From the policy: Make your monitoring checks as comprehensive as possible and use a logical flow to determine how best to identify issues. For instance, don’t assume that you can only use ping ...