The program for monitoring the network and servers. Control over computers on the local network. Extended network diagnostics

Monitoring local network It is a continuous process that is associated with the observation of the working network. The process performs the following functions:

  1. Timely error detection and malfunctions.
  2. Adequate and fast response to errors and malfunctions.

Monitors network status system administrator.

For convenience, various software alerts are used. One of these applications is the following development. Total Network Monitor from SoftInventive Lab.

Monitoring systems

The basic requirements that should be in the network monitoring software are allocated:

  1. Support for all species network connections, including WiFi network.
  2. Slotting for network activity.
  3. Defining the details of system and network services.
  4. Analysis of remote computers and web servers.

Monitoring systems should provide reports about events for certain time periods. It is important to keep the entire listing of activity and archive it in the appropriate magazine.

It is required to distinguish the tools that ensure control of external network access and software, which is important for monitoring inside network processes.

The network activity monitoring is determined as follows:

  1. The application with a certain period sends requests for necessary iP. network addresses.
  2. If such a request is incorrect or unsuccessful, the signal is sent to the sysadmin.
  3. Automatic Definition of Action, which are regulated by the Network Protocol.

Monitoring methods

There are many methods and means for monitoring network connections. The features of their use depends on the objectives of the process, network configuration, file System etc.

Main methods:

  1. Protocol analyzers. System data is needed solely to control network traffic.
  2. Integrated management and analysis systems. Used for software and hardware environment. Provide control of certain programs, communication segments and individual devices on the network.
  3. Network management. This includes software that collects data about network processes and about the state of the hardware block. Tracks all network traffic.
  4. Cable equipment. Certification and testing cable networks.

The Total Network Monitor program now refers to the most relevant working network monitoring applications. Software provides timely tracking problems, checks on relevance and works with anti-virus bases.

Today, the success of many enterprises and organizations to a great extent depends on the reliability and quality of the operation of the networks and network applications. Network monitoring under which the systematic control of key indicators of network functioning and network applications is understood, helps to detect and eliminate the emerging and brewing problems in their work to support the quality of user service at the proper level. In addition, network monitoring is extremely important to ensure information security, since it allows you to detect dangerous actions of users and malicious software.

Types of network monitoring

Distinguish passive and active network monitoring. With passive monitoring, key indicators of network functioning and network applications are monitored by analyzing real traffic of the current network, "observed" at its various points, and with active - to determine these indicators, specially generated test traffic is used.

In turn, highlight three main types of passive monitoring: monitoring on packets (capture and analysis of network packets with monitoring tools), SNMP monitoring (SNMP device survey for information about their status and traffic) and monitoring of streams (information collection About traffic flows using XFLOW protocols, etc.).

Being one of the types of passive monitoring, network monitoring on the packet database is carried out by passive (not transmitting test traffic) by monitoring devices that analyze captured packets.

Optimal connection of passive monitoring devices

IT specialists use various devices Passive monitoring (including protocol analyzers, RMON probes, NetFlow collectors, IDS / IPS systems and probes that can record large amounts of network traffic), intended for serial (inline) or an out-of-band (OUT-BAND) connection to network lines.

Kaspersky Internet Security

For OUT-OF-BAND connection of monitoring devices, it is best to use special network couplels.

The network coupler is included in the rupture of the network line. Walking through yourself a duplex traffic transmitted over a line, a network coupler copies its half (counter packet streams) to its monitoring ports intended for connecting monitoring devices (see Figure). Unlike the Ethernet switch with span ports, the network coupler never discards any packages, including defective, and thus provides 100% (!) Traffic control in the line.

Network couplers do not affect the operation of the network and do not reduce its reliability, because when the power failure fails, the branch for the copper line remains transparent to controlled traffic, and the fiber optic branch is a passive device that does not require power supply at all. In addition, because the monitoring device connected via the aquer does not need an IP address, it is isolated from the network, which significantly reduces its exposure to hacker attacks.

There is a wide range of network coupler for copper or fiber optic lines that support various maximum data transfer rates - from 10 Mbps to 100 Gbit / s. In addition to ordinary couplers, regenerating couplers are manufactured, which are used when the same traffic must be monitored using several different monitoring devices at the same time. From the ordinary coupler, the regenerating coupler is characterized by an increased number of monitoring ports. If the number of network channels that need to be monitored exceeds the number of available monitoring devices, an aggregating coupler can be used, which combines traffic from several controlled channels and outputs the total flow through several of its monitoring ports (see Figure). However, the speed of this stream may exceed throughput The port of the monitoring device, which will lead to an invalid packet loss. To reduce the likelihood of loss of packets, you need to select the model of the aggregating coupler with a sufficiently large buffer memory.

Functioning of aggregating and network counters

The overload of the monitoring device may occur when it is connected to a faster network channel (for example, if using a 10-gigabal reservoir, connect the analyzer with the 1GE port to the 10GE channel). To reduce the load on the monitoring devices, pre-filtering of branch traffic is widely used so that this device receives only those data that should be needed to perform its basic functions (for example associated with intrusion detection). Also, using a device with a high-speed load balancing function, you can roughly divide between multiple monitoring devices. At the same time, it is often important that the integrity of the transmitted packet flows is saved, that is, all packets related to the same stream must enter the same monitoring device in the load balancing group.

Traffic filtering and load balancing allow you to protect the investment in the available monitoring devices when implementing increasingly high-speed network technologies. Functions of aggregation, regeneration, traffic filtering and load balancing are available in network packet brokers. Thus, if the monitoring devices often have to switch from one controlled channel to another and / or need to flash the traffic and load balancing functions, you should connect these devices to networks or span ports through network packet brokers, and not directly.

Enter bypass (BYPASS) Switch, if necessary, implement a trouble-free inline connection of a device for monitoring or providing information security (for example, IPS). If this device for any reason ceases to function, the bypass switch will send traffic into account and thereby saving (for users) the availability of critical services and applications (for more details, see "Solutions for Inline Connecting Devices of Monitoring").

IXIA, A KEYSIGHT BUSINESS, produces a wide range of couplers, bypass switches, as well as brokers of network packets of the Vision family. Vision devices are switched, aggregated, regenerated, filtered and uniformly distributed to the control of traffic to be controlled on the monitoring devices connected to them. The most intelligent broker models in this family - Vision One and Vision 7300 - perform a wider range of functions, including deduplication and truncation of packets, supplying them with high-precision time marks, identification and monitoring of application traffic (for details, see "IXIA monitoring solutions functionality"). For centralized management of VISION network packet brokers installed on the controlled network, IXIA issues the solution of IXIA Fabric Controller (IFC).

The market for network monitoring systems presents comprehensive solution New generation Intelligent Monitoring Fabric (IMF) of CPACKET Networks. Compared to traditional network monitoring systems, the IMF solution has improved scalability, increased performance, provides a deeper analysis of the network operation, reduces current and capital costs. The IMF includes monitoring nodes that have a network packet and network analyzer broker functions.

Monitoring cloud media

In conditions of rapid growth in the popularity of cloud computing, IT specialists should guarantee the security of data and applications, optimize the performance of cloud solutions and how quickly the problems can be eliminated in their work. To perform listed tasks, cloud traffic is needed. Such control provides the IXIA Cloudlens platform designed to monitor the work of private, public and hybrid clouds. In the process of monitoring the work of a public cloud, the CloudLens platform operates in this cloud and provides a monitoring service with traffic filtering capabilities. CloudLens has a unique peer-to-peer (peer-to-peer) that saves all the advantages of cloud computing, including flexibility and scalability on demand. The peer-to-peer architecture provides direct connections between cloud objects (Cloud instances) generating controlled traffic, and virtual monitoring devices. In competing solutions, a central node is used, aggregating and filtering traffic. Such a monitoring system is worse scaled, it is more expensive, it is less flexible.


Peer Architecture Cloudlens.

Part of the CloudLens platform is the Cloudlens PrivaTe solution, which is monitored by private clouds. This solution will branch out traffic from virtualized networks, processes this traffic and submits to control packets to virtual or physical monitoring devices.

Take care of monitoring in advance

It is recommended to initially plan the implementation of the monitoring infrastructure as an integral part of the future network and when it is built to install equipment for connecting monitoring devices along with other network equipment.

When organizing a network monitoring system, it is necessary to provide opportunities for monitoring the traffic of critical network channels at the level of access, distribution and nucleus of the network, as well as in the Code where the enterprise servers are located.

Since many high-speed lines are concentrated in the network and in the network core, it is recommended to install multiported aggregating couplers and network packet brokers. Using this equipment will reduce the number of network monitoring devices, because if you have the ability to aggregate and switch traffic from keypoints, it disappears the need to install on a monitoring device in each of them.

Currently, high-speed network technologies, providing data transfer speeds of up to 100 Gbit / s, are becoming more and more widespread distribution. The use of these technologies can significantly reduce the number of lines in the nucleus of the network and reduce the cost of its maintenance, but at the same time the requirements for the reliability of each high-speed line increases, since its refusal will affect the operation of a larger number of users and applications. Obviously, in the process of operation of a cent or corporate network, the main line cannot be disconnected even for a few seconds to insert a fiber optic branch in it to supply the traffic to this line to the monitoring device. Therefore, the couplers are better to install on the main lines initially (even at the deployment stage of the cable system). This will allow, in the future, if any problems occur to quickly connect the desired monitoring or diagnostic devices to the lines of interest without separation.

Our programs for system administrators will help to be aware of everything that happens in a computer park and enterprise networks, to respond to equipment failures and malfunction failures, minimize costs and downtime. This page provides programs for network monitoring, servers and hosts, for PC inventory, accounting installed programs and licenses, creating reports on the "gland" of computers, to account for traffic on the network, to study the network topology and creating graphic schemes of local networks.

The network administrator can also use the program to search for files in local networks and auditing user access to server file resources over the network. All these programs will help sysadmin to improve performance. network devices and servers and ensure the proper level of security in the enterprise network.

The 10-Strike programs are included in the unified register of Russian programs for the Ministry of Communications and can participate in public procurement.

Network Administrator Programs, Network Utilities

Computer Inventory (Pro) 8.5

- program for inventory and accounting for installed software and hardware on computers in local networks. "Computer Inventory" allows system administrators to account for computers in the enterprise network, view the configurations of remote computers and lists of installed programs on the network, track configuration changes and software. The program contains a powerful report generator. For example, you can create. For planning upgrades You can create report containing computers with insufficient disk volume or random access memory . Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Lanstate (Pro) 8.8R

program for monitoring servers and computers online, allowing you to visually observe the current status of your network at any time. Lanstate monitors hosts on the network, tracks connections to network resources, monitors traffic, and signals different events. Lanstate contains many features useful for network administrators: mailing messages, turning off remote computers, scanning hosts and ports, receiving various information With remote computers (access to the registry, Event Log, etc.). Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Network Monitoring (Pro) 5.5

program for monitoring servers and other network devices, monitors network performance and notifies the administrator about failures. Find out on time about the lost failure (communication break, completing the place on the server disk, stop service, etc.) and eliminate the problem with minimal time loss. The program signals problems with sound, on-screen messages, by e-mail, can run external programs and services, as well as restart computers and services. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

"Software Accounting" 8.5

- program for inventory and accounting for installed software on computers in local networks. "Software Accounting" allows network administrators to maintain installed programs on network computers and track changes. The program contains report generator. For example, you can create reports on the availability of certain programs on computers and their number.

LAN Monitoring: Systems and Work Methods

Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Network Scheme 3.33.

program for building a local network schemewhich allows you to detect network devices and place them on the card scheme. If your switches support SNMP protocol, the program will draw connections between devices automatically. It remains only to move the icons of the devices with the mouse and your network scheme is ready. You can finalize the scheme using powerful built-in editing tools, draw connections, apply inscriptions, draw areas, pour them with different colors. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Traffic account 3.7.

program to account for traffic online, monitors the scope of the data and the speed of information transfer in the network. You can control traffic both on user computers and on the ports of switches. Alerts allow you in time to learn about traffic overwrings on any port. You can real-time to observe the distribution of loads on the channel, build graphs, charts and reports. All the collected traffic flow data is saved in the database for analyzing statistical information and reporting. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Remote access 5.0

program for managing remote computersover the network. You can configure access to network users computers and administer their PCs remotely. The program provides HelpDesk mode to provide those. Support remote clients via the Internet. You can connect to PCs and servers within the network, or access computers to the Internet on credentials or Hardware ID. In this case, you do not need to make ports through the router / router. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-STRIKE NETWORK FILE SEARCH (PRO) 2.3R

the program for finding files on the LAN computers (according to NetBIOS and FTP). Enter the phrase or file masks and find necessary information. When viewing the search results, the found files can be opened immediately, save to disk, or generate a report. When searching, a multi-threaded technology is used, which significantly speeds up work. You can set filters based on file size and change date. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Connection Monitor (Pro) 4.8R

network User Connection Monitoring Program on the network to the shared folderand filesAllows you to learn about connectivity to the computer network connections. The program gives sound signals, outputs the screen, and leads a detailed journal of connections in which information is recorded about who and when connected to network folders Computer, which files opened, etc. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike: Network Scan 3.0 Free!

- Local network scanner, IP addresses and hosts. This free program Allows you to scan the local network and detect active hosts, computers and servers. Supported scanning of IP address ranges and multiple protocols for detecting network devices (ICMP Ping, search for open TCP ports, NetBIOS, SNMP, UPNP, ...). With administrator rights, you can consider many useful information from Windows computers. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Sets of network programs for sysadminov

Program sets for system administrators Allow you to save money when buying several of our network programs or all at once. Get three programs at the price of two and so on. For example, when buying Complete set of administrator programs in the variant " on the organization"(without restrictions on the number of jobs), consisting of all our programs for network administrators, save up to 100 000 rubles or 45%!

Other utilities

10-Strike SearchMydiscs 4.43R

cD cataloging (CD, DVD).

With it, you will quickly find the necessary files on the CD and DVDs of your collection. SearchMydiscs helps to organize CD and DVD collections, allowing you to find the desired disk in a few seconds. If you're tired every time a long time to search for the desired disk - this program is for you! Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Log-Analyzer 1.5

rAW Analyzer Apache Web Server Log. Creates various reports and histograms. The program has a lot of settings and filters, which will allow you to get accurate information about your site downloaded files, and about who comes from. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Payment and delivery

When ordering programs, legal entities accept payment by non-cash payment. The accounts are exhibited in electronic form, the contract is concluded. Delivery electronic: the distribution is downloaded from our site, the registration keys will be sent after payment by email. After payment, the original treaty and documents for accounting are sent to the buyer by mail.

Write an account (specify the necessary programs and types of licenses, your details and the name of the director for the contract)

All our programs are also represented in the online stores of Sofkay and AllSoft (Follow the links "Buy" from our site).

Monitoring network

We present Zabbix - a program for monitoring and analyzing all basic parameters of the local network.

What is the local network monitoring system

Local network monitoring

The Zabbix solution allows you to quickly evaluate and diagnose the status of the local network as a whole, to conduct express monitoring of the basic parameters of the local network servers, monitor network equipment and workstations.

Monitoring servers

The system administrator will always know how much free space remains on hard diskshow much processors and operational memory are loaded. Thus, on the basis of objective data, you can make decisions on the redistribution of the load between servers, on the upgrade of the available servers, or the need to purchase additional.

Operational alerts on emergency situations

The most important function of Zabbix is \u200b\u200bthe alert of personnel about all impending or emerging problems. The operational alert mechanism includes sending email services (e-mail) and SMS by channels mobile communications. Using the remote monitoring of the local and computer network of your company, the system administrator, even from outside the office, will be able to prevent possible failures and eliminate emerging problems.

Prevent emergency situations

Zabbix can alert the system administrator, for example, that soon the server is running on the hard disk of the server, about the increased load on the processor, or on the download of RAM. Thus, the system administrator may even before an emergency take measures to prevent it.

Which interface has a local network monitoring system

For operational online monitoring of the status of the network, diagnostics and analysis of load parameters of the Zabbix server equipment provides a convenient web interface. Thus, thanks to the advanced monitoring and analysis of the basic parameters of the local network, network and server equipment, such critical parameters as a decrease in the amount of disk space will be available from any location, an increased load on the processors of the local network server, the overload of RAM and much more.

What is network monitoring and what is it needed for?

How much does the remote monitoring system of the LAN Zabbix

Why do you benefit from the introduction of a local network monitoring system

Setting up Zabbix, like any complex software Product, Requires high qualifications and experience, work on setting up Zabbix is \u200b\u200bvery responsible and painstaking. Our system administrators have extensive configuration experience and support of the remote monitoring system, perfectly own its installation and setup technology.

The implementation of the Zabbix network monitoring system includes:

How much is the installation and configuration of the local network monitoring system

* With a large number of same type of nodes, a discount is provided.

You can also contact us by phone. Call us!

7 (495) 665-2090

Zabbix absolutely free app

Zabbix is \u200b\u200bwritten and extends under the license GPL General Public License version 2. This means that its source code is freely distributed and is available for an unlimited circle of individuals.

Express audit of the local network and drafting a technical task

Installing the Zabbix system on your equipment

Setting up Zabbix to monitor key nodes of the local network

Installing Zabbix clients on the main local network nodes

Setting up notifications by email system administrator

The built-in OS administration tools are not always convenient or often not possess sufficient functionality, so the sysadmin's arsenal is replenished with useful utilities, superstructures and scripts, which significantly simplify everyday tasks. It is doubly gratifying when the decision found not only helps to cope with a certain problem, but also applies free of charge.

Advanced IP Scanner.

The sysadmin should know everything about network systems and quickly receive access to them. With this task, it helps to cope the Advanced IP Scanner, designed to quickly multithreading the local network scanning. APS is provided completely free, without any reservations. The program is very simple and understandable. After starting AIPS, checks the IP addresses of the host network interfaces on which it is installed, and automatically prescribes the IP range in the scanning parameters; If the IP is not needed, it remains to start the scan operation. As a result, we obtain a list of all active network devices. For each all possible information will be collected: MAC address, network card manufacturer, network name registered in the system user, available shared resources and services (shared folders, HTTP, HTTPS and FTP). Almost all scanning options can be configured, for example, change the speed or exclude a specific type of network resources (shared folders, HTTP, HTTPS and FTP). To any resource you can connect with one click, just notice it in the list. AIPS is integrated with the Radmin program and during the scanning process finds all machines with a RADMIN Server. The scan result can be exported to the file (XML, HTML or CSV) or save in the "Favorites" (DRAG-AND-DROP is supported). In the future, if necessary, refer to the desired client computer, it is not required to scan the network. If the remote device supports the Wake-On-LAN function, you can turn it on and off by selecting the appropriate menu item.

NetWrix, specializing in the development of solutions for an audit of IT-infrastructure, offers ten free and very useful utilities designed noticeably simplifying Windows administration. For example, NetWrix Inactive Users Tracker allows you to solve one of the urgent security problems - the presence of inactive accounts that no one uses any time (dismissed employees, a business trip, travel by post, temporary accounting, and the like). Personnels rarely warn IT-Division about changes, and an attacker can easily use such an account. The utility periodically checks all accounts in the domains and reports those access to which a certain time. IN fREE version As actions, it is possible to specify only a warning by e-mail (enough to set the parameters of the SMTP), all other operations performed produces manually, although the warnings in our case are sufficient. IN paid version Available: Automatic Random Password Installation, Deactivation account and move to another OU, the OU filter to search for accounts. Separately, the PowerShell-cmdlet get-ncinactiveusers is offered, which allows you to receive a list of inactive users (the "Lastlogon" attribute is checked) and simplify the writing of the respective scripts.

WINAUDIT FREEWARE

WinAudit is a free utility from Parmavex Services, which allows you to make a complete audit of the system. Does not require installation, can be performed in command line mode. The program has a simple and localized interface, it is supported on all versions of Windows, including 64-bit. Data collection takes approximately a minute (the process duration may vary depending on the operating system and the computer configuration), the resulting report consists of 30 categories (amenable to configuration). As a result, the admin can receive data on the system installed software and updates indicating the version and vendor connected devices; List of open network ports (number, service, program, etc.) and open folders; active sessions; security installations; access rights to the periphery; information on accounts and groups; List of tasks / services; programs in autorun; log entries and system statistics (UPTIME, memory, disks). You can also specify the search for certain files by name. For example, to find music and video on user hard drives, it is enough to set appropriate extensions (AVI, MP3 and the like). The result can be opened as a web page, export to a file of many popular formats (TXT, XML, CSV, PDF) or to the database (using the wizard, all popular are supported: MS SQL, MS Access, MySQL, Oracle and others), send By e-mail and print.


Accounting for computers using CheckCFG

The problem of accounting for office equipment and used by acutely in any organization. You can solve it in different ways, one of the options offers the developer Andrei TatukCCFG. This decision periodically collects data on the hardware, OS and programs, including the type of CPU, the volume of RAM, the disk space, the state of S.m.a.r.t. etc. In this case, CheckCFG easily copes with several hundreds of computers. The result is displayed in a comfortable tree form, to local catalogs it is easy to access. Each PC can be assigned an inventory number, if necessary, it is easy to generate a report in the RTF format.

CheckCFG is a whole range of programs. CheckCFG is responsible for direct collection of data on the computer, which starts when the OS start and writes the result to the file. Management and archiving information is made using SKLAD accounting program, which processes files created by checkcfg, and saves to its database, after which you can form reports. Using the SKLAD_W program, you can view the current computer configurations and the basic information on IP addresses, CPU, MEMORY, software) in a convenient form. To analyze changes in the PC configuration and alerts, this administrator uses another utility - DOBERMAN. Perhaps the setting will not seem quite trivial, as it is necessary to manually create the desired configuration files, but a detailed description on the site and the available templates can easily disassemble without any problems.

MailArchiva Open Source Edition

Some mail servers like MS Exchange have mail archiving features that allow you to find old messages if necessary, including to identify the leakage of confidential information when investigating incidents. In other cases, it is necessary to provide these functions on their own. Solution is the development of MailArchiva, which is compatible with most modern mail servers (Lotus Domino, MS Exchange, MDaemon, Postfix, Zimbra, Sendmail, Scalix, Google Apps). The archiving on SMTP, IMAP / POP3, WebDAV protocols and Milter is supported (the program has a built-in SMTP and MILTER server, an IMAP / POP client). To not collect all mail, you can create any archiving rules. The three levels of access to the saved data are implemented - the user (only its mail), the administrator (settings and its mail) and the auditor (all mail, can be limited to the rules). In the Open Source version of MailArchiva also implemented functions of intuitive search, including in investments (Word, PowerPoint, Excel, OpenOffice, PDF, RTF, ZIP, TAR, GZ). Works MailArchiva on Windows, Linux, FreeBSD and Mac OS X.

PERFORMANCE ANALYSIS OF LOGS

In case of problems with the performance of the system, detect a bottleneck using the standard Windows Performance Monitor, not having experience, is quite difficult. In order to figure out which metrics need to be removed and how to properly interpret the result, you will need to carefully launch the documentation. The PAL utility (Performance Analysis of Logs, Pal.codeplex.com) simply simplifies the search for a "bottle neck". After startup, it browsing the logs and analyzes them using embedded patterns. Currently, there are settings for most popular MS products - IIS, MOSS, SQL Server, Biztalk, Exchange, Active Directory and others. After starting the administrator in the PAL Wizard wizard activates the desired counters, simply by selecting a template from the list of proposed, indicates the current server settings (Number of CPU and other), the analysis interval and the directory to save the result. After some time, a detailed report in HTML and XML will be issued, containing the description, the name of the meter and the indicators (Min, AVG, Max and Hourly Trend). The report can then be easily copied to any document. But it is still necessary to deal with the collected parameters. Although if Pal shows that the characteristic is in the green sector, it is not necessary to worry. The request itself is saved in the PowerShell Pal.ps1 script, which can be saved for further use. Templates are XML files; Taking for an example of any of them, you can create your own option. To edit parameters, the template offers the built-in Pal Editor editor.


Win7 is officially supported, but works on all OS from MS, starting with WinXP (32/64). For installation you will need PowerShell v2.0 +, MS. Net Framework. 3.5Sp1 and MS Chart Controls for Microsoft .NET Framework 3.5.

Create access point with Virtual Router

The situation when a computer with a Wi-Fi-card must be turned into an access point, today it is not rare. For example, you need to quickly deploy WLAN or expand the zone wi-Fi coatings. Initially, the wireless card job was provided only in one of two modes: the point is the point when the clients are connected to each other, or as an access point. In Win7 / 2K8 (except Win7 Starter Edition), it is possible to virtualize network connections (Virtual Wi-Fi technology), which allows you to create multiple Wi-Fi modules with your settings when using one physical Wi-Fi adapter. Thus, the computer can be connected to Wi-Fi and at the same time act as an access point (SAPTWARE ACCESS POINT). Connection with such virtual hot spot is protected using WPA2. You can turn the PC running Win7 / 2K8R2 to the access point using the Netsh console utility, through the network and community management center, or using the Virtual Router application, which has an intuitive GUI and very simple settings. After launching Virtual Router, you only need to specify an SSD and password to connect, and then activate the access point. If you need to stop the work of hot spot can also be pressed by one button. Additionally, the current connectivity connections are displayed in the window, for each you can set your icon and change some parameters.

RDC Connections Management - RDCMAN

For remote management of servers and PCs working under windows controlThe Remote Desktop Connection is designed. If you need to install a lot of RDP connections with different settings, it becomes uncomfortable to work with it. Instead of the methodological storage of individual settings for each remote computer, you can use free tool Remote Desktop Connection Manager RDCMAN, automating this process. After starting, you should specify the RDP connection settings that will be used by default and inherited by all connections. Here you specify common credentials, gateway, screen installation, security settings and much more. Next, we create the desired number of systems groups (for example, on purpose, location, version OS), for each of them you can specify specific connection settings. And the last step is to fill in groups by systems. To add a server, enter only a domain name if any parameter will differ from the group settings, it can be redefined immediately. If necessary, the system is easily moved between groups of simple dragging. If there are a lot of systems, it's easier to create a text file by specifying one name in a string, after which the utility is racing. Now, to connect, it is enough to select the desired server and click the CONNECT item in the context menu. You can simultaneously activate multiple connections and switch between them.

FREE ACTIVE DIRECTORY TOOLS

Manage Active Directory parameters using standard tools is not always easy and convenient. Some situations will help the FREE Active Directory Tools utility set developed by ManageEngine. The kit consists of fourteen utilities, started from one shell. For convenience, they are divided into six groups: AD User Report, SharePoint Report, User Management, Domain and DC Info, Diagnostic Tools and Session Management. For example, the launch of the Empty Password User Report will allow you to get a list of accounts with empty passwords, GetDuplicates - get accounts with the same attributes, CSVGenerator - Save to the CSV file data Active Directory accounts. Other features: Last logging time report, receiving data from AD based on request, SharePoint installation reports, Local account management, view and editing a domain password policy, receiving a list of domain controllers and their roles, management of their replication, monitoring them Works (loading CPU, RAM, hard drive, performance, etc.), control of terminal sessions and much more.


Comodo Time Machine

The ability to restore the system using the System Restore component is laid in Windows, starting with XP, but its functionality, to put it mildly, is limited, so for backups often use third-party applications. Free Comodo utility Time Machine (Comodo.com) allows you to roll back the OS to any previous state. Moreover, it will work even in the case when the OS completely stopped being loaded. In the CTM process, it creates recovery points (manually or on a schedule), all modified system files are entered into them, the registry, as well as user files. This is a big advantage compared to the System Restore, which saves and restores only system files and registry. The maximum size has the first copy, the rest of the copies are stored only modified files. In order to save free disk space, you should periodically create a new checkpoint, removing old archives. To restore the OS, the CTM information is written to the boot sector; To invoke the corresponding menu, it is enough to press the Home key. You can also restore the state of the OS on schedule, such as configure the behavior of the utility so that with each reboot, the automatic rollback to the "clean" version of the system was performed. This will be useful, for example, in an Internet cafe, where users leave a lot of garbage in the system. Besides full recovery OS, the utility provides an opportunity to get an earlier version of any file from the archive. Implemented search, so you can find the necessary data without problems.

Amanda.

The task of centralized backup data from workstations and servers running Windows and * NIX can be solved using Amanda Advanced Maryland Automatic Network Disk Archiver). Initially, the program was created to work with ribbon drives, but over time, the developers offered a mechanism called "Virtual Ribbons" (VTapes), which allows you to save the collected data on hard drives and CD / DVD. Amanda is a convenient superstructure to standard UNIX programs DUMP / Restore, GNU TAR and some other, so its main characteristics should be considered based on the possibilities of these basic utilities. Works on the client-server scheme. All available authentication methods are used to access computers: Kerberos 4/5, OpenSSH, RSH, BSDTCP, BSDUDP or SAMBA password. To collect data from Windows systems, a special agent is involved or, as an option, Samba. Compression and encryption (GPG or amcrypt) information can be performed both directly on the client and on the server. All settings for the backup parameters are made exclusively on the server, in delivery. ready templates, Therefore, it is quite simple to figure out.

Core Configurator 2.0 for Server Core

Initial configuration of a server running Win2K8 / R2 in Server Core mode is made in the console using commands. To simplify the task, the OS developers have been added to R2 an interactive script SCONFIG.CMD, which allows you to configure the main parameters of the system. The alternative is available on Codeplex - a wonderful Core Configurator configurator. It will take the availability of NetFX2-Servercore, NetFX2-Servercore and PowerShell components. After starting start_coreconfig.wsf, we get a menu, we find several items that provide access to the basic settings that would have to manage from the command line: product activation, setting the screen resolution, clock and time zone, network interface, set permissions for remote RDP connections , Local Account Management, Windows Firewall Settings, Enable / Disable WinRM, Changing a Computer Name, Working Group or Domain, Setting Role, Components, Hyper-V and Launch DCPROMO. If you check the Load AT Windows Startup checkbox, the program will be loaded with the system.

Exchange 2010 RBAC Manager

The Exchange 2010 has a new role-playing model of access, allowing to finely monitor the level of privileges for users and administrators depending on the tasks being performed. The only negative is the built-in controls using PowerShell cmdlets not all may seem comfortable and understandable. More advanced features have a free Exchange 2010 tool RBAC Manager (RBAC Editor Gui, RBAC.CodePlex.com), offering a clear graphical interface to configure the properties of all roles. To deal with his peculiarities will not be difficult even newcomer. The program is written on C # and uses PowerShell. You need to work installed Exchange 2010 Management Tools.

PowerGui.

Hardly appearing, the PowerShell team shell won the sympathy of Windows admins, which have long needed a tool that allows you to automate many tasks. With the first versions of PowerShell, Microsoft developers could not offer a more or less functional editor, therefore a niche filled out several third-party projects. The best of them today is PowerGui, providing a convenient graphical interface for effective creation and debugging PowerShell scripts. At the same time, the authors offer ready-made sets of scripts to solve many tasks - they can be used in their developments.

Multi-Tabbed Putty

Freely distributed Putty client is well known to admins that need to be connected to remote hosts using SSH, Telnet or RLOGIN protocols. This is very convenient programallowing you to save session settings to quickly connect to the selected system. Single inconvenience - with a large number of connections, the desktop turns out loaded by many open windows. This problem solves the Multi-Tabbed Putty add-in, implementing the tab of the tab.

Info

Initially, Putty was developed for Windows, but later it was ported on UNIX.

Conclusion

Often there is no need to break your head over the solution of a certain problem: Most likely, other administrators have already encountered it and offered their own option - a specific utility or script, for which you do not even need to pay.

Your internet connection may be the result of several different factors. This includes factors such as malfunctions on the Internet provider side, incorrect operation of the modem, router and other network equipment, as well as increased network activity of programs.

Therefore, if you are sure that the problems with the provider and equipment are excluded, then you should look at the computer itself.

And the first, where to start, it is to check the Internet activity of programs, then-there see which applications are connected to the Internet in this moment. To our happiness, operating windows system It has a free embedded tool that will help the user track the increased network activity of applications.

To make sure that no applications in the background do not use your Internet connection, you just need to use the "Windows Resource Manager") built into the "Windows Resource Manager" operating system. Baister!

Running resource monitor. The fastest way, this is tapped on the keyboard the key + R keys. Next, go to "Start" - "All Programs" - "Standard" - "Run", where in the "Open" field, enter "RESMON" and press the "OK" button.

Network activity

In the resource monitor, open the "Network" tab, where you will see all the processes with the Internet activity, namely:

  • process name (its executable file);
  • ID (its identification number);
  • the average byte per second received / sent from the start of the program.

Manage the process (suspend / complete) right-click Mouse Calling the context menu on the executable file of the required process.

If the process (executable file) is unfamiliar to you, with the help of the same context menu and item "Search on the Internet" you will read about it.

In order to find out in detail which applications use the process "svhost.exe" I recommend using the "Process Explorer" utility, which is easily downloaded from the Internet. That's all!

If you want to find out what amount of traffic consumes a Windows computer for a certain time, then you need to use third-party solutions. In the Task Manager or in the Resource Monitor, only current network consumption values \u200b\u200bare available, so these tools are not suitable for monitoring traffic for a specific period. Some routers and modems collect data about consumed by traffic - You can view these values \u200b\u200bby contacting the device administrator panel.

Why keep monitoring traffic consumed? Traffic accounting is simply necessary when using limit Internet connections, but it can also be useful on unlimited tariffs.

Some Internet providers limit monthly traffic on certain tariffs. If the limits exceeding the limits, the user either must be paid for an additional quota, or be content with a reduced connection rate until the end of the reporting period. Traffic monitoring allows you to avoid similar unpleasant situations.

Traffic analysis allows you to better understand what amount of data you consume during the reporting period. This information will be useful when changing the Internet provider or tariff plan.

The tools presented below are designed to account for traffic on Windows computers. All programs are free, and their testing was performed on computers running Windows 7. and Windows 10..

- Free utility for monitoring traffic in Windows. The program tracks daily, weekly and monthly traffic intake and shows a desktop widget with visualization of data transmission and reception.

Users Alerts are available, setting the limitations of the provider and the calculation of traffic using the built-in calculator. Bitmeter II allows you to start the counter during which you can track various connection metrics.

The statistics section displays traffic consumption data over the past few hours, days and months. You can view them in a graphic or tabular form.

GabnetStats.

- Portable program for Microsoft Windows devices, which allows you to track consumed traffic and other indicators. The program started without failures on all test systems and immediately started tracking traffic.

The left click on the system tray icon opens the schedule and traffic statistics. The widget closes automatically five seconds, but you can change this behavior and activate the constant display of the widget on the desktop.

The program tracks sent and received data bytes, the average connection speed and many other parameters. Select Advanced Statistics to view the total number of received and sent packets, the number of routes and IP addresses, as well as TCP / IP configuration information.

The developer's website is no longer available, but you can download the program with of our site.

Note: To install this program in new versions of Windows 10, it is recommended to configure compatibility with earlier windows versions. To do this, right-click on the downloaded file and select Properties\u003e Compatibility\u003e Run the program in compatibility mode with: Previous version of Windows.

NetspeedMonitor shows incoming and outgoing traffic in the task panel notification area (system tray). Mouse over the icon to watch traffic for a specific session, day or month. The right mouse button opens the available parameters and traffic statistics interface for a certain period.

The program is available as a separate installer and portable version. The utility is fully compatible with all modern versions of Windows.

Note: portable version Gave an error in Windows 10 when trying to start without administrator rights.

When you start NetTraffic displays a network activity schedule on the desktop with the number of sent and received data. By default, the window is always displayed in the foreground, but you can turn off this mode, resize window and other work options.

Right click on the icon in the system tray opens access to parameters, statistics and additional tools. In the Statistics section, you can see traffic consumption for the selected period or for certain time intervals: month, day or year.

In the settings, you can change the design of the widget and set the quota by traffic. Among the available network utilities: Ipponfig, Netstat and Route.

The program has been distributed free of charge, now new versions have become paid. In this case, the last one free version Utilities (Networx 5.5.5) so far available for download On our site and does not have restrictions on functionality.

Immediately after starting NetWorx, it starts monitoring traffic consumption, and an application icon appears in the system tray. Dual click on the icon opens statistics: you can view general data, as well as data per day, week, month, breakdown data by applications. For convenience, different data views are posted on separate tabs.

You can use the program to monitor traffic consumed by individual applications. To do this, go to Settings\u003e General and in the section Watch connections Turn on the parameter Ignore local traffic (within the network).

Right-click on the icon in the system tray to access additional features. You can enable the display of the widget on the desktop to track traffic consumption in real time, start measuring the connection speed or open the quota installation screen.

Users are available to several network tools such as Trace Route or Ping.

comparison table

Unfortunately, some of the listed tools are no longer supported. Without a doubt, is the most professional solution for monitoring traffic with powerful functionality, but the free version of the utility is also no longer supported by the developer.

At the same time, it is worth noting that Microsoft tests a built-in tool in Windows 10 (version 2003) whose exit is expected in the spring of 2020.


Top.