Power Admin

power admin

Monitoring 101: Collecting the Right Data

When it comes to business, data is everything. Whether it’s sales, supply, marketing, or your I.T. systems, every day is a constant stream of decisions to be made. To make the right decisions, you need enough knowledge. To have enough knowledge, you need the right data. What’s the best way to collect all this data? In the information age, there’s so much data out there, all the time.

power admin

VPN vs. Remote Desktop - Gateway Security Concerns

VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user – whether that’s from prying eyes or the need to have physical access to their business network. But while each option can be attractive, neither is without its security concerns.

power admin

How To Keep Track Of Your Android Applications

Keeping track of application usage and the installation of software on your Android phone or tablet is an essential activity, both for device management and your overall security. In this regard, it’s also advisable to monitor how your Android applications are tracking you, in terms of your physical location, activities on the local device, and online. Here are some tips on how to achieve this.

power admin

5 Cybersecurity Trends for 2020

The world of cybersecurity is fast-paced and constantly changing. Where certain strategies once worked perfectly, new threats eventually emerge. Keeping up with a growing number of malicious influences and implementing effective security strategies to combat them involves staying up to date on yearly shifts in cybersecurity practices across industries. Here, we have put together a short list of important trends in cybersecurity that are likely to develop throughout 2020. Read on to learn more.

power admin

Hardening Your Windows Server in 2020

Security is vital for protecting company assets and data subjects. Evolving data protection regulations, like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), have thrown light on security breaches and the security architecture of those compromised. In 2019, the global average cost for a data breach was $3.9 million, not including reputational damage and hidden costs.

How to Monitor Anti-Virus and Alert

Using the Inventory Alerter monitor in PA Server Monitor can help you monitor for changes in your Anti-Virus software. The Inventory Collector collects system information including Anti-Virus product information. Then when using the Inventory Alerter monitor you can alert on such items as when the running status changes, when the Pattern File Date is out of date, or when the Version changes.

Add Event ID and Text Filter to Event Log Monitor

How to Audit Windows Logons and Logon Failures When a user logs into a Windows computer, or fails to logon, an event can be written to the Windows Event Log. This feature is built in to Windows. The Event Log monitor in PA Server Monitor can tell you when one of these events occurs, thus alerting you to a server logon, or a failed server logon. And because the Event Log monitor has a configurable monitoring cycle (the Schedule button in the lower right corner), you can find out about the logon in nearly real time.

How to Monitor if a Process is Running

PA Server Monitor's process monitor checks how many instances of a target specified process are running on Windows or Linux servers. It then compares that to the threshold and fires actions as needed. The process may be running locally, or remotely. PA Server Monitor can monitor remote processes on Windows servers via WMI or SNMP, as well as processes on remote Linux/Unix servers via SNMP. Process up or down data is recorded every time the monitor runs. You can define a time period, and optionally a summarization (hourly, daily, weekly, monthly) to create an uptime report for the process.