We have asked sysadmins and network engineers how they quickly get on track with their network health at the beginning of the day. Do they run the NetCrunch console for a brief checkup or mostly rely on alerts to guide your day and fire up NetCrunch only to perform certain tasks? Learn about their answers below.
Not surprisingly, most engineers mention the active alerts window as the first one they study when opening the administration console in the morning. After a brief glimpse at the network atlas summary to check for any obvious burning points, the next task is usually…
An efficiently operating IT infrastructure is one of the conditions for success in business for an organization. Smaller and larger downtimes or performance degradations caused by its malfunctioning generate costs. They can also cause a loss of image and even lead to the bankruptcy of the company. So what are the signs that your IT network is in trouble?
According to experienced IT administrators of AdRem Software, such signals can be divided into initial symptoms that are not necessarily a problem in itself but may signal negative trends. If you do not address them on time, they may spiral down…
In recent years, healthcare networks have become increasingly vulnerable to cyber-attacks. At the same time, there has been an explosion in the number and variety of medical IoT devices that are online or connected to a larger network. The classic narrative of insecure medical devices is related to the fact that older devices were not designed to be connected to computer networks. However, many newer ones are at least as insecure as the legacy equipment.
Legacy medical IoT devices may lack security features, but newer ones built around commodity components can have a whole different set of vulnerabilities that potential…
For successful and fast root cause analysis, it is recommended to monitor as many metrics, statuses, and data sources as possible. It does not mean being notified about every detail though! You can stay informed and preserve your sanity with advanced NetCrunch features that help your network diagnose issues and self-heal in the everyday, repetitive situations while informing you about critical situations or anomalies.
NetCrunch rule-based monitoring
NetCrunch comes with predefined Monitoring Packs for various devices, systems, and applications that allow to monitor the same type of element in the same way. In this way, you can easily control monitoring…
Monitoring Windows tasks can be a challenge as there is no easy way of retrieving information about them. Starting from version 10.9 NetCrunch introduced dedicated sensor and system view to view and monitor Windows tasks
A new view available in the Node Status of the Windows machines allows you to view all Windows tasks configured on this machine.
All tasks in this compact view can be searched by their name, path, status, or trigger which makes search extremely easy and quick.
Different folder on the left pane will filter out tasks even quicker.
Failed tasks will be marked with the…
Another major NetCrunch update with many changes, fixes, and 16 new features! Among them, the powerful are:
📍 New Sensor — Windows Task Scheduler
📍 New system view for Windows — Windows Scheduled Task
📍 New Network Service — Windows RDP
📍 New Integration with ServiceDesk Plus
📍 REST API update
📍 11 new Monitoring Packs
See what’s new ➡️ https://bit.ly/2zKNqAf
Due to the pandemic caused by the COVID-19 virus, many companies decide to send employees to work remotely, often on their own computer equipment. Unfortunately, organizations that have never before considered such a movement do not yet have adequate rules governing this mode of work. What’s worse, it’s challenging to prepare them on the spot. The increasingly popular BYOD (Bring Your Own Device) solution comes with help for IT teams. Here are the Top 10 BYOD Best Practices that you can implement now.
1) Limit OS versions and device platforms to reduce IT support overload
Consider what device platforms and…
Remote work is growing and sometimes indispensable. There is a number of different VPN services that can be used to provide secure access to company networks for remote workers or those traveling away from the office. This article will describe how to set up VPN Monitoring in NetCrunch on the example of Windows VPN
When installing additional services to a Windows Machine, very often additional counters become available in the perfmon- this is one of the easiest ways to get information related to different services.
In this particular scenario, it’s possible to pull data related to RAS (Remote Access Services)…
With consumer privacy laws becoming stricter, companies are facing increasing pressure to secure their databases. With GDPR now in full swing, companies can face fines of up to 10 000 000 Euros or 2% of their annual turnover.
Data security is no longer something that we can take lightly. In America alone, cybercrime costs around $525 million annually. Clearly, it’s time to start taking extra steps to ensure cybersecurity and prevent breaches.
In this post, we’ll look beyond your basic anti-virus programs. Instead, we’ll focus on an issue that is easy to overlook — Port Security.
Computers must connect to…
Modern IT systems are so complicated that solving any problems must be based on proper data provided in real-time. However, data alone is not enough. What matters is not only access to them but also the ability to interpret them thoroughly and select them properly. The times when the problem could be traced based on several possible causes have gone forever. Today’s standards are higher.
Contemporary tools supporting the work of administrators have enormous potential — data about the work of networks and IT services support the work of the company, and the information collected by them helps other decision-makers…