News

Introducing IPHost mobile client

Getting Push notifications on your mobile devices We are glad to introduce IPHost mobile app (currently available for Android 4.4 or newer). To start using Push notifications on your Android device(s), please upgrade your IPHost installation to v5.3 or...

Using alternate PING utilities to test your network

Handling problems monitoring low latency networks Low latency networks are the ideal media; in typical intranet all the hosts can be reached in a few milliseconds. Monitoring tools, starting from typical default ping utility (the one that sends ICMP Echo...

Use proxy to process complex or aggregated data

Use intermediate hosts to process multi-source or complex data Imagine you need a monitor to react to a derivative of several performance values. For example, you could need to only trigger alert if CPU load and free memory have both crossed certain thresholds....

Use Windows Subsystem for Linux to enhance IPHost monitoring setups

Windows Subsystem for Linux (WSL): software tool improving monitoring capabilities Windows Subsystem for Linux (WSL) is a software component allowing to run Linux applications directly on Windows 10 and Windows Server 2019 starting from August 2016. There...

Make use of Python bundled with IPHost to create new monitors and alerts

Extend bundled Python with new modules to address your monitoring needs Scripting languages (VBScript, Python, PowerShell etc) are both flexible and convenient to create small scripts, to handle a simple monitoring task (such as poll a device for data...

Common pitfall of addressing registry entries in 64-bit operating system

Address correct registry entries from IPHost Accessing Windows registry (local or remote) is a typical way of gathering useful data. However, there’s a typical pitfall that can cause unexpected scripts or programs behavior. Namely, accessing registry...

Quick start monitoring by using lightweight monitors

Basic setup: use simple monitors There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network discovery) when looking for hosts and/or monitors...

How to perform simple testing of critical network assets state

Simple network checks that can prevent major security issues Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences. Below we list several examples of such incidents;...

Maintain monitoring, backups and updates: basics of information security

Reinforce your assets security by following the basic principles There are three basic types of activity in information security – those that should be performed periodically to reduce possible risks to minimum. Periodic updates is one of them:...

Do you use uniform tools to perform monitoring in different environments?

Reduce time required to deploy monitoring setups by reducing the variety of tools While monitoring different types of OS, it is essential to reduce the number of tools used to a logical and reasonable minimum. Under “tools”, we understand...

SNMP vs WMI: the advantage of less resource consuming monitor types

Are you using one of notable ways to reduce load on your servers? WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications. With its query language (resembling the SQL used by...

Do you watch your remote conferencing services status?

Are your remote conferencing tools in working order? Nowadays, many people, even those far from IT industry, depend on remote conferencing services, either on premises, or global ones. Unless the status of those services is watched, its unexpected absence...

Handling the emerging security challenges and possible concept change

What upcoming changes to security landscape should be taken into account? With current global crisis spreading into multiple areas of information technologies, it is crucial to learn how are the security-related areas affected, and what it would mean...

Universal security and network monitoring rules for everyday use

What rules should be followed to keep your network monitoring setup up-to-date It’s no secret that information threats appear in numbers nowadays. It may be time to refresh some typical rules, tested by years of practice worldwide, to make your...

Handling security and capacity challenges when working remotely

What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from home. While it is the safest approach to diminish possible risks to health, there are information security...

How to create and monitor redundant means to access network

Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar access to the same resources; on the other hand,...

Make sure your Web servers support modern security protocols

Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure version, is strongly discouraged). Different versions...

Prevent security issues when monitoring with SNMP family of protocols

Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol versions (v1, v2c, v3), all of those supported...

Intrusion detection techniques: monitor and react to unusual activity

Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques available to efficiently prevent an unknown yet...

Active response monitoring: first aid for your services

Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to alert people in charge to detected problems. However, IPHost Network Monitor allows creating composite alerts,...

Security monitoring optimization: typical problems and their solutions

Optimizing security monitoring Security issues can be a challenge; preventing them via properly set up monitoring can save many resources. However, as network grows, the list of resources subject to monitoring may grow much faster. A typical situation...

Make your monitoring efficient: use clear and visible alerts

An efficient monitoring setup Default monitoring settings can be quite usable for most use cases; however, as the monitoring setup grows, certain configuration tweaks might be required to make monitoring more efficient. Alerts should actually attract...

Optimize email notifications – maximum flexibility with minimum efforts

Building flexible email notifications By default, in default IPHost installation the simplest email notification is used. While it’s suitable for most small or testing setups, more complex notifications may be required for real-life monitoring setups....

Custom Nagios plugins

Custom Nagios plugins Nagios is a well-known monitoring framework; it’s also known for its plugins, the software components that are actually providing monitoring capabilities. IPHost allows using Nagios plugins directly; we have detailed instructions...

Use SNMP to monitor whatever you need

Receive monitoring data via SNMP SNMP (Simple Network Management Protocol) is a popular protocol family, supported by majority of network devices, as well as available for every more or less popular operating system. One of most useful features of modern...

Make your monitors nearly real-time

Send events instead of polling for them Most of existing IPHost monitor types are passive, meaning they are being polled by IPHost – directly, or via remote network agent. There are two “active” monitors, that perform “Event”...

Beyond the standard monitoring

Non-standard monitoring use cases In most cases, monitoring is often viewed as pretty dumb alarm system – built to notify if something goes wrong. However, there could be cases when monitoring software can be used not so straightforward, or apply...

Web site monitoring: quick checks

Is Web site alive? Web site monitoring looks simple and straightforward. However, there still are pitfalls, not so obvious to many webmasters. How would you check that a site is alive and contains expected content? A human visitor would open site and...

Providing backup systems

Single points of failure Monitoring, apart from backing up and staying updated is one of fundamental principles of information security. However, every one of those principles is in fact intertwined with the remaining two. Monitoring is no exception....

Real-time monitoring

Monitoring events in real time Monitoring can be divided into two basic types: real-time and scheduled. In the first case, piece of monitoring software receives monitoring data and acts appropriately. In the second, software probes network resource for...

Template it

Reuse and inherit if you happen to monitor a small network, your task may be rather simple. A few monitors can be either generated via network discovery, or added manually. Same is true about setting up alerts. A few of them can’t be too difficult...

Sending alerts to external services

Using external services to distribute alerts Email remains the primary notification media (with SMS and push notifications coming next). However, email may be not the most convenient means to get notified quickly. Anyone can set up mail server and accept...

Preventing security issues

Monitoring security issues: quick start Security incidents plague the majority of Internet resources. It is still possible to notice most security issues, both actual and possible, before any damage is caused. The list below gives general impression of...

“Monitor everything” approach: did you miss anything?

Common pitfalls in setting up network monitoring In most cases, when a significant new service (device, application) is brought online, it is not put to monitoring immediately. This is a matter of common observation: resources often get monitored only...

Make your Web interface secure

IPHost Web interface is by default open to everyone; set it up securely.

Your first monitoring configuration

If you have never set up monitoring, you can easily be at a loss. Here we explain how to begin monitoring your network assets as fast as possible.