Blog Summary for Week of September 19

1. Monitor Everything with Monitis – And do it easily with PowerShell – Part 1
PowerShell is a task-based automation platform for Windows. PowerShell lets you perform tasks simple and easily, using logically named commands, like Get-command, Get-Help, or Send-MailMessage. Monitis has partnered with the PowerShell experts at Start-Automating to allow users to perform monitoring tasks using these simply commands. This article shows how to get started. The first step is to download the necessary files at and extract them. Then, by following the steps in this article, a user can create an external monitor to check with the following command: Add-MonitisExternalMonitor -Name “MyWebSite” -Tag WebMonitors -MonitorType http -Url -ApiKey 20ECHRRRMK88L31KH6OMDU0BNR -SecretKey 26CQ6QUIRF571P1BHU3CV37MR0 It’s really quite simple and powerful because you can automate otherwise repetitive tasks, such as adding many external monitors.

2. How To Protect Your Network: Monitoring ISA Server with Monitis
This article is about monitoring ISA server with Monitis using a custom monitor. Microsoft provides the ISA Server Performance Monitor tool to analyze ISA Server performance. The ISA Server Performance Monitor is installed when you install ISA Server, but if you are already monitoring a number of servers in your environment the Monitis dashboards offers an integrated solution to monitor ISA server together with your other monitored systems. Monitis recently wrote an article, ISA Server Best Practices, which recommended performance metrics and best practices for monitoring ISA Server. This article shows how to monitor those metrics with Monitis. The article starts with instructions to download the source files from Monitis’ Github page. It then shows how to set up and edit alerts in the dashboard, and examples of common alerts for ISA metrics.

3. Monitor Everything with Monitis – And do it easily with PowerShell – Part 2
This is Part 2 of the series on Monitis integration with PowerShell. The article starts by showing a command, Get-Command -Name *Monitis*External*Monitor*, which pulls 5 possible commands associated with External Monitors: Add, Get, Remove, Resume, and Suspend. The article then shows ways of using these 5 commands to pull monitor results, temporarily stop monitoring, and remove monitoring results.

4. Business Continuity and How to Achieve Up Time
This article outlines the importance of business continuity in the event of unexpected outages. If you run a business, you will at some point have to plan for the worst, so that your company can stay operational, at least from a technological perspective. Backups are the perhaps the most important security measure to consider. Though it is often stressed that IT administrators need to back everything up, many companies continue to neglect backups. Virtualized servers are very useful in this regard. What could be better than backing up entire servers? It makes redeployment a simple process. It is also important to consult upper management and create a detailed disaster recovery plan. A step by step roadmap that takes into account any obligations to customers and legal considerations that a company has.

You might also like