Comments
-
I think we all wish our software could proactively read and model users' actions, but I'm not sure how that would be accomplished. As it is, we as APM platform managers need significant input from the application support people and/or power-users, and possibly also to mine the ticket history for signs of recurring…
-
mr.e gets all the credit for that one. I just asked the question.
-
This is great information, as was the Labs session. Thank you for both!
-
Jfrazier, does your company allow hardware appliances for anything? If so, why is a virtual appliance considered different?
-
That sounds awesome. I'm in the same boat as mr.e. I wish I could be there.
-
In banking, security and regulatory compliance, which have always been important, are getting a much-increased level of attention.
-
DanielleH, It looks like you uploaded the Germany T&C's twice. The CA/UK/US ones aren't there at all.
-
We are using log aggregation and it has proven extremely helpful. We use it both proactively and reactively.
-
Hey cvachovecj, just wondering if this should be tagged as "What We're Working On?"
-
+1 for this. Closing unused ports is essential basic security, and as I mentioned earlier, the reason I think we see so many Telnet scans is that the attackers are looking for potential victims who haven't even bothered with the essential basic security; they're easy targets. Still, after that is done, there are still the…
-
Great perspective. When we deployed VoIP a couple years ago we found that providing effective training was critical. We also provided our end-users with quick-reference brochures on the new phones and the new voicemail system.
-
Excellent list, thanks for sharing. I guess I'd better get cracking on that CISSP.
-
Sounds awesome!
-
Awesome tools here. Thanks for sharing!
-
Thanks for this post. I wish I had seen it >6 months ago, but at least I'm on the right track now!
-
maria.bungau, I'm pretty sure I only got 2,400 points even though I registered for Usabili-Buddy, completed all the surveys, and referred someone. By my count that should be 2,500 points. Can you please double check, and does this also mean I wasn't entered in the drawing?
-
Our Engineering group actually does a great job of this.
-
That was a big deal in our environment, as we had multiple subsidiary companies with disparate phone systems. Documentation was a big deal, and very time-consuming.
-
If you have SAM as well, you can create an Application Template with SNMP Monitor components that check the statistics you need.
-
Our engineering group seems to like Solar Winds Patch Manager, though I admit I don't really have direct involvement with it.
-
The "why" is definitely the most critical. If you focus on the "how" and ignore the "why," you may end up quickly and efficiently completing a project that turns out to be completely the wrong project for what the business needs.
-
I don't see this as FFI. I'm sure the individuals above followed the instructions as provided. All they are saying is that they would have preferred a different format.
-
One thing I've seen work well is rather than calling it "priority", to have an option where people have to match their issue to a description of the impact of the problem. Certain impact levels, such as those indicating enterprise-wide impact, are unavailable to the "common" user for assignment, and can only be assigned by…
-
There appears to be a typo in today's clue. The word "user" should be "use". On a related note, has anyone noticed that we work in one of only two professions that refers to its customers as "users"?
-
Thanks. That would have caused me major issues in 2115. ;-)
-
Loot, not woot. Congratulations!
-
Nice! Fortunately I'm usually in situations where I can use Wireshark, but this is good information to have regardless.
-
If we have the sidekicks competition next year, I will be sorely disappointed if Pinky isn't in it. NARF!
-
This is certainly a challenge! I've had some success using log monitoring to track certain types of changes, but ultimately, if someone has the access, knowledge and will to do real damage, the most you can hope for is to detect it quickly.
-
On the one hard, I love the idea of an automated home with things like Nest thermostats, lights I can turn on with the touch of a button (or that turn on automatically when they sense my arrival), and a door I could unlock from my phone rather than fumbling for my keys with an armful of groceries. That said, the security…