Network Security Monitoring
Network Security monitoring tools help you analyze network security so you know backups have been successful, AV software is up to date, and you are alerted fast to any malicious activity. Knowing that your security infrastructure is in place and software is up to date provides the added peace of mind that networks and data is secure.
The TCP Service Check [Windows | Linux] alerts you to security risks and malfunctioning TCP/IP Services/applications, so you can spot developing problems on the network, and fix them before they become big disasters.
The TCP Check monitors a specified port on an IP address or hostname on the LAN, WAN or internet, and alerts you if it is either open or closed. For example alerting when Ports 25 (SMTP), 80 (HTTP), 3389 (RDP), 1723 (PPTP) are open when they shouldn't be.
The Hacker Check (Failed Login Check) [Windows | Linux | Mac] monitors the Security Log over a 24 hour period, it then totals them up and if they exceed the specified threshold an Alert is generated. Use this to determine if hackers are continually attacking the system. (The Failed Login Check was introduced in Agent 9.7.2 RC as a replacement for the Hacker Check on Windows Operating Systems.)
Antivirus Signature Status
The Antivirus Update Check [Windows | Linux] queries your client's anti-virus pattern file to ensure it is in sync with the vendor's latest published version. We receive a feed of this information on every vendor update. This check compares what's operating on the server against what the vendor says is the current version. If a discrepancy exists, you'll be alerted.
Managed Antivirus contains a choice of two engines built upon technology licensed from Bitfdender (Windows | Mac) and VIPRE® (Windows) which are selected, deployed, configured, monitored and reported on directly from the Dashboard.
From your Dashboard, you can configure every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Save this protection policy for use on similar types of device at other clients and sites. Receive alerts if a threat is quarantined and choose to delete or release from quarantine. Start, Pause, Resume and Cancel scans and view reports that demonstrate the service you’re providing.
On Windows ensure the application is fully patched with Patch Management, this supports all Microsoft Updates types (not just security) for Microsoft Operating Systems and third-party applications where the application is supported by the selected Patch Management engine.
This provides an effective and efficient solution not only for Microsoft Windows and Office applications security patches, but also non-Microsoft applications such as Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java and more.
For Mac computers, use the Run Managed Patch Automated Task to automatically deploy verified Apple OS and third-party updates for supported products (not including Mac App Store purchases).
The system integrates with Microsofts Windows Server Update Services (WSUS) a patch management tool that enables system administrators to deploy Microsoft product updates across their organization from a centralized source, the WSUS server.
The WSUS Check queries the WSUS database for the last synchronization information and reports this back to the Dashboard, along with the number of critical updates that have not yet installed successfully on all computers.
Package Manager Update
The Package Management Check monitors the package status on the device failing where the number of available, but not yet applied, updates exceeds the specified threshold and supports apt, yast,zypper and yum package management tools.
OS X Update
The OS X Update Check queries the Operating System through softwareupdate to determine whether there are any OS X software updates available.
The information returned to the Dashboard includes the update Name, Size, whether it is Recommended and if a Reboot is required to install with this available in the Extra information column against the Check.
Roll Your Own Event Log Check
The Event Logs are repositories of information that have detailed data on the status of the system written to them by applications and Windows components.
The Event Log Check monitors the Event Logs and can be configured to query a specific Event Log based on the following indicators Event ID, Event Type, Event Source and Description. Alerting where the specified information is, or is not, discovered in an Event Log entry.
The Check is available as both a 24x7 and Daily Safety Check as there may be Events you wish to be alerted to as soon as they occur, for example those recorded as critical events or license failures, as well as those that only happen once a day, for example where a backup job has completed or an Antivirus program updated.
Backup & Recovery
Cloud based backup is a natural complement to our service and therefore we have teamed up with IASO Backup Technology to add Backup & Recovery. Backup & Recovery can be enabled on individual servers and workstations or, on all servers and workstations at the client or site level, specifying whether or not to backup system state, which files and folders to backup, files to exclude and the backup schedule. Download and launch the Backup Manager from the Dashboard to backup network shares, Exchange Information Stores, SQL Server instances and take application aware VMware (ESX only) snapshots.
Backup & Recovery Documents regularly backs up specific file types on Windows and Mac workstations.
IASOs True Delta technology searches for changes at disk block level where, on average, only 0.1 - 0.5% of the protected data set will have changed making it highly effective at maximizing bandwidth and storage capacity. LocalSpeedVault can provide on-site copy (at no extra cost). Restore (also at disk block level) the last revision or any revision from the last 28-days either online or from the optional LocalSpeedVault via Backup Manager launched from Dashboard.
This Backup Check queries your client's backup on the days specified to determine the status of the backup ensuring that in the event of any problems on the client's server there is a backup to restore from.
The check incorporates a Show Backup operation incomplete as successful option so if the backup completes but files are still open this can be treated as successful or unsuccessful.
Although we monitor a number of the industry's leading backup solutions including Backup Exec, ARCServe, and Windows Backup additional products may be monitored via the Windows Event Log Check as mentioned earlier.