Identify Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. But Auvik makes it easy to quickly identify vulnerable devices for replacement or remediation.

Sarah Cunningham-ScharfJun 1, 2022

Introducing OID Monitor History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an…

Lemna ManoharanApr 26, 2022
NVDR Report

What Is IoMT (And How Is It Shaping Healthcare)?

Smart devices are everywhere nowadays, from refrigerators and coffee makers to security cameras and thermostats. A significant percentage…

Rebecca GrassingNov 15, 2021

Managing the Complex Networks of Financial Services

It’s possible to perform network mapping, device discovery, and asset management manually, but it’s not sustainable. Modern networks…

Lawrence PopaNov 15, 2021

The Challenge of Monitoring a Distributed Network

What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are…

Steve PetryschukSep 21, 2021
O’Reilly Report

How to Find IP Addresses on a Network and Monitor their Usage

If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in…

Steve PetryschukApr 21, 2021

Network Throughput vs Bandwidth and How to Measure It

Learn everything you need to know about network throughput from the experts at Auvik Networks. And while we’re at it, let’s cover the…

Steve PetryschukMar 16, 2021

11 Network Traffic Terms to Know

Monitoring network traffic is important—but first you need to understand the basic terms and concepts. Here are 11 key network traffic…

Steve PetryschukFeb 23, 2021

6 Best Network Traffic Monitor Software Options

Some network monitoring solutions have clear usability gaps, but we found some great choices. Learn about the 6 best network traffic…

Destiny BertucciFeb 10, 2021
Command Center (N-Able)

A Beginner’s Guide to Microsoft Power BI & Network Reports

Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from your network through custom reports &…

Annette HynesDec 8, 2020

5 Reasons to Add Network Monitoring to Your 2021 IT Budget

Allocating money in your IT budget for network monitoring in 2021 may be more important than ever. Here are five reasons why.

Steve PetryschukOct 27, 2020

5 Great Reasons to Store and Analyze Centralized Logs

Whether log events point to issues with hardware, applications, capacity, or security issues, they contain the data you need to quickly…

Rod LewisSep 15, 2020

What Is Syslog and How Does It Work?

Almost every device on a network has a syslog agent you can use to send messages to a central location. Here's how the network-based…

Kevin DooleyMay 5, 2020

VPN Monitoring: Keeping Remote Workers Connected With Auvik

Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of capacity issues and keep workers connected.

Steve PetryschukApr 21, 2020

Packet Errors, Packet Discards, and Packet Loss: What’s the Difference?

It’s a question the Auvik support team receives often: “What’s the difference between a packet error, a packet discard, and packet…

Annette HynesAug 27, 2019

Auvik TrafficInsights: How to Solve Network Cases Like a Super Sleuth

With Auvik TrafficInsights, if any traffic flows through a flow-enabled network device, you can see who’s on the network, what…

Annette HynesAug 6, 2019

5 Ways to Troubleshoot Faster, Boost Security, and Upsell Clients with Auvik TrafficInsights™ – (On Demand)

With Auvik TrafficInsights, MSPs have deep visibility into all traffic that flows across client networks, so you can be confident knowing…

Sarah Cunningham-ScharfJul 5, 2019

NetFlow Basics: An Introduction to Monitoring Network Traffic

You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and…

Steve PetryschukMar 19, 2019

3 Minor Network Alerts You Shouldn’t Ignore

It’s obvious you need to deal with emergency and critical network alerts. But what about simple warning alerts? Your first impulse may…

Steve PetryschukFeb 13, 2018

How I Strategically Tune Auvik Alerts to Reduce Noise and Optimize Monitoring

Auvik is pre-configured to alert on a list of standard metrics at industry best-practice thresholds. If the thresholds are too low for…

Corey KirkendollJan 16, 2018
Secure IT Ops

How to Dig Deeper on the Network When You Don’t Have NetFlow

NetFlow is great for gaining deeper visibility at Layer 3 and beyond—but not everyone has the luxury of putting it to use. Thankfully,…

Ray PatelAug 15, 2017

Network Monitoring: How to Handle High CPU Utilization Alerts

Seeing high CPU utilization on a network device is always an uncomfortable feeling. The harder the device is working, the more likely…

Ray PatelApr 4, 2017

How to Look Up a Custom OID

Is there a network device you want to learn more about or monitor? Being able to look up OIDs (the device’s Object Identifiers) is the…

Dana OrosFeb 7, 2017

6 Pro Tips for Handling IT Alert Fatigue

IT alert fatigue — becoming so overwhelmed with notifications that you stop paying attention — is a dangerous phenomenon that can…

Dana OrosSep 15, 2015