Remote Monitoring and Management

Managed Services for IT Infrastructure

Want to outsource your network monitoring and network management? Coyote Creek provides a full suite of managed services for Microsoft and Atlassian applications, all from our North America based network operations center. In fact, we manage over 150,000 Microsoft Exchange mailboxes, and take care of server and network environments for start-ups through Fortune 50 enterprises both globally and nationwide here in the US.

After many years of working on both Microsoft and Atlassian projects, Coyote Creek has developed a set of operational best practices to maximize uptime and keep these environments highly available and running well. Choose from three levels of service…all of which are offered on a 7x24x365 basis. Contact us Today!




Take advantage of Coyote Creek’s extensive expertise. We know what to check, what to watch for, and what alerts to put in place to proactively detect problems before all heck breaks lose. With the “Monitor” level of service you get 24×7 alerting from a Silicon Valley based firm, with alerts routed to your company for your staff to take action.



The “Maintain” level of service provides full monitoring, with Coyote Creek’s 7x24x365 staff performing Level 1 problem determination and remediation for you. In addition, Coyote Creek will also handle patching and take care of maintaining the environment. Level 2 problem determination is escalated to your personnel.



The “Manage” level of service is a complete outsourced remote monitoring and maintenance solution. Coyote Creek will run the environment for you, taking care of everything from basic monitoring to Level 2 technical service, without any need to interrupt or alert your staff. We’ll run your environment like it was our own…or better!

What Coyote Creek Manages

  • Microsoft infrastructure: Active Directory, Exchange, SharePoint, SQL Server, Lync
  • Atlassian applications: JIRA, JIRA Service Desk, Confluence, Hip Chat, Bitbucket, Add-Ons
  • Network devices and infrastructure: routers, switches, fire walls, security appliance
  • Network Management Data sheet
  • RMM Data sheet


Microsoft Lync Site Failover

Microsoft Lync Site Failover for Lync 2013

Microsoft Lync Site Failover By Romeo Cavestany Systems Engineer A client recently brought us in for some disaster recovery testing drills, including doing a complete Microsoft Lync site failover for their Microsoft Lync and Persistent Chat environment from their primary datacenter to their secondary datacenter. The exercise included failing over all of the Lync services—including front-end services, Persistent Chat, SQL and file store—and then failing it back again. The drill went very smoothly, which gave… read more

Information Technology Escalation Process

The Importance of an Information Technology Escalation Process

 Information Technology Escalation Process By: Romeo Cavestany Systems Engineer It’s almost lunch time and the phones are lighting up in the IT department. The email system is down, and everyone from the President to the Receptionist is calling to say there’s a problem. Of course, thanks to your monitoring system, IT had already noticed that something was wrong, but the calls are providing immediate feedback regarding how widespread the problem is. Because email is a… read more

Help Desk Ticket

If It’s Not in a Help Desk Ticket It Never Happened

  Help Desk Ticket By Mike Faster President It happens all the time. Joe HelpDeskGuy is walking down the hall minding his own business when he’s waylaid. Someone pulls him into a cubicle and says “I have this little IT problem to show you.” Thinking it’s just a five-minute job, Joe sits down; 45 minutes later a service has been delivered with absolutely no accountability or recognition from the business. Because it was not in a… read more

Active Directory Replication

Is Your Active Directory Replication Working Properly?

 Active Directory Replication By Romeo Cavestany Systems Engineer In a Windows infrastructure, the Active Directory (AD) database is the heart and soul of the entire networking environment. Active Directory is where all of your schema, configuration and domain naming information about your users and computers are stored. All of your other applications depend on this information to operate properly. The way that these other applications find out about any changes in this vital metadata is… read more

Exchange security

Validating Your Ability to Restore an Exchange Backup

Exchange Backup By Romeo Cavestany Systems Engineer What’s worse than having your Exchange system crash? Having your Exchange system crash and discovering in the midst of this disaster that you can’t restore it from your backup. After all, it’s not enough to have a backup system in place. You also need to test and validate that you can, indeed, use an Exchange backup to restore it. As with many disaster recovery scenarios, prior planning and… read more

information technology vacation planning

Information Technology Vacation Planning and Protecting Your Devices

  Information Technology Vacation Planning By Mike Faster President  You’re heading out on vacation for some much needed downtime. You’ve handed over your important work duties to someone else, let everyone know you’ll be out, set up out-of-office messages, and followed all of the other best practices for Information Technology vacation planning. You’re all packed up and ready to go. But have you given any thought to how you will keep your laptop, tablet, smart phone… read more