Blog entries

Handling security and capacity challenges when working remotely

What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from home. While it is the safest approach to diminish possible...
Read More

How to create and monitor redundant means to access network

Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar...
Read More

Make sure your Web servers support modern security protocols

Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure...
Read More

Prevent security issues when monitoring with SNMP family of protocols

Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol...
Read More

Intrusion detection techniques: monitor and react to unusual activity

Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques...
Read More

Active response monitoring: first aid for your services

Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to alert people in charge to detected problems. However, IPHost...
Read More

Security monitoring optimization: typical problems and their solutions

Optimizing security monitoring Security issues can be a challenge; preventing them via properly set up monitoring can save many resources. However, as network grows, the list of resources subject to monitoring...
Read More

Make your monitoring efficient: use clear and visible alerts

An efficient monitoring setup Default monitoring settings can be quite usable for most use cases; however, as the monitoring setup grows, certain configuration tweaks might be required to make monitoring...
Read More

Optimize email notifications – maximum flexibility with minimum efforts

Building flexible email notifications By default, in default IPHost installation the simplest email notification is used. While it’s suitable for most small or testing setups, more complex notifications...
Read More

Custom Nagios plugins

Custom Nagios plugins Nagios is a well-known monitoring framework; it’s also known for its plugins, the software components that are actually providing monitoring capabilities. IPHost allows using...
Read More

Use SNMP to monitor whatever you need

Receive monitoring data via SNMP SNMP (Simple Network Management Protocol) is a popular protocol family, supported by majority of network devices, as well as available for every more or less popular operating...
Read More

Make your monitors nearly real-time

Send events instead of polling for them Most of existing IPHost monitor types are passive, meaning they are being polled by IPHost – directly, or via remote network agent. There are two “active”...
Read More

Beyond the standard monitoring

Non-standard monitoring use cases In most cases, monitoring is often viewed as pretty dumb alarm system – built to notify if something goes wrong. However, there could be cases when monitoring software...
Read More

Web site monitoring: quick checks

Is Web site alive? Web site monitoring looks simple and straightforward. However, there still are pitfalls, not so obvious to many webmasters. How would you check that a site is alive and contains expected...
Read More

Providing backup systems

Single points of failure Monitoring, apart from backing up and staying updated is one of fundamental principles of information security. However, every one of those principles is in fact intertwined with...
Read More

Real-time monitoring

Monitoring events in real time Monitoring can be divided into two basic types: real-time and scheduled. In the first case, piece of monitoring software receives monitoring data and acts appropriately....
Read More

Template it

Reuse and inherit if you happen to monitor a small network, your task may be rather simple. A few monitors can be either generated via network discovery, or added manually. Same is true about setting up...
Read More

Sending alerts to external services

Using external services to distribute alerts Email remains the primary notification media (with SMS and push notifications coming next). However, email may be not the most convenient means to get notified...
Read More

Preventing security issues

Monitoring security issues: quick start Security incidents plague the majority of Internet resources. It is still possible to notice most security issues, both actual and possible, before any damage is...
Read More

“Monitor everything” approach: did you miss anything?

Common pitfalls in setting up network monitoring In most cases, when a significant new service (device, application) is brought online, it is not put to monitoring immediately. This is a matter of common...
Read More