Not all IT problems come under the domain of the network engineer. In my previous Blog , I talked about IT shops having a hodge-podge set of tools. There are various reasons, but the real inefficiency is when these tools perform the same functions. There becomes a time and need to look at the IT problems from different perspectives. A few examples below: Kenn Nied, Senior Network Engineer at WA State Board for Community and Technical Colleges, illustrates this encounter. While looking at OpManager from a networking point of view, the operator sees alerts that a few switches and a firewall are unresponsive. Is it faulty equipment or an attack? Then turning to a Security mindset, he looks at ManageEngine Device Expert to see real time and historical configuration changes. In one case, it was identified that there was a Firewall rule change made and realized it was a misconfiguration that caused the switch unresponsive. Diagnostic time was minimal. Albert E.
Deprovisioning administrative access: How careful are you?
FBI investigation on Shionogi security incident reveals the involvement of a former employee Lord Tennyson’s immortal words “Men may come and men may go, But I go on for ever” hold good universally.
Configuring Extreme Switches to export sFlow information.
The inspiration to post this blog came from a visit to our forums and blogs where we didn
How to Keep Your PVC Infrastructure Under Control
No, not Polyvinyl Chloride; I
NBAR and HTTP Traffic Classification
When I was thinking of next blog, I got an idea to do a deeper study on NBAR traffic classification and share some valuables over here.
Are Silos slowing down your IT Efficiency?
I read this interesting article yesterday on HBR blogs titled
Prioritizing VOIP traffic in your Network
When there are no QOS polices applied on a network, there is equal priority for all traffic passing through the network. This is when congestion occur
Managing Risk: Rapidly responding to security alerts from network device vendors
Assume the scenario below: The Cisco Product Security Incident Response Team (PSIRT) publishes an important security alert Releases an advisory suggesting firmware upgrage of routers The security issue on hand is quite serious, urgent and cannot be ignored Impact assessment of devices suggests firmware upgrade of more than 1500 routers to be done immediately Network administrators working on production networks involving a large number of network devices such as switches, routers, firewalls and other devices would have often faced a situation similar to the one above. Effectively managing risk is an important aspect of network security. But, manual process for reacting to security alerts is not only time-consuming, but also error-prone
An automated solution to enforce IT policy on standard password practices
Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among the numerous guidelines: Usage of unique, strong passwords across all IT resources Rotating the passwords at periodic intervals Role-based access controls for IT resources Enforcing the IT policy with respect to the privileged passwords turns out to be a daunting task to carry out manually.
Help Desk Tips & Tricks – When to merge tickets & when to engage Problem Management.
I know most of you are using ServiceDesk Plus in the right way, however in few of our customer environments I found certain features are used improperly. So I have started a series of tips & tricks blogs to use ServiceDesk Plus features efficiently.