TSF – Giải pháp IT toàn diện cho doanh nghiệp SMB | HCM

PRTG - How to Configure Email Alerts in PRTG Network Monitor

In this tutorial, you’ll learn how to configure email alerts in PRTG Network Monitor.
This step-by-step guide explains how to set up notification triggers and email delivery correctly.
Alerting is a critical part of any monitoring system.
Without proper alerts, network issues can go unnoticed for hours.
PRTG allows IT administrators to receive instant notifications for warning and critical events.
In this video, we demonstrate best practices for configuring reliable email alerts.
You’ll also learn how to test and troubleshoot alert notifications.
Follow this guide to ensure you never miss important network incidents.

Step 1: Install Puttygen

Step 2: Create private and public SSH keys (Use Puttygen to create them)

Save public key

Change the private key to openssh (prtg only accepts openssh)

Step 3: Assign the public key to the user

1. Pfsense
Copy the public key and paste it into Pfsense  User  Admin

Enable SSH for Pfsense  System  Advanced

2. Ubuntu/Proxmox VM

🔹 Step 1: Create a user (if not already created)


sudo adduser prtg
________________________________________
🔹 Step 2: Create the .ssh directory


sudo mkdir -p /home/prtg/.ssh
sudo chmod 700 /home/prtg/.ssh
sudo chown prtg:prtg /home/prtg/.ssh
________________________________________
🔹 Step 3: Assign the public key


Open file:
sudo nano /home/prtg/.ssh/authorized_keys
Paste the ENTIRE public key into one line
(for example, starting with ssh-rsa or ssh-ed25519)
________________________________________
🔹 Step 4: Set permissions (EXTREMELY IMPORTANT)


sudo chmod 600 /home/prtg/.ssh/authorized_keys
sudo chown prtg:prtg /home/prtg/.ssh/authorized_keys
________________________________________
🔹 Step 5: Check SSH config


sudo nano /etc/ssh/sshd_config
Make sure it is (or uncommented):
Ctrl + W to search

PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
(Optional – recommended for PRTG):
PasswordAuthentication no
PermitRootLogin no

Restart SSH:
sudo systemctl restart ssh

Step 4: Assign private key to PRTG


On PRTG, add the private key certificate SSH (copy the private key from the openssh file).

You must enter the user as root (even though this user doesn’t exist on pfsense). The root user bypasses the default console interface of pfsense.

Pfsense not monitor ssh memory

If the VM is a different Ubuntu/Proxmox instance, just enter the user you created to get the SSH key.