Resources in Network monitoring
Identify Vulnerable Devices From Vendor Recalls and Security Notices
When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. But Auvik makes it easy to quickly identify vulnerable devices for replacement or remediation.
Introducing OID Monitor History
Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an…
What Is IoMT (And How Is It Shaping Healthcare)?
Smart devices are everywhere nowadays, from refrigerators and coffee makers to security cameras and thermostats. A significant percentage…
Managing the Complex Networks of Financial Services
It’s possible to perform network mapping, device discovery, and asset management manually, but it’s not sustainable. Modern networks…
The Challenge of Monitoring a Distributed Network
What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are…
How to Find IP Addresses on a Network and Monitor their Usage
If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in…
Network Throughput vs Bandwidth and How to Measure It
Learn everything you need to know about network throughput from the experts at Auvik Networks. And while we’re at it, let’s cover the…
11 Network Traffic Terms to Know
Monitoring network traffic is important—but first you need to understand the basic terms and concepts. Here are 11 key network traffic…
6 Best Network Traffic Monitor Software Options
Some network monitoring solutions have clear usability gaps, but we found some great choices. Learn about the 6 best network traffic…
A Beginner’s Guide to Microsoft Power BI & Network Reports
Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from your network through custom reports &…
5 Reasons to Add Network Monitoring to Your 2021 IT Budget
Allocating money in your IT budget for network monitoring in 2021 may be more important than ever. Here are five reasons why.
5 Great Reasons to Store and Analyze Centralized Logs
Whether log events point to issues with hardware, applications, capacity, or security issues, they contain the data you need to quickly…
What Is Syslog and How Does It Work?
Almost every device on a network has a syslog agent you can use to send messages to a central location. Here's how the network-based…
VPN Monitoring: Keeping Remote Workers Connected With Auvik
Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of capacity issues and keep workers connected.
Packet Errors, Packet Discards, and Packet Loss: What’s the Difference?
It’s a question the Auvik support team receives often: “What’s the difference between a packet error, a packet discard, and packet…
Auvik TrafficInsights: How to Solve Network Cases Like a Super Sleuth
With Auvik TrafficInsights, if any traffic flows through a flow-enabled network device, you can see who’s on the network, what…
5 Ways to Troubleshoot Faster, Boost Security, and Upsell Clients with Auvik TrafficInsights™ – (On Demand)
With Auvik TrafficInsights, MSPs have deep visibility into all traffic that flows across client networks, so you can be confident knowing…
NetFlow Basics: An Introduction to Monitoring Network Traffic
You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and…
3 Minor Network Alerts You Shouldn’t Ignore
It’s obvious you need to deal with emergency and critical network alerts. But what about simple warning alerts? Your first impulse may…
How I Strategically Tune Auvik Alerts to Reduce Noise and Optimize Monitoring
Auvik is pre-configured to alert on a list of standard metrics at industry best-practice thresholds. If the thresholds are too low for…
How to Dig Deeper on the Network When You Don’t Have NetFlow
NetFlow is great for gaining deeper visibility at Layer 3 and beyond—but not everyone has the luxury of putting it to use. Thankfully,…
Network Monitoring: How to Handle High CPU Utilization Alerts
Seeing high CPU utilization on a network device is always an uncomfortable feeling. The harder the device is working, the more likely…
How to Look Up a Custom OID
Is there a network device you want to learn more about or monitor? Being able to look up OIDs (the device’s Object Identifiers) is the…
6 Pro Tips for Handling IT Alert Fatigue
IT alert fatigue — becoming so overwhelmed with notifications that you stop paying attention — is a dangerous phenomenon that can…