Quantcast
8
Posts
1
Comments

About Rainer Gerhards

Rainer Gerhards works for Adiscon, who offers software for server monitoring. Visit http://www.monitorware.com for more information and free downloads.
Actively Monitoring Disk Free Space
· 1

Why care about disk free space?

The obvious answer is that low free space means upcoming problems, like the inability to receive mail (for mail servers) or the inability to store new files (for file servers). There are numerous obvious reasons why free space is an operations management priority.

The ISAPI Execution Environment

This document bases on information and testing done with IIS 1.0. We have not re-tried it with later versions. However, we feel very comfortable with the information contained herein and think that it still is correct.

Performance Optimizing Syslog Server

We are quite often asked how many syslog message per second MonitorWare Agent can receive. The answer is not as simple as it may look. It largely depends. So I finally thought I write this brief article on the factors that influence syslog server performance. Obviously, you can also use it as a rough guide to optimizing your setup.

Monitoring Windows Disk Space with Scripting Host

Did you ever run out of disk space on an important machine? Never? Well, I’ve done so and experienced all the headaches that come along with this situation. In this article, I describe how I implemented a basic automatic monitor system with the help of a little scripting.

Centrally Monitoring Windows NT/2000/XP/2003

Monitoring Windows NT/2000/XP/2003 is important even for small environments. Automatically monitored, critical failures can often be avoided. But how to monitor a system without too much effort? The basic idea behind a successful monitoring and alerting system is to centralize all system events at a single monitoring station. Once the information is centralized, it can be used to build an alerting system or even carry out corrective actions.

Detecting Password Attacks on Windows

Why care about Password Attacks

Windows servers and workstations have become a primary target for malicious users. Be it hackers that try to deface a web site, the Warez community in search for “free” FTP server space or just your internal users interested in restricted files. One common thing about them is that the need to break in either via a software vulnerability or by breaking in into a user account. This article focuses on the later scenario, the try to break in into an account. Fortunately, this occurs not only often but is also relatively easy to spot – and the countermeasures are very simple and effective.

How to Monitor Windows NT from Unix

Many system administrators are running Unix / Linux based monitoring and alerting for a long term. The basic idea behind a successful monitoring and alerting system is to centralize all system events at a single monitoring station. Once the information is centralized, it can be used to build an alerting system or even carry out corrective actions.

IIS Workflow Described

IIS order of Operations

Contceptually, IIS has three processing stages:

  1. Decoding the target (web page) of the request

  2. Serving the request

  3. Finishing the request, which includes logging