Why Should I Onboard 1-2 Clients at a Time?



Similar documents
5 Reasons Your Business Needs Network Monitoring

Five Reasons Your Business Needs Network Monitoring

LabTech Ignite Internal Monitors

Managed Security Services SLA Document. Response and Resolution Times

Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery

EVENT LOG MANAGEMENT...

There are numerous ways to access monitors:

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

TABLE OF CONTENTS. 1...Introducing N-central 3...What You Can Do With N-central 4...MONITOR: Proactively Identify Potential Problems

Information Technology Solutions. Managed IT Services

How to Keep Your Computer Network Up, Running, and Problem FREE

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS


PC Proactive Solutions Technical View

IT Support & Maintenance Contract

Proactive. Professional. IT Support and Remote Network Monitoring.

Managed Antivirus Quick Start Guide

See all, manage all is the new mantra at the corporate workplace today.

Monitoring, Managing, Remediating

VMware and VSS: Application Backup and Recovery

PacketTrap One Resource for Managed Services

Capacity planning with Microsoft System Center

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

How To Manage A Patch Management Program

Managed Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures

MTA Course: Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data ext 301

Your guide to choosing an IT support provider

10 How to Accomplish SaaS

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR ADDRESS HAS CHANGED!

ScoMIS Encryption Service

Novell ZENworks Asset Management

Hosting Users Guide 2011

Configuring ehealth Application Response to Monitor Web Applications

LabTech Integration Instructions

MAXIMUM PROTECTION, MINIMUM DOWNTIME

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: f:

MySabre with Sabre VPN

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

vrealize Operations Manager User Guide

Business Virtualization

Compliance Rule Sets in MaaS360

21 Questions you should ask your IT service provider Before hiring them to support your network

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Intrado Call Handling CPE. Standard Maintenance and Support Services ( MSS Terms )

PEPPER PACK USER GUIDE

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Why Corporations Need to Automate IT Systems Management

PAR EverServ Services

Information Technology Services

Managed Service Plans

MALWAREBYTES PLUGIN DOCUMENTATION

Operating Instructions - Recovery, Backup and Troubleshooting Guide

MSP Service Matrix. Servers

Airtel PC Secure Trouble Shooting Guide

Administrator's Guide

Installation Manual v2.0.0

Understand Backup and Recovery Methods

Microsoft Windows Installation and Troubleshooting Guide

Release Notes OPC-Server V3 Alarm Event for High Availability

Backup & Disaster Recovery Options

Symantec AntiVirus Corporate Edition Patch Update

Enterprise Remote Control 5.6 Manual

Best Practices Report

Charter Business Desktop Security Administrator's Guide

Service Catalog. it s Managed Plan Service Catalog

Call us today Managed IT Services. Proactive, flexible and affordable

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

What s New Guide. Active Administrator 6.0

WHITE PAPER. Avoiding the Pitfalls when Transitioning into Managed Services. By Nick Cavalancia

Contents. McAfee Internet Security 3

Top 10 Considerations for Selecting the Right RMM Solution

Actualtests.C questions

CDM Software Asset Management (SWAM) Capability

Command Center Handbook

User Manual. Copyright Rogev LTD

DAY OF TESTING GUIDE. Contact Information. Websites. Please do not bookmark the Proctor Interface or the Student Interface.

Set Up Instructions

Symantec Mail Security for Domino

SystemGuard. Brief Description. Benefits. SystemGuard Main Window

DBA 101: Best Practices All DBAs Should Follow

How To Manage Your Information Systems At Aerosoft.Com

ANDRA ZAHARIA MARCOM MANAGER

ZCorum s Ask a Broadband Expert Series:

Transcription:

Ignite Overview LabTech Ignite is a set of preconfigured, out-of-the-box functions built into the LabTech remote monitoring and management (RMM) platform and designed to get your business up and running in no time. Developed and built by IT managed services industry experts and following Microsoft best practices, LabTech Ignite sets the standard for simple IT services delivery incorporating mission-critical monitoring packs, industry defined thresholds, auto-fix scripts, automated patch management and much more! LabTech Ignite allows you to turn on and off functionality so you can decide what level of functionality is best for your environment. Why Should I Onboard 1-2 Clients at a Time? A methodical approach should be taken when onboarding new clients to help better manage overall ticket creation. This allows you to adjust monitor conditions where required, whitelist or blacklist software, as well as events, services and processes. By onboarding one or two clients at a time and taking care of these tickets before onboarding additional clients, it will save you time in the end. Here s why: LabTech has provided you with 100+ internal monitors to provide you with valuable information (more on this later). When you onboard a new client, it is likely that every machine will generate 7-8 tickets EACH for a variety of reasons (e.g., new software, services, processes, events, sensors, etc.). So, if this client has 30 computers, approximately 240 tickets will be generated that need to be remediated. Now, say you have 100 clients with 30 computers each and you onboarded all of them, that s a whopping 24,000 tickets! Are you thinking you d rather just do it all at once and get it over with? Well here s the good news, if you onboard only one or two clients at a time and remediate those tickets you will drastically reduce the number of total tickets generated. How, you ask? With a little bit of planning! Here s an example: You have just onboarded the two clients and 60 of the tickets indicate that new software has been installed (e.g., Microsoft Office Professional Plus 2010). Add this software with the exact name to your App Whitelist and now you have eliminated that ticket for all of your remaining clients (3000 tickets just eliminated). Applications can be whitelisted or blacklisted in the Dashboard > Config > Configurations > App Whitelist/App Blacklist or by rightclicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Whitelist/Blacklist. The same applies for services and processes. A little preparation goes a long way. If you know what applications are on your clients computers, you can add these before you onboard and eliminate even more tickets! LabTech has provided you with 1000s of whitelisted software, services and processes; however, as new releases of 3 rd party software come out these applications may or may not be already in the whitelist for you. You may have to take the few seconds of time to add them to your whitelist. Success depends upon previous preparation, and without such preparation there is sure to be failure. - Confucius

Why Should I Create Tickets for Everything? One answer, Information. Creating tickets for everything provides a fullsized stream of information about your clients machines and networks and can be used to show root causes for some problems, predict new problems before they occur and simplify troubleshooting for technicians. The trick is learning to manage these alerts and separate the more important items from the lesser important ones is critical to being able to provide an acceptable level of client service and satisfaction. The overall goal is to maintain details to help in justifying your service delivery (remember, show your worth so the checks keep coming), as well as to help a technician pinpoint trouble in Top 10 Highest Ticket Producers an efficient and quick manner. Doing the best at this moment puts you in the best place for the next moment. ~ Oprah Winfrey The following table represents the ten highest ticket producers from LabTech. On the following pages, we will explain why these monitors are important, where they come from and how to better manage them to provide valid information versus noise in your PSA system. While this list is not all-inclusive, it was generated from support requests into the LabTech Help Desk. Monitor or Type LT-No Agent Checking in (30 Days) Change Management Tickets LabTech Onboarding/Patching Performance Monitors Sensor Monitors EV Blacklisted Events SW-Uninstalled SW Installed New SW Unclassified Apps SVC-Auto Services Stopped What it Does This alert notifies you of any machine that has not checked into the LabTech server for 30 days. Upon onboarding and each day, servers are checked for roles and or changes to roles and tickets are generated with the details. The monitors alert you to issues that should have been addressed within Lab- Tech during location on-boarding by a technician. These monitor specific performance variables on workstations and servers, as well as by server roles. These monitors monitor specific motherboard sensors for conditions that are excessive. Currently three monitors monitor the blacklist event table for alerts that match entries within the table. They are Critical and Warning Events, Exchange Events and Informational Events that all match the list. This monitor looks for applications that have been removed from computers but excludes common apps such as Java, Adobe, etc. that frequently do a removal when they are updated. This monitor looks for applications that have been added to computers, but excludes common apps such as Java, Adobe, etc. that are common and updated often. This monitor looks for applications that have been installed at some point on the various machines and lets you either whitelist or blacklist the application as either known good or bad. This monitor runs each hour looking for services that are reported stopped, but set to an automatic start state.

Why Should I Care if an Agent hasn t Checked In? The LabTech No Agent Checking In (30 Days) monitor will alert you to notify you of any machine that has not checked into the server for 30 days. Why is this important? The assumption is that you are providing a monthly service to your clients and if a machine has not reported in within the month, you were not able to perform what is required of you to deliver your service. Less work for you, right? Well, let s look at it from another point of view. Let s assume that every quarter you meet with your client and the client s patch health score is not up to par. Those computers that are offline and not checking in are affecting the reporting. Now, you have to explain to your client why the patch health score is low, why this computer hasn t been patched, etc. Of course, you could tell the client that you couldn t patch the computer because it has been turned off for more than 30 days. Oh, but wait, the client is paying you to deliver a service. Do you see where we are going here? Again, being proactive will always score you more brownie points than being reactive. When a machine has been off for more than 30 days, contact the client and tell them that there is a machine that has been off for several Server Roles Changing, Who Cares? days and you are unable to patch, backup or run antivirus against it. This will be another step to validating your worth with your client. If it is a computer that is turned off for a reason, you can exclude it at the monitor level so the machine will be ignored. From the Monitors screen, click on the Internal Monitors tab. Find the LT- Agents No Checkin for More than 30 days* monitor and double-click to open. Click on the Exclusions tab. Right-click in the Disabled Computers section and select the computer you want to exclude from this check. During Onboarding and each day servers are checked for roles and/or changes to roles. Tickets are generated with the details. This process was designed to keep you upto-date on any changes you may not be aware of and to use as validation for changes that may have been requested. The best solution to manage these tickets is to utilize your PSA to maintain the history. With the ConnectWise 6.0 plugin, ticket management can be used to close these tickets automatically after a specified number of days if they have not been reviewed. Servers are configured to perform a number of roles and the applications that are running on the server specify the particular server s role. What happens if an application or service that is installed to perform its specific role has been accidentally removed? If you are not monitoring the changes, you may start getting inundated with Help Desk tickets because the role that this server is responsible for is no longer performing this role. By monitoring any changes, you can be proactive and contact your client to indicate that the server role has changed and determine if the change was intended. Likewise, if a client has installed additional roles on an existing server that may conflict and now you are receiving Help Desk tickets because the server is crashing. Without these monitors notifying you of changes, it may take a considerable amount of time to locate the problem. Additionally, if the client asks you to remove applications that allow the server to perform certain functions, you can keep a history of the change for validation purposes if at some point the client comes back to you and says my server is not functioning. The golden rule for every business man is this: Put yourself in your customer s place. ~ Orison Swett Marden

Onboarding/Patching What Are These Alerts?? The Onboarding and Patching monitors will alert you to configuration issues that should have been addressed during your initial configuration. The purpose of these monitors is to notify you of important steps that were missed to get the desired outcome from LabTech. By ignoring these alerts, patching will not take place after you have approved patches, agents will not get deployed nor will agents be assigned to the appropriate service plan groups for monitoring. Performance Monitors To remediate these types of alerts, configuration needs to be completed at the location level. At the location level, assign Administrator Access on the Deployment & Defaults tab. On the Ignite tab, replace the Not Selected service plan value to something that is appropriate and on then click over to the Patching sub-tab, and select the desired patching days for servers, All performance monitors that are set to trigger are based on Microsoft s published best practices, so if something is alerting, it is exceeding the published threshold and should be investigated. Each of these alerts that do not auto reset once the threshold is lowered should be investigated and remediated. If any alerts that show a pattern of reoccurring, even if they reset, should also be investigated as both situations represent an issue based on performance. These performance monitors allow you to monitor your clients servers and workstations to identify potential problems such as malware spiking the CPU usage or excessive usage that the hardware can t support. Additionally, if a server or workstation continually exceeds the thresholds it gives you the opportunity to upsell your client to upgrade their systems. Imagine for a moment that you have turned off the performance monitors because you think they are noisy and you have ignored all alerts about CPU usage spiking on a client s server. Days later, Help Desk tickets are coming in, your client is complaining that his server is running too slow. You have turned off the performance monitors, so you no longer have a history of the CPU usage. Is it happening at peak times? All the time? Now, you have a client that is complaining about slowness and wants it fixed NOW. If you would have been using the performance monitors, it is likely that you would have received alerts that this particular machine was exceeding the Microsoft s published threshold allowing you to determine the cause long before your client submitted a Help Desk ticket. If it is an overutilized machine, you could have contacted the client and made him aware that the computer was consistently exceeding industry standard thresholds and made a sale to upgrade the computer. Performance monitors, when used with other monitors (e.g., sensor monitors), can help you diagnose the problem much quicker. For example, the CPU usage performance monitor has been sending alerts that CPU usage has exceeded 90% and the CPU Temperature has exceeded its threshold, this could be indicative of improper cooling. By being proactive, you can quickly identify the problem and correct it before disaster strikes! Did You Know? CPU spikes can be caused by excessive and continual usage, inadequate power supplies, improper cooling, running many programs at once and viruses resulting in system instability and spikes. A CPU spike can cause temporary or permanent damage to the CPU and motherboard.

Why Should I Care About Sensor Monitors? Sensor monitors were designed to help you see potential issues before they render a machine critical, such as elevated temperatures due to a clogged or failing fan. These items will go unnoticed by way of routine monitoring, such as with event logs. They are set to alert after the 3 rd failure and will auto-close if a condition clears. If a machine has been found to be causing alerts on a consistent basis with no concrete indication that there is a problem, the monitor can be overridden at the machine level. Failing machines can cost you and your client valuable time and money. A computer that overheats can cause costly damage and force you to abandon the computer and buy a new one or incur expensive repairs to fix it and this doesn t include the possible financial loss your client faces if a key computer goes down. By default, on new installations only servers will have sensor monitors. Don t fret, within a short while, the tickets will begin to auto-close and only the remaining issues that have not cleared will remain and can be investigated. These hardware based sensors vary from manufacturer to manufacturer and report hardware information such as: CPU Temperature Drive Temperature CPU voltage Power Supply Voltage Battery Voltage on Laptops Fan Speeds Let s assume that you are receiving alerts that the CPU temperature has exceeded the allotted threshold on one of your client s computers. What do you do? Well, there are various reasons why the temperature is exceeding the manufacturer s specifications: poor ventilation, a bad fan, defective fan, clogged with dust and dirt, the computer running at a higher than normal capacity, etc. Investigate and determine if there is in fact a problem. You find that the computer is clogged with dust and dirt If sensor monitors are desired on desktops/laptops, you can set the following properties: _sysmonsensordisabledesktop and _sysmonsensordisablelaptop properties to 0 (Dashboard > Config > Configurations > Properties). and very little ventilation. Clean the computer and move it to a better location where it gets more air. No more alerts. Ta Da! Problem fixed! Now, let s assume you turned off the sensor monitors and now you get a call to the Help Desk that the computer is not operable and only after you spend a couple of hours troubleshooting, you come to the conclusion that the motherboard and CPU have been rendered useless because of overheating. Now, you have to restore data from backup for the client because they lost valuable data and you have to stage another computer. Remember, it is always best to be proactive and not reactive. Would you ignore your car if it was overheating? Sensors tab on the agent (Devices > Sensors) shows all sensors that have been detected on this machine.

What Can Blacklisted Events Do For Me? Events can indicate a potential security risk or critical system failure. By default, there are three monitors that monitor blacklisted events: Exchange Server, Critical and Warning Events and Informational Events. These are important because these events are listed within the blacklist by specific ID and/or message and indicate true issues. These issues should be investigated and resolved. Events can be removed from the blacklist if you feel they are not necessary. By doing so, alerts will no longer be generated for that event. You can also add application specific events to alert you when a potential issue may arise. For example, you could create a monitor that monitors an event ID or message that indicates a backup did not occur. You could always go directly to the backup software and check but you can eliminate this step and have a monitor alert you via a ticket if a backup did not occur. Let s assume you were not verifying backups and something happened and required you to restore from backup. What are you going say to your client when you have to tell them that the last successful backup you have is a week ago and all of their data is lost? Guarantee it s not going to be a pleasant experience! It doesn t need Software was Uninstalled...so? The SW Uninstalled monitor looks for applications that have been removed from computers but it does exclude common apps such as Java, Adobe, etc. that are typically removed when updates are performed. There are a few reasons why you should want to be alerted when software is uninstalled. Let s assume Ollie at Client XYZ has uninstalled an application that is a key business app for your client. You start getting flooded with Help Desk tickets because all of the users are getting errors trying to access the app. Your client calls up angry because he thinks the update you did yesterday broke something even though you know it is unrelated. Now, you spend a few minutes to a few hours finding the issue and trying to convince the to be backup jobs you are monitoring, it could be other applications that your client absolutely has to have to keep their business running. Managing these alerts is simple as fixing the issue and the alert will stop. To add or remove events from the Event Blacklist: To add: Go to the Dashboard > Config > Configurations > Event Blacklist and enter the Event ID, Source, Message, Event Log Name, Event Type and the Category. To remove: Simply right-click on the event and select Delete. client that it was not your update that caused the problem. So, let s change the scenario and turn that monitor back on. Ollie uninstalls the software and your monitor alerts you that software has been uninstalled. You contact your client (before he contacts you) and indicate that you have been alerted that their key business app has been uninstalled. The client asks you to reinstall the software and that they will look into the incident on their end. He then thanks you for being proactive because it is a key business app and without it, it would cause financial implications for his business. Let s look at it from another angle. If a client has requested an application be uninstalled, the monitor will create ticket that you can use to validate that the request was completed. This monitor consolidates tickets for each machine so you are not notified via more than one ticket per machine if any applications are removed. If specific machines need to be excluded, you can add them to the exclusions list on the monitor. From the Monitors screen, click on the Internal Monitors tab. Find the SW- Uninstalled monitor and double-click to open. Click on the Exclusions tab. Right-click in the Disabled Computers section and select the computer you want to exclude from this check.

Applications Good or Bad? In a perfect world, you wouldn t have to classify applications good or bad. Unfortunately, in the real world you do. Users can unintentionally install potential harmful applications that threaten your network security or your client s network security. The SW-Unclassified Apps monitor looks for applications that have not been whitelisted or blacklisted and allows you to classify them good or bad. You can then alert on the bad ones. This monitor consolidates tickets for each machine so you are only notified with one ticket per machine if any unclassified applications are found. By monitoring applications that have been installed and are not classified you can reduce the risk of any harmful applications threatening your network or your client s network. Applications should be whitelisted/ blacklisted during Onboarding as much as possible to eliminate many future tickets. Additionally, if there are machines that should be excluded, they should be excluded at the monitor level on the Exclusions tab. Applications can be whitelisted and blacklisted in the Dashboard > Config > Configurations and then selecting the appropriate blacklist or whitelist tab. You can also add to the whitelist/blacklist by right-clicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. Why Should I Care if Auto Services Have Stopped? The SVC-Auto Services Stopped monitor reports on services that have stopped but are set to an automatic start state. If they are automatic start, should I really care about them? The answer is Yes and here s why. Many business applications are service driven. If these services are not restarted, you will start receiving Help Desk tickets because the application is not working. The beauty of this monitor is it keeps you from having to identify each and every service that needs to be running. What it does, is run a script to restart the stopped service and does multiple passes and then reports on success. Now, for services that are set to automatic start by the application installer but really only start once the application is launched, these can be excluded by adding them to the Services Blacklist. Additionally, if there are machines that should be excluded, they should be excluded at the monitor levels on the Exclusions tab. Services can be blacklisted in the Dashboard > Config > Configurations > Service Blacklist or by right-clicking on the service in the Service tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. It is easier to do a job right than to explain why you didn t. ~ Martin Van Buren

Why Do I Want to Monitor Software Installations? Software may contain viruses, spyware, key loggers or other things that can compromise security, which can cause a loss of valuable data as well as considerable financial loss. Additionally, unlicensed software can be installed without your or your client s knowledge which could potentially cost your client thousands of dollars in copyright infringement fines. So why do you want to monitor software installations? Let s assume for a moment that Ollie Operator that works for your client just installed this cool add-on for Microsoft Word. LabTech has detected the change as newly installed software and reported it via an automatically generated ticket. A few days later, your client calls your Help Desk about Word crashing repeatedly. Within minutes, your technician has tracked it down to this cool add-on because a ticket had been generated for it just days prior Applications can be blacklisted in the Dashboard > Config > Configurations > App Blacklist or by right-clicking on the application in the Software tab of the agent s Computer Management screen and then selecting Software > Add to Blacklist. and is in the history. The add-on can be quickly removed using LabTech and the application blacklisted so you are alerted in the future if it has been installed again. What if you weren t monitoring software installations and the same event occurs? How long do you think it would take to locate the problem? Could be hours, could be days or maybe not at all. Now, let s say the same client has 100 agents and Ollie Operator is doing his own thing again. He just installed the newest version of Microsoft Office Professional on all of the agents. At this point, you do not know if it is legal software or if it is pirated. If it is pirated, this could cost your client thousands of dollars in copyright infringement fines should the software company ever find out, say through a disgruntled employee (it s happened before). This gives you the chance to show your worth to your client. Send your client a letter that you have detected that You can keep track of the licensing information on the License Management tab of the client. ABC Software has been installed on all of his agents. Ask the client to please provide licensing information so in the event of a failure, recovery is accelerated by having the licensing information immediately available. Include information about piracy and that companies are subject to significant fines for copyright infringement if software is found on computers that is not licensed. By communicating with your client, you are showing that you are looking out for their best interests. It makes for happy clients. Happy clients send checks. This is all about being proactive, the more proactive you are the less Help Desk tickets you will receive and the more time you have to build your business or to improve your business. Not so Fun Facts: Did you know that dealing with viruses, spyware, PC theft and other computer related crimes costs U.S. businesses a staggering $67.2 billion a year (according to the FBI in 2006). The successful man is the one that finds out what is the matter with his business before his competitors do. ~ Roy L. Smith