Click the Schedule button. The Schedule Job dialog box appears, as shown in

Chapter 22 ✦ Using Network Management Tools Looking at other network monitors You can purchase network monitors for 10 to thousands of dollars, depending on what you need and want. For your home network, or even a small-business network, you do not need an expensive program to monitor your network. Generally, you can perform monitoring with the programs Windows supplies, or you can find some shareware to help you in your task. ✦ One such shareware program is Active Network Monitor. For around 30, you can gather information from every computer on the network. ✦ Another program, Essential NetTools, is freeware and contains many network tools for diagnosing and monitoring networks and connections. Essential NetTools uses com- mands such as PING, NETSTAT, TRACEROUTE, and so on to monitor the network. You can monitor your own network using commands on your computer without these pro- grams. For more information, see Appendix B. Using System Monitor You can use the System Monitor to view your computer’s network or disk access in a graphi- cal picture. The program enables you to monitor running processes, memory usage, dial-up access, and more. Most Windows operating systems automatically install the System Monitor. Watching network traffic gives you an idea of where the bottlenecks are and the cause of some of the user’s problems. You can use the System Monitor in Windows 2000 or Windows XP to see how network traffic affects your computer. If you have a clientserver network, you can use the System Monitor to view each computer’s connections and network traffic. To use the System Monitor over the network, you need specific administrative permissions, user-level security, a remote service installed on your computer, and so on. If you plan to use the System Monitor over a clientserver network, see the Windows 2000 Server documentation. For your home or small-business network, you most likely won’t need anything so complex and complicated. Using the Windows 98 System Monitor You can use the Windows 98 System Monitor to see how your computer works with others on the network. Basically, you connect to a specific computer and then watch the interaction between the two on the System Monitor. The monitor records system processor activity, such as the amount of data flowing between the two computers, memory used, details of open files and transactions, and so on. To start the System Monitor, click Start ➪ Programs ➪ Accessories ➪ System Tools ➪ System Monitor. To exit the program, click File ➪ Exit. Figure 22-13 shows the System Monitor on a Windows 98 computer. The peak shown in the Kernel Processor category shows heavy processor usage during that time. For more informa- tion about the System Monitor, consult the Windows 98 documentation. Cross- Reference Part VI ✦ Managing the Network Figure 22-13: The System Monitor shows how your computer relates to the network. Using the Windows XP System Monitor The XP System Monitor is similar to the Windows 98 program. The System Monitor appears in a Microsoft Management Console, which is the underlying frame of all Windows 2000 and XP administrative tools. You use the System Monitor to measure processes that are most active, or that drain the majority of resources. To start the Windows XP System Monitor, click Start ➪ Control Panel. Double-click Administrative Tools and double-click Performance. To exit the System Monitor, click File ➪ Exit. Figure 22-14 illustrates the Windows XP System Monitor. You can see peaks in the graph that identify when another computer used this computer’s resources. Using third-party system monitors You can find many third-party system monitors on the Internet. Some system monitors are targeted for viewing one computer’s processes, others enable you to view the network and connections, and yet other monitors enable you to view activities over the Internet. Internet spyware, or surveillance software, is an up-and-coming category of system monitors. This software monitors your spouse, children, or others’ activity on the Internet. For exam- ple, if your daughter receives an e-mail from a friend, you receive the e-mail at the same time. Many programs can also record chats and log keystrokes.