Table of Contents
- Introduction
- System Requirements
- Assign Service Logon As Credentials
- Server Configuration
- Agent-Based Monitoring
- Data Providers
- Directory Services
- Audit Work Items
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Log Management Templates
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- PowerShell Script Template
- Registry Value Monitor Template
- Active Directory User Monitor Template
- Active Directory User Integrity Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Network and Application Monitor Templates
- Database Monitor Template
- Directory Service Monitor Template
- DNS Blacklist Monitor Template
- DNS Monitor Template
- Domain Expiration Monitor Template
- Network Speed Monitor Template
- Ping Monitor Template
- SQL Server Shrink and Backup Template
- SSH Shell
- TCP Port Scan Monitor Template
- Website Monitor Template
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Monitors
- Reports
- Auto-Configurators
- Filters
- Actions
- Schedules
- Environment Variables
- Options
- Account Lockout Monitoring and Reporting
- SNMP
- SSH Shell
- Exporting and Importing Configuration Objects
- Shared Views
- Auto-Config Host Assignment Properties
- General Executable Properties
- Assign Actions
- Assign Directories
- Assign Disks
- Assign Shares
- Assign Files
- Assign Consolidated Logs
- Assign Event Logs
- Assign Active Directory Audit Logs
- Target Files and Sub-Directories
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Define CSV and W3C Log Entry Columns
- Active Directory User and Group Filters
- Explicitly Assigned Logs
- File Explorer
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- Select Folder or File
- Command Line Interface
- Troubleshooting
- Terminology
Azure Relay Hybrid Connection
The Server Manager service enables administrators to manage and users to push logs from remote installations. Azure Relay enables you to install the service on an internal server that is not publicly accessible then accept connections from remote installations such as WFH users. Each remote installation simply needs to specify the Azure Relay connection settings to connect. The relay runs on port 443 so users do not need to open any ports on their local firewall.
![]() |
To configure an Azure Relay you will need an Azure subscription. If you do not have one, create a free one before you begin. |
To configure Azure Relay through Microsoft's Azure Portal:
-
Please follow the documentation provided by Microsoft to create your own Azure Relay Hybrid Connection within your Azure subscription:
Azure App Service Hybrid Connections
Get started with Relay Hybrid Connections
To configure the service to use Azure Relay:
-
Configuration is implemented through the cbsmsrv.exe.config file located in the installation directory. The default location is:
C:\Program Files\Corner Bowl\Server Manager 2022\cbsmsrv.exe.config - Open the file in a text editor then find the <server> section.
- Set 'value' to true.
- Set 'relayNamespace' to the Hybrid Connection Url. For example: https://corner-bowl.servicebus.windows.net/log-manager
- Set 'connectionName' to the Hybrid Connection name. For example: log-manager
- Set 'keyName' to name of the Shared Access Policy key name. For example: RootManageSharedAccessKey
- Set 'key' to either the primary or secondary key found when you select the Shared Access Policy key name.
- Save your changes and restart the Corner Bowl Server Manager service.
<server> <host value="0.0.0.0" /> <port value="21843" /> <tls value="false" certificate="issuedTo" requireRemoteCertificate="false" allowSelfSignedCertificate="false" checkCertificateRevocation="true" allowCertificateChainErrors="false" /> <azure value="false" relayNamespace="" connectionName="" keyName="" key="" /> </server>
To configure the management console to use Azure Relay:
- Start the management console.
- From the login screen, set the Connection type to Azure Relay Hybrid Connection.
- Set the values to the same values you set to configure the server connection above.
- Specify your administrator username, password and domain as you normally would within your network.
- Click Login