Remote Monitoring and Management

Managed Services for IT Infrastructure

Want to outsource your network monitoring and network management? Coyote Creek provides a full suite of managed services for Microsoft and Atlassian applications, all from our North America based network operations center. In fact, we manage over 150,000 Microsoft Exchange mailboxes, and take care of server and network environments for start-ups through Fortune 50 enterprises both globally and nationwide here in the US.

After many years of working on both Microsoft and Atlassian projects, Coyote Creek has developed a set of operational best practices to maximize uptime and keep these environments highly available and running well. Choose from three levels of service…all of which are offered on a 7x24x365 basis. Contact us Today!




Take advantage of Coyote Creek’s extensive expertise. We know what to check, what to watch for, and what alerts to put in place to proactively detect problems before all heck breaks lose. With the “Monitor” level of service you get 24×7 alerting from a Silicon Valley based firm, with alerts routed to your company for your staff to take action.



The “Maintain” level of service provides full monitoring, with Coyote Creek’s 7x24x365 staff performing Level 1 problem determination and remediation for you. In addition, Coyote Creek will also handle patching and take care of maintaining the environment. Level 2 problem determination is escalated to your personnel.



The “Manage” level of service is a complete outsourced remote monitoring and maintenance solution. Coyote Creek will run the environment for you, taking care of everything from basic monitoring to Level 2 technical service, without any need to interrupt or alert your staff. We’ll run your environment like it was our own…or better!

What Coyote Creek Manages

  • Microsoft infrastructure: Active Directory, Exchange, SharePoint, SQL Server, Lync
  • Atlassian applications: JIRA, JIRA Service Desk, Confluence, Hip Chat, Bitbucket, Add-Ons
  • Network devices and infrastructure: routers, switches, fire walls, security appliance
  • Network Management Data sheet
  • RMM Data sheet


Microsoft Exchange

4 Best Practices for Microsoft Exchange Security

4 Best Practices for Microsoft Exchange Security By Mohan Reddy Senior Systems Engineer     For most organizations, Microsoft Exchange is a mission-critical system. Maintaining security is absolutely vital. To do so, here are four Exchange security best practices that we recommend: Enforce the use of complex passwords. While this is obviously an issue for other systems as well, it is an especially important Exchange security best practice. After all, most of the time Exchange… read more


How to Perform a Firewall Audit on a Cisco ASA Firewall

How to Perform a Firewall Audit on a Cisco ASA Firewall By Michael Pouncey Network Engineer Your firewall is a vital element of your IT security; your organization depends on it as a first line of defense. Keeping your firewall in top shape is therefore imperative. A firewall audit helps ensure that things are working as they should be, and that everything associated with your firewall is up to date. How often should you perform a… read more

Monitor JIRA, Confluence

5 Things to Monitor on Your JIRA or Confluence Instance

5 Things to Monitor on Your JIRA or Confluence Instance By Mohan Reddy and Tom Craig Senior Systems Engineers   If you want to avoid problems and keep your systems up and running, monitoring is a must. While there are many different things that you can monitor, here are five that we have found to be particularly vital for Atlassian’s JIRA and Confluence: HTTP Availability – JIRA and Confluence are both web-based applications. You therefore… read more

Testing Disaster Recovery Plans

Creating & Testing a Disaster Recovery Plan for Lync Persistent Chat Server

Creating & Testing a Disaster Recovery Plan for Lync Persistent Chat Server  By Romeo Cavestany Systems Engineer When Coyote Creek onboards a new client into our Remote Monitoring and Management service, one of the first things we do is take a look at the worst-case scenario. Now that we’re responsible for supporting their environment, what will we do in case of a disaster? How can we be sure we’ll be able to bring their systems… read more


Using SCCM to do Your Patching

Using SCCM to do Your Patching By Jeff Severance Systems Engineer Microsoft’s SCCM (System Center Configuration Manager) is an extremely useful centralized application designed to help you administer all of the servers and workstations in your environment. It allows you to control, get information from, patch and apply applications to all of your servers and workstations. It can even be used to deploy operating systems to new machines that do not yet have anything on… read more


5 Additional Benefits of Using Managed Services for Your Bay Area Business

In our last blog, we addressed five benefits of having managed services provider to help with your information technology for your Bay Area business. In this blog, we will address five additional benefits for your company so you can continue growing. Pour your Money Into Growing – Since managed service can allow you to save money on IT, which means it can help you to put that money to development or another well deserved area… read more