Tag: server-management

Customizing ASAM module in NetFlow Analyzer

The previous blog was on ASAM will have given you an idea about the class “Scan and Probes” available with NetFlow Analyzer. Now that we know how the events are triggered we need to narrow it down, that the specific events or unwanted events can be ignored. When I say unwanted events, I mean the events that are deemed trusted or allowed network activities for certain resources and problems

Allowing temporary access to sensitive IT resources

Assume the scenario below: You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A developer has to be provided time-limited, temporary access to the DBMS, say for a day

How do you deploy configuration changes to production network?

Administrators working on production networks often face the need to carry out changes to the configurations of switches, routers, firewalls and other devices. The change could be a trivial one to modify a minor setting or might be a major one like upgrading the firmware. In both the scenarios, configuration changes to a device in production network requires planning, coordination, attention, diligence and visibility

More security to your network with NetFlow Analyzer’s ASAM

If you are looking for a tool to monitor your network bandwidth and keep a watch on the overall security snapshot of the network, then NetFlow Analyzer along with the Advanced Security Analytics Module is the perfect fit for you. With the release of the new version of ASAM, a number of new features have been added to it. This makes the ASAM the best fit to perform security analytics.

Desktop Central August Newsletter

Newsletter – August 2011 Greetings from ManageEngine Desktop Central! We are happy to announce the availability of latest hotfix to Desktop Central 7 – Build 70234. Here’s the complete list of enhancements & bug fixes over previous hotfix: Enhancements & Bug Fixes Enhancements Ability to automatically scan to fetch the systems’ warranty has been included for Dell, HP and Toshiba computers. Moving Desktop Central installation from one computer to the other is made easy with the option to provide the details of the new computer in the user interface

Performance based IT Shop Part 2

Not all IT problems come under the domain of the network engineer. In my previous Blog , I talked about IT shops having a hodge-podge set of tools. There are various reasons, but the real inefficiency is when these tools perform the same functions. There becomes a time and need to look at the IT problems from different perspectives. A few examples below: Kenn Nied, Senior Network Engineer at WA State Board for Community and Technical Colleges, illustrates this encounter. While looking at OpManager from a networking point of view, the operator sees alerts that a few switches and a firewall are unresponsive. Is it faulty equipment or an attack? Then turning to a Security mindset, he looks at ManageEngine Device Expert to see real time and historical configuration changes. In one case, it was identified that there was a Firewall rule change made and realized it was a misconfiguration that caused the switch unresponsive. Diagnostic time was minimal. Albert E.

Managing Risk: Rapidly responding to security alerts from network device vendors

Assume the scenario below: The Cisco Product Security Incident Response Team (PSIRT) publishes an important security alert Releases an advisory suggesting firmware upgrage of routers The security issue on hand is quite serious, urgent and cannot be ignored Impact assessment of devices suggests firmware upgrade of more than 1500 routers to be done immediately Network administrators working on production networks involving a large number of network devices such as switches, routers, firewalls and other devices would have often faced a situation similar to the one above. Effectively managing risk is an important aspect of network security. But, manual process for reacting to security alerts is not only time-consuming, but also error-prone

An automated solution to enforce IT policy on standard password practices

Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among the numerous guidelines: Usage of unique, strong passwords across all IT resources Rotating the passwords at periodic intervals Role-based access controls for IT resources Enforcing the IT policy with respect to the privileged passwords turns out to be a daunting task to carry out manually.