Operations | Monitoring | ITSM | DevOps | Cloud

Power Admin

VPN vs. Remote Desktop - Gateway Security Concerns

VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user – whether that’s from prying eyes or the need to have physical access to their business network. But while each option can be attractive, neither is without its security concerns.

How To Keep Track Of Your Android Applications

Keeping track of application usage and the installation of software on your Android phone or tablet is an essential activity, both for device management and your overall security. In this regard, it’s also advisable to monitor how your Android applications are tracking you, in terms of your physical location, activities on the local device, and online. Here are some tips on how to achieve this.

5 Cybersecurity Trends for 2020

The world of cybersecurity is fast-paced and constantly changing. Where certain strategies once worked perfectly, new threats eventually emerge. Keeping up with a growing number of malicious influences and implementing effective security strategies to combat them involves staying up to date on yearly shifts in cybersecurity practices across industries. Here, we have put together a short list of important trends in cybersecurity that are likely to develop throughout 2020. Read on to learn more.

Hardening Your Windows Server in 2020

Security is vital for protecting company assets and data subjects. Evolving data protection regulations, like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), have thrown light on security breaches and the security architecture of those compromised. In 2019, the global average cost for a data breach was $3.9 million, not including reputational damage and hidden costs.

How to Monitor if a Process is Running

PA Server Monitor's process monitor checks how many instances of a target specified process are running on Windows or Linux servers. It then compares that to the threshold and fires actions as needed. The process may be running locally, or remotely. PA Server Monitor can monitor remote processes on Windows servers via WMI or SNMP, as well as processes on remote Linux/Unix servers via SNMP. Process up or down data is recorded every time the monitor runs. You can define a time period, and optionally a summarization (hourly, daily, weekly, monthly) to create an uptime report for the process.

Add Event ID and Text Filter to Event Log Monitor

How to Audit Windows Logons and Logon Failures When a user logs into a Windows computer, or fails to logon, an event can be written to the Windows Event Log. This feature is built in to Windows. The Event Log monitor in PA Server Monitor can tell you when one of these events occurs, thus alerting you to a server logon, or a failed server logon. And because the Event Log monitor has a configurable monitoring cycle (the Schedule button in the lower right corner), you can find out about the logon in nearly real time.

How to Monitor Anti-Virus and Alert

Using the Inventory Alerter monitor in PA Server Monitor can help you monitor for changes in your Anti-Virus software. The Inventory Collector collects system information including Anti-Virus product information. Then when using the Inventory Alerter monitor you can alert on such items as when the running status changes, when the Pattern File Date is out of date, or when the Version changes.

How to Monitor Services

Learn how to add a Service Monitor to your monitored server in PA Server Monitor. The Service Monitor watches the same system services that can be seen from the Administrator Tools Services applet (services.msc). If a service is not running, actions are fired (which could notify you and/or restart the service for example). The Restart Service action is typically attached to this monitor.