Introducing IPHost mobile client
Getting Push notifications on your mobile devices We are glad to introduce IPHost mobile app (currently available for Android 4.4 or newer). To start using Push notifications on your Android device(s),...
Using alternate PING utilities to test your network
Handling problems monitoring low latency networks Low latency networks are the ideal media; in typical intranet all the hosts can be reached in a few milliseconds. Monitoring tools, starting from typical...
Use proxy to process complex or aggregated data
Use intermediate hosts to process multi-source or complex data Imagine you need a monitor to react to a derivative of several performance values. For example, you could need to only trigger alert if CPU...
Use Windows Subsystem for Linux to enhance IPHost monitoring setups
Windows Subsystem for Linux (WSL): software tool improving monitoring capabilities Windows Subsystem for Linux (WSL) is a software component allowing to run Linux applications directly on Windows 10 and...
Make use of Python bundled with IPHost to create new monitors and alerts
Extend bundled Python with new modules to address your monitoring needs Scripting languages (VBScript, Python, PowerShell etc) are both flexible and convenient to create small scripts, to handle a simple...
Common pitfall of addressing registry entries in 64-bit operating system
Address correct registry entries from IPHost Accessing Windows registry (local or remote) is a typical way of gathering useful data. However, there’s a typical pitfall that can cause unexpected scripts...
Quick start monitoring by using lightweight monitors
Basic setup: use simple monitors There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network...
How to perform simple testing of critical network assets state
Simple network checks that can prevent major security issues Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences....
Maintain monitoring, backups and updates: basics of information security
Reinforce your assets security by following the basic principles There are three basic types of activity in information security – those that should be performed periodically to reduce possible risks...
Do you use uniform tools to perform monitoring in different environments?
Reduce time required to deploy monitoring setups by reducing the variety of tools While monitoring different types of OS, it is essential to reduce the number of tools used to a logical and reasonable...
SNMP vs WMI: the advantage of less resource consuming monitor types
Are you using one of notable ways to reduce load on your servers? WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications....
Do you watch your remote conferencing services status?
Are your remote conferencing tools in working order? Nowadays, many people, even those far from IT industry, depend on remote conferencing services, either on premises, or global ones. Unless the status...
Handling the emerging security challenges and possible concept change
What upcoming changes to security landscape should be taken into account? With current global crisis spreading into multiple areas of information technologies, it is crucial to learn how are the security-related...
Universal security and network monitoring rules for everyday use
What rules should be followed to keep your network monitoring setup up-to-date It’s no secret that information threats appear in numbers nowadays. It may be time to refresh some typical rules, tested...
Handling security and capacity challenges when working remotely
What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from home. While it is the safest approach to diminish possible...
How to create and monitor redundant means to access network
Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar...
Make sure your Web servers support modern security protocols
Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure...
Prevent security issues when monitoring with SNMP family of protocols
Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol...
Intrusion detection techniques: monitor and react to unusual activity
Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques...
Active response monitoring: first aid for your services
Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to alert people in charge to detected problems. However, IPHost...