By being proactive, we will ensure that your system uptime is maximised
By taking a proactive approach to supporting our customers’ networks and providing real-time server monitoring, we can work to prevent potential problems occurring through:
- Using monitoring software which will alert us to potential problems
- Advising on how to get the best from available hardware and software
- Ensuring software patches are applied regularly
- Ensuring anti-virus and where necessary anti-spyware and anti-spam software is in place and up to date
- On-site checkups where we can discuss any IT queries
- Ensuring your data and network security systems are adequate
Server Monitoring
Our monitoring service will proactively check the status of your systems. Issues can then often be resolved before our clients are even aware of them. This prevents small issues from developing into problems before they affect users, thereby increasing your productivity as there is a lower chance of user disruption.
By being proactive, we will ensure that your system uptime is maximised. By having greater involvement with your network, we can improve performance as well as minimising security risks.
Please feel free to get in touch with your requirements.
A multitude of services can be monitored including:
- Microsoft Exchange
- Terminal Services
- SQL Server
- Active Directory
- Directory Size Function
- CPU Usage Function
- Disk Drive Function
- Disk Space Function
- File Existence Function
- File Size Function
- POP3 Email
- Web Server
More specifically, these can be broken down into standard monthly reports which provide you with the sort of granular information and comprehensive IT audits previously only available to organisations with enterprise-level IT systems.
Software Audit
Our comprehensive software audits include: Operating System version (Service Pack Level & optional hotfix level), other installed software, licences, version number, paths and descriptions, PUPs (Potentially Unwanted Programs such as file-sharing software, music streaming applications and any non-business software), Anti-virus Software (Updates and Version), Anti-malware Software (anti-spy / anti-phishing /anti-ransomware).
Hardware Audit
Hardware audits enable a complete asset list to be compiled, detailing: Manufacturer and model, Service Tag or other manufacturer identification Disk Space, Processor Type, PCI Cards, Approximate age of machine, Printers, Misc network hardware details.
Network Infrastructure Audit
An audit of your network infrastructure enables us to document switches, ports in use and available, router information including firmware / OS version, wide-area connection details, Local, WAN and gateway IP addresses, DNS, WINS, DHCP, and MAC address, inventory of internal and external network links, Password policy & ISP details.