Big Brother: Network Monitoring Software. Kevin Orlowski. System Administration



Similar documents
Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60

Using Internet or Windows Explorer to Upload Your Site

How To Choose Help Desk Software For Your Company

Livezilla How to Install on Shared Hosting By: Jon Manning

WirelessOffice Administrator LDAP/Active Directory Support

Healthstone Monitoring System

Intelligent Video Analytics. Server Installation Guide. - Windows - Linux

PLEASE NOTE: The client data used in these manuals is purely fictional.

Using Network Attached Storage with Linux. by Andy Pepperdine

Effective Use of Individual User Profiles with Software Distribution

Installation Guide. Research Computing Team V1.9 RESTRICTED

Part I. OpenCIT Server

NetWrix SQL Server Change Reporter. Quick Start Guide

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Fax User Guide 07/31/2014 USER GUIDE

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Installation and Deployment

Kaspersky Lab Mobile Device Management Deployment Guide

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

ClickCartPro Software Installation README

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Web Hosting: Pipeline Program Technical Self Study Guide

NGASI Shared-Runtime Manager Administration and User Guide WebAppShowcase DBA NGASI

tpischeduler tpischeduler TotalFBO tpischeduler TotalFBO Initial Installation tpischeduler TotalFBO tpischeduler

NovaBACKUP xsp Version 15.0 Upgrade Guide

Ingenious Testcraft Technical Documentation Installation Guide

Security Correlation Server Quick Installation Guide

NetWrix File Server Change Reporter. Quick Start Guide

Kaltura On-Prem Evaluation Package - Getting Started

IISADMPWD. Replacement Tool v1.2. Installation and Configuration Guide. Instructions to Install and Configure IISADMPWD. Web Active Directory, LLC

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

RSA Authentication Manager 7.1 Basic Exercises

Setting Up SSL on IIS6 for MEGA Advisor

Managing Special Authorities. for PCI Compliance. on the. System i

Installing GFI LANguard Network Security Scanner

SQL Server 2008 R2 Express Edition Installation Guide

Installing The SysAidTM Server Locally

ROUNDTABLE TSMS 11.5 Installation Guide

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

SSH and Basic Commands

Browser Client 2.0 Admin Guide

Setting Up Dreamweaver for FTP and Site Management

The Web Pro Miami, Inc. 615 Santander Ave, Unit C Coral Gables, FL T: info@thewebpro.com

User Guide Microsoft Exchange Remote Test Instructions

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

VoipSwitch Security Audit

Google Apps Deployment Guide

Monitoring Oracle Enterprise Performance Management System Release Deployments from Oracle Enterprise Manager 12c

An Introduction To The Web File Manager

DSI File Server Client Documentation

NTP Software File Auditor for Windows Edition

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide

Witango Application Server 6. Installation Guide for OS X

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

How to install and use the File Sharing Outlook Plugin

See the installation page

imhosted Web Hosting Knowledge Base

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin Using the Legal Vault

CloudCall for Salesforce- Quick Start Guide. CloudCall for Act! CRM Quick Start Guide

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server

Administrators Help Manual

Cable Internet Connection & Sharing using Red Hat 7.2 (Version 1.0, )

Installation Guide For Choic Enterprise Edition

Document History Revision Date: October 30, 2006

Summer 2013 Cloud Initiative. Release Bulletin

Setting Up Scan to SMB on TaskALFA series MFP s.

Monitoring Microsoft Exchange Server in the Context of the Entire Network

Configuring your client to connect to your Exchange mailbox

Linux VPS with cpanel. Getting Started Guide

DPW ENTERPRISES Web Design and Hosting Services Autoresponder Software User s Guide

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set

Hosted Connecting Steps Client Installation Instructions

For Splunk Universal Forwarder and Splunk Cloud

The Social Accelerator Setup Guide

SysPatrol - Server Security Monitor

IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager

Preparing a SQL Server for EmpowerID installation

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Defender Token Deployment System Quick Start Guide

Interworks. Interworks Cloud Platform Installation Guide

Implementing Moodle on a Windows High Availability Environment

Getting Started with Web Hosting at TechServ

Kaseya 2. User Guide. for Network Monitor 4.1

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

WhatsUp Gold v16.3 Installation and Configuration Guide

Freshservice Discovery Probe User Guide

Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting

WEB2CS INSTALLATION GUIDE

Okta/Dropbox Active Directory Integration Guide

Spring 2014 Urban Affairs network computers and computer labs Mapping your H:\ drive using Microsoft Windows 7

Installing GFI Network Server Monitor

Transcription:

Big Brother 1 Big Brother: Network Monitoring Software Kevin Orlowski System Administration

Big Brother 2 Abstract Big Brother is a system and network monitor distributed by Quest Software. It displays network and system status via the web, which is unique among network monitoring software. The software is open source and highly customizable to a company s or individual s specific needs. Some people who have used the software, including myself, believe that it is lacking in documentation and its configuration can be confusing. However, if a user has a good understanding of Unix, Big Brother can be configured to be a powerful tool for monitoring a network for high security and optimal performance.

Big Brother 3 Big Brother: Network Monitoring Software Big Brother is a web-based network monitoring application offered by Quest Software. It is the first web-based application of its kind and was originally designed in 1996. The functionality of Big Brother is fairly simple; network statistics are displayed as web pages that can be viewed from any browser from any location. Due to the fact that it is open source, it is quite flexible and can be modified for many different tasks. Since its inception it has grown in popularity and it is currently being used in industry by such companies as: Hewlett Packard, ING Direct, and Sprint. Purpose of the Report The purpose of this report is to research and implement the Big Brother software package on a Unix based system. The report will outline goals, possible policies for users, a project timeline, details on the merit of the software, difficulties in implementation and finally conclusions. Using this report the reader should be able to decide if implementing the Big Brother software package is right for them. Project Goals The goals of this project are to successfully implement the Big Brother software and use it to monitor network devices and services on the campus network of Plymouth State University. During this implementation the software will be analyzed to determine both strengths and weaknesses. By the conclusion of the project I hope to have a comprehensive understanding of the Big Brother software.

Big Brother 4 User Policy There must be a fairly strict user policy in place when implementing the Big Brother software. Having the ability to monitor network devices and services could be very advantageous to someone trying to gain access to a network without authorization. In addition it is not necessary for everyone on a network to be able to monitor services, only a few privileged users should have that ability. It is recommended that only the network administrator, system administrator and related network staff have access to the Big Brother software. The network administrator should be the only user that can make changes to the reporting aspect of the software mainly due to the fact that the network administrator is responsible for the network devices and services working properly and will most likely be the person notified when they are not working. The URL where Big Brother is posting the network status should also be protected from unwanted users. If a prospective intruder can find out what is being monitored on a network they will in turn know what is not being monitored and may be able to find a way into the system without being noticed. The URL should be located on a secure web server and should require a login to view the network status.

Big Brother 5 Project Timeline Oct 28th Nov 1st Nov 3rd Nov 5th Nov 20th Dec 2nd Dec 4th Chose 'Big Brother-Network Monitoring Software' for Project Downloaded Software onto Syslab06 Machine Research Big Brother Installation and Configuration Type up Report Report is Due Give Presentation Positive Characteristics of the Big Brother Software The Big Brother software package has many positive characteristics that would help a network administrator easily monitor his/her network. Over the eight years since its inception there have been improvements made based on suggestions from users and updates by the developers. One of its more unique features is the ability to display network status and statistics as a web page that can be viewed from any machine by simply entering the proper URL. Most network monitoring packages require that the network status can only be viewed at the machine

Big Brother 6 where the software is installed which limits a network administrator. Using Big Brother, if a problem arises and the network administrator is not in their office he/she could view the status of the network from any machine they had access to and assess the problem without having to travel to a specific machine and lose valuable time. In addition to reporting network status and statistics, Big Brother can also report on a single machines performance and status. By installing a BBClient on a local machine Big Brother can monitor CPU usage, disk space, and other attributes that may be very useful in researching problems on the network and problems on that specific machine. Big Brother is capable of running multiple instances on a single network all running in parallel. If the machine that is running as the monitoring system goes down or is compromised it would be very difficult if not impossible to monitor further activity during an incident. With Big Brother multiple machines can be set up as the monitoring system and they can report to multiple URL s making the monitoring very redundant and robust. This way if one of the monitoring systems is down or compromised the network is still being monitored and the network administrator is not left in the dark. Big Brother also has a designated port, 1984, assigned by the IANA (Internet Assigned Numbers Authority) that it uses to send status reports from client to server (IANA 2003). This makes it easier to notice while reviewing network logs when your status reports are being sent. And because Big Brother uses its own port you will not be forced to keep another port open that you may want to close because it is being used for status reports from your network monitoring software. Big Brother has one of the most detailed and comprehensive notification processes of any network monitoring software on the market today. There is an extensive ruleset that a network

Big Brother 7 administrator can customize to make the software report in any manner that they find appropriate. Big Brother can notify based on a time if day, a specific machine, or if a certain test fails. There is also an available initial-delay for notification to cut down on late night false alarms. Big Brother supports paging over a standard phone line and email paging, it can page a group or just one person. On the Unix/Linux platform there is even an option to set up a completely custom notification procedure. Once a network administrator has experienced a problem it is very advantageous to store information about that problem and how the problem was resolved. This is one of the most useful tools available to a network administrator. Big Brother allows for each status report to be stored for use at a later date. Historical reports can give information about past performance and whether, over time, performance has increased or decreased and it can offer insight into when and where problems have occurred in the past. The Big Brother software is completely open source, which makes it very flexible and easily customizable. It supports plug-ins, which also promotes customization. There is an extensive user community that shares solutions, plug-ins and source code. This ability makes it possible for network administrators across the world to collaborate and solve network problems together and make the software itself stronger. Problems Encountered During Implementation I did encounter some problems while implementing the Big Brother software. The most frustrating of which was incomplete documentation. I was not familiar with the software at all before attempting to install it so I was forced to rely completely on the documentation that came

Big Brother 8 with the software. As is the case with many software packages trying to follow installation readme files and other documentation can get confusing. It is difficult for a programmer to be able to anticipate everything that a user may know before installation. Some users may need more guidance than others and in this case I think that if the programmers had included a little more information in a more organized manner users would benefit. During my research I found other reviewers that agree with my viewpoint. Oliver Kaven, a reviewer with PC Magazine states that documentation on BB is sparse and the product itself is mostly written with shell scripts if you can decode what little documentation there is and read the shell scripts, the system can be made to do just about anything you might want. (Kaven 2001). He went on to add that overall it is a good product, but not for the beginner administrator with little Unix knowledge. (Kaven 2001). Another problem I ran into during installation was getting the Big Brother software to interact correctly with my web server. One of the main advantages of the Big Brother software is the fact that it can publish network statistics and availability directly to the web, to do this however, it needs a web server. During the installation process of the Big Brother software the user must configure the software to interact with a specific web server and name the location of certain specific files that are associated with the web server in order for it to work correctly. At first I did not know the location of these files and I had to go back later to modify things, which was difficult. I think that if the Big Brother software came with its own web server that was already configured setup would be much easier because it would be one less thing for the user to worry about. Due to time constraints I was never really able to customize Big Brother for the Plymouth State University network. I was able to get the software running with the default settings of the

Big Brother 9 Quest Software network but when I tried to modify the software to monitor services and machines on the Plymouth network I ran into errors. I was unable to determine if this was because of my web server or if it was a problem with the way I had configured the software itself. I think that this problem has more to do with user error than software design and I think that if I had a little more time to play with the software that I could have solved this problem and configured the software properly. Conclusions After spending a month researching and implementing the Big Brother software package I have found that it is a very advantageous tool for any network administrator. Keeping track of network status and statistics is a must for any size network for security and performance reasons. In my opinion Big Brother makes this easier and more custom to your specific needs than any other network monitoring software available. I am confident that any network administrator would find this software well equipped to keep them informed of their network status now and into the future by adding plug-ins and modifying the source code themselves if need be. I would recommend Big Brother to any network administrator or individual looking to monitor a home network or simply monitor the performance of their personal machine.

Big Brother 10 References Big Brother System and Network Monitor. Quest Software. http://www.bb4.com. 1 st November 2003. Deadcat. Quest Software. http://www.deadcat.net. 8 th November 2003. Internet Assigned Numbers Authority. http://www.iana.org. 8 th November 2003. Kaven, Oliver. Big Brother. PC Magazine. http://www.pcmag.com/article2/0,4149,21895,00.asp. 30 th October 2001. Mortazavi, Shad. Enterprise Level Network Monitoring. News Views. http://www.newsviews.info/techbytes07.html. June 2003.

APPENDIX A Big Brother 11

Big Brother 12 How-To - Download the.tar file from www.bb4.com to the desired directory - Extract the contents of the file - You should set up a BBuser Unix account - Change directories to the one created (i.e. bb*.*) where *.* is the version - Once in this directory do cd./install followed by./bbconfig -./bbconfig will start the configuration process be prepared to answer some questions about your system. (make sure you know the answers because modifying later can be difficult) o Whether or not you want to keep the old-style directory structure o Do you intend to use Fully Qualified Domain Names o Which host(s) is(are) the BBDISPLAY(s) o Which host(s) is(are) the BBPAGER(s) o Is the current host a BBDISPLAY / BBPAGER o Default email recipient for notification o URL you intend to view BB with o URL of the BB CGI scripts o The User ID of your web server - Once that has finished do cd../src do a make and then a make install - cd../etc you can now edit the bb-hosts file and enter the names of your hosts - You can also edit the bbdef.sh file to set alarm levels - There are two scripts that come with the software that will check the configuration files for errors run them once you have finished editing the files. They are./bbchkcfg.sh and./bbchkhosts.sh - Change the ownership of the BB files to the BBuser account you set up earlier chown R BBuser bbvar - Create the symbolic link ln s /full path_to_your_bb_directory/www /WWW/bb (where WWW is the document root of your web server - Run the runbb.sh script - About two minutes after startup the web pages should be available