opCharts: Maximize Efficiency with Scheduled Outages

Knowing what is on your network is equally as important as understanding how your network operates. An often overlooked component while gathering performance data is accounting for scheduled outages.

If scheduled outages are not accounted for, there can be negative effects on your reporting and your efficiency. Preparation can stop events from expected outages taking up valuable diagnostic time by engineers. Further, the performance metrics will look better while being more accurate.

Using opCharts, scheduled outages can be planned and tracked. By leveraging the powerful tools at your disposal, you can view, display and warn about planned outages. This creates a historical record of start time, stop time and which user created the outage for review purposes. Communication between teams is increased by having a regular maintenance window that is agreed upon by all.

To create or view existing scheduled outages select the Views drop-down menu and select Scheduled Outages.

This will display a list of all the scheduled outages that are in the system. If you would like to add a new outage, simply click the New Outage button.

This will open a window to input a new Scheduled Outage.

Once these are filled in and saved there is a scheduled outage in place and you are one step closer to having the most reliable data.

Uncategorized

Knowing whats on your network

The standards for many organizations are still in the proverbial “dark ages” when it comes to keeping track of what is on their network. As a support engineer with Opmantek I speak with multiple engineers every day. It isn’t unusual for me to hear that engineers at large, fortune 500 companies are still using text documents, spreadsheets, and even sticky notes to manage their device inventories. The challenge with this is in how long the manual process takes. Manually updating records often leads to maintaining inventory records inconsistently causing the information to be incorrect and outdated.

Opmantek’s Open-AudIT software delivers IT auditing and inventory management automation as well as many other useful features. Keeping track of your organizations computers, printers, telephones, or any other network device is made easy with Open-AudIT. There are many ways to get information into Open-AudIT, one way to do this is to simply enter your networks subnet(s) and valid credentials and watch Open-AudIT start to populate with your network information. With this information you can keep track and report on what software the devices have installed, warranty information, software licenses, hardware information, configuration changes, and much more. Open-AudIT monitors any changes made to your network, i.e software updates, devices removed, or added etc. This is accomplished by running scheduled scans of your network daily, weekly, or any other time designated by you then, compares the audit results over time to previous scan results.

Customizable fields and queries allow you to keep track of any other information you feel is relevant to your organization. Open-AudIT comes preloaded with many queries out of the box. Device types, installed software, hardware changes are a few of these. If a query is needed that is not pre-packaged, Open-AudIT allows you to create and customize queries to address any of your specific needs. Quickly migrating from your current manual inventory and device management process is designed to be as automated as possible. Open-AudIT can import inventory information from various formats including XML, CSV, and others. For those still managing your inventory with spreadsheets and other files, this feature allows for the seamless implementation of your inventory records into Open-AudIT.

This software offers so many more features than just what was discussed here and did I mention… You can even use the community edition of Open-AudIT for free to get a feel for how it works! The community edition gives you Network Discovery, Device and Software Auditing (including Device Port and Storage Appliances), Configuration Changes Detection and Reporting, Hardware Warranty Status, Inventory Management, and Custom Fields. If you really wanted to keep your network monitoring and inventory management system up to date along with having other useful features, you can upgrade from the Community edition to the Professional or Enterprise editions. With the professional and Enterprise editions, you get Interactive Dashboards, Geographical maps, Scheduling of discoveries and reports, and enhanced reports. These editions also come with Commercial support to provide you with any assistance you may need in implementing and customizing Open-AudIT to your specific needs. The Enterprise version is highly scalable for large organizations and includes additional features that improve and simplify administration. Enterprise also includes File Auditing, Baselines, and Configurable Role Based Access Control including Active Directory and LDAP support. More information on the different versions of Open-AudIT can be found on the Opmantek website.

Having all of your device and inventory information in one place while replacing most of the manual process behind maintaining that information can save countless hours. Custom fields and queries allow you to be in control of what information you want to collect, report on, and view. Configuration changes let you know when a device has been removed or added. I don’t believe sticky notes or spreadsheets can do that. Make the switch to Open-AudIT and see how easy it is to know what is on your network.

Uncategorized

What is Open-AudIT?

What does it do?

Open-AudIT is an application to tell you exactly what is on your network, how it is configured and when it changes.

Open-AudIT is designed to be run on a server (Windows or Linux) and to scan your networks for devices. Once a device is found, Open-AudIT runs a series of commands upon it and stores the resulting data in a database. This data is then available for various reporting purposes. Open-AudIT comes with a list of over 50 reports with any number of additional reports able to be created by the user.

But Why?

Why would you want to go to the trouble (“trouble”, hah, see the blog post about downloading, installing and discovering in under 10 minutes here) of keeping track of every device and its configuration? Well, here are some contrived examples…

Would you know if someone installed a bitcoin miner program on their desktop PC and left it running every night? With Open-AudIT, you would not only be alerted when this new software was found, but you would also know which user account installed it and exactly when.

What about if someone bought their laptop into the office and plugged in – would you know? That laptop could be a security nightmare and now it’s sitting on your network. Open-AudIT will see this new device and the “New Devices found in the last 7 days” report will show you. The Dashboard in Professional and Enterprise will also populate its graph. You will know. Your network will be safer.

And then there’s software licensing – that’s a given. Naturally, Open-AudIT can report on exactly what software packages are installed. It’s simple and easy to see if you have bought the required number of licenses.

Features?

As a result of Open-AudIT storing the data about a device, it also recognizes and stores and changes affected upon a device. If software was added or removed, for example, Open-AudIT stores this and can report upon it. This is taken even further by the concept of a Baseline, which exists in Open-AudIT Enterprise. Baselines enable you to compare one device against another and report the differences.

Open-AudIT has an extensive role-based access control mechanism which allows administrator-level users to define the access rights of other application users. If you have multiple departments in your company and would like John from Finance to be able to view all assets, but not be able to change them, for example, this is simply and easily achievable. Open-AudIT can also leverage Active Directory and OpenLDAP for authentication and authorization.

In addition to the standard array of attributes retrieved, Open-AudIT can also be configured to retrieve and store the details of files and/or entire directories of files.

As a benefit of being open-source, users can add specific attributes for retrieval to the audit scripts. Opmantek is always open to including more attributes – all you need to do is ask! There is also the feature to be able to define “custom fields” which users can populate manually. If you need to store some piece of information about a device, Open-AudIT likely already does so, but if not, can be made to do so in a few mouse clicks.

Once you have the data, you can use the Restful JSON API to export it – or CSV, XML, HTML – whatever you like, because it’s your data. The API supports the standard create, read, update and delete functions on all endpoints.

When Open-AudIT scans a network, it is called a “Discovery”. Discoveries can be scheduled and hence automated. Set and forget. Along with automating discoveries, you can automate reports to be run and emailed to you on whatever schedule you choose. Why not send yourself a report containing all new devices found on your network in the last 7 days? This can be done in just a few mouse clicks.

The feature list is extensive and enables tracking of all IT assets, whether they be on your network or not. Need to record the details of a phone given to a user – not an issue. Open-AudIT can do that. What about the PC that’s not physically connected to the network – Open-AudIT still has the ability to audit the machine and store the details. From their location, to how they’re configured, to who is in the Administrators group, to when a piece of software was installed, to ensuring file changes (/etc/htpasswd ?) are recorded. Open-AudIT can tell you exactly WHAT is on your network, HOW it is configured and WHEN it changes. Easily. Automatically. Simple.

How does it work?

Open-AudIT works best when you supply a list of credentials that it then uses to query devices. Open-AudIT makes use of Nmap to scan a network and report any responding devices. These devices are then queried to determine their attributes. Even if you don’t have the credentials for a device on your network, Open-AudIT will still have a record of it thanks to Nmap. If a device is found, working credentials determined and it is a ‘computer’, an “audit script” is copied to the device and run. The script gathers extensive information and sends it back to the Open-AudIT server. If the device is a switch, router, printer, etc and it has SNMP enabled and Open-AudIT has working credentials, it’s attributes will be queried using SNMP and no audit scripts will be used.

Once the data is in Open-AudIT, it is yours to query at will. The database structure is open and documented with examples to get you started (if one of the built-in 50 reports don’t do just what you need).

How is it built?

Open-Audit Community is built using free and cross-platform tools such as PHP, MySQL, and Apache. In addition, Open-AudIT uses VBscript and Bash for its audit scripts. Both Professional and Enterprise use the same codebase with available features enabled by the license. Both Professional and Enterprise are compiled binary code with support offered to users by Opmantek.

Licensing

Open-AudIT started as a free software project. To this day it remains so. In recent years Opmantek Software has become the owners of the codebase and monetize this by creating add-ons in the form of Open-AudIT Professional and Open-AudIT Enterprise.

The original Open-AudIT is referred to as Open-AudIT Community.

Open-AudIT Community is the “engine” of Professional and Enterprise. It is Afferro GPL licensed and will always remain free software.

Open-AudIT Professional and Enterprise are commercial closed source programs, licensed by Opmantek to customers and users. Opmantek supply a free 20 device license to users. Professional and Enterprise build upon the foundation of Community and offer extra features and benefits. These can be seen in the table below.

Uncategorized

Opmantek’s Top 5 Technology Deals This Sales-Season!

Cyber Monday is here and we are getting excited for some bargains!

While Opmantek are offering 25% off an Open-AudIT Professional 100 device subscription with the promo code ‘CYBER17” until 5th December 2017, we have also been trawling the internet for the best deals for technology products and services our small business customers will love.  Here are our top 5:

Adobe

Mirroring their sale from last year, Adobe has on offer a 20% discount off a year’s subscription to Creative Cloud. The offer is available via Adobe’s website until 1st December 2017.

CISCO

CISCO are offering an online Black Friday and Cyber Monday deal buy 2, save 55% off the list price of books, eBooks, video training, practice tests, and simulators with promo code ‘BF2017’.

VMware

VMware have up to 25% discount on a number of their virtualization products as well as their training and certification programs designed to grow skills so you can exploit the opportunities made possible by VMware technology.

Envato Marketplace

Envato Marketplace are offering 50% off 500 of their digital assets, templates and files.  If you are looking to replace your old wordpress theme, rebrand some documents or purchase stock videos and images for your marketing stash, check it out!

Udemy

Lastly, Learn a new skill with massive savings on all online courses until tomorrow night.  Get your IT team up to speed with NMIS core with basic courses in Perl starting from $15 and loads of other development, marketing and business courses available.

Happy shopping!

Uncategorized

How to Configure Open-AudIT to Use Active Directory For User Authentication and Authorization

Introduction

Open-AudIT can use Active Directory (AD) to provide user authentication and optionally authorization.

Using AD for authentication only means the user must exist within Open-AudIT and AD is used to simply verify the user’s username and password.

If we go to the next step and configure authorization, then Open-AudIT will assign Roles and Orgs to the user, based on that user’s AD group membership.

We must create our AD groups based on the names provided for Roles and Orgs.

The default Roles group names are:

  • open-audit_roles_admin
  • open-audit_roles_org_admin
  • open-audit_roles_reporter
  • open-audit_roles_user

The default Orgs group name is:

  • open-audit_orgs_default_organisation

Creating the groups in AD and assigning users to them will enable complete user management from with Active Directory, as opposed to Open-AudIT itself.

We have a quick video showing the configuration, here:

Enabling

To enable AD (or, for that matter OpenLDAP) user auth, create a new LDAP Server within Open-AudIT. Go to menu -> Admin -> LDAP Servers -> Create.

As with all resources, a name for the entry is required.

The other essential items to complete are the host, the domain, and the base DN.

The host is the IP (or resolvable name) of the Domain Controller you would like Open-AudIT to communicate with. The domain is self-explanatory and the Base DN is the area of AD Open-AudIT will search to determine the user and groups.

In order to enable authorization in addition to authentication, the value “Use LDAP for Roles” to ‘y’. It is set to ‘n’ by default.

The DN Account and DN Password are only required if your AD users cannot search your AD. By default, AD users can search AD to unless you have changed that, these items are not required to be populated.

Once you have populated the required fields, click Submit and an LDAP Server will be created.

If you are using Open-AudIT Professional or Enterprise and you enable LDAP and you wish for user accounts to be automaticallly created at logon, you must edit the (text) file:

Linux – /usr/local/omk/conf/opCommon.nmis

Windows – c:\omk\conf\opCommon.nmis

And ensure that auth_method_1 is set to openaudit.

Testing

To test if it is working, log out from Open-AudIT and log in as an AD user that is a member of the required groups.

If this doesn’t work, try logging in to Community as that user. If this fails some information should be shown as to the reason why (this is coming for Pro/Enterprise).

The user should be created by Open-AudIT and logged on. The user’s email is also auto-populated from their AD attributes.

Further Items

If you create additional Roles or Orgs, they will have an AD group name auto-created for them. Add these groups into AD and put your users in them. Once a user logs on, their Roles and Orgs will be updated to reflect this.

To prevent a user from logging in to Open-AudIT, simply remove them from the AD groups. The user will NOT be removed from Open-AudIT. The application administrator should do this as part of their duties.

Don’t forget that if you create an Org and a user has permission on that Org, then that user also has permission on all of the descendants of that Org. IE – If you have a user that has permission on the Default Org, they will automatically have permission on every other Org that is created.

New Roles can be created if you are an Enterprise licensee however, the default Roles should cover the vast majority of use-cases, as shipped.

 

Uncategorized

Three Reports You Should Run Every Week in Open-AudIT

Introduction

Open-AudIT provides many useful reports about your network, the devices that exist on it and many other items.

Three quick and easy reports that will provide you with an invaluable insight to your network are: Daily Discovered Devices, Daily Discovered Software, and Devices Not Seen.

You can schedule these to run each week and to email you the report for the previous week’s items. This simple action will give you an essential view of what’s happening with devices on your network. All automated. Set and forget. Easy.

We have a quick video showing these reports, here:

 

Daily Discovered Devices

When you run this report you will see a list of the devices discovered each day. You will also see any devices that are “unknown”. These might be devices you do not have credentials to access or devices that do not respond to the normal discovery tests. This is a very quick and easy way to discover any unauthorized devices that have been plugged in.

Daily Discovered Software

Now you can easily see if new software has been installed. Was it authorized? Is it on the list of allowed software? Who installed it? When? Easily get a report each week that you can quickly skim through and know what’s happening.

Devices Not Seen

How would you know if a device has not been on your network for an extended amount of time? Because Open-AudIT records when it has seen devices, calculating how long since it has seen a device is easy. You might expect to not see a salesman’s laptop for a couple of weeks – but what about a couple of months? What about a desktop – why would it not have been seen? With this report, you can quickly get to the bottom of missing devices – including even who is responsible for the device in question. Quick. Simple. Easy.

Simply scheduling these three simple reports will provide you much more visibility on your network, and will even make your network safer!

Uncategorized