Call us on
01732 762675
Akita logo

Server Monitoring

By taking a proactive approach to supporting our customers’ networks and providing real-time server monitoring, we can work to prevent potential problems occurring through:

  • Using monitoring software which will alert us to potential problems
  • Advising on how to get the best from available hardware and software
  • Ensuring software patches are applied regularly
  • Ensuring anti-virus and where necessary anti-spyware and anti-spam software is in place and up to date.
  • On-site checkups where we can discuss any IT queries.
  • Ensuring your data and network security systems are adequate.

Our monitoring service will proactively check that your systems are up. Issues can then often be resolved before our clients are even aware. This prevents small issues from developing into problems before they affect users, thereby increasing your productivity as there is a lower chance of user disruption.

By being proactive, we will ensure that your system uptime is maximised. By having a greater involvement with your network, we can improve performance as well as minimising security risks, etc.

A multitude of services can be monitored including:

  • Microsoft Exchange
  • Terminal Services
  • SQL Server
  • Active Directory
  • Directory size function
  • CPU usage function
  • Disk drive function
  • Disk space function
  • File existence function
  • File size function
  • POP3 Email
  • Web Server

More specifically, these can be broken down into standard monthly reports which provide you with the sort of granular information and comprehensive IT auditspreviously only available to organisations with enterprise-level IT systems.

Software Audit

Our comprehensive software audits include: Operating System version (Service Pack Level & optional hotfix level), other installed software, Licences, version number, paths and descriptions, PUPs (Potentially Unwanted Programs such as MSN, file sharing software, any non-business software), Anti-virus Software (Updates and Version), Anti-malware Software (anti-spy / anti-phishing / anti-trojan).

Hardware Audit

Hardware audits enable a complete asset list to be compiled, detailing: Manufacturer and model, Service Tag or other manufacturer identification Disk Space, Processor Type, PCI Cards, Approximate age of machine, Printers, Misc network hardware details.

Network Infrastructure Audit

An audit of your network infrastructure enables us to document switches, ports in use and available, router information including firmware / OS version, Wide area connection details, Local, WAN and gateway IP addresses, DNS, WINS, DHCP, and MAC address, Inventory of internal and external network links, Password policy & ISP details.

Other services Contact us