Blog entries

Using alternate PING utilities to test your network

Handling problems monitoring low latency networks Low latency networks are the ideal media; in typical intranet all the hosts can be reached in a few milliseconds. Monitoring tools, starting from typical...
Read More

Use proxy to process complex or aggregated data

Use intermediate hosts to process multi-source or complex data Imagine you need a monitor to react to a derivative of several performance values. For example, you could need to only trigger alert if CPU...
Read More

Use Windows Subsystem for Linux to enhance IPHost monitoring setups

Windows Subsystem for Linux (WSL): software tool improving monitoring capabilities Windows Subsystem for Linux (WSL) is a software component allowing to run Linux applications directly on Windows 10 and...
Read More

Make use of Python bundled with IPHost to create new monitors and alerts

Extend bundled Python with new modules to address your monitoring needs Scripting languages (VBScript, Python, PowerShell etc) are both flexible and convenient to create small scripts, to handle a simple...
Read More

Common pitfall of addressing registry entries in 64-bit operating system

Address correct registry entries from IPHost Accessing Windows registry (local or remote) is a typical way of gathering useful data. However, there’s a typical pitfall that can cause unexpected scripts...
Read More

Quick start monitoring by using lightweight monitors

Basic setup: use simple monitors There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network...
Read More

How to perform simple testing of critical network assets state

Simple network checks that can prevent major security issues Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences....
Read More

Maintain monitoring, backups and updates: basics of information security

Reinforce your assets security by following the basic principles There are three basic types of activity in information security – those that should be performed periodically to reduce possible risks...
Read More

Do you use uniform tools to perform monitoring in different environments?

Reduce time required to deploy monitoring setups by reducing the variety of tools While monitoring different types of OS, it is essential to reduce the number of tools used to a logical and reasonable...
Read More

SNMP vs WMI: the advantage of less resource consuming monitor types

Are you using one of notable ways to reduce load on your servers? WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications....
Read More

Do you watch your remote conferencing services status?

Are your remote conferencing tools in working order? Nowadays, many people, even those far from IT industry, depend on remote conferencing services, either on premises, or global ones. Unless the status...
Read More

Handling the emerging security challenges and possible concept change

What upcoming changes to security landscape should be taken into account? With current global crisis spreading into multiple areas of information technologies, it is crucial to learn how are the security-related...
Read More

Universal security and network monitoring rules for everyday use

What rules should be followed to keep your network monitoring setup up-to-date It’s no secret that information threats appear in numbers nowadays. It may be time to refresh some typical rules, tested...
Read More

Handling security and capacity challenges when working remotely

What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from home. While it is the safest approach to diminish possible...
Read More

How to create and monitor redundant means to access network

Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar...
Read More

Make sure your Web servers support modern security protocols

Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure...
Read More

Prevent security issues when monitoring with SNMP family of protocols

Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol...
Read More

Intrusion detection techniques: monitor and react to unusual activity

Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques...
Read More

Active response monitoring: first aid for your services

Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to alert people in charge to detected problems. However, IPHost...
Read More

Security monitoring optimization: typical problems and their solutions

Optimizing security monitoring Security issues can be a challenge; preventing them via properly set up monitoring can save many resources. However, as network grows, the list of resources subject to monitoring...
Read More