Monitoring and Observability

Latest Posts in

Practical Security Steps for Every Network Engineer

IT organizations manage security in different ways. Some companies have formalized security teams with board-level interest. In these companies, the security team will have firm policies and procedures that apply…

Knowing Which Services Are Critical to a Business Service

In the age of exploration, cartographers used to navigate around the world and map the coastlines of unexplored continents. The coastline of IT, and moreover the inner landscapes and features,…

Disaster Recovery Testing – Learning to Walk the Walk

With the influx of natural disasters, hacks, and increasingly more common ransomware, being able to recover from a disaster is quickly moving up the priority list for IT departments across…

Disaster Recovery – Time To Create Our Plan!

Thus far, we have gone over how to classify our disasters and how to have some of those difficult conversations with our organization regarding Disaster Recovery (DR). We’ve also briefly…

A Case Against Chassis Switching

If you have done any work in enterprise networks, you are likely familiar with the idea of a chassis switch. They have been the de facto standard for campus and…

Network Monitoring Overload and How to Survive

It’s always good to have a periodic reminder to consider what we’re monitoring and why. Here’s an applicable article from my colleague Joe Kim, in which he offers some tips…

Out Of Office: Health Check

So far in this series, we’ve covered setting expectations as well as migrating to Office 365. Now that your organization is up and running on the new platform, how do…

Everything I Needed To Know About IT I Learned From Logan (Part Four)

(This is the fourth and final part of a series. You can find Part One here, Part Two here and Part Three here.) It behooves me to remind you that…

Traveling With Joy

Recently, two people I respect very much tweeted about travel, and how to remain positive and grateful while you do it. You can read those tweets (here) and (here). When…

Microsoft Workstation Logs – Configuration

Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…