Top SysAdmin Tools (That Aren’t Software!)

This might not be quite as fun as making things run DOOM, but it’s probably just as important. Here’s my list of non-software tools that live in my admin toolbox, organized by type. Do they live in yours? Let’s see.

Lawrence PopaOct 19, 2021

Network Basics: What Is SNMP and How Does It Work?

While the SNMP architecture is simple, the data hierarchy the protocol uses can seem complicated if you’re not familiar with it.…

Dana OrosJun 29, 2022
NVDR Report

The Auvik Network Device Buyer’s Guide

Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it…

Ryan LaFlammeJun 28, 2022

Network Configuration Management: The Benefits & Importance

Configuration management is one of those network management topics people often neglect. It’s not very exciting—but it’s incredibly…

Kevin DooleyJun 27, 2022

What is ITAM? Guide to IT Asset Management

In the business world, information technology (IT) is everything. Without it, companies would struggle to keep track of their data and…

Steve PetryschukJun 14, 2022
O’Reilly Report

Network Basics: Spanning Tree Protocol

For new networkers, Spanning Tree Protocol can be intimidating. But don’t worry! In this easy-to-understand intro, Ethan Banks walks…

Ethan BanksJun 9, 2022

Is it Time to Retire Your VPN?

Back to the question at hand: Is it time to move on from VPN? For an enterprise-wide greenfield deployment or network refresh? Sure,…

Ryan LaFlammeJun 7, 2022

Network Basics: What Is Link Aggregation & How Does It Work?

Link aggregation is a way of bundling a bunch of individual Ethernet links together so they act like a single logical link. Learn more on…

Kevin DooleyJun 6, 2022

How to Draw Effective Network Diagrams (Infographic)

A network diagram is, simply put, a schematic or map of your existing network that illustrates the nodes and their connections. Network…

Kevin DooleyJun 3, 2022
Command Center (N-Able)

Find and Fix Network Loops

Network loops are one of those things that can have you tearing your hair out for days, burning through billable hours while your client…

Ryan LaFlammeJun 1, 2022

Identify Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. But Auvik…

Sarah Cunningham-ScharfJun 1, 2022

How to Troubleshoot a Broadcast Storm

Broadcast storms are a major pain point for network administrators. Learn more about what they are, what causes them, and what steps you…

Ray PatelJun 1, 2022

What is RMM? The Importance of Network Management

Remote monitoring and management (RMM) is software with a pretty simple mission: save IT pros time and effort. How? Instead of waiting…

John CrossMay 31, 2022

How to Troubleshoot Routing Problems

Routing problems tend to emerge when you're first setting up a new piece of network equipment, and when something has failed. Usually…

Kevin DooleyMay 30, 2022

What is ITIL? IT Infrastructure Library Guide

What is ITIL? The Information Technology Infrastructure Library (ITIL) is a framework of best practices for providing various information…

Ryan LaFlammeMay 26, 2022

From Baud to Awed: The History of the Modem

While not nearly as sexy as the handset of a rotary phone plugged into an acoustic coupler, it can be argued that there are actually more…

Lawrence PopaMay 24, 2022

When Small Gets Big in a Hurry: How to Manage Fast-Growing Networks

Fast-growing networks need scalable systems or they’ll explode out of your control. Engineer Keith Tokash shares his hard-won tips for…

Keith TokashMay 23, 2022

Financial Networking From the Edge

Networks that power financial services are fast becoming one of the most exciting areas for edge networking. Financial services…

Lemna ManoharanMay 17, 2022

Updates Paused: How are MSPs Navigating Today’s Supply Chain Issues?

In a perfect world, a hardware network would probably look pretty boring. If you’re looking to take advantage of scale for the price,…

Lemna ManoharanMay 10, 2022

Introducing OID Monitor History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an…

Lemna ManoharanApr 26, 2022
Secure IT Ops

Network Nickels and Dimes: Government IT on a Budget

So what can IT teams at state and local governments do? Is begging for increases to the government IT budget the only solution? Of…

Lemna ManoharanApr 12, 2022

What Else But SNMP?

Most network engineers have a love/hate relationship with the Simple Network Management Protocol (SNMP). Ok, maybe it’s more like…

Destiny BertucciApr 7, 2022

What’s next for the Internet of Things?

IoT devices seem to be ubiquitous, but the truth is we’re not nearly there yet. In fact, IoT Analytics continues to predict steady…

Ryan LaFlammeMar 29, 2022

Finding & Fixing Asymmetric Routing Issues

The workstation at the bottom sends a packet to the server along the green path, and it goes through the firewall on the left. But,…

Kevin DooleyMar 22, 2022

Passing Grade: Top 3 Recommendations for School Network Administrators

Peace of mind. There is nothing else like it. And when you’ve planned well, taken decisive action to document, close gaps, review…

John CrossMar 15, 2022

What Does it Take to Run a Smart City?

From smart lighting, to waste management, to air quality, IoT devices and other “smart city technologies” are rapidly changing life…

Ryan LaFlammeMar 8, 2022

Insider Risk: The Call is Coming from Inside the House

[BONUS POINTS IF YOU CAN NAME THE MOVIES THESE GIFS COME FROM IN THE COMMENTS] In IT, we tend to think of threats as external. Hackers,…

Ryan LaFlammeMar 3, 2022

Trends in Education Networking

The EdTech space is evolving at a rapid pace. In addition to a drastic increase in remote learning, a wide range of new technologies and…

Rebecca GrassingMar 1, 2022

Moving in Concert: What is SD-WAN, and Where is it Going?

SD-WAN evolved quickly throughout the last decade, and we expect more evolutions through the 2020s. Conditions around the modern work…

Lawrence PopaFeb 22, 2022

Layer 2 vs Layer 3 Network Switches: What’s the Difference?

What's the difference between Layer 2 and Layer 3 network switches and how critical are they to a properly functioning network?

Steve PetryschukFeb 18, 2022

Defending Your Network Infrastructure Against Attack

Since perfect network security is impossible, your goal is to cover as many of the risk areas as you can with the budget you have. In…

Kevin DooleyFeb 17, 2022
Vendor Diversity Report 2020

4 Common VPN Types (And When to Use Them)

Virtual private networks (VPNs) are a straightforward idea. The trick comes in knowing the different VPN types and when to use which.…

Ethan BanksFeb 16, 2022

Cover Your DRaaS: Everything you need to know about Disaster Recovery

Unplanned downtime carries a hefty price tag for enterprises. In 2020, critical server outages cost enterprises on average at least…

Destiny BertucciFeb 15, 2022

What is a Supply Chain Attack (and What Can You Do About It)?

Any cybersecurity breach is damaging to individual companies. But when it becomes a supply chain attack, the results can be chaotic and…

Ryan LaFlammeFeb 8, 2022

What is Network-as-a-Service (NaaS)?

The flexible consumption model (FCM)—or as we know it—the everything-as-a-Service (XaaS) model, has steadily, but modestly, taken a…

Lawrence PopaFeb 3, 2022

The No Sweat Guide to Effective Switch Management

Switches are a critical network link & switch management is an important job. Learn how to choose a good location, design an uplink, &…

Ethan BanksJan 28, 2022

Will Layer 3 Switches Give Routers the Boot?

A Layer 3 switch combines the capabilities of a Layer 2 switch and a router in one device. Does this mean the death of the router is…

Steve PetryschukJan 28, 2022

Network Discovery Tools: Pros & Cons for 2022

You can’t manage what you can’t see—when it comes to the network, you need full visibility & awareness. But you don’t need to…

Steve PetryschukJan 27, 2022

What is a Backplane? A Network Backplane Throughput Primer

Understanding what backplane throughput is, and it’s related concepts, can help you better design and troubleshoot your network.…

Lawrence PopaJan 26, 2022

Preventing Network Configuration Drift

A cynical network engineer might say, “configuration drift happens when you take the day off.” Someone changed something they…

Steve PetryschukJan 25, 2022

What is Wi-Fi 6, and What Does it Mean for MSPs?

Wi-Fi 6 is taking tech world by storm. But should MSPs buy into the hype? We talked with Lee Badman, a wireless network architect and…

Annette HynesJan 24, 2022

Network Management in a Nutshell

Network management for MSPs is the process of monitoring and controlling a computer network to ensure all of its resources—both…

Ryan LaFlammeJan 19, 2022
Tackle 2021

Distributed Healthcare Network Monitoring is Possible (with the Right System)

A single healthcare network monitoring system is one of the most effective solutions for improving the management of distributed and…

Steve PetryschukJan 18, 2022

What is an Access Control List (ACL)?

Learn common uses for access control lists (ACLs), the different kinds of lists, and how to implement ACLs effectively.

Ethan BanksJan 13, 2022

Cloud-Native Applications: The Risks and Rewards for MSPs (Webinar)

Your clients want the freedom of cloud-based collaboration and productivity tools. As an MSP, you want a business-grade solution to…

Jamie AndersonJan 13, 2022

To Protect and Secure: Selling Cybersecurity as a Service (Webinar)

A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and…

Ryan LaFlammeJan 13, 2022

Network Troubleshooting Tips for MSPs (Webinar)

Host Steve Petryschuk, director of systems engineering at Auvik, will walk through the most common MSP client networking issues, and how…

Jamie AndersonJan 13, 2022

Network Basics: Configuring Interfaces on Ethernet Switches

As a network administrator, you'll likely configure interfaces more than any other thing. Learn how to do it right and stay in control of…

Ethan BanksJan 11, 2022

Beyond Zero Trust: What is Continuous Security Validation?

Your continuous control validation efforts can force you to improve your security controls. In turn, your continuous control validation…

Destiny BertucciJan 11, 2022

Supporting Remote Workers with Auvik During (and after) COVID-19

During the COVID-19 pandemic, network performance needs to be rock solid so users can access the resources they need, when they need…

Steve PetryschukJan 6, 2022

The Kids are Connected: Ensuring Connectivity in Education Networks

Connectivity is more important than ever to support our education system. BYOD, remote classes, Wi-Fi, and a variety of digital learning…

Steve PetryschukNov 30, 2021

How Not to Break Your Network With Updates

Given the risks, you can’t blame the paranoid network engineer that doesn’t want to change or update anything. The problem is that…

Steve PetryschukNov 18, 2021

Government IT Modernization Must Be More than Skin-Deep

The fact of the matter is that modernizing government technology has become a necessity. The COVID-19 pandemic proved just how…

Destiny BertucciNov 16, 2021
Triple-A Webinar

What Is IoMT (And How Is It Shaping Healthcare)?

Smart devices are everywhere nowadays, from refrigerators and coffee makers to security cameras and thermostats. A significant percentage…

Rebecca GrassingNov 15, 2021

Managing the Complex Networks of Financial Services

It’s possible to perform network mapping, device discovery, and asset management manually, but it’s not sustainable. Modern networks…

Lawrence PopaNov 15, 2021

The Future of Private Addresses: Goodbye NAT, Hello IPv6

So how do we get from IPv4 to IPv6—which we all agree has to happen—when there’s still a raging debate about one of the biggest…

Steve PetryschukNov 9, 2021

The Lights Never Go Out For Financial Services

The financial sector is in a constant state of change, and institutions must continually adjust to the evolving needs of their customers…

Ryan LaFlammeNov 4, 2021

6 All Too Common Network Security Hacks Your Team Should Know About

As an IT pro, you’re probably used to doing the heavy lifting when it comes to network security. You might even find your team…

Michael DwyerOct 12, 2021

The Challenge of Monitoring a Distributed Network

What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are…

Steve PetryschukSep 21, 2021

What is QUIC? Everything You Need to Know

When I hear QUIC, my immediate reaction is, “The QUICk brown fox jumps over the lazy dog.” That sentence has been ingrained in me…

Steve PetryschukSep 14, 2021

The 95th Percentile: How to Manage Capacity Before You Run Out

95th percentile bandwidth metering is a method to determine usage 95% of the time. Learn how to calculate & do capacity planning.

Rebecca GrassingSep 7, 2021

The Auvik Guide to Basic Switch Configuration

Setting up a network switch on your own can seem like a daunting task. Use this handy guide to get your switch configuration up and…

Lawrence PopaAug 24, 2021

The Auvik Guide to Figuring Out What’s Hogging Your Bandwidth

Knowing how to tell what users and devices are using high levels of your network bandwidth is key to proper management. Learn everything…

Ryan LaFlammeAug 11, 2021

Using DNS Filtering to your Advantage

DNS filtering is the use of DNS to block or allow access to specific content through the use of DNS requests. While technically you can…

Steve PetryschukAug 10, 2021