How Device Roles Reduce Administrative Headaches

How Device Roles Reduce Administrative Headaches

Here’s a familiar refrain in IT media: Today’s corporate networks are much different than they were 10, five, or even two years ago. It’s cliched, but it’s true: Modern IT networks are bigger, messier, and more dynamic than they used to be. For system and network administrators, that means it’s now a lot more difficult […]

How to Tune Windows System Monitor (Sysmon)

How to Tune Windows System Monitor (Sysmon)

One of the more disheartening aspects of log collection within the Windows Operating system are the limited number of out of the box events related to security. It is often desirable to capture any unknown or malicious running processes, capture the source process for outbound connections, identify modifications to files and the registry, and to […]

See It as It Happens: Live Activity View & Report in WhatsUp Gold 2019

See It as It Happens: Live Activity View & Report in WhatsUp Gold 2019

Your network is a living, breathing entity. Like a living body or an organic brain, it’s constantly moving things around and changing from moment to moment. Every single individual part is in continuous contact with and reacting to every other part. The job of your monitoring tool is to track all of this. Of course, […]

Centralizing Windows Event Forwarding

Centralizing Windows Event Forwarding

If you are a systems administrator or a security engineer, it is probable you have a requirement to filter and forward Windows event logs either directly or hierarchically. There are many alternatives available to accomplish this goal, one of which is Windows Event Forwarding (WEF).  In this article, you will learn to configure a simple […]

Checking Your Network’s Plumbing: Why You Need to Monitor Bandwidth

Checking Your Network’s Plumbing: Why You Need to Monitor Bandwidth

Everyone and everything in our modern connected world uses bandwidth. The pipes are now far bigger than the old 56kbps dial-up speeds most of the world endured once upon a time, so bandwidth is usually not seen as an issue by the vast majority of network users. Well, not until there’s a problem, that is. […]

As The Web Turns 30, The Digital Dark Age is Coming

As The Web Turns 30, The Digital Dark Age is Coming

The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves. Tim Berners-Lee, who is considered the founder […]

Network Bandwidth Usage: How To Optimize Your Network

Network Bandwidth Usage: How To Optimize Your Network

Company bandwidth usage has, for reasons other than expected growth, increased dramatically and continues to do so every year. Over time this usage is going to increase beyond your workforce’s limitations, which poses an important challenge for IT teams. How do you calculate and optimize the use of the bandwidth you have available to ensure your […]

Podcast: Log Management Basics – What Should You Collect?

Podcast: Log Management Basics – What Should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, […]

What is Bandwidth Monitoring?

What is Bandwidth Monitoring?

Monitoring bandwidth usage is a vital aspect of any network management strategy. Bandwidth monitors collect, monitor and analyze network traffic volume by end-point (user), port, interface and protocol (application). This information enables IT Admins to: Assure adequate bandwidth for business-critical applications Minimize the impact of non-critical or unauthorized network traffic Identify bandwidth bottlenecks such as […]