Windows Defender Firewall → Advanced Settings → Inbound Rules.
I located the File and Printer Sharing (SMB-In) rules and enabled them.
Applied it to the correct profiles (Private, Domain, Public).
Image2

Verified SMB was Listening Locally
On the Windows 10 machine, I opened PowerShell and ran:
netstat -an | findstr 445

The output showed:
Image1

Added SMB Monitor in Uptime Kuma

On the Uptime Kuma dashboard, I clicked Add New Monitor and filled in the details:

Image2

Image3

Verified the Monitor
On the dashboard, the new SMB monitor switched to UP, confirming that the SMB service was reachable.
Image4

Integrating the Windows Host to the status page

Image1

Overview of all services status page

Image1

Image2

Image3

Image4

Imag5

Quick Stat

Image1

Image2

Image3

Image4

Telegram Alert notification

Image5

Image6

Image7

Image8

Conclusion & Success Goal Achieved

Visibility across heterogeneous platforms was successfully increased by integrating a Windows Server and a Windows 10 computer into the current monitoring configuration. I created a unified monitoring framework by turning on firewall rules, setting up IIS as a test service, and confirming connectivity with Ping, HTTP, and SMB monitors.

I implemented IIS web services, enabled ICMP monitoring, and verified other protocols, such as SMB (TCP 445). The outage simulation verified that when the Windows host went down, dashboard updates and alarms functioned as planned.

Centralized control of Linux and Windows servers is now possible with the Uptime Kuma dashboard, and Telegram real-time alerts guarantee prompt outage identification and quicker crisis response. The public status page's inclusion of the Windows hosts improved openness and gave a comprehensive view of the state of the infrastructure.

Success Goal Achieved:
The goal of cross-platform monitoring on Days 8 & 9 was accomplished in full. Through visibility and proactive notifications, the monitoring environment now guarantees operational consistency across many systems, enhances reliability tracking, and boosts stakeholder confidence.

Lessons Learned

  • Cross-Platform Consistency: By keeping an eye on both Windows and Linux from the same dashboard, blind spots are decreased, and operational efficiency is increased.
  • *Windows Firewall Optimization Is Essential: * Accurate monitoring requires proper firewall configuration (ICMP, SMB, HTTP).
  • Deeper understanding of host availability and service health is ensured by combining Ping, HTTP, and TCP tests in multi-layer validation.
  • Outage testing strengthens dependability by simulating shutdowns, which confirms real-time warning across several operating systems in addition to detection.

Top comments (0)