Reading Time: < 1 minute 1. ALM requires an agent to be installed on the computer from which you want to collect information on assets. You will therefore need to install and configure the Windows agent (Mass deployment is possible) on the remote computers.
The First 70% to Complete
Reading Time: < 1 minute 1. NCM only needs to have access to your devices through SSH or Telnet, therefore ensure that the credentials for SSH or Telnet are defined in the Credentials section of the BLËSK server. We assume default port 22 for SSH and port 23 for Telnet connection is used, if this is not your case, […]
Reading Time: < 1 minute 1. Deploy our free bProbe probe on all networks or remote sites where you want to collect information on possible malicious activities (IDS). A mirroring port will need to be configured on the switch, and the second network interface of the bprobe server will be connected to it.
Reading Time: < 1 minute 1. Enabling the CDP or LLDP protocol on switches will provide, among other things, a view of the interconnections between these switches. You will therefore need to activate one of the CDP or LLDP protocol (depending of your model) on switches. a. On Cisco and Brocade devices, enter into configure terminal mode then execute […]
Reading Time: < 1 minute 1. Activate and configure system events on network devices such as Switches, Firewall, UPS, etc… 2. Install and configure an event logs agent on Windows servers (Optional). 3. Activate and configure system events on Linux (Unix) servers (Optional).