SlideShare ist ein Scribd-Unternehmen logo
1 von 2
How to Maintain Your Network Operable with Network
                                                Monitor

                             Network equipment failures can cause grave consequences, such as
                        material and data looses, bad relations with your customers, etc. System
                        administrators should detect all the failures that can occur on all
                        network devices (local computers, servers, switches, network printers
                        and others) in time and recover them as fast as possible. That is why the
network monitoring is vital in modern IT infrastructure.

    With the program 10-Strike Network Monitor, an administrator can solve this problem
effortlessly. The program is to be installed on the administrator computer only and does not
require installing any other software on remote computers. 10-Strike Network Monitor will scan
your network, detect all devices, and create a list in the tree-like form. You can edit this list, for
example, and organize hosts in folders. The monitoring process runs remotely via a network.

    The program contains a wide set of checks that allow the administrator to be notified about
any network failures. For example, 10-Strike Network Monitor helps you to check the state or
availability of any device or server in your network. You can do it via the TCP port monitoring,
SNMP, DNS, FTP, and HTTP server monitoring. These checks allow you to be notified when a
device or server goes down without leaving your working place. Thanks to this fact, you can
react to any problem quickly and recover all failures in time.

        Also, the 10-Strike Network Monitor program allows you to detect malicious software
on computers in time. The administrator can monitor opened TCP ports via the TCP protocol.
Having the list of TCP ports that are frequently used by such applications (the lists can be found
on the Internet), you can configure several checks to monitor those opened ports. If the
application detects any of the specified ports has opened, it will notify you of that. You can also
monitor processes running on remote computers and detect danger applications using this way.
For that, use the “Process Existence” monitoring check. In this case, you will need to have names
of danger processes and configure the process monitoring on remote computers.

         Using the same “Process Existence” monitoring check, the administrator can control
users' activities on the network, be notified when they launch certain applications, such as games,
media players, etc. during the working hours. In this case, you need to have the names of the
processes to be warned about and enter those in the monitoring settings.
         10-Strike Network Monitor also allows administrator to monitor the size of files and
folders. Sometimes, application logs increase and occupy too much space on the hard drive of a
computer or server. This check allows you to control the specified file size. You will be warned
if the file size reaches the specified volume. You can monitor the free space on your disks also.

        The program allows you to monitor MAC address changes (via the ARP or NetBIOS
protocols). This feature can help protecting your network from unauthorized connections.
        10-Strike Network Monitor can warn administrator about particular events in different
ways. These include: displaying a message, sending an e-mail message, playing a sound, sending
SMS to a mobile phone, executing VB and JS scripts. All the monitoring check results are
recorded in application log for future analyzing.
        Moreover, the administrator can configure the program to run particular programs in
response to monitoring events. The program can run external applications, restart/shut down a
service or a remote computer.
The network monitoring (which includes controlling hosts, searching slow and
defective systems, finding bottlenecks) is one of the most important functions of network
administrator. The whole successful operation of a company depends on how this problem is
solved. The 10-Strike Network Monitor program’s task is to make this process more effective
and simpler because of the wide number of network checks available.

http://www.10-strike.com/network-monitor/

Weitere ähnliche Inhalte

Was ist angesagt?

group presentation
group presentationgroup presentation
group presentations1120099
 
Writing Nagios Plugins in Python
Writing Nagios Plugins in PythonWriting Nagios Plugins in Python
Writing Nagios Plugins in Pythonguesta6e653
 
Viruses And Their Cures
Viruses And Their CuresViruses And Their Cures
Viruses And Their Curesannperry09
 
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa Manula Udugahapattuwa
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!Maxim Sidorenko
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer systemRachel Espino
 
2.index (computer forensic)
2.index (computer forensic)2.index (computer forensic)
2.index (computer forensic)JIEMS Akkalkuwa
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheetIS Decisions
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security SolutionsHassaanSahloul
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0SecPod Technologies
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple Mö Ìñ
 
Week 7 Assignment
Week 7 AssignmentWeek 7 Assignment
Week 7 Assignmentcherylbrown
 

Was ist angesagt? (18)

group G
group Ggroup G
group G
 
group presentation
group presentationgroup presentation
group presentation
 
PRTG
PRTGPRTG
PRTG
 
Writing Nagios Plugins in Python
Writing Nagios Plugins in PythonWriting Nagios Plugins in Python
Writing Nagios Plugins in Python
 
Viruses And Their Cures
Viruses And Their CuresViruses And Their Cures
Viruses And Their Cures
 
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
All about the Meltdown Cyber Attack (CVE-2017-5754) by Manula Udugahapattuwa
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
2.index (computer forensic)
2.index (computer forensic)2.index (computer forensic)
2.index (computer forensic)
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security Solutions
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple
 
JASM Flyer
JASM FlyerJASM Flyer
JASM Flyer
 
Project
ProjectProject
Project
 
Week 7 Assignment
Week 7 AssignmentWeek 7 Assignment
Week 7 Assignment
 

Ähnlich wie How to Maintain Your Network Operable with Network Monitor

[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
O P Manager
O P  ManagerO P  Manager
O P Managerblakka
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxawakish
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problemsAbenezer Abiti
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromiseCal Bryant
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Op Manager7
Op Manager7Op Manager7
Op Manager7lfair
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 

Ähnlich wie How to Maintain Your Network Operable with Network Monitor (20)

Network inventory software
Network inventory software  Network inventory software
Network inventory software
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
O P Manager
O P  ManagerO P  Manager
O P Manager
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptx
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Opmanager
OpmanagerOpmanager
Opmanager
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

How to Maintain Your Network Operable with Network Monitor

  • 1. How to Maintain Your Network Operable with Network Monitor Network equipment failures can cause grave consequences, such as material and data looses, bad relations with your customers, etc. System administrators should detect all the failures that can occur on all network devices (local computers, servers, switches, network printers and others) in time and recover them as fast as possible. That is why the network monitoring is vital in modern IT infrastructure. With the program 10-Strike Network Monitor, an administrator can solve this problem effortlessly. The program is to be installed on the administrator computer only and does not require installing any other software on remote computers. 10-Strike Network Monitor will scan your network, detect all devices, and create a list in the tree-like form. You can edit this list, for example, and organize hosts in folders. The monitoring process runs remotely via a network. The program contains a wide set of checks that allow the administrator to be notified about any network failures. For example, 10-Strike Network Monitor helps you to check the state or availability of any device or server in your network. You can do it via the TCP port monitoring, SNMP, DNS, FTP, and HTTP server monitoring. These checks allow you to be notified when a device or server goes down without leaving your working place. Thanks to this fact, you can react to any problem quickly and recover all failures in time. Also, the 10-Strike Network Monitor program allows you to detect malicious software on computers in time. The administrator can monitor opened TCP ports via the TCP protocol. Having the list of TCP ports that are frequently used by such applications (the lists can be found on the Internet), you can configure several checks to monitor those opened ports. If the application detects any of the specified ports has opened, it will notify you of that. You can also monitor processes running on remote computers and detect danger applications using this way. For that, use the “Process Existence” monitoring check. In this case, you will need to have names of danger processes and configure the process monitoring on remote computers. Using the same “Process Existence” monitoring check, the administrator can control users' activities on the network, be notified when they launch certain applications, such as games, media players, etc. during the working hours. In this case, you need to have the names of the processes to be warned about and enter those in the monitoring settings. 10-Strike Network Monitor also allows administrator to monitor the size of files and folders. Sometimes, application logs increase and occupy too much space on the hard drive of a computer or server. This check allows you to control the specified file size. You will be warned if the file size reaches the specified volume. You can monitor the free space on your disks also. The program allows you to monitor MAC address changes (via the ARP or NetBIOS protocols). This feature can help protecting your network from unauthorized connections. 10-Strike Network Monitor can warn administrator about particular events in different ways. These include: displaying a message, sending an e-mail message, playing a sound, sending SMS to a mobile phone, executing VB and JS scripts. All the monitoring check results are recorded in application log for future analyzing. Moreover, the administrator can configure the program to run particular programs in response to monitoring events. The program can run external applications, restart/shut down a service or a remote computer.
  • 2. The network monitoring (which includes controlling hosts, searching slow and defective systems, finding bottlenecks) is one of the most important functions of network administrator. The whole successful operation of a company depends on how this problem is solved. The 10-Strike Network Monitor program’s task is to make this process more effective and simpler because of the wide number of network checks available. http://www.10-strike.com/network-monitor/