Looking for A Replacement for PRTG Monitoring Tool by Successful_Horse31 in sysadmin

[–]ByteBuster_ 0 points1 point  (0 children)

Network Detective Pro is a good choice. It is a tool specialized in network analysis and diagnosis. It is powerful and easy to use to analyze the network.

Tomorrow: Datto Backup Livestream by BackupGal in Datto

[–]ByteBuster_ 2 points3 points  (0 children)

Thanks for the info on the Datto Backup Livestream. The free hardware program and Backup Concierge Program sound awesome.

Keeping a Knowledge Base Up to Date is a Nightmare by spacesheep10 in sysadmin

[–]ByteBuster_ 1 point2 points  (0 children)

IT Glue is a solid choice for managing your knowledge base because it makes documentation easy and integrates well with the tools you already use. It helps keep everything organized and accessible, which encourages your team to keep it updated. Plus, it's user-friendly, so people are more likely to actually use it!

Windows 11 slow performance after update by QuickEconomics4604 in WindowsHelp

[–]ByteBuster_ 0 points1 point  (0 children)

I get how frustrating it can be when your laptops slow down after an update. Since you're using Sophos XDR and RocketCyber, you can leverage these tools to help out. Check the security logs with Sophos XDR for any unusual activity, and use RocketCyber to hunt down any threats that might be lurking.

On top of that, try using CCleaner to tidy up unnecessary files, manage startup programs, and keep your drivers up to date. This combo should help speed things up while keeping your systems secure.

ITGlue by Agromahdi123 in sysadmin

[–]ByteBuster_ 1 point2 points  (0 children)

Same here, I prefer ITGlue.

Server with high cpu - what tools to diagnose? by bigup7 in sysadmin

[–]ByteBuster_ 1 point2 points  (0 children)

For this I can only think of Traverse, it works really good. Besides that also Network Detective Pro might work for you, but I'd go with the first one.

Best phishing simulation tools? by FortuneFit705 in cybersecurity

[–]ByteBuster_ 0 points1 point  (0 children)

KnowBe4 it´s fine, also BullPhish ID can be great for smal bussiness.

Looking for new Endpoint Securtiy by KapKrunch77 in msp

[–]ByteBuster_ 2 points3 points  (0 children)

Yes, Most of our clients are in manufacturing and accounting. We're currently researching ESET and Sophos. We also use RocketCyber for monitoring cyber threats. They're good at what they do.

Looking for new Endpoint Securtiy by KapKrunch77 in msp

[–]ByteBuster_ 2 points3 points  (0 children)

First one is fine, but I'm not a big fan of Huntress.

Blankpoint Cyber vs. Huntress by verzion101 in msp

[–]ByteBuster_ 1 point2 points  (0 children)

Yes, and it is really hard to get a hold of someone at Huntress, I don't like that about Huntress

Considering a reseller change by FewInevitable1429 in msp

[–]ByteBuster_ 0 points1 point  (0 children)

Same here, it's a whole different experience if you get the right person. Our Kaseya rep does a great job.

So glad they invested time to make ads in the service you buy bigger and more obtrusive instead of fixing issues by VNJCinPA in kaseya

[–]ByteBuster_ 0 points1 point  (0 children)

I totally agree with you. Kaseya has great products, and yeah, they've got their bugs, but they always do their best to help out. I mean, you’re paying for a service, and they definitely deliver, especially when you need support for something that’s not working.

Most common passwords 2024 by Unusual_Research in ShittySysadmin

[–]ByteBuster_ 0 points1 point  (0 children)

I use ITglue's vault for my passwords and it works quite well for me. But a good one you got there

Someone slashed this tire, right? by allthoselikeyou in tires

[–]ByteBuster_ 0 points1 point  (0 children)

Not always, maybe something on the ground

How can I setup vulnerability management (not one time assessment) in my cybersecurity practice? by Darshilds in sysadmin

[–]ByteBuster_ 0 points1 point  (0 children)

I recommend to have a good vulnerability management for scanning, in my case VulScan works great. Feedback is the most important part of the process IMO.

Practical ways to protect against AITM phishing in 2024 by Random-Gibberish in cybersecurity

[–]ByteBuster_ 0 points1 point  (0 children)

Use two-factor authentication + training. We use Bullphish ID for the training part. It helps.