Network Monitoring And Packet Analysis. A Network Monitoring

1482 WordsMar 14, 20176 Pages
Network Monitoring and Packet Analysis A network monitoring software is one that continually checks developments within the network, completes examinations, and signals IT personnel whenever a fault occurs or unwarranted standards are exceeded (MSDN Microsoft Technet). Network monitoring is very important and is typically suggested in order to keep a record of the readiness, operation, and bandwidth standard in an IT network. Network monitoring allows the administrator to intervene quickly, even remotely, if they are not on site. The following are standards that an administrator should consider when selecting any type of monitoring tool. The first one to consider is security. A monitoring solution supports the safe keeping of a network.…show more content…
A final requirement that is important is the user-friendliness. Any type of monitoring solution should be user-friendly with robust, logical menus, and incorporated procedures. Additionally, the user interface must be built adaptably and planned for use as a Windows, Web or mobile interface. As an over-all principle, programmed network discovery after the initial set up should be a standard element of the solution. A solution that is available in the national language is helpful, but not essentially a requirement (Microsoft). When working with charts and reports, administrators benefit from modifying structures and arrangements to suit their requirements, as this allows for a faster entry to more often used valuations. In many instances, single devices can be grouped into clusters in an effort to generate a tangential summary of the network. There are some resolutions that deal with predesigned templates for a summary of the software and hardware mechanisms, which can be altered as needed (Microsoft). IT personnel can sometimes choose between summary and detail views. How do security managers allow technical staff to have access to these monitoring tools while ensuring that they are not misused? Access control is a significant area to be covered. Access Control Mechanisms are comprised of Access Control Lists
Open Document