Operations | Monitoring | ITSM | DevOps | Cloud

How to Monitor User Permissions on Linux Servers With SolarWinds Server Configuration Monitor

Understanding who has permissions to what and how those permissions levels change over time is an important piece of the puzzle when it comes to protecting sensitive data from getting into the wrong hands. However, this can be a difficult task when dealing with permissions on Linux servers and files. In this video, we'll show you how you can see who has access on your Linux servers, monitor and alert on changes to those permissions, and track the changes over time for auditing purposes.

Preparing for the Unexpected: How to Monitor Logs for Anomalies

Hidden among your normal, everyday logs are any number of unexpected events and anomalies. These events can provide key insights when troubleshooting problems, tracing transactions, or monitoring performance and behavior. However, finding them can be challenging, especially if you’re unsure of what, or how, to look for them. Searching for unexpected events involves more than just searching for keywords like “error” or “critical”.

How to Solve Real World Application Problems With APM - SolarWinds Lab Episode #83

Based on one of the most popular SWUG™ (SolarWinds User Group) sessions of 2019, Jim Hansen, SolarWinds VP of application management products, shows you how to combine user experience monitoring with custom metrics, distributed tracing, log analytics, and log management to provide unparalleled visibility into your custom applications. Jim will demonstrate, step by step, how Pingdom®, AppOptics™, and Loggly® integrate with one another to help you pinpoint performance issues and keep your end users happy.

Why Transaction Tracing is Critical for Monitoring Microservices

Teams switching from a monolithic application architecture to microservices often face a jarring realization: their time-tested troubleshooting techniques don’t work as effectively. A microservice consists of many independent, distributed, and ephemeral services with varying capabilities for monitoring and logging. Techniques such as stack traces are effective troubleshooting tools in monoliths, but only paint a small portion of the big picture in a microservice-based application.

Quicker Azure Monitoring, Linux Change Detection, New API Poller - SolarWinds Lab #82 (Part 2)

The first step in improving system monitoring and visibility is getting data flowing sooner rather than later. For systems engineers managing diverse resources, it can be easier said than done. In this applications- and systems-focused conclusion of our year-end performance series, Server & Application Monitor (SAM) Senior Product Manager Serena Chou joins Head Geeks Patrick Hubbard and Sascha Giese to share shortcuts to streamline Azure monitoring configuration and get the cloud performance data you need, now.

How to Harden Servers With PowerShell and Change Monitoring

Server and application configurations are a fundamental piece of securing your environment. If unauthorized changes are made to these configurations, you can be exposed to serious vulnerabilities. Learn how to harden your servers using PowerShell scripts in SolarWinds® Server Configuration Monitor. In this video, we'll create a custom profile including several PowerShell scripts to monitor changes to different aspects of your servers.

How to Monitor Changes to Local Certificates

Local certificates provide a multitude of security benefits. From encrypting emails and allowing easier authentication, to securing connections between web browsers and your web servers, they're a necessary part of any network. Learn how to monitor changes to local certificates with SolarWinds® Server Configuration Monitor.