Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

How to Monitor the Event Log for Errors

The Event Log Monitor can monitor one or more event logs on the system, including the standard Application, Security and System logs as well as custom event logs. You have complete flexibility in specifying which types of events are important to you and which types you'd like to ignore. In addition, you can manually add dynamic event sources (event sources that register themselves, add an event, and then unregister themselves).

How to Use Smart Config

Video tutorial on how to use Smart Config in PA Server Monitor. The Smart Config feature is a very useful tool for quickly adding servers or devices to be monitored. You specify one or more servers, and the monitors inspect the servers/devices and create appropriate monitors for each one based on default settings. You can access the feature by clicking the Smart Config button at the top of the Console. You can paste a list of server names or IP addresses into an edit box. You can also press the Discover button to find a list of servers for you (more on that below).

Threat Hunting with Network Metadata

Maintaining a safe and secure network is not optional with an ever increasing amount of threats and methods of intrusion. Learn how you can leverage network metadata for fast and effective threat hunting, today. In this webinar, you will see how bringing together NetOps and SecOps information can help your organization continually locate and validate past and present indicators of compromise more efficiently

7 ITIL® 4 tips for service professionals by the ITIL 4 co-author | ITIL 4 overview, benefits & more

Presented by Barclay Rae, ITIL 4 co-author and a well-known ITSM consultant, this webinar focuses on the practical application of ITIL 4, using value streams, and the various areas of professionalism that are now included as part of the ITIL 4 portfolio.