|N-Remote Total Care|
All N-Remote Total Care
client are entitled to the following:
- Anti-Virus File Check:
We monitor your Anti-Virus application to make sure it is in sync with the vendor’s latest published version.If your antivirus software is not up to date, we will update it remotely thus ensuring that your system remains safe from virus infection.
The following Antivirus products are supported: Avira AntiVir Professional, Avira AntiVir Server, CA eTrust Inoculan, CA eTrust inoculateIT, CA Anti-Virus 2009, Eset Nod32, F-Secure AntiVirus, GData AntiVirus 2010, Engine A (BitDefender), Engine B (Avast), GData AntiVirus Business and Enterprise Edition (Client), Engine A (BitDefender), Engine B (Avast), Grisoft AVG, Kaspersky AntiVirus v6, Kaspersky AntiVirus 7, Kaspersky AntiVirus 2011, Kaspersky Enterprise Edition, Kaspersky Enterprise Edition v6, Kaspersky Small Business Edition, McAfee GroupShield v6.0, McAfee NetShield v4.5, McAfee Security Service for Exchange, McAfee Total Protection, McAfee VirusScan v7.0, v7.1,v8.0, v8.5, McAfee WebShield v4.5.1, Microsoft Security Essentials (including V2), Microsoft Forefront EndPoint Protection, Norton AntiVirus 2007, Norman AntiVirus, Panda Security For Business, Panda Security For Enterprise, Panda Security For Business with Exchange, Panda Cloud Office Protection, Sophos AntiVirus, Sunbelt VIPRE Antivirus, Sunbelt VIPRE Enterprise Agent, Sunbelt VIPRE Premium, Symantec AntiVirus IntelligentUpdate, Symantec AntiVirus LiveUpdate, Symantec AntiVirus RapidRelease, Symantec AntiVirus 10.1, Trend Micro AntiVirus 2007, Trend AntiVirus, Trend Officescan, Conventional Scan, Smart Scan, Trend ScanMail, Trend ServerProtect, Trend Worry Free Business Security, Conventional Scan, Smart Scan.
- Back-up Check:
We monitor your data back-ups and detect if they are completed successfully or not. If they are not completed successfully, you will be informed and with your approval we will proceed with troubleshooting and resolution.
We currently support the following products:
Acronis Backup and Recovery Server (v10), Acronis True Image Echo Server (v9.5), Acronis True Image Echo Server (v9.7), Acronis True Image Server v9.1, ARCserve 2000, ARCserve v9, ARCserve v11, ARCserve v12, ARCserve v12.5, GFI Backup 2010 - Business Edition, Microsoft NT Backup, Microsoft Windows 7 Backup, Microsoft Windows Backup Vista, Microsoft Windows Backup Server 2008, Veritas Backup Exec v8.5, Veritas Backup Exec v8.6, Veritas Backup Exec v9.0, Veritas Backup Exec v9.1, Veritas Backup Exec v10, StorageCraft ShadowProtect Desktop, StorageCraft ShadowProtect Server, StorageCraft ShadowProtect Small Business Server, Symantec Backup Exec v11, Symantec Backup Exec v11 x64, Symantec Backup Exec v12 (also supports v12.5), Symantec Backup Exec 2010, Symantec Live State Recovery 6, Symantec Backup Exec System Recovery 7, Symantec Backup Exec System Recovery 8, Symantec Backup Exec System Recovery 2010 (v9), VaultLogix Internet Vault
- Disk Space Check:
We monitor the size of your hard drive. Automated disk clean-up tasks prevent your hard drive space from being filled up with unnecessary data.
- Drive Space Consumption Check:
We monitor when the data on a disk has grown by more than X% in the past 24 hours. This may be an indication of something amiss on your system. It will automatically be researched and you will be informed of the cause.
- Event Logs Check:
The Event Logs are repositories of information that have detailed data on the status of the system written to them by applications and Windows components. We monitor the Event Logs on your machine based on the following indicators Event ID, Event Type, Event Source and Description. We monitor the Event Logs of your device for warnings and errors detecting growing problems and highlighting the need for further Investigation. With your approval, these warning and errors can be resolved. ***
- Critical Events Check:
We monitor the event logs of your system looking for the 10 most frequent warnings and errors during the past 24-hours detecting growing. Problems and highlighting the need for further investigation. With your approval, these warning and errors can be resolved. ***
- Hacker Check:
We monitor failed login attempts to identify hacker attacks. If hacker attacks are detected, you will be informed and given advice to take better precaution and to increase your security measures.
- Physical Disk Check:
We monitor when any attached disk is reporting errors. If a disk is reporting error you will be informed so that you can have it replaced as soon as possible before it causes data corruption of loss of data.*** The however only works with SMART (Self-Monitoring, Analysis and Reporting Technology) disks which reports errors to the operating system and alerts you.
- File Size Check:
When files and folders grow unbounded in size, this can often be an early indicator of a problem on a system, for example a Microsoft SQL Server log file can easily grow to fill the entire disk. Similarly, if a file or folder is below an expected size then this can also indicate a problem, for example if an application has not written to its log file because it failed to run. We can monitor the size of a group of files, folders (and subfolders) detecting when the size of the group is greater or less than the specified threshold.
We defragment selected drives to maximize disk space and prevent degradation in system performance.
- Clear Event Log:
We delete outdated entries in the selected Windows Event Logs to remove obsolete log entries and prevent slow writing to and reading from the event logs.
We maximize available drive space by removing unwanted temporary files and logs from your device.
The following files and logs can be removed – user temp file, user cookies, user java cache, user flash cache, user recent history, user terminal server cache, user IE history, system temp files, system log files, system IIS log files, user IE temp files, and user office recent history, etc
- Windows Services Checks:
Windows systems are underpinned by Windows Services - these services provide crucial functions to users, machines and applications network-wide. We monitor these services to ensure that they are functioning. Vital services can be automatically restarted if they stop.
By monitoring your server we are able to determine if it is up and fully functioning. If no response has been received from your server within a given amount of time, you will be informed and with your approval we can proceed with troubleshooting and resolving. ***
- Microsoft Exchange Check:
One of the most common problems with Microsoft Exchange Server is the Information Store growing too large to be easily administered on the partition. Keeping an eye on the Exchange Information Store is vital to the service running well and ensures you’ve space to work on it if required. We monitor the size of the Microsoft Exchange Server Information Store if your organization has an internal mail server and prevent it from reaching its maximum thus preventing system crashes and time-consuming recovery issues.
- Processor Queue Check:
The Processor Queue Length is the number of threads that are ready but currently unable run on the processor due to another active thread.A bottleneck on the processor may be thought to occur where the number of threads in the queue is more than 2 times the number of processor cores over a continuous period.
We monitor your server’s processor queue length to determine the number of threads that are ready but currently unable to run on the processor due to another active thread. This helps us determine if your server’s processor is sufficient for the tasks it is intended to carry out.**
- Processor Utilization Check:
Processor Utilization is the percentage of time that the core/processor is actually occupied compared against the total time the core/processor is available for use. For example if the CPU is occupied for 45 seconds during a minute, its utilization for this period is 75%. To derive this figure the processors are polled every five seconds and where the average for any processor exceeds 70% (the default threshold) over the Agent cycle (5 or 15 minutes) an Alert is generated. We monitor all of the cores/processors in the server up to a maximum of four cores to see if they are being over utilized.
- Memory Usage Check:
We monitor the following aspects of your server’s memory.
Available memory:is the sum of the following three internal memory lists: Standby list, Free list, and Zero list.Unused pages of memory and pages of memory returned to the operating system when a process has either quit or its working set was reduced to comply with system resource requirements are placed on one of the above three lists.
Committed bytes:is the demand for memory and may be thought of as the number of bytes that have been allocated to processes by the operating system has committed a RAM page frame or page slot in the pagefile to.
Pages per second (hard page faults only):is where the system attempts to access a virtual memory page that is not currently the working set in the physical memory and has to be retrieved from the disk resulting in a delay.
Page file (percentage usage):contains memory pages used by a process that are not stored in physical RAM. The paging file can be resized to accommodate the additional memory requirements of the running processes and problems may occur where the systems paging file is inadequately sizes for the paging activity of the system.
Non-pageable memory:consists of memory that was allocated to processes which have either exited abnormally or have not returned the memory to the Operating System for reuse and memory in use by running processes. As such the operating system cannot swap such memory from physical RAM to the pagefile as it is in use.
- Script Check:
We monitor that created scripts are running as they should.
- WSUS Check:
Microsoft’s Windows Server Update Services (WSUS) is a free patch management tool that enables system administrators to deploy Microsoft product updates across their organization from a centralisedWSUS server. source, the
The WSUS server synchronises with an update repository, either Microsoft Update or another WSUSi.e. Critical or Security Updates). server, to retrieve updates in accordance with the administrator specified product, product families and update types (
Once an update is selected it can be downloaded to the WSUS server and from there pushed out across the organization.
We monitor the WSUS database for the last synchronisation information along with the number of critical updates that have not yet installed successfully on all computers.
We have an easy and effective way of testing network device connectivity. This ensures that devices (internal or external) are responding to PING requests. We can monitor and test network device connectivity by configuring PING requests. If a device does not respond you will be informed. With your approval we will proceed with troubleshooting and resolving.
The following PING requests can be created:
We can monitor security risks and malfunctioning TCP/IP Services/applications, so you can spot developing problems on the network, and have them fixed before they become big disasters.
We can monitor the following:
We monitor if a specified website is online and is serving the expected text. We can do a continuous web page check to ensure that the specified text exists. If it's not there, you will be informed that something's amiss with the site so that you can have it fixed as soon as possible.***
*** Solution might be billable.