Identify And Remedy a Failing Web Server

A customer of ours reached out to us recently to help them solve and potentially reduce the outages they were experiencing to their public website. The first step to help remedy this situation was to identify the root cause of the fault.

Digging into the logs, we were able to identify there had been an accidental (perhaps) Distributed Denial of Service (DDoS) attack produced by around 1200 IP Address crawlers that overloaded both the web server and the application, requiring a server reboot. The resolution for this singular problem was to block that IP Address range to prevent this from occurring again. This, however, was only a partial solution, as this could happen again from a separate range.

This is where the power of Opmantek software began to shine.

Firstly, the engineering team must shift their mindset from a reactive one to being proactive; identify the issue before it becomes a problem and take automated action to prevent an outage. Dependent on how your network is set up, your staffing situation and personal preferences, you may tackle this issue in a variety of different ways.

There are several methods that can be implemented to identify the root cause of the service impact. From NMIS, you could run a service check on the web server that looks to identify if the quantity of connections exceeds a present threshold. You can test the number of open connections on the web server with a command such as;

netstat -ntu | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n

One step further and we can use a combination of NMIS and opTrend to monitor for a sudden increase in CPU/memory utilization on the server and raise an event from there.

Once the event condition is satisfied the next step is to identify the attack vector and remediate. In this case opEvents could retrieve and parse the Apache logs, identifying the IP Address range, then instruct opConfig is reconfigure the necessary firewalls and applications to block them. Nick Day, Opmantek’s Senior Network Engineer in Asia-PAC, helped another customer by leveraging automated remediation; you can find out how in this blog.

Not comfortable with this level of automation? Once the event is properly identified, engineers could be notified of the situation and using opConfig’s Virtual Operator reconfigure the firewalls/applications to block the DDos attack and restart any services/applications/servers all without giving those operators command line access or sudo/root privilege.

Uncategorized

Peace of Mind For Monitoring Networks And Assets Remotely During COVID-19

Thousands of businesses worldwide, many of which have never had work from home processes or policies in place have suddenly had to accommodate remote access to company networks, the relocation of hardware assets as staff take key equipment home and increased stress on systems and software as staff utilising home internet connections with limited bandwidth access applications designed to be supported by corporate networks putting strain on resources and creating stress for the IT departments responsible for the digital security of network, software and hardware.

If you are an IT manager coping with the sudden adaptation to an online businesses structure, these 5 Opmantek product features and tools will help to provide you with peace of mind that everything is under control, and if you’re are an Australian Healthcare or Government organisation you can apply to have the entire commercial suite of Opmantek network management and IT Audit tools provided FREE of charge under our COVID-19 Software Relief Program.

Hardware Asset Tracking

Conduct a digital audit of your infrastructure and hardware to keep track of when devices were last seen and where.

Application Monitoring

Keep an eye on the performance of private cloud and SaaS applications that may be slow or underperforming due to higher than normal traffic and other response issues.

Anomaly Detection

Let Opmantek’s machine learning, trending and event management modules alert you when unusual activity occurs on your network or to any of your networked devices.

Remote Configuration Management

Monitor, track and update the configuration of core network infrastructure including security settings and firewalls remotely and get alerts of any unauthorised changes.  Roll out and roll back new device configurations manually or automatically in seconds.

Automated Event Remediation

Use the Event Management scripting tool to proactively trigger automated responses to a variety of common network issues, resolving tickets before human intervention is required and storing logs that can be reviewed and analysed to put more preventative measures in place.

Combined with the scalability, reliability, ease of deployment and low-cost support that Opmantek Software are recognised for globally, if you need intelligent network management that works anywhere and everywhere, download the Opmantek VM today.

Uncategorized

A Teleworkers Guide to Maintaining Productivity

The world has changed. 2020 had so much promise and now we’ve had to reshape the way we look at work completely. With most companies transitioning to a teleworking model, there will be and has already been, a significant disruption in productivity. The companies that have leant on remote working or flexible office hours historically are much better suited to accommodate a dramatic shift, the magnitude of which I haven’t seen in my lifetime.

For some workers, myself included, the teleworking landscape is not new. People have transitioned standard workdays to be outside of the office, either from home, co-working spaces or hipster cafes. With this lifestyle being popular for some time now, there is plenty of great advice on how to maintain a healthy balance between work and personal life. I have summarised the most important ones below.

Create a work location

Whether you have an office at home or a make-shift on your dining table, create a space that is dedicated solely to work. You must resist the temptation to work from a laptop on the couch or worse, in bed. This is not only detrimental to your health, but mentally you are starting in the negative, making you less productive. The cognitive shift from ‘on fire achieving goals’ to ‘this is where I normally binge-watch three seasons and a family value meal’’’ is staggeringly quick.

Trust me.

Optimize your workspace

Optimizing may be harder currently, but you should try to make your new workspace as ‘optimal’  as possible. Use a comfortable chair, raise your screens, use external keyboards, good lighting. The more comfortable you are in this space the more focused you will be on working. But more importantly, one crucial point that is handed down from generation to generation; do not work in your PJs. You’ve already decided your commitment from the get-go.

Have your shower. Brush your teeth. Put on casual work clothes. These physical steps do trigger parts in your brain to help get you in the work mindset.

Schedule your workday

Don’t change too much! Make sure you keep that alarm, if it was 5:20 am before you started working from home, keep it that way. Maintain the same regiment that you operated on when you weren’t teleworking. This will be important for you to stay in a work-focused mindset and to create that atmosphere throughout your house.

This is crucial at both ends of the workday as well, maintain a strict start and finish time. Just because the laptop is there, doesn’t mean you’re on the clock. Shut down all your tabs, press the off button and cultivate that defined work/life balance.

Maintain your To-Do List

The management of your task list becomes paramount when there are fewer people involved in the day to day proceedings. Keeping your most important tasks top-of-mind and in your queue will help keep you on track in the days and weeks ahead. Try and put the highest priority and most challenging first every day. Get them done before your brain realizes and kicks in those ten fantastic valid excuses to procrastinate.

Further, lists are a fantastic way to help decrease anxiety! Every part will help over the coming months.

“Organize and contain a sense of inner chaos, which can make your load feel more manageable.” – Psychology Today

Act more healthily

A lot of us will now have a terrific opportunity to be more active than usual. I, for one, am much more comfortable doing ten push-ups at home compared to in the office. The Heart Foundation of Australia recommends that you should get up from your desk every thirty minutes, this means you will have ample opportunity to do some light exercise. Also, the time saved in your commute and getting ready for work can be reassigned to something more movement-based.

Couple this with a healthy diet and you will keep your energy up throughout the day.

Stay Connected

However isolated you are, you should always stay connected. Start creating the habit of regular communications with your friends, family and also your co-workers, ensuring that you’re not doing everyday solo. Your business probably has an instant messenger but if not, get one going. You can have a more personable, casual chat through a messenger that you can’t through email. Plus GIFs are more socially acceptable.

Following these steps and recognizing how you work at your best, will help increase your productivity while teleworking.

And if all else fails, there’s now an abundance of time to prank your flatmate.

Keep calm and stay safe (flatmate).

Uncategorized

4 Ways To Simplify & Get Practical With Your IoT Management

“How well do you know your IoT network? If you’ve had to stop and think you’ve answered our question”.

Having confidence in your operational capabilities to deliver efficient connections and real-time insights is a myth without effective IoT management. A business’s head can become a murky place swimming with data on their IoT network that often gets pushed into unseen depths. This, however, doesn’t have to be the case. So, how can you throw out a lifeline, simplify and get practical with your IoT management? Below is a list of ways to enhance your management skills to boost your confidence.

1. Cloud Network Management

Rather than trying to maintain traditional device-focused networks, businesses should introduce wan-optimised cloud networks to improve the reliability of IoT connectivity. Cloud computing provides a great base for IoT networks as it has ample storage space for IoT data. Without the cloud, IoT data may have to be stored in multiple servers, which makes it much harder to analyse and compare. If you are currently unsure where all your data is being stored and collected, Open-AudIT can collect your data from multiple networks, ensuring that it is organised, catalogued and easily configurable into meaningful reports.

2. Ensure Scalability

Over 25B units, that is the 2021 expert forecasts for install base IoT endpoints, with services spending $500B on IoT. So it’s time to pivot, businesses need to be flexible in introducing new devices and expanding their IoT network. An IoT network should be ready for the lights, camera and action of integrating new services, apps and data; without the negative effect on their networks. Gartner mirrors the importance of scalability and practical IoT infrastructure management in this podcast.

3. AI

From chatbots to automated customer service enquiries, automation is being introduced in multiple areas of a business. The stronger your communication between devices on an IoT network, the more processes that can be efficiently automated. You’ll have the power for devices to be able to communicate with each other over a query; saving the time of a physical employee transporting information from one database to another.

Why Is Simplifying Your IoT Management Beneficial?

By simplifying your IoT management, you allow your IoT network to work more efficiently. For example, work processes will become more streamlined and everyday tasks can be completed intuitively. This leads to better customer satisfaction and engagement. Employees in your business will also benefit from simplified IoT management as they will have a streamlined workflow and will be able to manage their time more effectively. Open-AudIT will ensure employees have maximum control over network devices, so they have more time to focus on creative tasks. This will help employees to feel more valued, helping you attract and retain the best team members.

How To Start Practical Iot Management?

Before you try to simplify your IoT management before the whistle goes off, understanding of the current condition of your IoT network is essential. Use tools like Open-audIT to see beneath the surface with precise x-ray vision quality device discovery and control. Simplifying the end-to-end process Opmantek tools allow users to gain unparalleled visibility into their IoT network, giving businesses the chance to grow on a global level.

Practical IoT management involves more than just managing IoT data, it involves managing how IoT devices connect and communicate with one another. The best way to start IoT management is by having a clear and thorough understanding of your IoT network. With greater understanding and control of the devices of your IoT network, you’ll be able to make more accurate choices about how you use your data and what software would benefit your network. For more guidance about practical IoT management, talk to our experts about showing you a live demo.

Uncategorized

Helping With Security Concerns When Working From Home

If you’re like a lot of companies and staff of late, at least some of your employees will be working from home. That’s all well and good, but what are they using at home to do this work and do you know if that device (or those devices) are secure? Are they running Antivirus? Do they have up-to-date Office software? Are their operating system updates complete? How do you know if you don’t have your management client on their computers? 

Open-AudIT comes to the rescue! Sign up for an Open-AudIT Cloud account and it’s quick and easy to find out exactly what your staff’s devices consist of.

Go to http://opmantek.com/cloud, sign up, sign in and use the Audit My PC functionality. You can copy the provided URL and email it to your staff, advising them to download and run the audit script. The audit script will automatically send the result back to Open-AudIT Cloud, which will update your instance.

Alternatively if you’re running Open-AudIT on premise, simply send the URL of the Open-AudIT homepage (http://your-server/omk/open-audit) to your users. There is an option to Audit My PC right there, see image below.

Open-AudIT-Login-screen
But wait, there’s more! 

What if you have requirements that users have Antivirus installed, well there’s already a query for that inbuilt. It’s the same for Office software, we already have a query. But what if you would like to take things one step further – that’s where our Baselines feature comes in. You define a list of software and versions that PCs must meet (or exceed), assign the VPN users PCs to a Group and run the Baseline against that Group. You’ll see an easily digestible report showing the status of each PC and the test run against it.

And what about tracking any computers that would normally be in the office, but are taken home? Again, it’s just as easy. Make sure you have an entry in Open-AudIT for the PC in question, then just edit the Owner field on the device details page to indicate that user X now has PC Y. When they bring it back, remove the name. If that’s too simple, you can always create custom fields such as “lent to”, “lent on” and “returned on”. You can easily query which PCs are still out on loan to staff working from home. Now you also know who has what and what configuration the machines have.

You now know the configuration of the computers of your staff using your VPN to continue working. You are able to report on those PCs and show any that don’t meet your corporate security standards, and you have a record of any PCs that have left the workplace. This is a simple way Open-AudIT can help you manage your device fleet, but at this time we thought it was important to let you know.

Uncategorized

Initial Guidelines to Remote Working

There’s been much written already about how to manage the human factors of a remote workforce. Everyone has an opinion about the best practices for dealing with changes to productivity, communication and the possible impact of loneliness, not to mention the health and safety concerns of the home office. People can look after themselves, but for the IT manager, enabling the systems in a compressed time-frame is a real challenge.

There is little quality advice on how to quickly mobilize your office-based workforce to work from home from an IT Management perspective. You need to be creative, leave no stone unturned and be prepared for some risk mitigation. Here are some steps you can help guide you through this process.

The process is simple and can be summarised as:

  1. Ensure business continuity through remote working.
  2. Manage the associated risks to security, in particular data loss, unauthorised access and computer viruses.
  3. Manage the infrastructure to ensure highly available and reliable network services, the internet and network has never been more critical.

 

1. Your first decision. To BYOD or not BYOD (Bring Your Own Device).

In most industries, the sales staff are already set-up for remote access. These staff will already have computers specifically set-up for the job requirements and be capable of working from anywhere. It’s a matter of duplicating (and adjusting accordingly for each job role) what you have already in place for these staff specifically for others to use.

Then there’s everyone else who is not mobile capable using a desktop computer, 9 to 5. What do you do to get these people working from home? Ideally, your IT team or outsourced service provider can offer some help and support. But what if you don’t? What can you do in the short (and medium) term?

Let’s deal with the Short Term. It buys you time for the medium term, when you can make more informed decisions.

Let the staff use (in as many cases as possible) their BYOD home computer as:

  1. It’s an immediate solution.
  2. It is already set-up (and hopefully working).
  3. The user is already familiar with it.
  4. They will have the Internet.
  5. It may already have some access to cloud applications (so can do some work).

2. How much risk does unplanned BYOD bring to your environment?

Your office computers are likely to have a standard operating environment (SOE) so you will already know your minimum specs for the computers. You will know in detail your hardware and software versions, network settings, VPN and security details. They will be configured and locked down as appropriate for their purpose.

Using this bare minimum as your baseline you can use an audit tool (such as Open-Audit Enterprise or Open-Audit Cloud).

To ensure BYOD equipment is ready to connect to your network, you can audit these before providing access (or go back and audit them now). This way you can quickly see what you are dealing with and which computers will be more problematic than others and start to group them based on risk. Mitigate the threats understanding that these are uncharted territories, likely you will need to balance security risk with business continuity.

It is likely that some computers may require anti-virus to be installed to meet your minimum requirement. You can plan this as batch work. You may also decide to add in other O/S updates or applications at the same time to get you past the baseline, or delay for the next phase. Ideally you try to get as close to your SOE as you can given the circumstances.

3. Next steps

There will be many decisions that you will need to make as you enter uncharted territory.

Knowing your risk from the audit results will enable you and the team to make data-based decisions about what you will and won’t allow on the network for a longer-term. In the short term it allows you manage the risk down and advise the business accordingly.

Uncategorized