Remote Monitoring & Management

Microsoft Lync Site Failover for Lync 2013

Microsoft Lync Site Failover

Microsoft Lync Site Failover By Romeo Cavestany Systems Engineer A client recently brought us in for some disaster recovery testing drills, including doing a complete Microsoft Lync site failover for their Microsoft Lync and Persistent Chat environment from their primary datacenter to their secondary datacenter. The exercise included failing over all of the Lync services—including… read more

The Importance of an Information Technology Escalation Process

Information Technology Escalation Process

 Information Technology Escalation Process By: Romeo Cavestany Systems Engineer It’s almost lunch time and the phones are lighting up in the IT department. The email system is down, and everyone from the President to the Receptionist is calling to say there’s a problem. Of course, thanks to your monitoring system, IT had already noticed that… read more

If It’s Not in a Help Desk Ticket It Never Happened

Help Desk Ticket

  Help Desk Ticket By Mike Faster President It happens all the time. Joe HelpDeskGuy is walking down the hall minding his own business when he’s waylaid. Someone pulls him into a cubicle and says “I have this little IT problem to show you.” Thinking it’s just a five-minute job, Joe sits down; 45 minutes later… read more

Is Your Active Directory Replication Working Properly?

Active Directory Replication

 Active Directory Replication By Romeo Cavestany Systems Engineer In a Windows infrastructure, the Active Directory (AD) database is the heart and soul of the entire networking environment. Active Directory is where all of your schema, configuration and domain naming information about your users and computers are stored. All of your other applications depend on this… read more

Validating Your Ability to Restore an Exchange Backup

Exchange security

Exchange Backup By Romeo Cavestany Systems Engineer What’s worse than having your Exchange system crash? Having your Exchange system crash and discovering in the midst of this disaster that you can’t restore it from your backup. After all, it’s not enough to have a backup system in place. You also need to test and validate… read more

Information Technology Vacation Planning and Protecting Your Devices

information technology vacation planning

  Information Technology Vacation Planning By Mike Faster President  You’re heading out on vacation for some much needed downtime. You’ve handed over your important work duties to someone else, let everyone know you’ll be out, set up out-of-office messages, and followed all of the other best practices for Information Technology vacation planning. You’re all packed up… read more

Information Technology Vacation Planning Best Practices

information technology vacation planning

 Information Technology Vacation Planning By Mike Faster President This is the third article in my series on Information Technology vacation planning. In previous articles I talked about the importance of creating a department vacation schedule where everyone can see when everyone else is taking their vacation, and the positive side of having people out on… read more

Information Technology Vacation Planning Presents Unique Opportunities

Information Technology Vacation Planning

 Information Technology Vacation Planning By Mike Faster President In an earlier blog about Information Technology vacation planning I talked about the importance of creating a vacation schedule and asking all of your team members to communicate when they were planning to be out of the office. I even provided alink to a handy vacation planning… read more

It’s Information Technology Vacation Planning Time

information Technology Vacation planning

Information Technology Vacation Planning By Mike Faster President It’s that time of the year again: Everyone in your department is starting to plan for their vacation. Back when I was a CIO I’d get quite anxious heading into the summer months. I knew that the work wouldn’t stop just because some of my key people… read more

Improving Exchange Security through Monitoring

Exchange Security

Exchange Security By Mohan Reddy Senior Systems Engineer In my last post, “4 Best Practices for Microsoft Exchange Security,” I focused on using passwords, patches, mobile access policies and log audits to improve the security of Microsoft Exchange. In this article I’ll zero in on monitoring. For Exchange security best practices, what exactly should you… read more