Auvik Blog

Protocols & Communication

What is 802.1X Authentication?

Want to understand network access control, and authentication 802.1X at the base layer? This article goes through all the ins and outs of 802.1X.
Network Management

What is Network Access Control? A Complete Guide to NAC

As networks scale to support IoT and remote workers, network access control is critical. See how NAC secures access across complex environments.
Configuration & Troubleshooting

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your network. Then, techniques to prevent them.
Configuration & Troubleshooting

How to Find and Fix IP Address Conflicts

IP address conflict resolution 101 – /ipconfig release, /ipconfig renew. If that doesn’t work, here are some tips to find and fix IP address conflicts on your…
Configuration & Troubleshooting

How to Troubleshoot a Broadcast Storm

Broadcast storms are a major pain point for network admins. Learn more about what they are, what causes them, and how to deal with them.
Network Management

Passing Grade: Top 3 Recommendations for School Network Administrators

Peace of mind. There is nothing else like it. And when you’ve planned well, taken decisive action to document, close gaps, review policies, standardize devices,…
Network Management

What is Network Visualization?

Network visualization is a map of connected links, nodes, and other data points to show network paths between endpoints. Let’s review some examples.
Cybersecurity

Beyond Zero Trust: What is Continuous Security Validation?

Your continuous control validation efforts can force you to improve your security controls. In turn, your continuous control validation efforts will need to…
Cybersecurity

Defending Your Network Infrastructure Against Attack

Since perfect network security is impossible, your goal is to cover as many of the risk areas as possible. Here are the most effective ways to block attacks.
Cybersecurity

What is Phishing? Insider Risk & How to Prevent It

When it comes to security, phishing is one of any IT team’s biggest concerns—as it targets the weakest link in the security chain: end-users. No matter how…
Cybersecurity

Implementing a Bring Your Own Device Policy (BYOD) in Your Organization

A bring your own device policy is more important than ever since users can bring unsecured personal devices into your office. Here’s how to create one.
Network Management

What is ITIL? IT Infrastructure Library Guide

The Information Technology Infrastructure Library (ITIL) is a framework of best practices for providing various information technology (IT) services, including…
Network Management

What is Hierarchical Network Design?

Looking for a network with scale and the highest level of performance? Hierarchical network design might be the most effective option.
Configuration & Troubleshooting

Network Segmentation: What It Is & How It Works

Learn how network segmentation compartmentalizes environments to limit blast radius, enabling granular access controls, visibility, and faster response.
Network Management

What is Network Management? Your Complete Guide

The ultimate guide to network management, the ongoing monitoring, administration, and maintenance of any networked system of computers.