Network Security Monitoring
Network Security monitoring tools help you analyze network security so you know backups have been successful, AV software is up to date, and you are alerted fast to any malicious activity. Knowing that your security infrastructure is in place and software is up to date provides the added peace of mind that networks and data is secure.
The TCP Service Check for Windows, Linux and macOS alerts you to security risks and malfunctioning TCP/IP Services/applications, so you can spot developing problems on the network, and fix them before they become big disasters.
The TCP Check monitors a specified port on an IP address or hostname on the LAN, WAN or internet, and alerts you if it is either open or closed. For example alerting when Ports 25 (SMTP), 80 (HTTP), 3389 (RDP), 1723 (PPTP) are open when they shouldn't be.
The Failed Login Check for Windows, Linux and Mac monitors the Operating System's security log over a 24 hour period, it then totals them up and if they exceed the specified threshold the Check fails. Use this to determine if hackers are continually attacking the system.
Antivirus Signature Status
The Antivirus Update Check for Windows and Linux compares the computer's antivirus definition pattern against the latest published version from the vendor. The Check fails where the computer's definition pattern is outside of the pass condition threshold.
Managed Antivirus contains an engine built on technology licensed from Bitdefender (Windows | Mac) and deployed, configured, monitored and reported on directly from the Dashboard.
From your Dashboard, you can configure every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Save this protection policy for use on similar types of device at other clients and sites. Receive alerts if a threat is quarantined and choose to delete or release from quarantine. Start, Pause, Resume and Cancel scans and view reports that demonstrate the service you’re providing.
Endpoint Detection & Response (EDR)
EDR is an integrated threat management solution from SentinelOne. EDR enables Windows devices to self-defend and heal themselves by stopping processes, quarantine, fix, and roll back events to keep devices protected. EDR uses process behavior to monitor multiple processes to recognize attacks as they develop and respond at machine speed. This is different to signature-based detection from traditional AV solutions, which monitors processes as they execute, and not the processes that can spawn from of it.
Patch Management for Windows
On Windows Patch Management for Windows can be used to deploy all Microsoft Updates types (not just security) for Microsoft Operating Systems as well as updates for supported third-party applications.
This provides an effective and efficient solution not only for Microsoft Windows and Office applications security patches, but also non-Microsoft applications such as Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java and more.
Patch Management for Apple
To deploy verified third party updates, use Run Managed Patch task.
To update the Apple OS version on your devices, see Update OS on Apple devices.
To update App Store purchases on your devices, see Manage App Store purchases.
The system integrates with Microsoft's Windows Server Update Services (WSUS) a patch management tool that enables system administrators to deploy Microsoft product updates across their organization from a centralized source, the WSUS server.
The WSUS Check queries the WSUS database for the last synchronization information and reports this back to the Dashboard, along with the number of critical updates that have not yet installed successfully on all computers.
Package Manager Update
The Package Management Check monitors the package status on the device failing where the number of available, but not yet applied, updates exceeds the specified threshold and supports apt, yast,zypper and yum package management tools.
The OSX Update Check queries the Operating System through "softwareupdate" to determine whether any Mac software updates are available.
The information returned to the Dashboard includes the update Name, Size, whether it is Recommended and if a Reboot is required to install with this available in the Extra information column against the Check.
Windows Event Log Checks
Event Logs act as repositories containing detailed information on the status of the system populated by applications and Windows components.
Set up the Event Log Check to monitor an Event Log for Event ID, Event Type, Event Source or Description. Depending on configuration, the Check alerts when the specified criteria is, or is not, discovered in an Event Log entry.
The Event Log Check is available as both 24x7 and Daily Safety Checks. This allows you to continually monitor for critical events or licence failures and alert as soon as they are discovered, as well as setup Checks to look for events that only happen once per day including Antivirus updates or Backup job completion status.
Backup & Recovery
Cloud based backup is a natural complement to our service and therefore we have teamed up with Cove Data Protection (Cove) to add Backup & Recovery. Enable Backup & Recovery on individual servers and workstations, on all servers and workstations at the Client or Site level, or a combination of both. For example at the Client or Site level, but with specific computers excluded.
Backup & Recovery uses True Delta Technology searches for changes at disk block level where, on average, only 0.1 - 0.5% of the protected data set will have changed making it highly effective at maximizing bandwidth and storage capacity. LocalSpeedVault provides on-site copy. Restore (also at disk block level) the last revision or any revision from the last 28-days either online or from the optional LocalSpeedVault.
On Windows you can backup the computer's system state, choose the files and folders to backup, along with the files to exclude, and set up a backup schedule. Along with the option to backup network shares, Exchange Information Stores, SQL Server instances and take application aware VMware (ESX only) snapshots.
For Windows and Mac workstations you can choose to use Backup & Recovery Documents and regularly back up specific file types on a preset schedule.
The Backup Check queries your client's backup on the days specified to determine the status of the backup ensuring that in the event of any problems on the client's server there is a backup to restore from.
The check incorporates a "Show Backup operation incomplete as successful" option so if the backup completes but files are still open this can be treated as successful or unsuccessful.
Although we monitor a number of the industry's leading backup solutions, where you product is unsupported and writes to the Windows Event Log the Windows Event Log Check may be used to monitor its status.