SlideShare a Scribd company logo
1 of 10
Download to read offline
MANAGING
YOUR
NETWORK
The work you do right after your LAN is up and running and configured can save you
huge amounts of time in the coming months.
 Mapping your network for easier management and troubleshooting.
Setting up appropriate security measures to protect
against accidental and intentional harm.
 Tuning up your LAN so that you get the best possible speed from
it.
 Creating company standards for adding hardware and software, so you
don’t have nagging compatibility problems later.
 Putting backup systems in place so that you have copies of data and
programs if your hardware fails.
 Installing some monitoring and diagnostic software so that you can check
on your network’s health and get an early warning of impleading problems.
 Figuring out how you plan to handle
troubleshooting – educating your LAN
administrator, setting up a support contract with a
software vendor, and so on.
Managing your network
Managing your network

More Related Content

What's hot

U08784 part 2 presentation
U08784 part 2 presentationU08784 part 2 presentation
U08784 part 2 presentationxero42
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018techexpert2345
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overviewdavidwells
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014Sid Yenamandra
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacksParesh Thakkar
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Network Monitoring & Alarming
Network Monitoring & Alarming Network Monitoring & Alarming
Network Monitoring & Alarming Anuson K
 
Hacked!?! How Can I Fix This Fast?
Hacked!?! How Can I Fix This Fast?Hacked!?! How Can I Fix This Fast?
Hacked!?! How Can I Fix This Fast?Ivanti
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0SecPod Technologies
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organizationRapidSSLOnline.com
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 

What's hot (20)

U08784 part 2 presentation
U08784 part 2 presentationU08784 part 2 presentation
U08784 part 2 presentation
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018
 
Mohammed imranuddin cv.DOC
Mohammed imranuddin cv.DOCMohammed imranuddin cv.DOC
Mohammed imranuddin cv.DOC
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overview
 
Security testing
Security testingSecurity testing
Security testing
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Security policies
Security policiesSecurity policies
Security policies
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
 
1 page consulting for security
1 page consulting for security1 page consulting for security
1 page consulting for security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Network Monitoring & Alarming
Network Monitoring & Alarming Network Monitoring & Alarming
Network Monitoring & Alarming
 
CoreSecurity
CoreSecurityCoreSecurity
CoreSecurity
 
Hacked!?! How Can I Fix This Fast?
Hacked!?! How Can I Fix This Fast?Hacked!?! How Can I Fix This Fast?
Hacked!?! How Can I Fix This Fast?
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
 

Viewers also liked

E safetylabel ic_tdag 23112015jdc
E safetylabel ic_tdag 23112015jdcE safetylabel ic_tdag 23112015jdc
E safetylabel ic_tdag 23112015jdcJan De Craemer
 
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211Nelly Carolina Monsalve
 
Joomla! 1.6 the highlights
Joomla! 1.6 the highlightsJoomla! 1.6 the highlights
Joomla! 1.6 the highlightsbrian teeman
 
เธšเธ—เธ—เธตเนˆ 6
เธšเธ—เธ—เธตเนˆ 6เธšเธ—เธ—เธตเนˆ 6
เธšเธ—เธ—เธตเนˆ 6Gawewat Dechaapinun
 
Environmental Flows Update, Tony Smith
Environmental Flows Update, Tony SmithEnvironmental Flows Update, Tony Smith
Environmental Flows Update, Tony SmithTWCA
 
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...TWCA
 
Educação Física e saúde e nutrição.
Educação Física e saúde e nutrição.Educação Física e saúde e nutrição.
Educação Física e saúde e nutrição.Nicole Gouveia
 
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...MobileCreation
 

Viewers also liked (13)

E safetylabel ic_tdag 23112015jdc
E safetylabel ic_tdag 23112015jdcE safetylabel ic_tdag 23112015jdc
E safetylabel ic_tdag 23112015jdc
 
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211
Dialnet telematica ensenanzay-ambientesvirtualescolaborativo-278211
 
R kovačević u potkrovlju sveta
R kovačević u potkrovlju svetaR kovačević u potkrovlju sveta
R kovačević u potkrovlju sveta
 
Vikram kaushik
Vikram kaushikVikram kaushik
Vikram kaushik
 
Joomla! 1.6 the highlights
Joomla! 1.6 the highlightsJoomla! 1.6 the highlights
Joomla! 1.6 the highlights
 
เธšเธ—เธ—เธตเนˆ 6
เธšเธ—เธ—เธตเนˆ 6เธšเธ—เธ—เธตเนˆ 6
เธšเธ—เธ—เธตเนˆ 6
 
ˆ 7
ˆ 7ˆ 7
ˆ 7
 
Environmental Flows Update, Tony Smith
Environmental Flows Update, Tony SmithEnvironmental Flows Update, Tony Smith
Environmental Flows Update, Tony Smith
 
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...
The Dakota Access Pipeline: Lessons Learned from the Standing Rock Protests f...
 
Educação física e saúde aula 2
Educação  física e saúde   aula 2Educação  física e saúde   aula 2
Educação física e saúde aula 2
 
Educação Física e saúde e nutrição.
Educação Física e saúde e nutrição.Educação Física e saúde e nutrição.
Educação Física e saúde e nutrição.
 
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...
Crowdvoice, Middle East Tunes. Images et sons mobiles des minorités au Moyen ...
 
Fotooo
FotoooFotooo
Fotooo
 

Similar to Managing your network

Configuring your network and Managing your Network
Configuring your network and Managing your Network Configuring your network and Managing your Network
Configuring your network and Managing your Network Daisyrie Cubio
 
Work Progress Report pcsmcp up lindia.docx
Work Progress Report pcsmcp up lindia.docxWork Progress Report pcsmcp up lindia.docx
Work Progress Report pcsmcp up lindia.docxrahulsinha97184
 
Why Your Business Needs a Network Management System.pptx
Why Your Business Needs a Network Management System.pptxWhy Your Business Needs a Network Management System.pptx
Why Your Business Needs a Network Management System.pptxBluechip Gulf IT Services
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
Dubai How to set up a Remote the workforce.pdf
Dubai How to set up a Remote the workforce.pdfDubai How to set up a Remote the workforce.pdf
Dubai How to set up a Remote the workforce.pdfJose thomas
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesGrace Stone
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
 
Network Monitoring Webcast
Network Monitoring WebcastNetwork Monitoring Webcast
Network Monitoring WebcastMike Pennacchi
 
Op Manager7
Op Manager7Op Manager7
Op Manager7lfair
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
GSIP 2017 presentation
GSIP 2017 presentationGSIP 2017 presentation
GSIP 2017 presentationParker Lacy
 

Similar to Managing your network (20)

Configuring your network and Managing your Network
Configuring your network and Managing your Network Configuring your network and Managing your Network
Configuring your network and Managing your Network
 
Network management
Network management Network management
Network management
 
harish.t
harish.tharish.t
harish.t
 
Work Progress Report pcsmcp up lindia.docx
Work Progress Report pcsmcp up lindia.docxWork Progress Report pcsmcp up lindia.docx
Work Progress Report pcsmcp up lindia.docx
 
Scott Speakman Resume
Scott Speakman ResumeScott Speakman Resume
Scott Speakman Resume
 
Why Your Business Needs a Network Management System.pptx
Why Your Business Needs a Network Management System.pptxWhy Your Business Needs a Network Management System.pptx
Why Your Business Needs a Network Management System.pptx
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Husnain Ahmed
Husnain AhmedHusnain Ahmed
Husnain Ahmed
 
Dubai How to set up a Remote the workforce.pdf
Dubai How to set up a Remote the workforce.pdfDubai How to set up a Remote the workforce.pdf
Dubai How to set up a Remote the workforce.pdf
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Network Monitoring Webcast
Network Monitoring WebcastNetwork Monitoring Webcast
Network Monitoring Webcast
 
10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness
 
Kirk's resume
Kirk's resumeKirk's resume
Kirk's resume
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
GSIP 2017 presentation
GSIP 2017 presentationGSIP 2017 presentation
GSIP 2017 presentation
 

Recently uploaded

TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...vmzoxnx5
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
How to login to Router net ORBI LOGIN...
How to login to Router net ORBI LOGIN...How to login to Router net ORBI LOGIN...
How to login to Router net ORBI LOGIN...rrouter90
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)ICT Watch - Indonesia
 

Recently uploaded (9)

TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
How to login to Router net ORBI LOGIN...
How to login to Router net ORBI LOGIN...How to login to Router net ORBI LOGIN...
How to login to Router net ORBI LOGIN...
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
 
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
 

Managing your network

  • 2. The work you do right after your LAN is up and running and configured can save you huge amounts of time in the coming months.  Mapping your network for easier management and troubleshooting.
  • 3. Setting up appropriate security measures to protect against accidental and intentional harm.
  • 4.  Tuning up your LAN so that you get the best possible speed from it.
  • 5.  Creating company standards for adding hardware and software, so you don’t have nagging compatibility problems later.
  • 6.  Putting backup systems in place so that you have copies of data and programs if your hardware fails.
  • 7.  Installing some monitoring and diagnostic software so that you can check on your network’s health and get an early warning of impleading problems.
  • 8.  Figuring out how you plan to handle troubleshooting – educating your LAN administrator, setting up a support contract with a software vendor, and so on.