SlideShare a Scribd company logo
1 of 17
Some basics
•   WAN links between sites
•   Links between core network devices
•   Important devices like servers and core appliances
•   Websites
•   Drive space, CPU and memory utilization
•   Log files (for errors or other text)
•   Network utilization and bandwidth
•   Important services and processes
•   Internal or External website availability
“My Internet is slow”
  Measure bandwidth or CPU of firewall, outbound connections (virus?)

“I can’t get any email, is the server down?”
       Check Exchange services, monitor outbound mail traffic per sec.

“We are paying $900 per month to connect our satellite office with
a high speed connection. Is it worth it?”
            Watch for peak bandwidth usage during day, week, month.

“Everyone here can’t print. You did something, didn’t you?”
      Monitor spooler service, watch for errors in system log regarding
                                                                printers
A good monitoring system will query a device for a specific
set of statistics, retain this data and report to an appropriate
administrator if those statistics exceed an acceptable
threshold…

                                          …if a drive is 90% full, let
                                          the IT administrator know
                                          via email so they can
                                          begin to remedy the
                                          situation.
What do monitoring systems use to get their data?

SNMP – Linux, Network Hardware, Windows
WMI – Windows
Performance Counters – Windows
SSH – Linux
SNMP
 Usually requires MIB (management information base) files to monitor
                                        advanced system statistics


WMI
   Typically available by default, but highly security conscious network
                                     admins may have this locked down

Performance Counters
      If you can view it in Windows Perfmon, you can track it in some
                                                    monitoring tools


SSH
SSH
                              Requires root access to run commands
• Monitor threshold – at what point does something trigger
  an alert?

• Alert – When a threshold is met for a period of time, go
  into „Alert‟ status.

• Action – Send an email, SMS, restart a service, run a
  script, etc.
• Historical trending and reporting
• Maintenance windows
• Multiple notification methods
• Ability to perform action in response to an alert
• NOC (Network Operation Center) view
• Large variety of monitor types that support
  WMI, SNMP, etc.
• Ability to produce alerts based a defined span
  of time
• Company shared drive size and availability

• Ensure Exchange service and Accounting system DB is
  accessible after backups

• Make sure outgoing Internet connection is not saturated

• Keep invalid domain logon attempts at bay

• Watch for system errors
• How long until something is considered an emergency?
• Will the condition return to normal without your
  intervention?
• How do you want to be notified –
  email, SMS, page, IM, Net Send?
• Do you want the monitoring tool attempt to remedy the
  situation automatically?
• Configure your monitors
  with high thresholds while
  you determine what is
  “normal”
• Watch these monitors over
  time to get an idea of
  normal peaks and valleys of
  performance stats
• Tweak your monitors
  according to trending and
  growth patterns
1.   The Death Star depends on tractor beam
2.   The IT Admin sets up a monitor to watch service:
     “tractor_beam”
3.   He then configures the alert to “Email” Darth Vader
     when the tractor beam goes down
4.   Obi-Wan disables the tractor beam
5.   5 minutes later, the Millenium Falcon escapes
6.   Tractor beam is down for an additionl 5 minutes, then
     monitoring system sends email
7.   Vader is busy choking one of his employees, and has
     his BlackBerry set on “vibrate”…

 “…probably should have set the monitoring system to restart the service before
   Han got awa-aaacccchhdhhshhpfffft” – IT admin speaking with Darth Vader
=====================================
Time: 2010/10/05 20:34:22
Object: DC-ROA-01(DC-ROA-01)
Monitor: Security events
=====================================
Status: Alarm
Message: Found matching eventlog record
                                            This is an example of an event log
Event id: 529
Computer: DC-ROA-01                         report when a user attempted to log
Source: Security                            in with an invalid password.
User: SYSTEM
Time Generated: 2010/10/05 20:06:27
Message:                                    Logon Type: 8 means the password was passed using
Logon Failure:                              ClearText
Reason: Unknown user name or bad password
User Name: amyv@mydomain.com                Caller Process is the PID of the executable on the server
Domain: mydomain.com
                                            processing the logon attempt.
Logon Type: 8
Logon Process: Advapi
                                            Source network address is the user‟s Comcast IP.
Authentication Package: Negotiate
Workstation Name: DC-ROA-01
Caller User Name: DC-ROA-01$
Caller Domain: MYDOMAIN
Caller Logon ID: (0x0,0x3E7)
Caller Process ID: 7708
Transited Services: -
Source Network Address: 67.184.244.32

Source Port: 56049
It is important to be able to keep a history of
trending, especially with storage devices and
service outages. This will help determine future
needs for backup and DR processes.

You can get an idea of heavily used
volumes/resources, allowing you to organize
planned downtime when moving them.
Windows based

• Total Network Monitor
http://www.softinventive.com/products/total-network-monitor/

• MicroTik‟s “The Dude”
http://www.mikrotik.com/thedude.php

• Hyperic HQ Open Source
http://www.hyperic.com/products/open-source-systems-monitoring

• Spotlight on Windows (realtime monitoring only)
http://www.quest.com/spotlight-on-windows/ - free registration required

• Splunk (logfile indexing)
http://www.splunk.org

• Spiceworks (general activity monitoring)
http://community.spiceworks.com



Linux based

• Zenoss
http://www.zenoss.com/

• Nagios
http://www.nagios.org
This presentation will be available from www.ninp.org (via
SlideShare)

Rob Dunn: uphold2001@hotmail.com

More Related Content

What's hot

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System AdministrationIgguuMuude
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 
Domain name server
Domain name serverDomain name server
Domain name serverMobile88
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 

What's hot (20)

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Network management
Network managementNetwork management
Network management
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 
snmp
snmpsnmp
snmp
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Domain name server
Domain name serverDomain name server
Domain name server
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Acl
AclAcl
Acl
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 

Similar to Network Monitoring Basics

network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learnedamiable_indian
 
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008ClubHack
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Sandeep Kumar Yadav
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...RootedCON
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 

Similar to Network Monitoring Basics (20)

network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Opmanager Workshop - Middle East
Opmanager Workshop - Middle EastOpmanager Workshop - Middle East
Opmanager Workshop - Middle East
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORING
 
Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
ISSA Siem Fraud
ISSA Siem FraudISSA Siem Fraud
ISSA Siem Fraud
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
OpManager - Technical overview
OpManager - Technical overviewOpManager - Technical overview
OpManager - Technical overview
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Network Monitoring Basics

  • 2. WAN links between sites • Links between core network devices • Important devices like servers and core appliances • Websites
  • 3. Drive space, CPU and memory utilization • Log files (for errors or other text) • Network utilization and bandwidth • Important services and processes • Internal or External website availability
  • 4. “My Internet is slow” Measure bandwidth or CPU of firewall, outbound connections (virus?) “I can’t get any email, is the server down?” Check Exchange services, monitor outbound mail traffic per sec. “We are paying $900 per month to connect our satellite office with a high speed connection. Is it worth it?” Watch for peak bandwidth usage during day, week, month. “Everyone here can’t print. You did something, didn’t you?” Monitor spooler service, watch for errors in system log regarding printers
  • 5. A good monitoring system will query a device for a specific set of statistics, retain this data and report to an appropriate administrator if those statistics exceed an acceptable threshold… …if a drive is 90% full, let the IT administrator know via email so they can begin to remedy the situation.
  • 6. What do monitoring systems use to get their data? SNMP – Linux, Network Hardware, Windows WMI – Windows Performance Counters – Windows SSH – Linux
  • 7. SNMP Usually requires MIB (management information base) files to monitor advanced system statistics WMI Typically available by default, but highly security conscious network admins may have this locked down Performance Counters If you can view it in Windows Perfmon, you can track it in some monitoring tools SSH SSH Requires root access to run commands
  • 8. • Monitor threshold – at what point does something trigger an alert? • Alert – When a threshold is met for a period of time, go into „Alert‟ status. • Action – Send an email, SMS, restart a service, run a script, etc.
  • 9. • Historical trending and reporting • Maintenance windows • Multiple notification methods • Ability to perform action in response to an alert • NOC (Network Operation Center) view • Large variety of monitor types that support WMI, SNMP, etc. • Ability to produce alerts based a defined span of time
  • 10. • Company shared drive size and availability • Ensure Exchange service and Accounting system DB is accessible after backups • Make sure outgoing Internet connection is not saturated • Keep invalid domain logon attempts at bay • Watch for system errors
  • 11. • How long until something is considered an emergency? • Will the condition return to normal without your intervention? • How do you want to be notified – email, SMS, page, IM, Net Send? • Do you want the monitoring tool attempt to remedy the situation automatically?
  • 12. • Configure your monitors with high thresholds while you determine what is “normal” • Watch these monitors over time to get an idea of normal peaks and valleys of performance stats • Tweak your monitors according to trending and growth patterns
  • 13. 1. The Death Star depends on tractor beam 2. The IT Admin sets up a monitor to watch service: “tractor_beam” 3. He then configures the alert to “Email” Darth Vader when the tractor beam goes down 4. Obi-Wan disables the tractor beam 5. 5 minutes later, the Millenium Falcon escapes 6. Tractor beam is down for an additionl 5 minutes, then monitoring system sends email 7. Vader is busy choking one of his employees, and has his BlackBerry set on “vibrate”… “…probably should have set the monitoring system to restart the service before Han got awa-aaacccchhdhhshhpfffft” – IT admin speaking with Darth Vader
  • 14. ===================================== Time: 2010/10/05 20:34:22 Object: DC-ROA-01(DC-ROA-01) Monitor: Security events ===================================== Status: Alarm Message: Found matching eventlog record This is an example of an event log Event id: 529 Computer: DC-ROA-01 report when a user attempted to log Source: Security in with an invalid password. User: SYSTEM Time Generated: 2010/10/05 20:06:27 Message: Logon Type: 8 means the password was passed using Logon Failure: ClearText Reason: Unknown user name or bad password User Name: amyv@mydomain.com Caller Process is the PID of the executable on the server Domain: mydomain.com processing the logon attempt. Logon Type: 8 Logon Process: Advapi Source network address is the user‟s Comcast IP. Authentication Package: Negotiate Workstation Name: DC-ROA-01 Caller User Name: DC-ROA-01$ Caller Domain: MYDOMAIN Caller Logon ID: (0x0,0x3E7) Caller Process ID: 7708 Transited Services: - Source Network Address: 67.184.244.32 Source Port: 56049
  • 15. It is important to be able to keep a history of trending, especially with storage devices and service outages. This will help determine future needs for backup and DR processes. You can get an idea of heavily used volumes/resources, allowing you to organize planned downtime when moving them.
  • 16. Windows based • Total Network Monitor http://www.softinventive.com/products/total-network-monitor/ • MicroTik‟s “The Dude” http://www.mikrotik.com/thedude.php • Hyperic HQ Open Source http://www.hyperic.com/products/open-source-systems-monitoring • Spotlight on Windows (realtime monitoring only) http://www.quest.com/spotlight-on-windows/ - free registration required • Splunk (logfile indexing) http://www.splunk.org • Spiceworks (general activity monitoring) http://community.spiceworks.com Linux based • Zenoss http://www.zenoss.com/ • Nagios http://www.nagios.org
  • 17. This presentation will be available from www.ninp.org (via SlideShare) Rob Dunn: uphold2001@hotmail.com

Editor's Notes

  1. SNMP – protocol, WMI – set of extensions to the Windows Driver Model that provides an interface which the instrumented components provide information and notification.
  2. Cisco uses an access list to allow SNMP traffic to and from a specific host via Read only or Read-Write community strings
  3. Time intervals – like if an threshold is tripped 10 times over 20 minutes, then produce an alert.
  4. You can have many monitoring tools run a script, restart a service, send a notification, etc. in response to an alert. In the case of event log monitors, you can set it to perform what is called a ‘looping list’, which resets itself after every event log scan. This allows it to scan event log dates and remember the last place it scanned before running another check.