IT:Network:Apps.  Need to keep track of many things ◦ Traffic (packets) ◦ Network load ◦ Server load ◦ Disk space ◦ Log files ◦ Availability of Servers/Services.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 10 Planning Microsoft® Exchange Server 2010 Monitoring and Troubleshooting.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 10: Collect and Analyze Performance Data.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Chapter 11: Maintaining and Optimizing Windows Vista
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Monitoring Network Resources & Performance IT:NETWORK:APPS.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Module 14 Monitoring and Maintaining Windows Server® 2008 Servers.
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
CH 13 Server and Network Monitoring. Hands-On Microsoft Windows Server Objectives Understand the importance of server monitoring Monitor server.
Windows Server 2008 Chapter 11 Last Update
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Services and Disk Management. Default Services (some) Alerter ClipBook Server Computer Browser DNS Client Event Log Messenger Net Logon Network DDE Network.
systemhound © Raxco Software Belgium systemhound PC inventory software.
COEN 252 Computer Forensics
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
11 SYSTEM PERFORMANCE IN WINDOWS XP Chapter 12. Chapter 12: System Performance in Windows XP2 SYSTEM PERFORMANCE IN WINDOWS XP  Optimize Microsoft Windows.
COEN 252 Computer Forensics Collecting Network-based Evidence.
1 Objectives Audit Policies Update and maintain your clients using Windows Server Update Service Microsoft Baseline Security Analyzer Windows Firewalls.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
Monitoring Windows Server 2012
Learningcomputer.com SQL Server 2008 – Profiling and Monitoring Tools.
Module 11 Maintaining Microsoft® Exchange Server 2010.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Overview Managing a DHCP Database Monitoring DHCP
Chapter 10 System Monitoring Issues Performance Benchmarks NT Server Services Users and Server Access Information Task Manager for Applications Ram and.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
14.70 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 14: Monitoring Windows Server.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Using Event Viewer Event Levels Creating Custom Views Windows Logs Monitoring Performance.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Module 14 Monitoring and Maintaining Windows Server® 2008 Servers.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Chapter 5 Server Installation NT Server Requirements NT Server File Systems Installation.
Monitoring Windows Server 2012
Chapter Objectives In this chapter, you will learn:
3.1 Types of Servers.
Module 9: Preparing to Administer a Server
Troubleshooting Tools
3.1 Types of Servers.
Traffic Analysis with Ethereal
MONITORING MICROSOFT WINDOWS SERVER 2003
PLANNING A SECURE BASELINE INSTALLATION
Software - Operating Systems
Module 9: Preparing to Administer a Server
Presentation transcript:

IT:Network:Apps

 Need to keep track of many things ◦ Traffic (packets) ◦ Network load ◦ Server load ◦ Disk space ◦ Log files ◦ Availability of Servers/Services

 Protocol Analyzer ◦ Wireshark ◦ Sniffer ◦ Network Monitor  Need to see all packets ◦ Promiscuous Mode ◦ Management port on switch

 Could use Wireshark again (Stats>Summary)  Administrative Tools > Performance ◦ IPv4 – Datagrams (sent/received) / sec ◦ Network Interface – Bytes (sent/received/total) / sec

 Performance again ◦ Processor - % Processor Time ◦ Processor - % Idle Time ◦ Memory – Pages/sec

 Disk Space – does it have enough space ◦ Performance Monitor ◦ Logical Disk - Free megabytes; % Free Space  Disk Performance – is it fast enough ◦ Performance Monitor ◦ Logical Disk – Avg Disk Read|Write Queue Length

 System keeps log files with important info ◦ System; Application; Security; Others  Look at them!!!  EventRover  EventAlarm

 Security Policy (Local, Domain, DC) ◦ Local Policies – Audit Policy  What to watch ◦ Account Logon Events – domain user auth by DC ◦ Account Mgmt – ◦ Logon Events – user auth by local machine ◦ Object access – file system/reg key/ printer  (ntfs security – Adv – audit) ◦ Policy Change ◦ Privilege use ◦ Process Tracking ◦ System Events

 It Depends ◦ Security – watch for what “shouldn’t” happen ◦ Tracking – watch for what “is” happening  Do we need to know Mary successfully logged in?  Do we need to know the server restarted? ◦ Why did it restart?  Do we need to know a user was created? ◦ who created it and why?  Watch Log File

 NetProbe  Performance  Could be as simple as ping  Could check for specific service (www, smtp)  Could check Performance Monitor settings

 Windows Software Update Services ◦ Patch management software  Microsoft Security Baseline Analyzer ◦ MBSA, probes local and remote systems for security issues  Missing updates, hotfixes etc for most Microsoft Software