Blog entries

Quick start monitoring by using lightweight monitors

Basic setup: use simple monitors There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network...
Read More

How to perform simple testing of critical network assets state

Simple network checks that can prevent major security issues Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences....
Read More

Maintain monitoring, backups and updates: basics of information security

Reinforce your assets security by following the basic principles There are three basic types of activity in information security – those that should be performed periodically to reduce possible risks...
Read More

Do you use uniform tools to perform monitoring in different environments?

Reduce time required to deploy monitoring setups by reducing the variety of tools While monitoring different types of OS, it is essential to reduce the number of tools used to a logical and reasonable...
Read More

SNMP vs WMI: the advantage of less resource consuming monitor types

Are you using one of notable ways to reduce load on your servers? WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications....
Read More

Do you watch your remote conferencing services status?

Are your remote conferencing tools in working order? Nowadays, many people, even those far from IT industry, depend on remote conferencing services, either on premises, or global ones. Unless the status...
Read More

Handling the emerging security challenges and possible concept change

What upcoming changes to security landscape should be taken into account? With current global crisis spreading into multiple areas of information technologies, it is crucial to learn how are the security-related...
Read More

Universal security and network monitoring rules for everyday use

What rules should be followed to keep your network monitoring setup up-to-date It’s no secret that information threats appear in numbers nowadays. It may be time to refresh some typical rules, tested...
Read More

Handling security and capacity challenges when working remotely

What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from home. While it is the safest approach to diminish possible...
Read More

How to create and monitor redundant means to access network

Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar...
Read More

Make sure your Web servers support modern security protocols

Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure...
Read More

Prevent security issues when monitoring with SNMP family of protocols

Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol...
Read More

Intrusion detection techniques: monitor and react to unusual activity

Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques...
Read More

Active response monitoring: first aid for your services

Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to alert people in charge to detected problems. However, IPHost...
Read More

Security monitoring optimization: typical problems and their solutions

Optimizing security monitoring Security issues can be a challenge; preventing them via properly set up monitoring can save many resources. However, as network grows, the list of resources subject to monitoring...
Read More

Make your monitoring efficient: use clear and visible alerts

An efficient monitoring setup Default monitoring settings can be quite usable for most use cases; however, as the monitoring setup grows, certain configuration tweaks might be required to make monitoring...
Read More

Optimize email notifications – maximum flexibility with minimum efforts

Building flexible email notifications By default, in default IPHost installation the simplest email notification is used. While it’s suitable for most small or testing setups, more complex notifications...
Read More

Custom Nagios plugins

Custom Nagios plugins Nagios is a well-known monitoring framework; it’s also known for its plugins, the software components that are actually providing monitoring capabilities. IPHost allows using...
Read More

Use SNMP to monitor whatever you need

Receive monitoring data via SNMP SNMP (Simple Network Management Protocol) is a popular protocol family, supported by majority of network devices, as well as available for every more or less popular operating...
Read More

Make your monitors nearly real-time

Send events instead of polling for them Most of existing IPHost monitor types are passive, meaning they are being polled by IPHost – directly, or via remote network agent. There are two “active”...
Read More