Tag: server-management

ISP and Enterprise Billing in NetFlow Analyzer-Part 2

The previous blog dealt with Billing and as a continuation here is a brief account of IP group billing which is one of the unique features of NetFlow Analyzer. IP Group Billing:- Consider a scenario where billing has to happen across different users from different departments sharing the same link. This scenario is very typical in large enterprises where a given project is handled by different departments & they have their unique ways of using the bandwidth to handle the project

Exporting NetFlow packets from Blue Coat Device

Blue Coat Packetshaper are capable of exporting NetFlow packets. The configuration to export NetFlow from the devices is simple, you can configure the packetshaper to export NetFlow packets to the NetFlow server. Follow the steps mention below to export NetFlow packets: Login to the Packetshaper UI and click on setup.

[EMA-ManageEngine Webinar]: Seven Best Practices to Optimize Application Delivery in Cloud and Hybrid Environments

With Dennis Drogseth, EMA VP of Research and Arun Balachandran, Sr. Market Analyst, ManageEngine Applications Manager Date : Thursday, September 29, 2011 Time : 8 am Pacific / 11 am Eastern 4 pm GMT Summer Time (London, GMT+01:00) Featured Speakers : Dennis Drogseth, VP of Research, EMA Arun Balachandran, Sr. Market Analyst, ManageEngine While many early cloud computing deployments favored niche infrastructure-centric services such as PaaS and storage-related services, there has been a distinct move towards a more application-service-centric model over the last 18 months.

[Webinar]: What you need to know about Applications Manager Version 10.0

We recently released Applications Manager Version 10.0 and want to demonstrate to you how the new features work. For this purpose, we are organizing webinar sessions where we will discuss release 10.0 in depth

Perils of ‘Static’ Windows Service Accounts

Windows Service Accounts, used by the system programs to run application software services or processes often possess higher or even excessive privileges than normal user accounts. These are indeed very powerful accounts that run critical business processes and services. Many third-party services or scheduled tasks or processes might make use of the same service account, resulting in a complex interconnection