Comments
-
Add me to the Beta testing or RC eval. Definitely would like to see a single point for managing alerting.
-
Scott, You might want to check out this thread: Re: Re: Custom SNMP Device Templates Short summary: Create a custom SNMP Device Template using the device OID/MIBs and then apply it to the device instead of the pre-built template. Hope this help. BSpencer
-
No doubts Eric that Security is the primary factor that must be tackled, handled, documented, configured, monitored, tweaked, updated, documented, tested, and documented again when contemplating moving any corporate data off prem. and into the Public Cloud. Feeling redundant but my psyche is satisfied I put enough emphasis…
-
Leon, Once again, a great topic and all too spot on! Lifelong learning is a necessity with ever-changing forefronts, platforms, protocols, etc. Tech trends are not going to stop and wait on us, that is for sure! I still keep books at my desk and have printouts, just in case. I had a co-worker once ask me why I was stuck in…
-
Agree with this review recommendation but append with not an annual nor a semi-annual basis, due to the forefront ever-changing, we must be ever diligent and constantly evolving and this task demands constant upkeep and auditing to ensure the rule-sets are consistent, correct, appropriate, secure, and as such affording…
-
Solarwinds Products used: NPM, SAM, NCM, VNQM, LEM, and Network Engineer's Toolkit. Others: HP System Insight Manager (ILO and physical server monitoring), Riverbed NetExpress for NetFlow, Riverbed Steelhead Packet Analyzer (Wireshark GUI for packet analysis), Snort, all things Kali, and VMTurbo. Working with STIX and…
-
Congrats to you both!
-
Sometimes it takes the IT Dark Shadows to prove a point! Agree with rharland that no matter what the IT department does, once any blanket statement is out there, administrative overhead is just going to be there. It's one of the costs we must absorb and deal with on a daily basis. Agree superfly99, there are always going…
-
Definitely interested in the whole process and in particular the outcome and how adoption is fostered and accepted...
-
It's always a Microsoft issue! Especially after MS updates!!! Come on, get that right! LOL 1. MSSQL and a few MySQL DBs 2. One Dedicated DB Admin 3. SW SAM and local integrated OS and MS SQL Tools. 4. PowerShell Scripts and VB Scripts locally created.
-
With our integrated and always connected world, we will always have attacks and always be perplexed with the perimeter and its' defense. From IoT, IoE, MIoT, SIoT, and more acronyms cropping up daily but all have the roots in TCP/IP Ethernet connectivity. As long as there is a door to knock on, knock down, bypass, or avoid…
-
I'm with Chris T. and mcam here on this question maria.bungau. From the doc provided: AppInsight for SQL monitors your database servers for memory bottlenecks. You can monitor a variety of key metrics related to memory: Total Server Memory Target Server Memory SQL Cache Memory Lock Memory Optimizer Memory …
-
Very similar in thought to cahunt here with the addition that I am still trying to find the allusive "Single Pane of Glass"! SW is very close. Others are too. Just throw some more money and modules at it and eventually it will be there...
-
maria.bungau Cracked me up a bit, hence why I just had to share! And I totally agree about the time allocation issues!
-
Vegaskid, One cannot have too many layers. The old security DID onion analogy... If they can't peel enough layers to get to the core, then you might have enough... I said MIGHT! Agree with cahunt, policies and procedures are a must! No matter the complexity nor the diverse nature of the devices, we are only watching as…
-
Hey ecklerwr1, A little bit of luck when you're gambling is a good thing!
-
So true, sadly so true wluther!
-
The necessary Network EVIL! Necessary being the key word here....
-
Very great product! It deserves the award! Kudos SW NCM team!
-
I agree to err on the side of caution. No matter how secure, one breech, one capture during transfer, one unauthorized access, and you are in deep kimchee. We currently keep all logs internal and use our SIEM, SW LEM, for log analysis and alerting. I have taken a look at cloud logging solutions and they are appealing,…
-
Unfortunately, our management is slow to adopt change, almost resistant to the point of being absurd! Hardware is new, software is not the latest and most always behind a version or twenty. Makes it difficult at times for sure! Tried to get them up to speed, but, even with RTO, RPO, and all the documentation I could…
-
Now this is a cool prize pack! How about some SolarWinds swag that can only be purchased if you complete the mission? Maybe a SW shirt or Polo with "Monthly Mission Conquest Mastered" or "Monthly Mission Master" or just a special logo that could be purchased with points in the SW Store and/or awarded only to the winner of…
-
Great functionality and content. Easy to navigate. This will definitely be in the troubleshooting steps for any SW product moving forward. Keep up the great work SW!
-
And the answer is yes! I still get my name blocked due to it being one vowel off! LMBO Oh, well, I guess I'll just be B! BSpencer
-
congrats!
-
Simplifies that answer immensely!
-
I totally agree byrona!
-
Not only do I agree with most of the posts so far on this subject from API's, responsible parties, strategy, and scope, but I additionally will add that I prefer the "single pane of glass" approach. It is hard enough finding a tool that does exactly what you need, but to have it be able to interact with your other…
-
Peter, You actually made me laugh with this post! I was two semester into a programming degree when I also came to the realization that I would never be a full-time programmer. Just not my cup of tea! Still I persevered and finished the degree, but, only after butting heads with an instructor that tried to teach me C++ and…
-
Proactive SIEM solutions can assist with a lot of the log filtering, grouping, connector configuration, and alerting as well as being able to create "Active Responses" upon appropriate logs for certain "time sensitive" incidents. LEM (formerly TriGeo) is a good SIEM with all of the aforementioned traits. I was used to…