VMWare is wonderful for getting full utilization of scarce resource. However, if you're on a limited budget, affording ESX clustered hosts for all needs is overkill. Sometimes a free ESXi server is enough. In the latter, we ran into challenges doing backups. ...
Remote Engineers
WebInject Scripting to Perform Advanced Monitoring
Nagios is a wonderful tool. However, there are limits to what you can do with it directly. As my colleague Brad discussed in a recent blog post, using NRPE is a powerful tool for Windows. For complicated web checks that require multi-step operation, we use: WebInject....
How to setup basic Windows monitoring with Nagios
In my previous blog post, I talked about how to setup NSClient++ for Windows which is very solid Nagios NRPE client. In this post, I'll describe how to setup some basic checks for your Windows server within Nagios and hopefully give you some ideas on what you should...
How to monitor Windows servers using Nagios and NSClient
One of the best monitoring software packages available for system administrators is Nagios. It's free, open source, has a large community of developers and users for support and can be relied upon to provide outstanding monitoring for mission critical devices. As part...
How to Keep Your Linux Servers Up to Date
One of the most important aspects of our Linux server management service is operating system patching. With Windows, Microsoft has made this trivial by means of the Windows Update utility. Microsoft is the single source of the patches, and assuming that the patches...
Deploying Exchange and Outlook 2010 Settings Using MSP, GPO, and ADMX in 15 minutes
Let’s be realistic: Windows users use Microsoft Office and Microsoft Office requires configuration. You’ve probably used the Microsoft Office Customization Tool to create Microsoft Software Patch (MSP) files to automate installation, but you should consider using...
Firewall HA setup with Juniper NS50s
One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
How to Authenticate Linux Users using Active Directory
In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...
3 Options for Network Installation and Application Management
It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...
Leveraging Group Policy to Setup Wireless Access
In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...
Enterprise Storage – Do you really get what you pay for?
In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring. This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...
Upgrading from ClearCase/ClearQuest 7.0 to 7.1
As an IT engineering expert for SPK and associates, a California based IT services company, I write blog posts on topics such as Software Configuration Management and other Engineering Applications. This week I’d like to blog about my experiences in upgrading...