Resources in Network management
![[image] The Pros and Cons of VPN Split Tunneling](https://www.auvik.com/wp-content/uploads/2021/01/vpn-split-tunneling-decide-decision-1800x1200-1-800x600.jpg)
The Pros and Cons of VPN Split Tunneling
Should you use VPN split tunneling? Here's what you need to know to decide.
![[image] A Beginner’s Guide to Microsoft Power BI & Network Reports](https://www.auvik.com/wp-content/uploads/2020/11/guide-to-microsoft-power-bi-1800x1200-1-300x180.png)
A Beginner’s Guide to Microsoft Power BI & Network Reports
Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from…
![[image] Are Network Blind Spots Endangering Your Business?](https://www.auvik.com/wp-content/uploads/2016/07/network-blind-spots-crash-1800x1200-300x180.jpg)
Are Network Blind Spots Endangering Your Business?
Network blind spots are the things you can't see and don't know about — and they can be deadly…
![[image] Configuring and Troubleshooting Multicast Protocols](https://www.auvik.com/wp-content/uploads/2020/11/configuring-troubleshooting-multicast-1800x1200-1-300x180.png)
Configuring and Troubleshooting Multicast Protocols
There are two important protocols required to get your network to forward multicast packets.…
![[image] 5 Reasons to Add Network Monitoring to Your 2021 IT Budget](https://www.auvik.com/wp-content/uploads/2020/10/network-monitoring-budget-1800x1200-1-300x180.png)
5 Reasons to Add Network Monitoring to Your 2021 IT Budget
Allocating money in your IT budget for network monitoring in 2021 may be more important than…
![[image] What Is Multicast Networking and How Does It Work?](https://www.auvik.com/wp-content/uploads/2020/10/multicast-networking-1800x1200-1-300x180.png)
What Is Multicast Networking and How Does It Work?
Multicast networking is based on the concept that a single packet can be sent by a server & it…
![[image] Reducing Mean Time to Resolution With Auvik](https://www.auvik.com/wp-content/uploads/2020/10/reducing-mttr-with-auvik-1800x1200-1-300x180.png)
Reducing Mean Time to Resolution With Auvik
You can streamline troubleshooting, shrink mean time to resolution & spare network users from…
![[image] Security for Humans – FIT 071](https://www.auvik.com/wp-content/uploads/2020/09/people-first-security-cybersecurity-podcast-interview-1800x1200-1-300x180.jpg)
Security for Humans – FIT 071
Struggling to get users to comply with your IT security practices? You might be going about it…
![[image] The Employee Offboarding Checklist for IT Pros](https://www.auvik.com/wp-content/uploads/2020/09/employee-offboarding-checklist-1800x1200-1-300x180.png)
The Employee Offboarding Checklist for IT Pros
Somebody leaving? Keep your network & data secure! Use this handy employee offboarding checklist…
![[image] Special IP Address Ranges and When to Use Them](https://www.auvik.com/wp-content/uploads/2020/09/special-ip-address-ranges-1800x1200-1-800x400.png)
Special IP Address Ranges and When to Use Them
There are several special IP address ranges that have specific purposes. Network engineer Kevin…
![[image] 5 Great Reasons to Store and Analyze Centralized Logs](https://www.auvik.com/wp-content/uploads/2020/09/centralized-logs-1800x1200-1-300x180.png)
5 Great Reasons to Store and Analyze Centralized Logs
Whether log events point to issues with hardware, applications, capacity, or security issues,…
![[image] An Introduction to Subnetting](https://www.auvik.com/wp-content/uploads/2020/09/subnetting-primer-1800x1200-1-300x180.png)
An Introduction to Subnetting
You don't need that subnet calculator! Not when you have this handy guide to subnetting using…
![[image] Getting Started With Syslog in Auvik](https://www.auvik.com/wp-content/uploads/2020/08/setting-up-auvik-syslog-1800x1200-1-300x180.png)
Getting Started With Syslog in Auvik
Auvik centralizes syslog data for all your network devices, allowing you to search & filter to…
![[image] Making the Move to Windows Virtual Desktop – FIT 068](https://www.auvik.com/wp-content/uploads/2020/08/microsoft-windows-virtual-desktop-WVD-remote-workers-1800x1200-1-300x180.jpg)
Making the Move to Windows Virtual Desktop – FIT 068
Should you move to virtual desktops? Nerdio’s Joseph Landes joins us to look at the trend, the…
![[image] 6 Essential First Steps When Managing a New Network](https://www.auvik.com/wp-content/uploads/2020/08/managing-a-new-network-1800x1200-1-300x180.png)
6 Essential First Steps When Managing a New Network
Where do you start when you're managing a new network and are looking to make a stellar first…
![[image] The No Sweat Guide to Effective Switch Management](https://www.auvik.com/wp-content/uploads/2014/08/effective-switch-management-1800x1200-1-300x180.png)
The No Sweat Guide to Effective Switch Management
Switches are a critical network link & switch management is an important job. Learn how to choose…
![[image] Implementing a Bring Your Own Device Policy In Your Organization](https://www.auvik.com/wp-content/uploads/2020/07/bring-your-own-device-policy-1800x1200-2-300x180.png)
Implementing a Bring Your Own Device Policy In Your Organization
A bring your own device policy is more important than ever since users can bring unsecured…
![[image] sFlow vs NetFlow: What’s the Difference?](https://www.auvik.com/wp-content/uploads/2020/07/sflow-vs-netflow-1800x1200-1-300x180.png)
sFlow vs NetFlow: What’s the Difference?
Two of the most common flow protocols you’ll run into are NetFlow and sFlow, and these are some…
![[image] Network Security Threats From the “Light Web” – FMSP 066](https://www.auvik.com/wp-content/uploads/2020/07/light-web-network-threats-data-brokers-cybersecurity-1800x1200-1-300x180.jpg)
Network Security Threats From the “Light Web” – FMSP 066
Today’s biggest network threats might just be coming at you from scammers using totally legal…
![[image] Managing IT Risk When Everyone’s Working Remote](https://www.auvik.com/wp-content/uploads/2020/06/IT-risk-remote-workers-cybersecurity-300x180.jpg)
Managing IT Risk When Everyone’s Working Remote
Top IT & cybersecurity experts share their advice for leaders scrambling to contend with a new…
![[image] Why a Zero-Trust Network Is More Desirable—and Achievable—Than Ever](https://www.auvik.com/wp-content/uploads/2020/06/zero-trust-network-1800x1200-1-300x180.png)
Why a Zero-Trust Network Is More Desirable—and Achievable—Than Ever
The cybersecurity landscape has changed a lot thanks to the increase in cloud-based services, and…
![[image] 3 Reasons to Use Auvik’s Remote Management Features](https://www.auvik.com/wp-content/uploads/2020/06/remote-management-auvik-1800x1200-1-800x400.png)
3 Reasons to Use Auvik’s Remote Management Features
You can't always be on site to troubleshoot every network issue that pops up. With Auvik’s…
![[image] 10 Computer Networking Books Every Network Manager Should Read](https://www.auvik.com/wp-content/uploads/2020/06/computer-networking-books-1800x1200-1-300x180.png)
10 Computer Networking Books Every Network Manager Should Read
Get a fresh perspective on general networking, network management, network monitoring, security,…
![[image] How to Configure Syslog on a Cisco Device](https://www.auvik.com/wp-content/uploads/2020/05/configure-syslog-cisco-1800x1200-1-300x180.png)
How to Configure Syslog on a Cisco Device
Essentially every modern network device has at least some syslog capabilities. Here's how to…
![[image] How to Troubleshoot Network Connectivity Issues With Auvik](https://www.auvik.com/wp-content/uploads/2020/05/troubleshooting-network-connectivity-auvik-1800.1200-300x180.png)
How to Troubleshoot Network Connectivity Issues With Auvik
Network connectivity issues can be some of the worst to troubleshoot. But with Auvik, problems…
![[image] 9 Low-Cost or Free Cybersecurity Training Resources](https://www.auvik.com/wp-content/uploads/2020/05/free-cybersecurity-training-1800x1200-1-300x180.png)
9 Low-Cost or Free Cybersecurity Training Resources
Want to advance your career or make the most of your team’s professional development budget?…
![[image] How to Keep IT Infrastructure Fresh and Fit for Purpose](https://www.auvik.com/wp-content/uploads/2020/05/it-infrastructure-fresh-1800x1200-1-300x180.png)
How to Keep IT Infrastructure Fresh and Fit for Purpose
Old, unused network devices create security risks, eat up IT time, and bloat operating costs.…
![[image] What Is Syslog and How Does It Work?](https://www.auvik.com/wp-content/uploads/2020/05/what-is-syslog-1800x1200-1-300x180.png)
What Is Syslog and How Does It Work?
Almost every device on a network has a syslog agent you can use to send messages to a central…
![[image] Keeping Remote Workers Connected With Proactive VPN Monitoring](https://www.auvik.com/wp-content/uploads/2020/04/vpn-monitoring-auvik-1800x1200-1-300x180.png)
Keeping Remote Workers Connected With Proactive VPN Monitoring
Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of…
![[image] How to Securely Enable Work From Home – FMSP 063](https://www.auvik.com/wp-content/uploads/2020/03/security-remote-work-from-home-IT-MSP-1800x1200-1-300x180.jpg)
How to Securely Enable Work From Home – FMSP 063
From developing BYOD policies to tips for helping workers secure their home networks, Webroot’s…
![[image] An Introduction to Web Proxies](https://www.auvik.com/wp-content/uploads/2020/03/introductions-to-proxies-1800x1200-1-300x180.png)
An Introduction to Web Proxies
Web proxies intercept traffic from your systems as they move to others, analyze the packets, and…
![[image] How Auvik Can Help Keep Networks Steady During the COVID-19 Pandemic](https://www.auvik.com/wp-content/uploads/2020/03/covid-19-pandemic-help-remote-work-network-management-auvik-B1800x1200-300x180.jpg)
How Auvik Can Help Keep Networks Steady During the COVID-19 Pandemic
During the COVID-19 pandemic, network performance needs to be rock solid so users can access the…
![[image] What Is Two-Factor Authentication and Why Is It Important?](https://www.auvik.com/wp-content/uploads/2020/02/two-factor-authentication-1800x1200-1-800x400.png)
What Is Two-Factor Authentication and Why Is It Important?
Two-factor authentication or 2FA requires a user to identify themselves in two ways—or using…
![[image] Using the NIST Cybersecurity Framework to Assess Your Clients’ Network Security](https://www.auvik.com/wp-content/uploads/2020/02/nist-cybersecurity-framework-1800x1200-1-300x180.png)
Using the NIST Cybersecurity Framework to Assess Your Clients’ Network Security
The NIST Cybersecurity Framework was intended to be used by internal IT teams, but its five major…
![[image] The Biggest Cybersecurity Threats for MSPs in 2020 – FMSP 059](https://www.auvik.com/wp-content/uploads/2020/01/cyber-security-predictions-criminals-deep-fakes-ransomware-podcast-1800x1200-1-300x180.jpg)
The Biggest Cybersecurity Threats for MSPs in 2020 – FMSP 059
What new and evolving security threats will you be grappling with this year? We dig into Trend…
![[image] What Does Wi-Fi 6 Mean for MSPs?](https://www.auvik.com/wp-content/uploads/2019/10/wi-fi-6-for-msps-1800x1200-300x180.png)
What Does Wi-Fi 6 Mean for MSPs?
Wi-Fi 6 is taking tech world by storm. But should MSPs buy into the hype? We talked with Lee…
![[image] How to Make Money With Microsoft Azure – FMSP 052](https://www.auvik.com/wp-content/uploads/2019/10/photo-1526913299589-f35a3ddeb7ae-1-300x180.jpeg)
How to Make Money With Microsoft Azure – FMSP 052
Joseph Landes of Nerdio walks us through how to take advantage of four Microsoft programs that…
![[image] How to Explain Cloud Computing to Your Clients](https://www.auvik.com/wp-content/uploads/2019/10/what-is-cloud-computing-1800x1200-300x180.png)
How to Explain Cloud Computing to Your Clients
What is cloud computing? If you’ve been asked this question by a client, you know there isn’t…
![[image] Continuum Navigate East 2019: 4 Cybersecurity Takeaways](https://www.auvik.com/wp-content/uploads/2019/10/Continuum-Navigate-East-2019-1800x1200-300x180.jpeg)
Continuum Navigate East 2019: 4 Cybersecurity Takeaways
With recent MSP-targeted ransomware attacks fresh in the minds of all attendees, cybersecurity…
![[image] Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051](https://www.auvik.com/wp-content/uploads/2019/10/ransomware-MSP-cyberattack-fight-back-attackers-podcast-interview-1800x1200-300x180.jpg)
Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051
Wes Spencer of Perch Security reviews the practical steps you can take to protect yourselves,…
![[image] What Is Network Agility and Why Does It Matter?](https://www.auvik.com/wp-content/uploads/2019/09/network-agility-network-design-1800x1200-300x180.jpg)
What Is Network Agility and Why Does It Matter?
What does network agility actually mean? We surfed the web and analyzed what (almost) everyone…
![[image] Auvik Use Case: Proactively Monitor and Manage Networks](https://www.auvik.com/wp-content/uploads/2019/08/auvik-use-case-proactive-monitor-manage-network-1800x1200-300x180.jpg)
Auvik Use Case: Proactively Monitor and Manage Networks
By doing the behind-the-scenes work before something goes wrong, you’ll keep your client…
![[image] Packet Errors, Packet Discards, and Packet Loss: What’s the Difference?](https://www.auvik.com/wp-content/uploads/2019/08/network-packet-errors-packet-discards-packet-loss-1800x1200-300x180.jpg)
Packet Errors, Packet Discards, and Packet Loss: What’s the Difference?
It’s a question the Auvik support team receives often: “What’s the difference between a…
![[image] Best Practices for Analyzing and Troubleshooting Networks – (On Demand)](https://www.auvik.com/wp-content/uploads/2019/08/ErickSimpson-300x180.jpg)
Best Practices for Analyzing and Troubleshooting Networks – (On Demand)
Have you ever encountered a tough network issue and needed a step-by-step troubleshooting process…
![[image] How to Solve Network Cases Like a Super Sleuth With Auvik TrafficInsights™](https://www.auvik.com/wp-content/uploads/2019/07/network-traffic-analysis-use-cases-Auvik-TrafficInsights-sleuth-300x180.jpg)
How to Solve Network Cases Like a Super Sleuth With Auvik TrafficInsights™
With Auvik TrafficInsights, if any traffic flows through a flow-enabled network device, you can…
![[image] Network Management in a Nutshell](https://www.auvik.com/wp-content/uploads/2019/07/network-management-nutshell-MSPs-1800x1200-800x400.jpg)
Network Management in a Nutshell
Network management is a big responsibility for MSPs. It includes monitoring and controlling a…
![[image] This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047](https://www.auvik.com/wp-content/uploads/2019/07/wi-fi-security-wireless-security-trusted-wireless-environment-TWE-framework-1800x1200-300x180.jpg)
This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047
WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…
![[image] This New Wi-Fi Security Framework Brings Opportunity for MSPs](https://www.auvik.com/wp-content/uploads/2019/07/wi-fi-security-wireless-security-trusted-wireless-environment-TWE-framework-1800x1200-300x180.jpg)
This New Wi-Fi Security Framework Brings Opportunity for MSPs
WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…
![[image] 5 Ways to Troubleshoot Faster, Boost Security, and Upsell Clients with Auvik TrafficInsights™ – (On Demand)](https://www.auvik.com/wp-content/uploads/2019/07/MKT-9698_TI-Webinar-Graphic.jpg-300x180.jpg)
5 Ways to Troubleshoot Faster, Boost Security, and Upsell Clients with Auvik TrafficInsights™ – (On Demand)
With Auvik TrafficInsights, MSPs have deep visibility into all traffic that flows across client…
![[image] Reduce Downtime Risk With a Complete Business Continuity Plan – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/05/MKT-9418_Webinar-Graphic-2-300x180.jpg)
Reduce Downtime Risk With a Complete Business Continuity Plan – Webinar (On Demand)
Join Angus Robertson, CMO at Axcient, and Steve Petryschuk, Director of Systems Engineering at…
![[image] How One MSP Fuelled Their Business With Firewall as a Service](https://www.auvik.com/wp-content/uploads/2019/05/firewall-as-a-service-FaaS-watchtower-protect-security-1800x1200-300x180.jpg)
How One MSP Fuelled Their Business With Firewall as a Service
Under director Leigh Wood's watch, Node IT Solutions went from reselling Fortinet firewalls in…
![[image] Auvik Use Case: Gain Visibility Into the Internet of Things](https://www.auvik.com/wp-content/uploads/2019/05/IoT-internet-of-things-smart-lightbulb-auvik-use-case-1800x1200-300x180.jpg)
Auvik Use Case: Gain Visibility Into the Internet of Things
IoT devices can be added to a network without notice, cause unexpected performance issues, and…
![[image] Brace Yourself—768K Day Is Coming](https://www.auvik.com/wp-content/uploads/2019/05/768K-Day-internet-meltdown-outages-1800x1200-300x180.jpg)
Brace Yourself—768K Day Is Coming
All over the internet, there are ominous rumblings that “768K Day” is on its way—and it’s…
![[image] Using Network Visibility to Grow Your MSP Business – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/05/Using-Network-Visibility-to-Grow-Your-MSP-Business-1-300x180.jpg)
Using Network Visibility to Grow Your MSP Business – Webinar (On Demand)
If you’re moving MSP clients to the cloud, you better make sure they can always access the…
![[image] Next Time You Configure or Update Your Network Interfaces Use This Checklist](https://www.auvik.com/wp-content/uploads/2019/04/Auvik-Blog-Headers-1-300x180.png)
Next Time You Configure or Update Your Network Interfaces Use This Checklist
Our checklist covers the key things you’ll want to consider the next time you’re configuring…
![[image] Generate Revenue with Cisco & Auvik – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/04/Generate-Revenue-with-Cisco-and-Auvik-800x400.jpg)
Generate Revenue with Cisco & Auvik – Webinar (On Demand)
Many steps in the network assessment process can be automated, but sourcing warranty and patch…
![[image] Network Segmentation Is Great Network Management](https://www.auvik.com/wp-content/uploads/2019/04/network-segmentation-management-network-security-orange-1800x1200-300x180.jpg)
Network Segmentation Is Great Network Management
Network segmentation—breaking a network into smaller chunks—improves network visibility,…
![[image] NetFlow Basics: An Introduction to Monitoring Network Traffic](https://www.auvik.com/wp-content/uploads/2015/02/network-traffic-netflow-1800x1200-300x180.jpg)
NetFlow Basics: An Introduction to Monitoring Network Traffic
You probably have support for NetFlow or other flow protocols on your client devices already.…
![[image] How to Manage Your Client’s Network—Even When the Network Isn’t Available](https://www.auvik.com/wp-content/uploads/2014/05/out-of-band-management-alternate-route-access-network-management-1800x1200-300x180.jpg)
How to Manage Your Client’s Network—Even When the Network Isn’t Available
Let’s say one of your techs is configuring a client’s firewall and makes a mistake that…
![[image] Could Your MSP Profitably Deliver a Private Cloud Service? – FMSP 037](https://www.auvik.com/wp-content/uploads/2019/02/private-cloud-public-cloud-MSP-offering-podcast-interview-1800x1200-300x180.jpg)
Could Your MSP Profitably Deliver a Private Cloud Service? – FMSP 037
Thinking about offering private cloud to your MSP clients? Best to go in with your eyes wide…
![[image] Troubleshooting Network Issues With Auvik – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/02/Troubleshooting-Networking-Issues-with-Auvik-300x180.jpg)
Troubleshooting Network Issues With Auvik – Webinar (On Demand)
Host Steve Petryschuk, director of systems engineering at Auvik, will walk through the most…
![[image] 5 Security Best Practices for Network Devices](https://www.auvik.com/wp-content/uploads/2019/01/network-device-security-best-practices-1800x1200-300x180.jpg)
5 Security Best Practices for Network Devices
What can you be doing to continually improve your network device security? Here are 5 things to…
![[image] To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/01/ToProtectAndSecure-300x180.jpg)
To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)
A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity.…
![[image] MSP Risks and Rewards in Cloud Tech – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/01/MSP-Risks-and-Rewards-in-Cloud-Tech-Feb-7-300x180.jpg)
MSP Risks and Rewards in Cloud Tech – Webinar (On Demand)
Your clients want the freedom of cloud-based collaboration and productivity tools. As an MSP, you…