6.9.7. Services and processes
Overview
The Services and Processes report provides real-time monitoring of all ChronoScan-related background services and processes running across your system.
It helps administrators quickly verify which services are active, review their runtime parameters, detect configuration issues, and ensure systems are running with correct licenses and versions.
Fields/Columns
|
Column
|
Description
|
|
status
|
Current state of the process/service (active, inactive, etc.)
|
|
process_id
|
Unique identifier of the running process
|
|
service
|
Name/type of the ChronoScan service or process
|
|
service_name
|
Path or name of the actual executable running
|
|
is_service
|
Flag: 1 if running as a Windows service, 0 if as a regular process
|
|
date_start
|
Start date and time of the process/service
|
|
date_update
|
Last update or heartbeat date/time
|
|
server
|
Name of the server/machine running this process
|
|
params
|
Command-line parameters or startup arguments
|
|
usr_name
|
Name of the user running the process/service
|
|
is_licensed
|
Flag: 1 indicates the process is running under a valid license
|
|
chrono_ver
|
ChronoScan software version number of the running process/service
|
|
thread1
|
Identifier of primary thread or additional process info (internally used for diagnostics)
|
Toolbar
|
#
|
Button / Option
|
Description
|
|
1
|
Updated
|
Refresh the view to display the latest processes/services state.
|
|
2
|
Service
|
Filter to show only Windows Services.
|
|
3
|
Active
|
Filter to show only currently active processes and services.
|
Usage Tips
-
Status coloring: Active services/processes are highlighted in green for quick identification.
-
Process details: Review parameters and version columns to ensure correct deployment and licensing.
-
Heartbeat/Update: Use date_update to monitor health/liveness; an outdated timestamp may suggest a stalled or disconnected service.
-
Filtering: Use toolbar filters to quickly drill down to only services, only active processes, or all background workers.