Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Prevent security issues when monitoring with SNMP family of protocols

Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol versions (v1, v2c, v3), all of those supported by IPHost Network Monitor. SNMP is a popular means of watching network devices of any kind (nowadays literally every device with an IP address can support SNMP); however, there are typical problems users can encounter when using SNMP-enabled devices in local or global network.

The Top 8 Best Practices for Windows File Server Auditing

Windows file server auditing is a great way to monitor what is going on with all the files stored on your company’s servers. You can find out who is accessing files, creating new files, deleting files, copying files, and moving files. To tap into the benefits of Windows file server auditing, you must first understand and use audit policy best practices.

NGINX 502 Bad Gateway: PHP-FPM

This post is part of a series on troubleshooting NGINX 502 Bad Gateway errors. If you’re not using PHP-FPM, check out our other article on troubleshooting NGINX 502s with Gunicorn as a backend. PHP-FastCGI Process Manager (PHP-FPM) is a daemon for handling web server requests for PHP applications. In production, PHP-FPM is often deployed behind an NGINX web server. NGINX proxies web requests and passes them on to PHP-FPM worker processes that execute the PHP application.

GDPR Episode 2: A New Privacy Policy

What does it take to write a GDPR compliant privacy policy? It was easier than we realized! This is a continuation of our series on ensuring StatusGator complies with the terms of the European Union’s General Data Protection Regulation. The GDPR has very specific requirements for privacy policies. Companies must provide clear and accessible information about the personal data they collect and what they do with it.

Our award-winning IAM and insider threat prevention solutions highlighted at RSA Conference 2020

ManageEngine brought home its first set of accolades for 2020: two InfoSec Awards presented by Cyber Defense Magazine at RSA Conference 2020. Amidst the over 3,000 cyberdefense innovators that were assessed by Cyber Defense Magazine for its 2020 InfoSec Awards, ManageEngine was recognized for its identity and access management (IAM) offering, AD360, and for its insider threat prevention in Log360.

5 tips for ramping up on remote work in a hurry

If you think of it in terms of Tuckman’s stages of team development, suddenly shifting to remote en masse throws your team into “storming” mode. Confusion and frustration abound, and everything feels twice as hard as it should. (We know because we’ve been there.) Your goal right now is to get back to the “performing” stage and resume your regularly-scheduled level of productivity. Here are five ways to do that.

New Relic vs. Scout: which is right for you?

There's no type of monitoring tool that can get to the heart of a performance problem faster than Application Performance Management (APM). If you're making this decision, you may be choosing between New Relic and Scout. There are cases where New Relic is a better fit, clear cases where Scout fits like a glove, and some murky situations as well. Where do you fall? Below, I'll summarize the factors to consider when choosing your best APM product.

How to visualize data with Azure Monitor

So far, we’ve learnt how to collect data (part 2) and pull it into Azure Log Analytics (part 3), as well as how to actually work with the data using Kusto (part 4). Now it’s time to explore how we can visualize this data, make dashboards, share them with other teams in our organizations and so on. Unfortunately, dashboarding in Azure is not very sophisticated, and neither is it centralized.

Better IT Insights Lead to Better Outcomes for Organizations

I’ve always been a huge fan of mystery novels and true crime stories. It seems true crime is having an especially big moment right now, from serial killer documentaries to podcasts. Like so many people, I find myself drawn in as I read, watch, or listen to the criminal investigation. It’s fascinating how detectives work, diving into the smallest of details to solve massive crimes.