Network Monitoring Systems (NMS)

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:00
Hi, everyone, and welcome back.
00:02
Let's get started on Module two's first topic about network monitoring systems or in a mess.
00:10
Animus is an application tool used for monetary and managing network infrastructure and system operations. It includes integrated features such as alerts, reports,
00:21
the logs,
00:22
tickets
00:23
and that working maps, which we will discuss further
00:29
examples of enemies. Tools include solo wins, their work performance monitor,
00:34
Paisley's Pierre Teaching that work monitor and I Be Switched. What's up? Gold Network Monitoring. So far,
00:43
A and M s Alert said some notification triggers to send emails or SMS when the change occurs.
00:50
For example, setting an alarm or alert whereby the throws hold is less than 10 kilobytes per second for 10 minutes,
00:58
then you can go to fire in their work team.
01:00
Or you could also set an optional alert whereby if the condition has cleared or is no longer in the seat,
01:07
all Bolden underlined our parameters that can be changed according to how you want to set your alarm.
01:12
Instead of threats hold, you may choose other options such as state speed,
01:19
volume and change
01:23
as your enemies performs, his job to monitor
01:26
and an abnormality occurs
01:30
it will start prompting alerts to number operations team, which keeps you proactive as possible. When an event occurs,
01:41
An Animus report creates manual or automated time based reports to track and document network services and conditions. Here are some examples off reports from that rock flow
01:53
and performance monitoring
01:57
logs have a time stamp of events which are helpful when tracking changes or abnormalities in the network.
02:05
And remember, it is important that all devices in your infrastructure has the correct time configured,
02:10
whether it be manually configured or synchronized, you sing network time Protocol, or NTP.
02:19
As you can see in this column, error alert and debug shows the different severity levels off logs. We will get into this more later in the course.
02:32
Many in the mess have integrated support ticketing systems. Creating tickets can also be known as opening cases,
02:39
and this helps never operations Team. To track customer requests, assign a member or team for escalation of required
02:49
and wanted to response and resolution time for customer service performance,
02:55
a ticket this created either by a user reporting and incidents
03:00
or an alert prompted by your animus.
03:04
A reference or case number is created and handled by a member of the NFC or service test
03:10
to respond to the alerted or reported incident.
03:15
Based on the gathered information, the NTC member will identify whether it can be resolved within their own expertise
03:23
or whether it will be required to escalate toe a higher tier member
03:29
or more specialized team.
03:31
Interaction between the end user and NFC member is continuous and crucial.
03:39
Network mapping creates a graphical representation of your network infrastructure. It shows all the devices on your network. Helping network I'm in the street is to visualize your network.
03:52
It also contributes to identifying network faults, usually through the use of color coding. For example, green being active and red being down.
04:00
And, of course, pictures speak 1000 words.
04:08
All right
04:09
Quiz time, which enemas feature will be the priority to configure for improved reliability, off services and productivity. When a change occurs,
04:19
you have three seconds to the side,
04:23
and if you need more time, just feel free to pause the video
04:31
alerts. Depending on the individual or organisation, it may be decided to use all features in their enemies package.
04:39
However, in terms of priority,
04:42
it is safe to say that setting up alerts
04:44
definitely helps the network operations team to be notified when the change is detected on the network and immediately start investigating on the root cause.
04:57
And we're done with the animus topic.
05:00
So so far, we've discussed what isn't an M s. How is it useful in their work operations? And we discussed as well the animus features commonly seen, which are alerts,
05:11
reports, logs,
05:13
tickets and network mapping.
05:15
In the next video, we will look into S and M P.
Up Next