Tag: server-management

Behind the Scenes at WYSADMIN News

Hey sysadmins – SolarWinds provides four outstanding products for managing your systems, servers, and applications. To get your free 30-day trial of Server & Application Monitor, visit: bit.ly Check out the hilarious “Top Story” behind-the-scenes video featuring WSYSADMIN Channel News field reporter Chip Codee. Haven’t seen Top Story: Server & Application Monitor Goes Big?

Tracking Workstation Logon/Logoff using ADAudit Plus

Before getting into the specifics, I would like to give a small introduction on tracking Logon / Logoff in Active Directory environment, which is a cumbersome process. Auditing the Windows Active Directory environment Logon Auditing With the current Windows architecture it’s difficult to get all logon data at a single point

What’s New in SolarWinds Server & Application Monitor?

Dowload SAM now: bit.ly Application Performance Monitor changes names and will now be referred to as Server & Application Monitor. Along with the name change, this release also includes server hardware monitoring and real-time process monitoring, which serve to reinforce the emphasis on server monitoring. As part of a well-rounded monitoring strategy, SAM will now allow you to monitor the memory, cpu, fans, power, etc to ensure servers are kept alive.

Server & Application Monitor (SAM) Guided Tour

Watch the video, then download a free trial of our Server and Application Monitor (SAM): bit.ly SolarWinds is a brand that network admins and IT generalists around the globe have come to know and trust for managing their network environment. SolarWinds Server & Application Monitor (SAM) will help managing your systems, servers, and applications. The following video outlines SAM and everything it offers.

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]

In the previous four posts , we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong policies, haphazard style of privileged password management and lack of proper activity monitoring give room for security incidents

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-4]

In the previous three posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information security in enterprises and the causes for security incidents. In part-3 of this series, we discussed how lack of internal controls, access restrictions, centralized management, accountability, strong policies and haphazard style of privileged password management give room for security incidents. Let us now analyze the activity monitoring scenario …