4
What is network monitoring? SafeBytes Software

What is network monitoring

Embed Size (px)

Citation preview

Page 1: What is network monitoring

What is network monitoring?

SafeBytes Software

Page 2: What is network monitoring

Any person that is put in charge of controlling a PC system should have an in depth knowledge of network monitoring. This is a collective term for all the measures that are taken to ensure that incidents of underperformance are properly reported, diagnosed and treated according to the industry recommendations.

The help of programs like SafeBytes will be critical, not least because they are able to record subtle changes that could easily be missed by an ordinary user. The administrator will be notified using the standard protocols.

However, they also need to be aware of what the codes mean so that they can respond appropriately. For example, they will receive an email, alarm or SMS text message to notify them that the system is too slow.

They are then in a position to ascertain the malware or configuration issue that is causing the problem.

This is an essential aspect of good network management, a key corporate requirement. It will include an intrusion detection system that can pick out viruses before they become a real nuisance.

There is another maintenance schedule that considers the possibility of overloads and crashing servers. It will also extend to the type and number of network connections.

Page 3: What is network monitoring

Other devices may be scanned and monitored accordingly depending on the role that they play in the entirety of the computer system. The intrusion detection system is designed to monitor all the threats that could potentially come from the outside of the PC system.

However, the networking monitoring system focuses on internal issues.

Administering the functionality of a network

There is an experimental approach to this monitoring. A case in point is how the system will check the status of a web server. This is achieved by sending an HTTP request so as to fetch the relevant page.

The process is tested for time taken as well as any significant barriers along the way. These could be due to malware or some other configuration problem.

In the case of an email server, a test message is issued using the SMTP protocol. This is then received via POP3 and IMAP. A number of metrics are used in order to ascertain whether the system is functioning as intended.

These may include the response times and the availability of the files that are being sought.

Page 4: What is network monitoring

Another test is that of uptime. Note that a virus attack can affect the consistency and reliability of these metrics.

We then move to the addition of WAN optimization devices. One of the consequences of this development is the deterioration in the function and popularity of network monitoring tools.

Basically, there is a view that one can have better ways of scanning for threats. Meanwhile the traditional monitoring tools like TotalSystemCare continue to have their fans; based on a long tradition of keeping the computer system safe.

Meanwhile the administrative and monitoring function is increasingly an important prerequisite for anyone that wants to work as an IT administrator especially for a large corporate or other entity that stores sensitive data.