Network Administration

Home/Network Administration

What is Kali Linux?

2021-01-20T13:55:44+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , , |

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security,a leading information security training company. In fact, it’s a Debian-based rewrite of their previous Knoppix-based digital forensics and penetration testing distribution BackTrack. One of the biggest reasons cyber professionals use Kali Linux is [...]

Auvik

2020-12-22T10:19:58+00:00Categories: Network Administration, Network Monitoring|Tags: , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to a powerful tool in the field of network monitoring. It is better to read this blog first of all: Network Monitoring. The tool we are going to discuss is called Auvik network management and monitoring. It is a cloud-based software. Official site of the manufacturer [...]

Network Inventory Tool: LANsweeper

2020-09-02T05:34:57+00:00Categories: Network Administration|Tags: , , , , , , , , , , , , , |

Each network administrator wishes to be able to document the assets related to the computer network in such a way that this documentation always: Be up to date Be reliable Be available This can be done manually: someone examines the assets and records them on a piece of paper or in a spreadsheet file. But [...]

NIST SP 800-50

2020-09-26T06:33:11+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , , , , , , |

The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. For example, one of NIST’s roles is to develop guidelines on how companies can [...]

NIST SP 800-145 (Cloud Computing Definitions)

2020-09-02T05:39:50+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , , , , , |

Recent our posts were about NIST SP 800-137 and NIST SP 800-53A. In this post, we are going to review NIST SP 800-145. The title of this article is: Evaluation of Cloud Computing Services. This publication published in 2010. The PDF file of this publication consists of 32 pages and 7 chapters. These chapters are: Chapter [...]

NIST SP 800–53A

2020-09-02T05:40:04+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , |

Our previous post was about NIST SP 800-137. In this post, we are going to review NIST SP 800-53A. NIST SP 800-53 is shorthand for the National Institute of Standards and Technology Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organization. NIST SP 800-53 is a set of standards and guidelines [...]

What’s ISCM? (NIST SP 800-137)

2020-09-02T05:40:16+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , |

First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations [...]

ManageEngine ADAudit

2020-09-24T11:34:03+00:00Categories: Microsoft, Network Administration, Network Security|Tags: , , , , , , , , , , , , , , , , |

In this post, we'll take a look at ManageEngine ADAudit to help you understand the different aspects of this network product. You can use ManageEngine ADAudit to ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects (like Users, Groups, GPOs, Computers, OUs, etc.). [...]

RADIUS

2020-09-24T11:46:34+00:00Categories: Microsoft, Network Administration|Tags: , , , , , , , , , |

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on ports UDP 1645 and UDP 1812 that provides centralized AAA (Authentication, Authorization, and Accounting) management for users who connect and use a NAS (network access server  such as VPN concentrator, router, switch). This protocol is a client/server protocol and software that enables remote [...]

Go to Top