Why Should I Onboard 1-2 Clients at a Time?

Size: px
Start display at page:

Download "Why Should I Onboard 1-2 Clients at a Time?"

Transcription

1

2 Ignite Overview LabTech Ignite is a set of preconfigured, out-of-the-box functions built into the LabTech remote monitoring and management (RMM) platform and designed to get your business up and running in no time. Developed and built by IT managed services industry experts and following Microsoft best practices, LabTech Ignite sets the standard for simple IT services delivery incorporating mission-critical monitoring packs, industry defined thresholds, auto-fix scripts, automated patch management and much more! LabTech Ignite allows you to turn on and off functionality so you can decide what level of functionality is best for your environment. Why Should I Onboard 1-2 Clients at a Time? A methodical approach should be taken when onboarding new clients to help better manage overall ticket creation. This allows you to adjust monitor conditions where required, whitelist or blacklist software, as well as events, services and processes. By onboarding one or two clients at a time and taking care of these tickets before onboarding additional clients, it will save you time in the end. Here s why: LabTech has provided you with 100+ internal monitors to provide you with valuable information (more on this later). When you onboard a new client, it is likely that every machine will generate 7-8 tickets EACH for a variety of reasons (e.g., new software, services, processes, events, sensors, etc.). So, if this client has 30 computers, approximately 240 tickets will be generated that need to be remediated. Now, say you have 100 clients with 30 computers each and you onboarded all of them, that s a whopping 24,000 tickets! Are you thinking you d rather just do it all at once and get it over with? Well here s the good news, if you onboard only one or two clients at a time and remediate those tickets you will drastically reduce the number of total tickets generated. How, you ask? With a little bit of planning! Here s an example: You have just onboarded the two clients and 60 of the tickets indicate that new software has been installed (e.g., Microsoft Office Professional Plus 2010). Add this software with the exact name to your App Whitelist and now you have eliminated that ticket for all of your remaining clients (3000 tickets just eliminated). Applications can be whitelisted or blacklisted in the Dashboard > Config > Configurations > App Whitelist/App Blacklist or by rightclicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Whitelist/Blacklist. The same applies for services and processes. A little preparation goes a long way. If you know what applications are on your clients computers, you can add these before you onboard and eliminate even more tickets! LabTech has provided you with 1000s of whitelisted software, services and processes; however, as new releases of 3 rd party software come out these applications may or may not be already in the whitelist for you. You may have to take the few seconds of time to add them to your whitelist. Success depends upon previous preparation, and without such preparation there is sure to be failure. - Confucius

3 Why Should I Create Tickets for Everything? One answer, Information. Creating tickets for everything provides a fullsized stream of information about your clients machines and networks and can be used to show root causes for some problems, predict new problems before they occur and simplify troubleshooting for technicians. The trick is learning to manage these alerts and separate the more important items from the lesser important ones is critical to being able to provide an acceptable level of client service and satisfaction. The overall goal is to maintain details to help in justifying your service delivery (remember, show your worth so the checks keep coming), as well as to help a technician pinpoint trouble in Top 10 Highest Ticket Producers an efficient and quick manner. Doing the best at this moment puts you in the best place for the next moment. ~ Oprah Winfrey The following table represents the ten highest ticket producers from LabTech. On the following pages, we will explain why these monitors are important, where they come from and how to better manage them to provide valid information versus noise in your PSA system. While this list is not all-inclusive, it was generated from support requests into the LabTech Help Desk. Monitor or Type LT-No Agent Checking in (30 Days) Change Management Tickets LabTech Onboarding/Patching Performance Monitors Sensor Monitors EV Blacklisted Events SW-Uninstalled SW Installed New SW Unclassified Apps SVC-Auto Services Stopped What it Does This alert notifies you of any machine that has not checked into the LabTech server for 30 days. Upon onboarding and each day, servers are checked for roles and or changes to roles and tickets are generated with the details. The monitors alert you to issues that should have been addressed within Lab- Tech during location on-boarding by a technician. These monitor specific performance variables on workstations and servers, as well as by server roles. These monitors monitor specific motherboard sensors for conditions that are excessive. Currently three monitors monitor the blacklist event table for alerts that match entries within the table. They are Critical and Warning Events, Exchange Events and Informational Events that all match the list. This monitor looks for applications that have been removed from computers but excludes common apps such as Java, Adobe, etc. that frequently do a removal when they are updated. This monitor looks for applications that have been added to computers, but excludes common apps such as Java, Adobe, etc. that are common and updated often. This monitor looks for applications that have been installed at some point on the various machines and lets you either whitelist or blacklist the application as either known good or bad. This monitor runs each hour looking for services that are reported stopped, but set to an automatic start state.

4 Why Should I Care if an Agent hasn t Checked In? The LabTech No Agent Checking In (30 Days) monitor will alert you to notify you of any machine that has not checked into the server for 30 days. Why is this important? The assumption is that you are providing a monthly service to your clients and if a machine has not reported in within the month, you were not able to perform what is required of you to deliver your service. Less work for you, right? Well, let s look at it from another point of view. Let s assume that every quarter you meet with your client and the client s patch health score is not up to par. Those computers that are offline and not checking in are affecting the reporting. Now, you have to explain to your client why the patch health score is low, why this computer hasn t been patched, etc. Of course, you could tell the client that you couldn t patch the computer because it has been turned off for more than 30 days. Oh, but wait, the client is paying you to deliver a service. Do you see where we are going here? Again, being proactive will always score you more brownie points than being reactive. When a machine has been off for more than 30 days, contact the client and tell them that there is a machine that has been off for several Server Roles Changing, Who Cares? days and you are unable to patch, backup or run antivirus against it. This will be another step to validating your worth with your client. If it is a computer that is turned off for a reason, you can exclude it at the monitor level so the machine will be ignored. From the Monitors screen, click on the Internal Monitors tab. Find the LT- Agents No Checkin for More than 30 days* monitor and double-click to open. Click on the Exclusions tab. Right-click in the Disabled Computers section and select the computer you want to exclude from this check. During Onboarding and each day servers are checked for roles and/or changes to roles. Tickets are generated with the details. This process was designed to keep you upto-date on any changes you may not be aware of and to use as validation for changes that may have been requested. The best solution to manage these tickets is to utilize your PSA to maintain the history. With the ConnectWise 6.0 plugin, ticket management can be used to close these tickets automatically after a specified number of days if they have not been reviewed. Servers are configured to perform a number of roles and the applications that are running on the server specify the particular server s role. What happens if an application or service that is installed to perform its specific role has been accidentally removed? If you are not monitoring the changes, you may start getting inundated with Help Desk tickets because the role that this server is responsible for is no longer performing this role. By monitoring any changes, you can be proactive and contact your client to indicate that the server role has changed and determine if the change was intended. Likewise, if a client has installed additional roles on an existing server that may conflict and now you are receiving Help Desk tickets because the server is crashing. Without these monitors notifying you of changes, it may take a considerable amount of time to locate the problem. Additionally, if the client asks you to remove applications that allow the server to perform certain functions, you can keep a history of the change for validation purposes if at some point the client comes back to you and says my server is not functioning. The golden rule for every business man is this: Put yourself in your customer s place. ~ Orison Swett Marden

5 Onboarding/Patching What Are These Alerts?? The Onboarding and Patching monitors will alert you to configuration issues that should have been addressed during your initial configuration. The purpose of these monitors is to notify you of important steps that were missed to get the desired outcome from LabTech. By ignoring these alerts, patching will not take place after you have approved patches, agents will not get deployed nor will agents be assigned to the appropriate service plan groups for monitoring. Performance Monitors To remediate these types of alerts, configuration needs to be completed at the location level. At the location level, assign Administrator Access on the Deployment & Defaults tab. On the Ignite tab, replace the Not Selected service plan value to something that is appropriate and on then click over to the Patching sub-tab, and select the desired patching days for servers, All performance monitors that are set to trigger are based on Microsoft s published best practices, so if something is alerting, it is exceeding the published threshold and should be investigated. Each of these alerts that do not auto reset once the threshold is lowered should be investigated and remediated. If any alerts that show a pattern of reoccurring, even if they reset, should also be investigated as both situations represent an issue based on performance. These performance monitors allow you to monitor your clients servers and workstations to identify potential problems such as malware spiking the CPU usage or excessive usage that the hardware can t support. Additionally, if a server or workstation continually exceeds the thresholds it gives you the opportunity to upsell your client to upgrade their systems. Imagine for a moment that you have turned off the performance monitors because you think they are noisy and you have ignored all alerts about CPU usage spiking on a client s server. Days later, Help Desk tickets are coming in, your client is complaining that his server is running too slow. You have turned off the performance monitors, so you no longer have a history of the CPU usage. Is it happening at peak times? All the time? Now, you have a client that is complaining about slowness and wants it fixed NOW. If you would have been using the performance monitors, it is likely that you would have received alerts that this particular machine was exceeding the Microsoft s published threshold allowing you to determine the cause long before your client submitted a Help Desk ticket. If it is an overutilized machine, you could have contacted the client and made him aware that the computer was consistently exceeding industry standard thresholds and made a sale to upgrade the computer. Performance monitors, when used with other monitors (e.g., sensor monitors), can help you diagnose the problem much quicker. For example, the CPU usage performance monitor has been sending alerts that CPU usage has exceeded 90% and the CPU Temperature has exceeded its threshold, this could be indicative of improper cooling. By being proactive, you can quickly identify the problem and correct it before disaster strikes! Did You Know? CPU spikes can be caused by excessive and continual usage, inadequate power supplies, improper cooling, running many programs at once and viruses resulting in system instability and spikes. A CPU spike can cause temporary or permanent damage to the CPU and motherboard.

6 Why Should I Care About Sensor Monitors? Sensor monitors were designed to help you see potential issues before they render a machine critical, such as elevated temperatures due to a clogged or failing fan. These items will go unnoticed by way of routine monitoring, such as with event logs. They are set to alert after the 3 rd failure and will auto-close if a condition clears. If a machine has been found to be causing alerts on a consistent basis with no concrete indication that there is a problem, the monitor can be overridden at the machine level. Failing machines can cost you and your client valuable time and money. A computer that overheats can cause costly damage and force you to abandon the computer and buy a new one or incur expensive repairs to fix it and this doesn t include the possible financial loss your client faces if a key computer goes down. By default, on new installations only servers will have sensor monitors. Don t fret, within a short while, the tickets will begin to auto-close and only the remaining issues that have not cleared will remain and can be investigated. These hardware based sensors vary from manufacturer to manufacturer and report hardware information such as: CPU Temperature Drive Temperature CPU voltage Power Supply Voltage Battery Voltage on Laptops Fan Speeds Let s assume that you are receiving alerts that the CPU temperature has exceeded the allotted threshold on one of your client s computers. What do you do? Well, there are various reasons why the temperature is exceeding the manufacturer s specifications: poor ventilation, a bad fan, defective fan, clogged with dust and dirt, the computer running at a higher than normal capacity, etc. Investigate and determine if there is in fact a problem. You find that the computer is clogged with dust and dirt If sensor monitors are desired on desktops/laptops, you can set the following properties: _sysmonsensordisabledesktop and _sysmonsensordisablelaptop properties to 0 (Dashboard > Config > Configurations > Properties). and very little ventilation. Clean the computer and move it to a better location where it gets more air. No more alerts. Ta Da! Problem fixed! Now, let s assume you turned off the sensor monitors and now you get a call to the Help Desk that the computer is not operable and only after you spend a couple of hours troubleshooting, you come to the conclusion that the motherboard and CPU have been rendered useless because of overheating. Now, you have to restore data from backup for the client because they lost valuable data and you have to stage another computer. Remember, it is always best to be proactive and not reactive. Would you ignore your car if it was overheating? Sensors tab on the agent (Devices > Sensors) shows all sensors that have been detected on this machine.

7 What Can Blacklisted Events Do For Me? Events can indicate a potential security risk or critical system failure. By default, there are three monitors that monitor blacklisted events: Exchange Server, Critical and Warning Events and Informational Events. These are important because these events are listed within the blacklist by specific ID and/or message and indicate true issues. These issues should be investigated and resolved. Events can be removed from the blacklist if you feel they are not necessary. By doing so, alerts will no longer be generated for that event. You can also add application specific events to alert you when a potential issue may arise. For example, you could create a monitor that monitors an event ID or message that indicates a backup did not occur. You could always go directly to the backup software and check but you can eliminate this step and have a monitor alert you via a ticket if a backup did not occur. Let s assume you were not verifying backups and something happened and required you to restore from backup. What are you going say to your client when you have to tell them that the last successful backup you have is a week ago and all of their data is lost? Guarantee it s not going to be a pleasant experience! It doesn t need Software was Uninstalled...so? The SW Uninstalled monitor looks for applications that have been removed from computers but it does exclude common apps such as Java, Adobe, etc. that are typically removed when updates are performed. There are a few reasons why you should want to be alerted when software is uninstalled. Let s assume Ollie at Client XYZ has uninstalled an application that is a key business app for your client. You start getting flooded with Help Desk tickets because all of the users are getting errors trying to access the app. Your client calls up angry because he thinks the update you did yesterday broke something even though you know it is unrelated. Now, you spend a few minutes to a few hours finding the issue and trying to convince the to be backup jobs you are monitoring, it could be other applications that your client absolutely has to have to keep their business running. Managing these alerts is simple as fixing the issue and the alert will stop. To add or remove events from the Event Blacklist: To add: Go to the Dashboard > Config > Configurations > Event Blacklist and enter the Event ID, Source, Message, Event Log Name, Event Type and the Category. To remove: Simply right-click on the event and select Delete. client that it was not your update that caused the problem. So, let s change the scenario and turn that monitor back on. Ollie uninstalls the software and your monitor alerts you that software has been uninstalled. You contact your client (before he contacts you) and indicate that you have been alerted that their key business app has been uninstalled. The client asks you to reinstall the software and that they will look into the incident on their end. He then thanks you for being proactive because it is a key business app and without it, it would cause financial implications for his business. Let s look at it from another angle. If a client has requested an application be uninstalled, the monitor will create ticket that you can use to validate that the request was completed. This monitor consolidates tickets for each machine so you are not notified via more than one ticket per machine if any applications are removed. If specific machines need to be excluded, you can add them to the exclusions list on the monitor. From the Monitors screen, click on the Internal Monitors tab. Find the SW- Uninstalled monitor and double-click to open. Click on the Exclusions tab. Right-click in the Disabled Computers section and select the computer you want to exclude from this check.

8 Applications Good or Bad? In a perfect world, you wouldn t have to classify applications good or bad. Unfortunately, in the real world you do. Users can unintentionally install potential harmful applications that threaten your network security or your client s network security. The SW-Unclassified Apps monitor looks for applications that have not been whitelisted or blacklisted and allows you to classify them good or bad. You can then alert on the bad ones. This monitor consolidates tickets for each machine so you are only notified with one ticket per machine if any unclassified applications are found. By monitoring applications that have been installed and are not classified you can reduce the risk of any harmful applications threatening your network or your client s network. Applications should be whitelisted/ blacklisted during Onboarding as much as possible to eliminate many future tickets. Additionally, if there are machines that should be excluded, they should be excluded at the monitor level on the Exclusions tab. Applications can be whitelisted and blacklisted in the Dashboard > Config > Configurations and then selecting the appropriate blacklist or whitelist tab. You can also add to the whitelist/blacklist by right-clicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. Why Should I Care if Auto Services Have Stopped? The SVC-Auto Services Stopped monitor reports on services that have stopped but are set to an automatic start state. If they are automatic start, should I really care about them? The answer is Yes and here s why. Many business applications are service driven. If these services are not restarted, you will start receiving Help Desk tickets because the application is not working. The beauty of this monitor is it keeps you from having to identify each and every service that needs to be running. What it does, is run a script to restart the stopped service and does multiple passes and then reports on success. Now, for services that are set to automatic start by the application installer but really only start once the application is launched, these can be excluded by adding them to the Services Blacklist. Additionally, if there are machines that should be excluded, they should be excluded at the monitor levels on the Exclusions tab. Services can be blacklisted in the Dashboard > Config > Configurations > Service Blacklist or by right-clicking on the service in the Service tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. It is easier to do a job right than to explain why you didn t. ~ Martin Van Buren

9 Why Do I Want to Monitor Software Installations? Software may contain viruses, spyware, key loggers or other things that can compromise security, which can cause a loss of valuable data as well as considerable financial loss. Additionally, unlicensed software can be installed without your or your client s knowledge which could potentially cost your client thousands of dollars in copyright infringement fines. So why do you want to monitor software installations? Let s assume for a moment that Ollie Operator that works for your client just installed this cool add-on for Microsoft Word. LabTech has detected the change as newly installed software and reported it via an automatically generated ticket. A few days later, your client calls your Help Desk about Word crashing repeatedly. Within minutes, your technician has tracked it down to this cool add-on because a ticket had been generated for it just days prior Applications can be blacklisted in the Dashboard > Config > Configurations > App Blacklist or by right-clicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. and is in the history. The add-on can be quickly removed using LabTech and the application blacklisted so you are alerted in the future if it has been installed again. What if you weren t monitoring software installations and the same event occurs? How long do you think it would take to locate the problem? Could be hours, could be days or maybe not at all. Now, let s say the same client has 100 agents and Ollie Operator is doing his own thing again. He just installed the newest version of Microsoft Office Professional on all of the agents. At this point, you do not know if it is legal software or if it is pirated. If it is pirated, this could cost your client thousands of dollars in copyright infringement fines should the software company ever find out, say through a disgruntled employee (it s happened before). This gives you the chance to show your worth to your client. Send your client a letter that you have detected that You can keep track of the licensing information on the License Management tab of the client. ABC Software has been installed on all of his agents. Ask the client to please provide licensing information so in the event of a failure, recovery is accelerated by having the licensing information immediately available. Include information about piracy and that companies are subject to significant fines for copyright infringement if software is found on computers that is not licensed. By communicating with your client, you are showing that you are looking out for their best interests. It makes for happy clients. Happy clients send checks. This is all about being proactive, the more proactive you are the less Help Desk tickets you will receive and the more time you have to build your business or to improve your business. Not so Fun Facts: Did you know that dealing with viruses, spyware, PC theft and other computer related crimes costs U.S. businesses a staggering $67.2 billion a year (according to the FBI in 2006). The successful man is the one that finds out what is the matter with his business before his competitors do. ~ Roy L. Smith

5 Reasons Your Business Needs Network Monitoring

5 Reasons Your Business Needs Network Monitoring 5 Reasons Your Business Needs Network Monitoring Intivix.com (415) 543 1033 5 REASONS YOUR BUSINESS NEEDS NETWORK MONITORING Your business depends on the health of your network for office productivity.

More information

Five Reasons Your Business Needs Network Monitoring

Five Reasons Your Business Needs Network Monitoring Five Reasons Your Business Needs Network Monitoring cognoscape.com Five Reasons Your Business Needs Network Monitoring Your business depends on the health of your network for office productivity. Most

More information

LabTech Ignite Internal Monitors

LabTech Ignite Internal Monitors LabTech Ignite LABTECH IGNITE INTERNAL MONITORS 1 Overview... 1 Important Notes about... 2 Default... 3... 3 Backups... 4 CIM (Hypervisor Hardware)... 4 Disk... 5 ESX (Hypervisor Performance)... 7 Events...

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery

Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery 1 Introduction As businesses emerge from the difficult economic recession, they need to continue the low-cost and highproductivity practices that allowed them to successfully weather the storm. Specifically

More information

EVENT LOG MANAGEMENT...

EVENT LOG MANAGEMENT... Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department managed services ebook Meet the Always On IT Department meet the always on it department PROPHET Business Group 1 MEET THE ALWAYS ON IT DEPARTMENT As IT gets more complicated it gets easier for the daily

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

TABLE OF CONTENTS. 1...Introducing N-central 3...What You Can Do With N-central 4...MONITOR: Proactively Identify Potential Problems

TABLE OF CONTENTS. 1...Introducing N-central 3...What You Can Do With N-central 4...MONITOR: Proactively Identify Potential Problems TABLE OF CONTENTS 1...Introducing N-central 3...What You Can Do With N-central 4...MONITOR: Proactively Identify Potential Problems 5... Centralized Management Console 6... Automatic Discovery 7... Cuzomizable

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

How to Keep Your Computer Network Up, Running, and Problem FREE

How to Keep Your Computer Network Up, Running, and Problem FREE How to Keep Your Computer Network Up, Running, and Problem FREE Are you frustrated with on-going computer problems - slow computer, error messages, viruses, spyware, printers not working, applications

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

www.datatechhosting.com

www.datatechhosting.com Hosting and Cloud Services Customer Service Level Agreement (SLA) Welcome to the Clustered Cloud Hosted Services Community. We are happy to have you aboard and look forward to assisting you with all your

More information

PC Proactive Solutions Technical View

PC Proactive Solutions Technical View PC Proactive Solutions Technical View PC Proactive Solutions Technicians View The following pages briefly describe our technicians view of our proactive management utility. Our software application is

More information

IT Support & Maintenance Contract

IT Support & Maintenance Contract IT Support & Maintenance Contract This document has been produced by STOCK IT Ltd, www.stockit.co.uk, an IT company offering technology advice & support for small businesses. Company Registration No: 9060944

More information

Proactive. Professional. IT Support and Remote Network Monitoring.

Proactive. Professional. IT Support and Remote Network Monitoring. Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

See all, manage all is the new mantra at the corporate workplace today.

See all, manage all is the new mantra at the corporate workplace today. See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that

More information

Monitoring, Managing, Remediating

Monitoring, Managing, Remediating MANAGED SERVICES Packages include: Fault management Troubleshooting & escalation Proactive monitoring WAN status 800# Incident & inventory management Quarterly reviews Managed device database Online dashboard

More information

VMware and VSS: Application Backup and Recovery

VMware and VSS: Application Backup and Recovery Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP

More information

PacketTrap One Resource for Managed Services

PacketTrap One Resource for Managed Services Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It

More information

Capacity planning with Microsoft System Center

Capacity planning with Microsoft System Center Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

How To Manage A Patch Management Program

How To Manage A Patch Management Program Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.

More information

Managed Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures

Managed Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures Overview Servers, Exchange, Help Desk, and Citrix Infrastructures Prepared By: Envision Information Technologies Last Modified: Thursday, August 28, 2014 Table of Contents Table of Contents... 2 EIT Contacts...

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 [email protected] www.vitalvoiceanddata.com Table of Contents Proprietary Notice & Non-Disclosure

More information

Your guide to choosing an IT support provider

Your guide to choosing an IT support provider Your guide to choosing an IT support provider T: 08452 41 41 55 Contents Introduction 3 IT and business continuity 4 About managed services 5 Modular vs packaged support 6 Checklist of supplier questions

More information

10 How to Accomplish SaaS

10 How to Accomplish SaaS 10 How to Accomplish SaaS When a business migrates from a traditional on-premises software application model, to a Software as a Service, software delivery model, there are a few changes that a businesses

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.

LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation. LANDesk Patch and Compliance Common Troubleshooting steps for Vulnerability Remediation. Contents Introduction... 3 Scope... 3 Assumptions... 3 Logs used in Troubleshooting... 4 Vulscan Switches... 4 The

More information

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR EMAIL ADDRESS HAS CHANGED!

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR EMAIL ADDRESS HAS CHANGED! Computer Housecalls 3266 Lupine Dr Indianapolis IN 46224 317.388.1989 [email protected] www.computerhousecall.com HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Novell ZENworks Asset Management

Novell ZENworks Asset Management Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Configuring ehealth Application Response to Monitor Web Applications

Configuring ehealth Application Response to Monitor Web Applications Focus on Setup Configuring ehealth Application Response to Monitor Web Applications ehealth Application Response (AR) helps you manage the performance of your Web applications by monitoring response times

More information

LabTech Integration Instructions

LabTech Integration Instructions LabTech Integration Instructions Overview... 2 Requirements... 2 Webroot Activation... 3 Plug-In Installation... 5 Global Site Manager Integration... 6 Usage... 8 Information by Computer/Device... 8 Reference...

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware. WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure

More information

MySabre with Sabre VPN

MySabre with Sabre VPN MySabre with Sabre VPN MIGRATION / INSTALLATION GUIDE T a b l e o f C o n t e n t s Table of Contents... ii Introduction... 3 Before Installing... 3 New MySabre User Installation... 4 Appendix A ActiveX

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

vrealize Operations Manager User Guide

vrealize Operations Manager User Guide vrealize Operations Manager User Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

21 Questions you should ask your IT service provider Before hiring them to support your network

21 Questions you should ask your IT service provider Before hiring them to support your network 21 Questions you should ask your IT service provider Before hiring them to support your network Customer Service: Q1: Do they answer their phones live or do you always have to leave a voice mail and wait

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

Intrado Call Handling CPE. Standard Maintenance and Support Services ( MSS Terms )

Intrado Call Handling CPE. Standard Maintenance and Support Services ( MSS Terms ) Intrado Call Handling CPE Standard Maintenance and Support Services ( MSS Terms ) These Maintenance and Support Services terms ( MSS Terms ) describe the current offerings for maintenance and support services

More information

PEPPER PACK USER GUIDE

PEPPER PACK USER GUIDE PEPPER PACK USER GUIDE Version 1.0 INTRODUCTION The Spiceworks Help Desk module is an excellent system for managing IT support requests. However, it lacks a few features that could really help IT technicians

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Why Corporations Need to Automate IT Systems Management

Why Corporations Need to Automate IT Systems Management White Paper Why Corporations Need to Automate IT Systems Management In today s competitive business environment, corporations across all industries are looking to provide quality products and services

More information

PAR EverServ Services

PAR EverServ Services PAR EverServ Services Maximize your return on investment with PAR EverServ Services For more than 30 years, ParTech, Inc. (PAR) has been designing, integrating, and managing leading-edge technology systems

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

Operating Instructions - Recovery, Backup and Troubleshooting Guide

Operating Instructions - Recovery, Backup and Troubleshooting Guide Personal Computer Operating Instructions - Recovery, Backup and Troubleshooting Guide Please create your recovery discs immediately after setup. Please read this manual carefully before using your product.

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Installation Manual v2.0.0

Installation Manual v2.0.0 Installation Manual v2.0.0 Contents ResponseLogic Install Guide v2.0.0 (Command Prompt Install)... 3 Requirements... 4 Installation Checklist:... 4 1. Download and Unzip files.... 4 2. Confirm you have

More information

Understand Backup and Recovery Methods

Understand Backup and Recovery Methods Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows

More information

Microsoft Windows Installation and Troubleshooting Guide

Microsoft Windows Installation and Troubleshooting Guide Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT

More information

Release Notes OPC-Server V3 Alarm Event for High Availability

Release Notes OPC-Server V3 Alarm Event for High Availability Manual-No. 2CDC 125 027 K0201 Release Notes OPC-Server V3 Alarm Event for High Availability ABB STOTZ-KONTAKT GmbH, Eppelheimer Straße 82, 69123 Heidelberg, http://www.abb.de/stotz-kontakt Please read

More information

Backup & Disaster Recovery Options

Backup & Disaster Recovery Options Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Call us today 1300 724 599. Managed IT Services. Proactive, flexible and affordable

Call us today 1300 724 599. Managed IT Services. Proactive, flexible and affordable Call us today 1300 724 599 Managed IT Services Proactive, flexible and affordable We believe technology is at its best when it s invisible. When you can focus on the task you are achieving, not the technology

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

What s New Guide. Active Administrator 6.0

What s New Guide. Active Administrator 6.0 What s New Guide Active Administrator 6.0 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

WHITE PAPER. Avoiding the Pitfalls when Transitioning into Managed Services. By Nick Cavalancia

WHITE PAPER. Avoiding the Pitfalls when Transitioning into Managed Services. By Nick Cavalancia Avoiding the Pitfalls when Transitioning into Managed Services By Nick Cavalancia As you begin your journey transitioning into managed services, you ll quickly find the transition is more about how you

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Top 10 Considerations for Selecting the Right RMM Solution

Top 10 Considerations for Selecting the Right RMM Solution 1 Introduction The most successful IT service providers are those that find ways to differentiate themselves from the competition and consistently strive to retain loyal customers. In an increasingly crowded

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

CDM Software Asset Management (SWAM) Capability

CDM Software Asset Management (SWAM) Capability CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

Command Center Handbook

Command Center Handbook Command Center Handbook P r o a c t i v IT e Monitoring Protecting Business Value Through Operational Excellence Abdul A Jaludi Copyright 2014 Abdul A Jaludi [email protected] www.tag-mc.net All rights reserved.

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

DAY OF TESTING GUIDE. Contact Information. Websites. Please do not bookmark the Proctor Interface or the Student Interface.

DAY OF TESTING GUIDE. Contact Information. Websites. Please do not bookmark the Proctor Interface or the Student Interface. DAY OF TESTING GUIDE Contact Information General Contact [email protected] (212) 217-0700 ITS Technical Support Monday-Friday, 8AM-8PM ET (800) 514-8494 Outside of business and weekends, press 1 to be taken

More information

Email Set Up Instructions

Email Set Up Instructions Email Set Up Instructions Email Support...1 Important Fist Steps for all Users...2 DO YOU KNOW YOUR USERNAME AND PASSWORD?...2 Install the Despaminator CompanyV Certificate...2 What is Your Mail Client?...2

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

SystemGuard. Brief Description. Benefits. SystemGuard Main Window

SystemGuard. Brief Description. Benefits. SystemGuard Main Window SystemGuard Issue May 2009 Product SystemGuard Pages 8 Brief Description SystemGuard is an application software (published under freeware terms and conditions) from Fujitsu Technology Solutions which can

More information

DBA 101: Best Practices All DBAs Should Follow

DBA 101: Best Practices All DBAs Should Follow The World s Largest Community of SQL Server Professionals DBA 101: Best Practices All DBAs Should Follow Brad M. McGehee Microsoft SQL Server MVP Director of DBA Education Red Gate Software www.bradmcgehee.com

More information

How To Manage Your Information Systems At Aerosoft.Com

How To Manage Your Information Systems At Aerosoft.Com Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

ZCorum s Ask a Broadband Expert Series:

ZCorum s Ask a Broadband Expert Series: s Ask a Broadband Expert Series: The Advantages of Network Virtualization An Interview with Peter Olivia, Director of Systems Engineering ZCorum 1.800.909.9441 4501 North Point Parkway, Suite 125 Alpharetta,

More information