{"id":2555,"date":"2020-07-28T09:17:35","date_gmt":"2020-07-28T13:17:35","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2555"},"modified":"2020-07-28T09:17:35","modified_gmt":"2020-07-28T13:17:35","slug":"security-for-all-sizes-remote-management-and-monitoring","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2555","title":{"rendered":"Security for All Sizes: Remote Management and Monitoring"},"content":{"rendered":"\n<p>I remember the first&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/remote-management\">remote management<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/monitoring\">monitoring<\/a>&nbsp;(RMM) solution ever, the venerable and wonderful &#8220;ping&#8221;. We would use it all the time to see if a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/remote\">remote<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/host\">host<\/a>&nbsp;was up and responding. And then, one day, someone wrote a program for&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/windows-2004\">Windows,<\/a>&nbsp;Whatsup, and the world was changed forever. With that program, we admins could enter multiple&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip-addresses\">IP addresses<\/a>&nbsp;and that tool would ping them&nbsp;<em>all day and night!<\/em>&nbsp;It could even be set up to generate alerts.<\/p>\n\n\n\n<p>We thought we had it made until someone asked, &#8220;Hey, I know I can ping the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/sql\">SQL<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/server-2009\">server<\/a>, but is it responding on&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/tcp\">TCP<\/a>&nbsp;1433?&#8221; At that point, we knew both that we needed more in our app and that there would be other admins, with other&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/network-ports\">network ports<\/a>, who would make similar requests. And so began the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/development\">development<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/rmm\">RMM<\/a>&nbsp;tools.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_360.809,q_auto,w_559\/v1\/post-attachments\/rmm_qeaelv\" alt=\"\"\/><\/figure>\n\n\n\n<p>At small companies, RMM may very well be not much more than a shareware ping\/telnet suite that checks for hosts being up and responding on critical ports. It may involve&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/learning\">learning<\/a>&nbsp;multiple suites of RMM tools, roughly in conjunction with the trial period for one tool ending and a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/download\">download<\/a>&nbsp;for the new tool being complete. Most of what goes on is just monitoring, not&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/management\">management<\/a>&nbsp;(does that mean they consume R_M products?), as there are few enough systems to manage where&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ssh\">ssh<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/rdp\">RDP<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/sessions\">sessions<\/a>&nbsp;to the several devices that need management are sufficient.<\/p>\n\n\n\n<p>Once we get to a medium company with multiple sites, that SSH\/RDP solution for everything simply fails to scale. It&#8217;s time to lay some&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/money\">money<\/a>&nbsp;out and actually pay for an RMM solution that will&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/track\">track<\/a>&nbsp;those uptimes as well as do some kind of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/configuration\">configuration<\/a>&nbsp;management. Everyone makes demands of that config&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/management-solution\">management solution<\/a>&nbsp;&#8211; will it do rollbacks? Will it do point-in-time recovery? Will it track changes made outside the product? Will it enforce certain configuration parameters? Will it integrate with the helpdesk&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ticketing\">ticketing<\/a>&nbsp;system?<\/p>\n\n\n\n<p>The answer to all of those questions is either &#8220;no&#8221; or &#8220;yes, at an additional cost.&#8221; Nobody rides the RMM&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/train\">train<\/a>&nbsp;for free.<\/p>\n\n\n\n<p>And it&#8217;s not like that RMM will magically never make mistakes. We&#8217;re still in a garbage in, garbage out world. More than once, I was working on a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/project\">project<\/a>&nbsp;to integrate our&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/routers\">routers<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/switches\">switches<\/a>&nbsp;with a tool by pushing&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/code\">code<\/a>&nbsp;to them with the RMM solution&#8230; only to have that code get overwritten because a different&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/team\">team<\/a>&nbsp;pushed a change with an outdated template. So what&#8217;s the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/policy\">policy<\/a>&nbsp;and procedure for undoing a change that was done in error? I found that part out the hard way as I waited for the next change window to get my changes put back into the environment.<\/p>\n\n\n\n<p>I&#8217;ve seen RMM tools that can&#8217;t&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/push\">push<\/a>&nbsp;version-specific code. Well, they can, but they don&#8217;t keep track of versions, so it&#8217;s a guess or a logic problem to figure out which devices are on which version. One solution I came up with was to push one line of code to all devices, knowing that it would fail for devices on the older version. The next push checked the config to see if that line I previously pushed was in the config. If so, skip the device. If not, then push a line of code compatible with the older versions. Would I have preferred that the tool have the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/intelligence\">intelligence<\/a>&nbsp;to do a version check and then push the appropriate line of code, all in one go? Yes. Yes, I would. The biggest irony to me in this particular case was that the RMM tool was made by the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendor\">vendor<\/a>&nbsp;of the devices that the tool couldn&#8217;t track the version on. Very disappointing&#8230;<\/p>\n\n\n\n<p>And then there&#8217;s RMM at the large corporation. Thousands of switches and routers, some on very dodgy&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/internet\">Internet<\/a>&nbsp;connections, all of them being monitored. This means the poor sap with the on-call&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/phone\">phone<\/a>&nbsp;is constantly answering when the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/noc\">NOC<\/a>&nbsp;calls in to say that the Dakar site is down. Or the Guadalajara site. Or the Noida site. Or the Ho Chih Minh City site. Or the Chengdu site. Or the Narvik site. Or the Deadhorse site. And the NOC guy reads out the entire device name and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip-address\">IP address<\/a>,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/letter\">letter<\/a>&nbsp;and number by letter and number, so one has to sit and wait through it all before saying, &#8220;Acknowledged. Please open a ticket with the ISP.&#8221; I can&#8217;t remember a happier day than when the policy was finally re-done so that the NOC would just open the blasted ticket on their own without requiring acknowledgement from engineering.<\/p>\n\n\n\n<p>Still, we were blessed in that we had nearly every switch under management. This did have one side effect, however&#8230; we wouldn&#8217;t believe a switch existed if it wasn&#8217;t in the RMM tool until we saw it listed as a neighbor on another switch and pinged it. That&#8217;s when we discovered that some switches couldn&#8217;t be brought into our RMM tool because they didn&#8217;t support the SNMPv2. Or because nobody could remember the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/password\">password<\/a>&nbsp;to get local access and nobody had the nerve to take it to ROMMON mode to break into it. Or because the local support contract kept that gear out of our global tools.<\/p>\n\n\n\n<p>Those problems were relatively straightforward compared to getting gear from specialty&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendors\">vendors<\/a>&nbsp;into the RMM tool. Not all of them had the same&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/implementation\">implementation<\/a>&nbsp;when it came to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/reporting\">reporting<\/a>, even things as simple as&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/disk\">disk<\/a>&nbsp;space and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/cpu\">CPU<\/a>&nbsp;usage. For disk space, does the vendor&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/report\">report<\/a>&nbsp;total available space, across all volumes, or will it send an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/alert\">alert<\/a>&nbsp;when one particular volume hits 95% capacity? Will it report overall CPU utilization or will it fire an alert when one of 16 CPUs goes over 90%? The answer is, of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/course\">course<\/a>, &#8220;It depends.&#8221; That means that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/alerts\">alerts<\/a>&nbsp;from some vendors actually aren&#8217;t alerts, they&#8217;re more like transient conditions of no great importance. It also means that some vendor gear could be in an alert state, but it doesn&#8217;t actually report it as such, given how it implements a particular&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/snmp\">SNMP<\/a>&nbsp;MIB.<\/p>\n\n\n\n<p>At all companies, there&#8217;s the issue with keeping the tools up-to-date. The day that the tool is launched for general use is such a bright, shining moment in the history of the progress of humanity, with all the devices that need monitoring in that tool, right where they should be. Within a very short time &#8211; overnight, in some cases &#8211; the information in it is obsolete. New devices aren&#8217;t added and decommissioned devices are showing red because nothing is reporting back at that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip\">IP<\/a>&nbsp;address&#8230; and then they go green again when that IP is re-used, but we just haven&#8217;t realized yet that it&#8217;s a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-camera\">security camera<\/a>&nbsp;now, not a loopback address.<\/p>\n\n\n\n<p>Finally, there&#8217;s the issue of access. Even at the small company, not everyone who wants to know if a system is up will have access to the RMM dashboard. At larger and larger companies, access to that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/dashboard\">dashboard<\/a>&nbsp;can get limited to the point where even the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/network-engineers\">network engineers<\/a>&nbsp;can&#8217;t look at it&#8230; or the tool is so cumbersome, there&#8217;s severe mental pain involved in getting information out of it.<\/p>\n\n\n\n<p>And that&#8217;s why, even at a massively huge global megacorporation, I still got plenty of use out of running a shareware app that would ping a list of devices, so I&#8217;d know if they were up&#8230; it wasn&#8217;t an official tool with management and headcount assigned to it. It just ran on my&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/desktop\">desktop<\/a>&nbsp;and running it meant I wouldn&#8217;t have to open a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/service\">service<\/a>&nbsp;ticket to ask someone if they could check to see if the RMM had a green dot by my device or not.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I remember the first&nbsp;remote management&nbsp;and&nbsp;monitoring&nbsp;(RMM) solution ever, the venerable and wonderful &#8220;ping&#8221;. We would use it all the time to see if a&nbsp;remote&nbsp;host&nbsp;was up and responding. And then, one day, someone wrote a program for&nbsp;Windows,&nbsp;Whatsup, and the world was changed forever. With that program, we admins could enter multiple&nbsp;IP addresses&nbsp;and that tool would ping them&nbsp;all [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2555","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2555"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2555\/revisions"}],"predecessor-version":[{"id":2556,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2555\/revisions\/2556"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}