{"id":221,"date":"2021-04-12T16:23:33","date_gmt":"2021-04-12T16:23:33","guid":{"rendered":"http:\/\/172.105.17.27\/?p=221"},"modified":"2023-10-05T13:30:24","modified_gmt":"2023-10-05T13:30:24","slug":"identify-and-deal-with-a-warning-before-it-becomes-a-disaster","status":"publish","type":"post","link":"https:\/\/www.blesk.ca\/fr\/2021\/04\/12\/identify-and-deal-with-a-warning-before-it-becomes-a-disaster\/","title":{"rendered":"Identify and deal with a warning before it becomes a disaster"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1310.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>As a Network administrator, think about the occurrence of a hacker posing as one of your network administrators to gain access to privileged data. If they\u2019ve stolen the proper credentials through either a data leak or a targeted spear phishing attack, they can use a legitimate access method to discover even more sensitive material.<\/p>\n<p>In this type of incident, since the hacker is using a legitimate method of accessing your network, the system won\u2019t flag it as a malicious attempt. Even if you\u2019re using an access log, you might run into problems unless you pay attention to the IP of the user or the physical location.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">How does Event Log monitoring help in eliminating downtime?<\/h2><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>Event logs record errors and other important details going on behind the scenes of your network, and the errors that might not appear directly in front of you. If there\u2019s suspicious activity on your network, the event logs are one of the ways to identify it.<\/p>\n<p>Event logs monitoring can help a network administrator to identify a hardware or driver issue before it starts to affect the end user, which eliminates downtime and serves as an early-warning system.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">bl\u00ebsk Event Log Manager (ELM)<\/h2><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>The bl\u00ebsk Event Log Manager module (ELM) is a user friendly way to view, search, and visualize your log data. It provides a high level of visibility that will have you identifying issues and creating solutions, faster. Your applications generate the data, and ELM receives it, structures it, boosts fields, ranks results by score, sorts results by field, aggregates results, and stores them in the database to make it available to you through a convenient search feature.<\/p>\n<p>A use case of bl\u00ebsk ELM is to perform log analytics, in which you take the logs from an application, feed them into ELM, and use the rich search and visualization functionality to identify issues. For example, a malfunctioning web server might throw a 500 error 0.5% of the time, which can be hard to notice unless you have a real-time graph of all HTTP status codes that the server has thrown in the past four hours. ELM can give you early warning of impending system issues and save you from unexpected disasters.<\/p>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-1\" style=\"--awb-margin-bottom:50px;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:var(--body_typography-font-size);--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1917\" height=\"954\" title=\"elm1\" src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1.png\" data-orig-src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1.png\" alt class=\"lazyload img-responsive wp-image-2560\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271917%27%20height%3D%27954%27%20viewBox%3D%270%200%201917%20954%27%3E%3Crect%20width%3D%271917%27%20height%3D%27954%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1-200x100.png 200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1-400x199.png 400w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1-600x299.png 600w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1-800x398.png 800w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1-1200x597.png 1200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/elm1.png 1917w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1917px\" \/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><div class=\"awb-imageframe-caption-title\">Image \u2013 1<\/div><\/div><\/div><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">bl\u00ebsk, a complete network monitoring solution<\/h2><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>bl\u00ebsk is a complete network monitoring solution, which allows you to monitor the status of services on the server or client machines, see the security status of a network, analyze communication protocols exchanged, view information on the features of the components of the network, verify the latency of devices, see event log reports, and administer and manage systems remotely.<\/p>\n<p>In summary, network systems benefit from event log monitoring it helps to show administrators more about what\u2019s happening across a given network. Event log monitoring helps to make network administration more efficient and avoids serious security problems and other issues.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Managed Network Monitoring Service<\/h2><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>We understand that some organizations may don\u2019t have inhouse capacity to facilitate many essential tasks; therefore, bl\u00ebsk offers managed services to the low resourced companies to monitor their network services.<\/p>\n<p>Download a free trial of bl\u00ebsk at <a href=\"https:\/\/www.blesk.ca\/fr\/free-trial\/\">https:\/\/www.blesk.ca\/free-trial\/<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>As a Network administrator, think about the occurrence of a hacker posing as one of your network administrators to gain access to privileged data. <\/p>","protected":false},"author":2,"featured_media":2558,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blesk-tech-talk"],"_links":{"self":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":9,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"predecessor-version":[{"id":2721,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/221\/revisions\/2721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media\/2558"}],"wp:attachment":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}