Solarwinds hack – Our Safety Measures
The IT world has been in shock as we’ve all learned about the Solarwinds hack. Network and server monitoring software inhabits a special niche where it often has full access to the servers and devices...
View ArticleHow Active Directory Management Tools Help Quickly Find and Troubleshoot Issues
Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring...
View ArticleWhy Full Reporting Capabilities for Your Databases and Files Are Helpful
Do you know what files your employees access to? Do you know when they create new files? How about when they copy, move, or delete files? How confident are you that your databases are safe and secure...
View ArticleWhy Use Active Directory Security to Improve Your Server Security?
How do you secure your network servers, laptops, desktops, and workstations? A good starting point is to have a checklist of how to enable security features on these devices. You also need to enable a...
View ArticleRecommended Hard Drives Operating Temperature Range
Did you know that hard drives have a recommended operating temperature range? Most people do not think about what happens when they turn on their computer or server and the hard drives begin to whirl...
View ArticleThe Top 5 Benefits of Temperature Server Monitoring Solutions
Your servers generate heat—this is a fact common with any type of electronic device. The amount of heat they generate will vary, depending on where they are located and the number of servers in use....
View Article10 Server Maintenance Tips for Efficient Server Maintenance
Just like your commercial vehicles or HVAC systems, servers require regular maintenance to ensure they are operating effectively and optimally. So, we decided to compile a list of server maintenance...
View ArticleWhich Event Log Events Should You Worry About?
When you are configuring your event log monitor settings, you need to decide which event log events you need to worry about. Event logs are generated for a wide array of processes, applications, and...
View ArticleWhat Should You Do When You Receive Event Log Monitor Alerts?
When you are installing PA Server Monitor, you will need to configure what occurs when there are event log monitor alerts. You typically set this up during the initial install. However, it is not...
View ArticleOpenSSL v3.0.0 – v3.0.6 critical vulnerability
OpenSSL is the backbone of secure Internet communication. It has two currently active and supported development branches: version 1.1.1 and version 3.0. It has recently been discovered that all...
View Article