Category: General IT

  • OpenSSL v3.0.0 – v3.0.6 critical vulnerability

    OpenSSL v3.0.0 – v3.0.6 critical vulnerability

    OpenSSL is the backbone of secure Internet communication. It has two currently active and supported development branches: version 1.1.1 and version 3.0.   It has recently been discovered that all current versions of OpenSSL 3 (3.0.0 through the current 3.0.6) have a critical security vulnerability, and must be upgraded to a new version immediately.   […]

  • What Should You Do When You Receive Event Log Monitor Alerts?

    What Should You Do When You Receive Event Log Monitor Alerts?

    When you are installing PA Server Monitor, you will need to configure what occurs when there are event log monitor alerts. You typically set this up during the initial install. However, it is not uncommon to want to make changes and updates or even add new events to your server monitoring software as you become […]

  • Which Event Log Events Should You Worry About?

    Which Event Log Events Should You Worry About?

    When you are configuring your event log monitor settings, you need to decide which event log events you need to worry about. Event logs are generated for a wide array of processes, applications, and events. Logs will record both successes and failures. As such, you need to decide what data is most vital and needs […]

  • 10 Server Maintenance Tips for Efficient Server Maintenance

    10 Server Maintenance Tips for Efficient Server Maintenance

    Just like your commercial vehicles or HVAC systems, servers require regular maintenance to ensure they are operating effectively and optimally. So, we decided to compile a list of server maintenance tips you should be doing.   Keep in mind, these server maintenance tips are meant to be used as a guide to help you develop […]

  • The Top 5 Benefits of Temperature Server Monitoring Solutions

    The Top 5 Benefits of Temperature Server Monitoring Solutions

    Your servers generate heat—this is a fact common with any type of electronic device. The amount of heat they generate will vary, depending on where they are located and the number of servers in use.   For example, a small business may have only one or two servers that are stored in a small server […]

  • Recommended Hard Drives Operating Temperature Range

    Recommended Hard Drives Operating Temperature Range

    Did you know that hard drives have a recommended operating temperature range? Most people do not think about what happens when they turn on their computer or server and the hard drives begin to whirl around inside. Even if you have the newer solid-state drives (SDDs), you still need to know the recommended hard drives […]

  • Why Use Active Directory Security to Improve Your Server Security?

    Why Use Active Directory Security to Improve Your Server Security?

    How do you secure your network servers, laptops, desktops, and workstations? A good starting point is to have a checklist of how to enable security features on these devices. You also need to enable a server monitoring service to track specific events and generate event logs.   Yet, your security tasks are never done. You […]

  • Why Full Reporting Capabilities for Your Databases and Files Are Helpful

    Why Full Reporting Capabilities for Your Databases and Files Are Helpful

    Do you know what files your employees access to? Do you know when they create new files? How about when they copy, move, or delete files? How confident are you that your databases are safe and secure from potential intrusions?   These are the types of questions any business owner should ask themselves, especially now. […]

  • How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

    How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

    Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring access to network resources. Active Directory is also used to enforce various network security policies, enable various processes, and enable various services.   Active Directory […]

  • Supply Chain Safety – Our Measures

    Supply Chain Safety – Our Measures

    The IT world has been in shock as we’ve all learned about the Solarwinds hack (UPDATE: And now also the Kaseya hack).  Network and server monitoring software inhabits a special niche where it often has full access to the servers and devices on the network in order to monitor all internal resources.  Because of this […]