Menu
Is free
check in
the main  /  Firmware / Network monitor program. Programs for system administrators, network programs

Network monitor program. Programs for system administrators, network programs

Your internet connection may be the result of several different factors. This includes factors such as malfunctions on the Internet provider side, wrong work Modem, router and other network equipment, as well as increased network activity of programs.

Therefore, if you are sure that the problems with the provider and equipment are excluded, then you should look at the computer itself.

And the first, where to start, it is to check the Internet activity of programs, then-there see which applications are connected to the Internet in this moment. To our happiness, operating windows system It has a free embedded tool that will help the user track the increased network activity of applications.

To make sure that no applications in the background do not use your Internet connection, you just need to use the "Windows Resource Manager") built into the "Windows Resource Manager" operating system. Baister!

Running resource monitor. Most fast way, It is clicking on the keyboard. The key + R keys. Next, go to "Start" - "All Programs" - "Standard" - "Run", where in the "Open" field, enter "RESMON" and press the "OK" button.

Network activity

In the resource monitor, open the "Network" tab, where you will see all the processes with the Internet activity, namely:

  • process name (its executable file);
  • ID (its identification number);
  • the average byte per second received / sent from the start of the program.

You can control the process (suspend / complete), right-clicking the context menu on the executable file of the required process.

If the process (executable file) is unfamiliar to you, with the same context menu And the item "Search on the Internet" you will read about it.

In order to find out in detail which applications use the process "svhost.exe" I recommend using the utility " Process Explorer.", Which is easily downloading from the Internet. That's all!

If you want to find out what amount of traffic consumes a Windows computer for a certain time, then you need to use third-party solutions. In the Task Manager or in the Resource Monitor, only current network consumption values \u200b\u200bare available, so these tools are not suitable for monitoring traffic for a specific period. Some routers and modems collect data about consumed by traffic - You can view these values \u200b\u200bby contacting the device administrator panel.

Why keep monitoring traffic consumed? Traffic accounting is simply necessary when using limit Internet connections, but it can also be useful on unlimited tariffs.

Some Internet providers limit monthly traffic on certain tariffs. If the limits exceeding the limits, the user either must be paid for an additional quota, or be content with a reduced connection rate until the end of the reporting period. Traffic monitoring allows you to avoid similar unpleasant situations.

Traffic analysis allows you to better understand what amount of data you consume during the reporting period. This information will be useful when changing the Internet provider or tariff plan.

The tools presented below are designed to account for traffic on Windows computers. All programs are free, and their testing was performed on computers running Windows 7 and Windows 10.

free utility To monitor traffic in Windows. The program tracks daily, weekly and monthly traffic intake and shows a desktop widget with visualization of data transmission and reception.

Users Alerts are available, setting the limitations of the provider and the calculation of traffic using the built-in calculator. Bitmeter II allows you to start the counter during which you can track various connection metrics.

The statistics section displays traffic consumption data over the past few hours, days and months. You can view them in a graphic or tabular form.

GabnetStats.

- Portable program for devices Microsoft Windows.which allows you to track traffic consumed and other indicators. The program started without failures on all test systems and immediately started tracking traffic.

The left click on the system tray icon opens the schedule and traffic statistics. The widget closes automatically five seconds, but you can change this behavior and activate the constant display of the widget on the desktop.

The program tracks sent and received data bytes, the average connection speed and many other parameters. Select Advanced Statistics to view the total number of received and sent packets, the number of routes and IP addresses, as well as TCP / IP configuration information.

The developer's website is no longer available, but you can download the program from our site.

Note: To install this program in new versions of Windows 10, it is recommended to configure compatibility with earlier windows versions. To do this, right-click on the downloaded file and select Properties\u003e Compatibility\u003e Run the program in compatibility mode: previous version Windows.

NetspeedMonitor shows incoming and outgoing traffic in the task panel notification area (system tray). Mouse over the icon to watch traffic for a specific session, day or month. The right mouse button opens the available parameters and traffic statistics interface for a certain period.

The program is available as a separate installer and portable version. The utility is fully compatible with all modern versions Windows.

Note: The portable version issued an error in Windows 10 when trying to start without administrator rights.

When you start NetTraffic displays a network activity schedule on the desktop with the number of sent and received data. By default, the window is always displayed in the foreground, but you can turn off this mode, resize window and other work options.

Right click on the icon in the system tray opens access to parameters, statistics and additional tools. In the Statistics section, you can see traffic consumption for the selected period or for certain time intervals: month, day or year.

In the settings, you can change the design of the widget and set the quota by traffic. Among the available network utilities: Ipponfig, Netstat and Route.

The program has been distributed free of charge, now new versions have become paid. In this case, the last one free version Utilities (NetWorx 5.5.5) are still available for download on our website and has no restrictions on functionality.

Immediately after starting NetWorx, it starts monitoring traffic consumption, and an application icon appears in the system tray. Dual click on the icon opens statistics: you can view general data, as well as data per day, week, month, breakdown data by applications. For convenience, different data views are posted on separate tabs.

You can use the program to monitor traffic consumed by individual applications. To do this, go to Settings\u003e General and in the section Watch connections Turn on the parameter Ignore local traffic (within the network).

Right click on the icon in the system tray to access access to additional features. You can enable the display of the widget on the desktop to track traffic consumption in real time, start measuring the connection speed or open the quota installation screen.

Users are available to several network tools such as Trace Route or Ping.

comparison table

Unfortunately, some of the listed tools are no longer supported. No doubt is the most professional decision To monitor traffic with powerful functionality, but the free version of the utility is also no longer supported by the developer.

At the same time, it is worth noting that Microsoft tests the built-in tool in Windows 10 (version 2003), which is expected in spring 2020.

Most likely you know the built-in firewall in it. You may also know how to allow and block the access of individual programs to the network to monitor the incoming and outgoing traffic. But do you know that Windows Firewall can be used to register all connections passing through it?

Windows Firewall Logs can be useful in solving individual problems:

  • The program used cannot connect to the Internet, despite the fact that this problem is not observed with other applications. In this case, to troubleshoot the fault, check whether the system firewall does not block the requests for the connection program.
  • You suspect that the computer is used to transfer data to the malicious program and want to monitor outgoing traffic on suspicious connection requests.
  • You have created new permissions and block access rules and want to make sure that the firewall correctly processes the specified instructions.

Regardless of the causes of use, the inclusion of event logging can be a challenge, as it requires many manipulations with the settings. We give a clear algorithm of actions, how to activate the registration of network activity in Firewall Windows.

Access to the Faervola settings

First, you need to go to the extended settings windows Firewall. Open the Control Panel (click right-click on the Start menu, the "Control Panel" option, then click the Windows Firewall link, if you have a small / large icons, or select the "System and Security" section, and then "Windows Firewall ", If there is a viewing mode category.

In the firewall window, select the option in the left navigation menu " Extra options”.

You will see the following screen settings:

This is the internal technical side of Windows Firewall. This interface allows you to allow or block Internet access access, customize incoming and outgoing traffic. In addition, it is here that you can activate the event registration feature - although it is not immediately clear where it can be done.

Access to the log settings

First, select the option "Windows Firewall in Hypersed Safety (Local Computer)".

Right-click on it and select the "Properties" option.

A window will open that user can confuse. When you select a three tab (domain profile, a private profile, a common profile), it can be noted that their contents are identical, but refers to three different profiles, the name of which is indicated in the tab title. The tab of each profile contains a logging button. Each magazine will correspond to a separate profile, but what profile do you use?

Consider what each profile means:

  • Domain profile is used to connect to wireless wi-Fi networkWhen the domain is set by the domain controller. If you are not sure what it means, it is better not to use this profile.
  • Private profile is used to connect to private networks, including domestic or personal networks - It is most likely to use this profile.
  • The general profile is used to connect to public networks, including chains of restaurants, airports, libraries and other institutions.

If you use a computer in home network, Click the "Private Profile" tab. If a public network is used, go to the General Profile tab. Click the "Set" button in the logging section on the correct tab.

Activation of event log

In the window that opens, you can configure the location and maximum size magazine. You can set a easily memorable location for a log, but in fact the location of the log file does not have much values. If you want to start logging events, in both drop-down menu "write missed packets" and "write down successful connectivity" set the "Yes" value and click OK. Permanent operation features can lead to performance problems, so activate it only when you really need to monitor connections. To disable the logging function, set the value "no (default)" in both drop-down menus.

Studying magazines

Now the computer will fix the network activity controlled by the firewall. In order to view the logs, go to the "Advanced Settings" window, select the Observation option in the left list, and then in the "Logging Settings" section, click the "File Name" link.

Then the network activity log opens. The contents of the log may confuse an inexperienced user. Consider the main content of the log entries:

  1. Date and connection time.
  2. What happened with the connection. The status "Allow" means that the firewall allowed the connection, and the status "drop" shows that the connection was blocked by the firewall. If you are faced with the problems of connecting to the network of a separate program, you can accurately determine that the cause of the problem is related to the firewall policy.
  3. Connection type - TCP or UDP.
  4. In order: The IP address of the connection source (computer), the recipient IP address (for example, web pages) and the network port used on the computer. This entry Allows you to identify ports that require discoveries for software. Also follow suspicious connections - they can be committed by malicious programs.
  5. Whether a data package was successfully sent or received.

Information in the journal will help find out the reason for the connection problems. Magazines can register other activity, such as the target port or TCP confirmation number. If you need details, read the "#fields" string in the top of the log to identify the value of each indicator.

Do not forget to disable the logging function after completing the work.

Extended network diagnostics

By using the Windows Firewall Log, you can analyze the types of data processed on the computer. In addition, it is possible to establish the causes of the network problems associated with the work of the firewall or other objects that violate the compounds. The activity magazine allows you to familiarize yourself with the work of the Faervol and get a clear idea of \u200b\u200bwhat is happening on the network.

We have made another list of excellent free tools for monitoring servers and networks. They are very important for any business leading through a website or network. The server monitoring and network allows you to be aware of all questions as they occur; And this, in turn, allows you to make the right actions.

Ganglia is a variable monitoring system for high-performance computing systems, such as clusters and cells. It is built hierarchically, and aims at combining clusters.


Monit - Available utility for managing and monitoring processes, programs, files, directories and file systems in uNIX system. Monit conducts automatic maintenance and repair, and if errors occur, can perform actions corresponding to each specific case.


Nagios offers complete control and alert for servers, applications and services.


Collectd is a demon who periodically collects system performance statistics and provides mechanisms for storing values \u200b\u200bin various forms, for example, in the form of RRD files.


CACTI is a comprehensive network graph solution, designed to use RRD-tools and graphic functionality. Cacti provides the ability to create advanced graph templates, several methods of data collection, as well as a new look at user management functions. All this is wrapped in an intuitive and simple interface that makes sense both for LAN networks and for complex networks With hundreds of devices.


IT organizations use the ZENOSS server, a network and cloud monitoring to control dynamic data processing centers.


Argus is an application for system and network monitoring.


OBServium is an automatic detection platform for SNMP-based network monitoring, written in PHP, which includes support for a wide range of network equipment and operating systems, including Cisco, Windows, Linux, HP, Dell, FreeBSD, Juniper, Brocade, NetScaler, NetApp and much more.


The smallest free tool for monitoring computers in local network and any Internet hosts. You just need to start EasyNetMonitor, open the pop-up menu to the tray and get information about the status of computers on the network.


Network Analyzer (Package Interceptor) Capsa Free - This software for windows platformsService Packages and Analysis Protocols, the best free analytical tool for network monitoring and troubleshooting.


Free online proxy to eliminate bugs suitable for any browser, system and platform.


Zenoss Core is an application for managing a corporate network and systems written in Python. Zenoss provides an integrated product for monitoring the availability, performance, events and configuration of all layers and platforms.

Local network monitoring is a continuous process, which is associated with the observation of the working network. The process performs the following functions:

  1. Timely error detection and malfunctions.
  2. Adequate and fast response to errors and malfunctions.

Monitors network status system administrator.

For convenience, use various software Alerts. One of these applications is the following development. Total Network Monitor from SoftInventive Lab.

Monitoring systems

The basic requirements that should be in the network monitoring software are allocated:

  1. Support for all types of network connections, including WiFi network.
  2. Slotting for network activity.
  3. Defining the details of system and network services.
  4. Analysis remote computers and web servers.

Monitoring systems should provide reports about events for certain time periods. It is important to keep the entire listing of activity and archive it in the appropriate magazine.

It is required to distinguish the tools that ensure control of external network access and software, which is important for monitoring inside network processes.

The network activity monitoring is determined as follows:

  1. The application with a certain period sends requests for necessary iP network addresses.
  2. If such a request is incorrect or unsuccessful, the signal is sent to the sysadmin.
  3. Automatic Definition of Action, which are regulated by the Network Protocol.

Monitoring methods

There are many methods and means for monitoring network connections. The features of their use depends on the objectives of the process, network configuration, file System etc.

Main methods:

  1. Protocol analyzers. System data is needed solely to control network traffic.
  2. Integrated management and analysis systems. Used for software and hardware environment. Provide control of certain programs, communication segments and individual devices on the network.
  3. Network management. This includes software that collects data about network processes and about the state hardware block. Tracks all network traffic.
  4. Cable equipment. Certification and testing cable networks.

The Total Network Monitor program now refers to the most relevant working network monitoring applications. Software provides timely tracking problems, checks on relevance and works with anti-virus bases.

Today, the success of many enterprises and organizations to a great extent depends on the reliability and quality of the operation of the networks and network applications. Network monitoring under which the systematic control of key indicators of network functioning and network applications is understood, helps to detect and eliminate the emerging and brewing problems in their work to support the quality of user service at the proper level. In addition, network monitoring is extremely important to ensure information securityBecause it allows you to identify dangerous actions of users and malicious software.

Types of network monitoring

Distinguish passive and active network monitoring. With passive monitoring, key indicators of network functioning and network applications are controlled by analyzing real traffic The current network, "observed" at different points, and with active - specially generated test traffic is used to determine these indicators.

In turn, highlight three main types of passive monitoring: monitoring on packets (capture and analysis of network packets with monitoring tools), SNMP monitoring (SNMP device survey for information about their status and traffic) and monitoring of streams (information collection About traffic flows using XFLOW protocols, etc.).

Being one of the types of passive monitoring, network monitoring on the packet database is carried out by passive (not transmitting test traffic) by monitoring devices that analyze captured packets.

Optimal connection of passive monitoring devices

IT specialists use various devices Passive monitoring (including protocol analyzers, RMON probes, NetFlow collectors, IDS / IPS systems and probes that can record large amounts of network traffic), intended for serial (inline) or an out-of-band (OUT-BAND) connection to network lines.

Kaspersky Internet Security

For OUT-OF-BAND connection of monitoring devices, it is best to use special network couplels.

The network coupler is included in the rupture of the network line. Walking through yourself a duplex traffic transmitted over a line, a network coupler copies its half (counter packet streams) to its monitoring ports intended for connecting monitoring devices (see Figure). Unlike the Ethernet switch with span ports, the network coupler never discards any packages, including defective, and thus provides 100% (!) Traffic control in the line.

Network couplers do not affect the operation of the network and do not reduce its reliability, because when the power failure fails, the branch for the copper line remains transparent to controlled traffic, and the fiber optic branch is a passive device that does not require power supply at all. In addition, because the monitoring device connected via the aquer does not need an IP address, it is isolated from the network, which significantly reduces its exposure to hacker attacks.

There is a wide range of network coupler for copper or fiber optic lines that support various maximum data transfer rates - from 10 Mbps to 100 Gbit / s. In addition to ordinary couplers, regenerating couplers are produced, which are used when the same traffic must be monitored by several different devices Monitoring simultaneously. From the ordinary coupler, the regenerating coupler is characterized by an increased number of monitoring ports. If the number network channelsYou need to control, exceed the number of available monitoring devices, you can use an aggregating coupler, which combines traffic from several controlled channels and outputs the total stream through several of its monitoring ports (see Figure). However, the speed of this stream may exceed throughput The port of the monitoring device, which will lead to an invalid packet loss. To reduce the likelihood of loss of packets, you need to select the model of the aggregating coupler with a sufficiently large buffer memory.

Functioning of aggregating and network counters

The overload of the monitoring device may occur when it is connected to a faster network channel (for example, if using a 10-gigabal reservoir, connect the analyzer with the 1GE port to the 10GE channel). To reduce the load on the monitoring devices, pre-filtering of branch traffic is widely used so that this device receives only those data that should be needed to perform its basic functions (for example associated with intrusion detection). Also, using a device with a high-speed load balancing function, you can roughly divide between multiple monitoring devices. At the same time, it is often important that the integrity of the transmitted packet flows is saved, that is, all packets related to the same stream must enter the same monitoring device in the load balancing group.

Traffic filtering and load balancing allow you to protect the investment in the available monitoring devices when implementing increasingly high-speed network technologies. Functions of aggregation, regeneration, traffic filtering and load balancing are available in network packet brokers. Thus, if the monitoring devices often have to switch from one controlled channel to another and / or need to flash the traffic and load balancing functions, you should connect these devices to networks or span ports through network packet brokers, and not directly.

Enter bypass (BYPASS) Switch, if necessary, implement a trouble-free inline connection of a device for monitoring or providing information security (for example, IPS). If this device for any reason ceases to function, the bypass switch will send traffic into account and thereby saving (for users) the availability of critical services and applications (for more details, see "Solutions for Inline Connecting Devices of Monitoring").

IXIA, A KEYSIGHT BUSINESS, produces a wide range of couplers, bypass switches, as well as brokers of network packets of the Vision family. Vision devices are switched, aggregated, regenerated, filtered and uniformly distributed to the control of traffic to be controlled on the monitoring devices connected to them. The most intelligent broker models in this family - Vision One and Vision 7300 - perform a wider range of functions, including deduplication and truncation of packets, supplying them with high-precision time marks, identification and monitoring of application traffic (for details, see "IXIA monitoring solutions functionality"). For centralized management of VISION network packet brokers installed on the controlled network, IXIA issues the solution of IXIA Fabric Controller (IFC).

The network monitoring market presents a comprehensive solution to the new generation of Intelligent Monitoring Fabric (IMF) of CPACKET Networks. Compared with traditional systems network monitoring, the IMF solution has improved scalability, increased performance, Provides a deeper analysis of the network operation, reduces the current and capital costs. The IMF includes monitoring nodes that have a network packet and network analyzer broker functions.

Monitoring cloud media

In conditions of rapid growth in popularity cloud computing IT professionals must guarantee data security and applications, optimize cloud performance and as soon as possible to troubleshoot problems in their work. To perform listed tasks, cloud traffic is needed. Such control provides the IXIA Cloudlens platform designed to monitor the work of private, public and hybrid clouds. In the process of monitoring the work of a public cloud, the CloudLens platform operates in this cloud and provides a monitoring service with traffic filtering capabilities. CloudLens has a unique peer-to-peer (peer-to-peer) that saves all the advantages of cloud computing, including flexibility and scalability on demand. The peer-to-peer architecture provides direct connections between cloud objects (cloud instances) that generate controlled traffic and virtual monitoring devices. In competing solutions, a central node is used, aggregating and filtering traffic. Such a monitoring system is worse scaled, it is more expensive, it is less flexible.


Peer Architecture Cloudlens.

Part of the CloudLens platform is the Cloudlens PrivaTe solution, which is monitored by private clouds. This solution will branch out traffic from virtualized networks, processes this traffic and submits to control packets to virtual or physical monitoring devices.

Take care of monitoring in advance

It is recommended to initially plan to implement the monitoring infrastructure as part of future network And when it is built to install equipment for connecting monitoring devices along with other network equipment.

When organizing a network monitoring system, it is necessary to provide opportunities for monitoring the traffic of critical network channels at the level of access, distribution and nucleus of the network, as well as in the Code where the enterprise servers are located.

Since many high-speed lines are concentrated in the network and in the network core, it is recommended to install multiported aggregating couplers and network packet brokers. Using this equipment will reduce the number of network monitoring devices, because if you have the ability to aggregate and switch traffic from keypoints, it disappears the need to install on a monitoring device in each of them.

Currently, high-speed high-speed distribution are becoming more widely distributed network technologiesproviding data transfer rate up to 100 Gbps. Using these technologies can significantly reduce the number of lines in the nucleus of the network and reduce the cost of its maintenance, but at the same time the requirements for the reliability of each high-speed line increase, since its refusal will affect the work more Users and applications. Obviously, in the process of operating a cent or corporate network The main line cannot be disconnected even for a few seconds to insert a fiber-optic branch in it to supply the traffic of this line to the monitoring device. Therefore, the couplers are better installed on the trunk lines initially (still at the deployment stage cable system). This will allow, in the future, if any problems occur to quickly connect the desired monitoring or diagnostic devices to the lines of interest without separation.

Our programs for system administrators It will help to keep abreast of everything that happens in the computer park and network of the enterprise, to respond in time to the failures of the equipment and problems in software, minimize costs and downtime. This page provides programs for network monitoring, servers and hosts, for PC inventory, accounting installed programs and licenses, creating reports on the "gland" of computers, to account for traffic on the network, to study the network topology and creating graphic schemes of local networks.

The network administrator can also use the program to search for files in local networks and auditing user access to server file resources over the network. All these programs will help sysadmin to improve performance. network devices and servers and ensure the proper level of security in the enterprise network.

The 10-Strike programs are included in the unified register of Russian programs for the Ministry of Communications and can participate in public procurement.

Network Administrator Programs, Network Utilities

Computer Inventory (Pro) 8.5

- program for inventory and accounting for established software and hardware On computers in local networks. "Computer Inventory" allows system administrators to account for computers in the enterprise network, view the configurations of remote computers and lists of installed programs on the network, track configuration changes and software. The program contains a powerful report generator. For example, you can create. For planning upgrades You can create report containing computers with insufficient disk volume or random access memory . Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Lanstate (Pro) 8.8R

program for monitoring servers and computers onlineallowing visual to observe current state Your network at any time. Lanstate monitors hosts on the network, tracks connections to network resources, monitors traffic, and signals different events. Lanstate contains many features useful for network administrators: mailing messages, turning off remote computers, scan hosts and ports, receiving various information from remote computers (access to the registry, Event Log, etc.). Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Network Monitoring (Pro) 5.5

program for monitoring servers and other network devices, monitors network performance and notifies the administrator about failures. Find out on time about the lost failure (communication break, completing the place on the server disk, stop service, etc.) and eliminate the problem with minimal time loss. The program signals about malfunctions using sound, on-screen messages, by e-mail, can run external programs and services, as well as reboot computers and services. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

"Accounting Software" 8.5

- program for inventory and accounting for installed software on computers in local networks. "Software Accounting" allows network administrators to maintain installed programs on network computers and track changes. The program contains report generator. For example, you can create reports on the availability of certain programs on computers and their number.

LAN Monitoring: Systems and Work Methods

Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Network Scheme 3.33.

program for building a local network schemewhich allows you to detect network devices and place them on the card scheme. If your switches support SNMP protocol, the program will draw connections between devices automatically. It remains only to move the icons of the devices with the mouse and your network scheme is ready. You can finalize the scheme using powerful built-in editing tools, draw connections, apply inscriptions, draw areas, pour them with different colors. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Traffic account 3.7.

program to account for traffic online, monitors the scope of the data and the speed of information transfer in the network. You can control traffic both on user computers and on the ports of switches. Alerts allow you in time to learn about traffic overwrings on any port. You can real-time to observe the distribution of loads on the channel, build graphs, charts and reports. All the collected traffic flow data is saved in the database for analyzing statistical information and reporting. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Remote access 5.0

program for managing remote computersover the network. You can configure access to network users computers and administer their PCs remotely. The program provides HelpDesk mode to provide those. Support remote clients via the Internet. You can connect to PCs and servers within the network, or access computers to the Internet on credentials or Hardware ID. In this case, you do not need to make ports through the router / router. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-STRIKE NETWORK FILE SEARCH (PRO) 2.3R

the program for finding files on the LAN computers (according to NetBIOS and FTP). Enter the phrase or file masks and find the information you need. When viewing the search results, the found files can be opened immediately, save to disk, or generate a report. When searching, a multi-threaded technology is used, which significantly speeds up work. You can set filters based on file size and change date. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Connection Monitor (Pro) 4.8R

network User Connection Monitoring Program on the network to the shared folderand filesAllows you to learn about connectivity to the computer network connections. The program is submitted sound signals, issues alerts on the screen, and leads a detailed journal of connections, which records information about who and when connected to the network folders of the computer, which files opened, etc. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike: Network Scan 3.0 Free!

- Local network scanner, IP addresses and hosts. This free program Allows you to scan the local network and detect active hosts, computers and servers. Supported scanning of IP address ranges and multiple protocols for detecting network devices (ICMP Ping, search for open TCP ports, NetBIOS, SNMP, UPNP, ...). With administrator rights with windows computers Most can be considered useful information. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Sets of network programs for sysadminov

Program sets for system administrators allow you to save money when buying several of our network programs Or everyone at once. Get three programs at the price of two etc. For example, when buying Complete set of administrator programs in the variant " on the organization"(without restrictions on the number of jobs), consisting of all our programs for network administrators, save up to 100 000 rubles or 45%!

Other utilities

10-Strike SearchMydiscs 4.43R

cD cataloging (CD, DVD).

With it, you will quickly find files On CD and DVDs of your collection. SearchMydiscs helps to organize CD collections and DVD discs, allowing you to find disc For a few seconds. If you're tired every time a long time to search for the desired disk - this program is for you! Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

10-Strike Log-Analyzer 1.5

rAW Analyzer Apache Web Server Log. Creates various reports and histograms. The program has a lot of settings and filters, which will allow you to get accurate information about your site downloaded files, and about who comes from. Supports Windows XP / 2003 / VISTA / 2008/7/8.1 / 2012/10/2016.

Payment and delivery

When ordering programs legal entities Payment is made by non-cash payments. The bills are exhibited by B. in electronic formatThe contract is concluded. Delivery electronic: the distribution is downloaded from our site, registration keys Sended after payment by email. After payment, the original treaty and documents for accounting are sent to the buyer by mail.

Write an account (specify required programs and license types, their details and name of the director for the contract)

All our programs are also represented in the online stores of Sofkay and AllSoft (Follow the links "Buy" from our site).

Monitoring network

We present Zabbix - a program for monitoring and analyzing all basic parameters of the local network.

What is the local network monitoring system

Local network monitoring

The Zabbix solution allows you to quickly evaluate and diagnose the status of the local network as a whole, to conduct express monitoring of the basic parameters of the local network servers, monitor network equipment and workstations.

Monitoring servers

The system administrator will always know how much free space remains on hard diskshow much processors and operational memory are loaded. Thus, on the basis of objective data, you can make decisions on the redistribution of the load between servers, on the upgrade of the available servers, or the need to purchase additional.

Operational alerts on emergency situations

The most important function of Zabbix is \u200b\u200bthe alert of personnel about all impending or emerging problems. The operational alert mechanism includes sending email services (e-mail) and SMS by channels mobile communications. Using the remote monitoring of the local and computer network of your company, the system administrator, even from outside the office, will be able to prevent possible failures and eliminate emerging problems.

Prevent emergency situations

Zabbix can alert the system administrator, for example, that soon the server is running on the hard disk of the server, about the increased load on the processor, or on the download of RAM. Thus, the system administrator may even before an emergency take measures to prevent it.

Which interface has a local network monitoring system

For operational online monitoring of the status of the network, diagnostics and analysis of load parameters of the Zabbix server equipment provides a convenient web interface. Thus, thanks to the advanced monitoring and analysis of the basic parameters of the local network, network and server equipment, such critical parameters as a decrease in the amount of disk space will be available from any location, an increased load on the processors of the local network server, the overload of RAM and much more.

What is network monitoring and what is it needed for?

How much does the remote monitoring system of the LAN Zabbix

Why do you benefit from the introduction of a local network monitoring system

Setting up Zabbix, like any complex software Product, Requires high qualifications and experience, work on setting up Zabbix is \u200b\u200bvery responsible and painstaking. Our system administrators have extensive configuration experience and support of the remote monitoring system, perfectly own its installation and setup technology.

The implementation of the Zabbix network monitoring system includes:

How much is the installation and configuration of the local network monitoring system

* With a large number of same type of nodes, a discount is provided.

You can also contact us by phone. Call us!

7 (495) 665-2090

Zabbix absolutely free app

Zabbix is \u200b\u200bwritten and distributed under the GPL General license Public License version 2. This means that his source Freely extends and accessible to an unlimited circle of persons.

Express audit of the local network and drafting a technical task

Installing the Zabbix system on your equipment

Setting up Zabbix to monitor key nodes of the local network

Installing Zabbix clients on the main local network nodes

Configuring Notifications to Email System Administrator