Hyper-V monitoring: Here’s some tips!

Posted by on Sep 26, 2017 in Capacity Management, Nagios, Nagios-Plugins, NetEye | 0 comments

Network traffic monitoring is traditionally based on SNMP queries. This protocol generates statistics on the transmission of data across one or more network interfaces.

While network device queries still run through SNMP, using Microsoft Hyper-V monitoring requires the adoption of other approaches. One of the reasons is the network connection configuration itself: for example, many physical network interfaces of a Hyper-V device belong to a logical interface that can also distribute network traffic to multiple network devices, such as multiple switches. Another reason for using an alternative approach is that Microsoft has abandoned the maintenance of SNMP services on their operating systems.

Consider a physical network with the following configuration: a physical Hyper-V host has two active physical network connections that are connected to the network via two switches.

Esempio di cablaggio di una rete fisica

Example of a physical network

Read More

NetEye & EriZone User Group: il programma

Posted by on Sep 25, 2017 in EriZone & OTRS, NetEye | 0 comments


NetEye & EriZone User Group

Sfide e opportunità per l’IT Management 4.0

Connectbay, Mantova, Giovedì 19 ottobre 11:00 – 17:00

Vi aspettiamo il 19 ottobre al NetEye & EriZone User Group. L’evento offrirà un’occasione unica a tutti i nostri clienti per scoprire le ultime novità nell’IT System & Service Management, individuare i requisiti necessari per adeguarsi al GDPR (General Data Protection Regulation) e partecipare attivamente alla definizione della fase evolutiva delle nostre soluzioni.

A chi è rivolto l’evento:

A tutti i clienti e utilizzatori di NetEye e EriZone.

Data e location:

  •  Giovedì, 19 ottobre 2017, ore 11:00 – 17:00
  •  Connectbay, via Rita Castagna 1, Mantova

Il programma:

    •  Ecco il programma [PDF]


La partecipazione è gratuita e può essere estesa anche ai vostri colleghi. Per registrarsi è sufficiente inviare una email al seguente indirizzo usergroup@wuerth-phoenix.com.
Read More

Our contribution to the “Digital Business Forum”

Posted by on Sep 22, 2017 in EriZone & OTRS, NetEye | 0 comments

Digital Business Transformation has more than ever a strong impact on enterprise business models, the way we work and on how operational processes are faultlessly supported by high availability IT services. Best practices to leverage these changes and transform them into opportunities was the main topic of the “Digital Business Forum”, held last week in Bolzano.

Experts form Microsoft Austria, the Fraunhofer Institute, the University of Bolzano and Würth Phoenix highlighted practical experiences and gave insights on their mid-term market visions to stimulate a new way of doing business. See here a brief video-summary of the event.

Read More

EriZone – Security Advisory

Posted by on Sep 21, 2017 in EriZone & OTRS, EriZone Security Advisories | 0 comments

A vulnerability has been detected on the agent interface of the EriZone – OTRS system. The following is valid for all OTRS 3.3.x, Erizone 3.x and EriZone 5.x systems.

This vulnerability takes advantage of a hole in agent statistics module and has been classified with a “high” risk.

To guarantee the security of your system, we recommend applying last released patches.

For EriZone 5.2:

Via Admin >> Package Manager
Click on “Update repository information” and upgrade the packages strictly in the following sequence:

  • EriZoneCore
  • EriZoneServiceDeskEnhancement
  • EriZoneTheme


For EriZone 3.6:

Via Admin >> Package Manager
Click on “Update repository information” and upgrade package:

  • EriZoneCore


For both systems, after previous procedure use a console to launch following commands:

  • /opt/otrs/scripts/EriZone/erizone.global_makelink
  • /opt/otrs/scripts/EriZone/Permissions.sh
  • /opt/otrs/scripts/EriZone/RestartEriZone.sh


Further information regarding this topic can be found on https://www.otrs.com/security-advisory-2017-04-security-update-otrs-versions/

The update for Erizone 5.2 will also fix two more bugs.



Technical details:

  • Date: 2017-09-19
  • Title: Code Injection / Privilege Escalation OTRS
  • Severity: High
  • Product: OTRS 3.3.*, EriZone 3.* and EriZone 5.*
  • ID: OSA-2017-04
Read More

Do you want to prevent cyber-attacks? NetEye and Kibana can help.

Posted by on Sep 19, 2017 in Information Security Operations Center, NetEye | 0 comments

cyber attacks as a technology concept illustration design

IT security is one of the highest priorities for every CIO. Cyber-attacks are now a reality that we must deal with on a daily basis. More and more organizations have been the victims of so-called cybercrimes that are the cause of financial losses, operational problems and consequences to the company’s reputation.

That is why trying to better structure your defenses, and increase efficiency and reactivity in case of an attack, are now key goals for IT departments. How should we adapt to these new needs? One of the most important actions to take is the creation of an Information Security Operations Center, which implements IT security and proactively monitors IT infrastructure.

A new IT Security Management Strategy

Lately, in the Banca Informatica Bancaria Trentina Group where I work, we have increasingly focused on the realization of an Information Security Operations Center. To ensure security and to better control cyber-attacks, we are now leveraging the advantages offered by Kibana and Grafana: Data Visualization Modules integrated into NetEye. These tools allow you to create dashboards that are easy to interpret. More specifically, we focused on the generation of dashboards for infrastructure load (e.g., the CPU usage of the various nodes and the bandwidth load of the switches) and for the security events that allow us to rapidly identify if our organization is under attack.

These dashboards offer a concrete benefit in those situations where it is fundamental to quickly identify the root cause of a problem, such as within an ISOC.

Read More

NetEye & EriZone at it-sa

Posted by on Sep 13, 2017 in EriZone & OTRS, NetEye | 0 comments


Be our guest on the it-sa

Between the 10th and 12th of October, we welcome you at Europe’s largest IT security fair trade, the it-sa in Nuremberg-Germany.

By visiting our stand located in Hall 10.1 – 520, you will get the latest insights on all new functionalities related to NetEye, EriZone and ntop – especially in Cloud and IoT environments.

When and where

Get your free, personal ticket by inserting our special guest-Code A384367 at it-sa.de/Gutschein. We´re looking forward to meet you there!!

Read More

JavaScript Design Patterns in Icinga Web 2

Posted by on Sep 11, 2017 in Development, NetEye | 0 comments


Are you looking for some guidelines on how  to create new JavaScript functions in Icinga Web 2?  This article will show you the necessary structure your function should have in order to compile correctly with Icinga.

If you’ve already looked at some example functions within the existing Icinga JS code, you will have noticed that all these functions follow the Design Patterns structure.

What is a Design Pattern?

Design patterns are advanced object-oriented solutions to commonly occurring software problems.  The bane of every developer is writing readable, maintainable, and reusable code, and design patterns are crucial for solving this challenge.  Solid design patterns are the basic building block for maintainable software applications. In other words, a design pattern is a reusable software solution to a specific type of problem that occurs frequently when developing software.

Design Patterns in JavaScript

Talking about Object Oriented solutions related to JavaScript can be confusing, as JavaScript does not really have the concept of a “class”; a more correct term is “data type”. JavaScript is an object-oriented language where objects inherit from other objects in a concept known as prototypical inheritance. This means that a data type can be created by defining what is called a constructor function.

Read More

NetEye 3.11 and EriZone 5.2 have been released!

Posted by on Sep 1, 2017 in EriZone & OTRS, NetEye, Release Notes | 0 comments


We are proud to announce the release of new minor versions of our IT System & Service Management solutions NetEye and EriZone. These release notes describe the new features and improvements and provide information on how to upgrade.

Please find more details on our corporate webpages by clicking on the following links:

Read More

Non mancare al prossimo NetEye & EriZone User Group

Posted by on Aug 31, 2017 in EriZone & OTRS, NetEye, ntop | 0 comments


NetEye & EriZone User Group

Sfide e opportunità per l’IT Management 4.0

Connectbay, Mantova, Giovedì 19 ottobre 11:00 – 17:00

Siamo lieti di invitarvi il 19 ottobre al NetEye & EriZone User Group. L’evento vi offrirà un’occasione unica per scoprire le ultime novità nell’IT System & Service Management, individuare i requisiti necessari per adeguarsi al GDPR (General Data Protection Regulation) e partecipare attivamente alla definizione della fase evolutiva delle nostre soluzioni.

Read More

Upgrading your Windows computers with WSUS? Here’s a guideline.

Posted by on Aug 22, 2017 in NetEye | 0 comments

Windows Server Update Services (WSUS) is an application developed by Microsoft that enables administrators to manage the distribution of updates for Microsoft products to computers in a corporate environment.

The first version of WSUS was known as Software Update Services (SUS) and was created in 2005. Only after 2008 it was distributed as an installable server role.

WSUS manages the update catalog for Windows components and other Microsoft products, the approval cycle, as well as the distribution of updates on a local network. However, it has no control over when and how such updates are applied to the target computers: even with this limit, WSUS is the ideal solution because it is free and easier to manage than the System Center Configuration Manager, a product that can both force and centrally control the distribution of updates.

Read More

Life Cycle Asset Management with GLPI and OCS Inventory

Posted by on Aug 9, 2017 in Asset Management, NetEye | 0 comments


If you are using our Asset Management module integrated into NetEye, you probably already know about the potential of OCS Inventory and GLPI. However, often users are not aware of all the functionalities available in Life Cycle Asset Management. So let’s highlight some of the most important features to manage the entire life cycle of your assets:

Read More

Save the date! – NetEye & EriZone User Group 2017

Posted by on Aug 3, 2017 in EriZone & OTRS, NetEye | 0 comments


NetEye & EriZone User Group

Challenges and opportunities in the IT Management 4.0

Connectbay, Mantova, October 19, 11:00 – 17:00

We are glad to invite you to attend the NetEye & EriZone User Group. The yearly event for our customers will offer you the possibility to discover the innovations in the IT Service Management field, to identify modern approaches for the Performance Monitoring and to participate in the definition of our solution roadmap.

Read More

Next Level Performance Monitoring – Part II: The Role of Machine Learning and Anomaly Detection

Posted by on Aug 2, 2017 in NetEye, Real User Experience Monitoring | 0 comments

Machine learning and anomaly detection are being mentioned with increasing frequency in performance monitoring. But what are they and why is interest in them rising so quickly?

From Statistics to Machine Learning

There have been several attempts to explicitly differentiate between machine learning and statistics. It is not so easy to draw a line between them, though.

For instance, different experts have said:

  • “There is no difference between Machine Learning and Statistics” (in terms of maths, books, teaching, and so on)
  • “Machine Learning is completely different from Statistics.” (and the only future of both)
  • “Statistics is the true and only one” (Machine Learning is a different name used for part of statistics by people who do not understand the real concepts of what they are doing)

The interested reader is also referred to:
Breiman – Statistical Modeling: The Two Cultures and Statistics vs. Machine Learning, fight!

In short we will not answer this question here. But for monitoring people it is still relevant that the machine learning and statistics communities currently focus on different directions and that it might be convenient to use methods from both fields. The statistics community focuses on inference (they want to infer the process by which data were generated) while the machine learning community puts emphasis on the prediction of what future data are expected to look like. Obviously the two interests are not independent. Knowledge about the generating model could be used for creating an even better predictor or anomaly detection algorithm.

Read More

Using Active Direcory for defining new NetEye Users

Posted by on Jul 31, 2017 in NetEye | 0 comments

Every so often I get asked whether it is possible to integrate Active Directory Users and Groups with NetEye. Until now my answer has always been that it is possible to use AD via its LDAP functionality as an authentication backend, and that you may manually add each AD user one-by-one to NetEye.

I was never very satisfied with this answer and so I tried to find a solution.  Here’s what needs to be done:

Read More

Keeping an eye on your EriZone process tickets

Posted by on Jul 10, 2017 in EriZone & OTRS | 0 comments


Usually, during a new EriZone implementation, we are not just implementing “simple” Incident Management, but also defining processes to standardize existing procedures within the company.

Investing time now in the implementation of a standardized process will pay dividends later, especially in the case of multilevel authorizations or other workflows where the ticket needs to follow a predefined path.

Thanks to EriZone’s “process bundle”, tickets that have a given service and category automatically trigger a predefined process flow. Thus a new ticket automatically enters the appropriate pipeline defined in the standardization process.

Read More