SlideShare a Scribd company logo
1 of 2
How to Maintain Your Network Operable with Network
                                                Monitor

                             Network equipment failures can cause grave consequences, such as
                        material and data looses, bad relations with your customers, etc. System
                        administrators should detect all the failures that can occur on all
                        network devices (local computers, servers, switches, network printers
                        and others) in time and recover them as fast as possible. That is why the
network monitoring is vital in modern IT infrastructure.

    With the program 10-Strike Network Monitor, an administrator can solve this problem
effortlessly. The program is to be installed on the administrator computer only and does not
require installing any other software on remote computers. 10-Strike Network Monitor will scan
your network, detect all devices, and create a list in the tree-like form. You can edit this list, for
example, and organize hosts in folders. The monitoring process runs remotely via a network.

    The program contains a wide set of checks that allow the administrator to be notified about
any network failures. For example, 10-Strike Network Monitor helps you to check the state or
availability of any device or server in your network. You can do it via the TCP port monitoring,
SNMP, DNS, FTP, and HTTP server monitoring. These checks allow you to be notified when a
device or server goes down without leaving your working place. Thanks to this fact, you can
react to any problem quickly and recover all failures in time.

        Also, the 10-Strike Network Monitor program allows you to detect malicious software
on computers in time. The administrator can monitor opened TCP ports via the TCP protocol.
Having the list of TCP ports that are frequently used by such applications (the lists can be found
on the Internet), you can configure several checks to monitor those opened ports. If the
application detects any of the specified ports has opened, it will notify you of that. You can also
monitor processes running on remote computers and detect danger applications using this way.
For that, use the “Process Existence” monitoring check. In this case, you will need to have names
of danger processes and configure the process monitoring on remote computers.

         Using the same “Process Existence” monitoring check, the administrator can control
users' activities on the network, be notified when they launch certain applications, such as games,
media players, etc. during the working hours. In this case, you need to have the names of the
processes to be warned about and enter those in the monitoring settings.
         10-Strike Network Monitor also allows administrator to monitor the size of files and
folders. Sometimes, application logs increase and occupy too much space on the hard drive of a
computer or server. This check allows you to control the specified file size. You will be warned
if the file size reaches the specified volume. You can monitor the free space on your disks also.

        The program allows you to monitor MAC address changes (via the ARP or NetBIOS
protocols). This feature can help protecting your network from unauthorized connections.
        10-Strike Network Monitor can warn administrator about particular events in different
ways. These include: displaying a message, sending an e-mail message, playing a sound, sending
SMS to a mobile phone, executing VB and JS scripts. All the monitoring check results are
recorded in application log for future analyzing.
        Moreover, the administrator can configure the program to run particular programs in
response to monitoring events. The program can run external applications, restart/shut down a
service or a remote computer.
The network monitoring (which includes controlling hosts, searching slow and
defective systems, finding bottlenecks) is one of the most important functions of network
administrator. The whole successful operation of a company depends on how this problem is
solved. The 10-Strike Network Monitor program’s task is to make this process more effective
and simpler because of the wide number of network checks available.

http://www.10-strike.com/network-monitor/

More Related Content

What's hot

group presentation
group presentationgroup presentation
group presentations1120099
 
Writing Nagios Plugins in Python
Writing Nagios Plugins in PythonWriting Nagios Plugins in Python
Writing Nagios Plugins in Pythonguesta6e653
 
Viruses And Their Cures
Viruses And Their CuresViruses And Their Cures
Viruses And Their Curesannperry09
 
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa Manula Udugahapattuwa
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!Maxim Sidorenko
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer systemRachel Espino
 
2.index (computer forensic)
2.index (computer forensic)2.index (computer forensic)
2.index (computer forensic)JIEMS Akkalkuwa
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheetIS Decisions
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security SolutionsHassaanSahloul
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0SecPod Technologies
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple Mö Ìñ
 
Week 7 Assignment
Week 7 AssignmentWeek 7 Assignment
Week 7 Assignmentcherylbrown
 

What's hot (18)

group G
group Ggroup G
group G
 
group presentation
group presentationgroup presentation
group presentation
 
PRTG
PRTGPRTG
PRTG
 
Writing Nagios Plugins in Python
Writing Nagios Plugins in PythonWriting Nagios Plugins in Python
Writing Nagios Plugins in Python
 
Viruses And Their Cures
Viruses And Their CuresViruses And Their Cures
Viruses And Their Cures
 
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
2.index (computer forensic)
2.index (computer forensic)2.index (computer forensic)
2.index (computer forensic)
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security Solutions
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple
 
JASM Flyer
JASM FlyerJASM Flyer
JASM Flyer
 
Project
ProjectProject
Project
 
Week 7 Assignment
Week 7 AssignmentWeek 7 Assignment
Week 7 Assignment
 

Similar to How to Maintain Your Network Operable with Network Monitor

[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
O P Manager
O P  ManagerO P  Manager
O P Managerblakka
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxawakish
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problemsAbenezer Abiti
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromiseCal Bryant
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Op Manager7
Op Manager7Op Manager7
Op Manager7lfair
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 

Similar to How to Maintain Your Network Operable with Network Monitor (20)

Network inventory software
Network inventory software  Network inventory software
Network inventory software
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
O P Manager
O P  ManagerO P  Manager
O P Manager
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptx
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Opmanager
OpmanagerOpmanager
Opmanager
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 

Recently uploaded

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

How to Maintain Your Network Operable with Network Monitor

  • 1. How to Maintain Your Network Operable with Network Monitor Network equipment failures can cause grave consequences, such as material and data looses, bad relations with your customers, etc. System administrators should detect all the failures that can occur on all network devices (local computers, servers, switches, network printers and others) in time and recover them as fast as possible. That is why the network monitoring is vital in modern IT infrastructure. With the program 10-Strike Network Monitor, an administrator can solve this problem effortlessly. The program is to be installed on the administrator computer only and does not require installing any other software on remote computers. 10-Strike Network Monitor will scan your network, detect all devices, and create a list in the tree-like form. You can edit this list, for example, and organize hosts in folders. The monitoring process runs remotely via a network. The program contains a wide set of checks that allow the administrator to be notified about any network failures. For example, 10-Strike Network Monitor helps you to check the state or availability of any device or server in your network. You can do it via the TCP port monitoring, SNMP, DNS, FTP, and HTTP server monitoring. These checks allow you to be notified when a device or server goes down without leaving your working place. Thanks to this fact, you can react to any problem quickly and recover all failures in time. Also, the 10-Strike Network Monitor program allows you to detect malicious software on computers in time. The administrator can monitor opened TCP ports via the TCP protocol. Having the list of TCP ports that are frequently used by such applications (the lists can be found on the Internet), you can configure several checks to monitor those opened ports. If the application detects any of the specified ports has opened, it will notify you of that. You can also monitor processes running on remote computers and detect danger applications using this way. For that, use the “Process Existence” monitoring check. In this case, you will need to have names of danger processes and configure the process monitoring on remote computers. Using the same “Process Existence” monitoring check, the administrator can control users' activities on the network, be notified when they launch certain applications, such as games, media players, etc. during the working hours. In this case, you need to have the names of the processes to be warned about and enter those in the monitoring settings. 10-Strike Network Monitor also allows administrator to monitor the size of files and folders. Sometimes, application logs increase and occupy too much space on the hard drive of a computer or server. This check allows you to control the specified file size. You will be warned if the file size reaches the specified volume. You can monitor the free space on your disks also. The program allows you to monitor MAC address changes (via the ARP or NetBIOS protocols). This feature can help protecting your network from unauthorized connections. 10-Strike Network Monitor can warn administrator about particular events in different ways. These include: displaying a message, sending an e-mail message, playing a sound, sending SMS to a mobile phone, executing VB and JS scripts. All the monitoring check results are recorded in application log for future analyzing. Moreover, the administrator can configure the program to run particular programs in response to monitoring events. The program can run external applications, restart/shut down a service or a remote computer.
  • 2. The network monitoring (which includes controlling hosts, searching slow and defective systems, finding bottlenecks) is one of the most important functions of network administrator. The whole successful operation of a company depends on how this problem is solved. The 10-Strike Network Monitor program’s task is to make this process more effective and simpler because of the wide number of network checks available. http://www.10-strike.com/network-monitor/