Checking Network/Port Connectivity using Kaseya Agent Procedures Developed By: Emmanuel Giboyeaux Advisor : Dr. S. Masoud Sadjadi School of Computing and.

Slides:



Advertisements
Similar presentations
© 2012 Entrinsik, Inc. Informer Administration Exploring the system menu and functions PRESENTER: Jason Vorenkamp| Informer Software Engineer| March 2012.
Advertisements

Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
System Optimization Agent Procedures using Kaseya Developed By: Jason Aparcana Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Spring 2014 RMS/EOC Common Errors & Solutions Training.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
CSE 4939 Alex Riordan Brian Pruitt-Goddard Remote Unit Testing.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
AD Maintenance via PowerShell Developed By: Mario Eirea Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
Version Control Systems Phil Pratt-Szeliga Fall 2010.
By Laura Trawin.
How to Establish a Blog. What is a Blog A blog is a collection of informational articles/ideas intended to update a viewer on new information associated.
Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
Setting IE Home Page and Starting IE after User Logins Using Kaseya Developed By: Paola Nunez Advisor : Dr. S. Masoud Sadjadi School of Computing and Information.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Test Review. What is the main advantage to using shadow copies?
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
ETIQUETTE AND EVIDENCE
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Mail merge I: Use mail merge for mass mailings Perform a complete mail merge Now you’ll walk through the process of performing a mail merge by using the.
Video Chat on LAN By Payal Ashokkumar Dalwadi 10/29/2010 Advisor: Dr. Chung-E Wang Department of Computer Science California State University, Sacramento.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Antivirus Decommission and Deployment using Kaseya Developed By: Celia McFadden Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
A Feature-Based of IT Automation using Kaseya Developed By: Gregory Hayes Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Oracle Data Integrator Procedures, Advanced Workflows.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
A Feature-Based of IT Automation using Kaseya andAuslogics Registry Cleaner Developed By: Krystle Crawford Advisor : Dr. S. Masoud Sadjadi School of Computing.
A Brief Documentation.  Provides basic information about connection, server, and client.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Kill and Uninstall Multiple Running Anti-Virus Programs using Kaseya Developed By: Jasmine English Advisor : Dr. S. Masoud Sadjadi School of Computing.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
How to Setup Scan to on most Sharp Models.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Getting Started. Package Overview (GradeQuick)‏ Web-based grade book –Access Anywhere –Always Current Paper grade book “look and feel” Flexible grading.
Leading firms through the next generation of change™
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
1 Tips for the assignment. 2 Socket: a door between application process and end- end-transport protocol (UDP or TCP) TCP service: reliable transfer of.
A Feature-Based of IT Automation using Remote Control on Safe Mode Developed By: Fernando Perez Advisor : Dr. S. Masoud Sadjadi School of Computing and.
A Feature-Based of IT Automation using Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
LOAN RADAR Media Center, LLC. Keep your team on the same page Update your in-process loans with loan status.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Using Opal to deploy a real scientific application as a Web service Sriram Krishnan, Ph.D.
Perform a complete mail merge Lesson 14 By the end of this lesson you will be able to complete the following: Use the Mail Merge Wizard to perform a basic.
SQL Database Management
Troubleshooting Network Communications
Troubleshooting IP Communications
Printer Admin Print Job Manager
Disable/Enable CD-ROM devices using Kaseya-Agent Procedures
Configuring Internet-related services
Configuration Of A Pull Network.
GE 1442 – Printer Logic & Network Printers (Level 1)
First Level Incident Handling FAQ (For EAL)
Presentation transcript:

Checking Network/Port Connectivity using Kaseya Agent Procedures Developed By: Emmanuel Giboyeaux Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International University

Agenda Problem and Motivation Solution Behind the Scene Customizing the Solution Disclaimer Progress Report

Problem and Motivation: A client would like to check the health of their network connection. The client would also like to set up printer sharing at their workplace. Knowing what ports are opened and closed would allow the client feel more secure.

Solution Use an agent procedure that pings an address to check if it is working properly. Use an agent procedures to check what ports are open or closed. If the ports are not working correctly, an will be sent to the administrator.

Behind the Scene Part one of the ping check creates a folder to store the information. The agent procedure pings and address and creates a text file that store the results Creates a variable that contains the content of the file with the results and then executes part two of the ping check procedure

Behind the Scene cont. In part two of the procedure if the variable created does not contain Lost = 0 then it creates an stating that the ping test didn’t pass, deletes the text file and writes a statement in the procedure log. If the ping test passes then it simply writes a statement saying so in the procedure log.

Behind the Scene cont. To monitor ports another agent procedure would create several variables; one for the host/ IP address, port number, list of s to contact, and one for an agent directory Deletes a pingout.txt if it already exits Executes a command that checks the port and creates a new pingout.txt file with the results Creates another variable to store the contents of the new text file and then deletes the text file Executes part two of the port check procedure

Behind the Scene cont. If the last variable created does not contain Connection Successful then it sends out an to the contacts listed stating which host/ IP address and port failed to respond.

Figure 1.1

Figure 1.2

Customizing the Solution Edit the values for the host/ IP address and the ports Add a line of code that can automatically find ports Modify the contents of the

Disclaimer Not knowing the port number Should be able to work on all systems If trying the customized solution for finding ports, procedure might have to be altered to work on different operating systems.

Progress Report Trial and error with the video tutorial Test the procedures Need to complete documentation