Skip to main content

Exoprise CloudReady Monitor for Office 365

Basic value proposition - supplements Office 365 dashboard capabilities by providing near real-time performance and point-of-access monitoring (includes alerting capabilities via email or SMS when custom defined thresholds are exceeded).

Office 365 Health Dashboard:

Exoprise Sensor Dashboard (sample):
Crowdsourcing feature is pretty interesting - Exoprise service collects (anonymously) performance data across the entire community of users (all sensors that report back to the system), trends, and lets you compare your stats against calculated crowd averages. This may highlight performance problems that are common across the entire O365 Service or something that is not O365 related at all (e.g. local ISP issue). Seems like a very useful feature.

The way performance data is collected - small (<12MB) agent in installed on a workstation (or server, or VM) at the customer's site. The agent performs synthetic transactions (like sending and receiving email, etc.) and measures response times, etc. Thus the agent will need to be configured with a valid O365 account/license (not a big deal, but potentially a small additional expense for the customer) + need to make sure the account's password is set to not expire and least privilege is configured (to avoid any inadvertent information leaks, though the agent itself is only supposed to collect performance data).

The way the service is priced is by sensor, currently the following sensors are available or planned:
  • Exchange Online
  • AD
  • ADFS
  • Azure (beta)
  • SharePoint Online (planned)
The sensor monitors one service (from the list above) at one location (agent installed). For example, if customer has 2 locations (1 main, 1 satellite) and wants to monitor Exchange Online from both, but AD and ADFS only from the main one - 4 sensors would need to be licensed.

For more information visit http://www.exoprise.com/

Comments

Popular posts from this blog

Updating computer's AD Security Group membership without rebooting

I found the following to be very useful - From the elevated command prompt execute “ klist –li 0x3e7 ” to view the logon session of the computer account . To purge them, simply execute “ klist –li 0x3e7 purge ”. A typical use case might involve targeting GPOs based on computer's group membership. When you add computer to the group in order to test the application of policies you can reboot it or, alternatively, run the above mentioned to clear logon sessions, then do “ gpupdate /force ” and check. In a spirit of giving credit where credit is due, I found a few references to this, but the one I learned it from was  http://setspn.blogspot.com/2010/10/updating-servers-security-group.html

WordPress displays weird characters

Sometimes after a database conversion (e.g. from MySQL to MariaDB) or due to encoding issues a situation might arise when WordPress is showing weird characters. A quick way of remedying the situation would involve examining the pages to discover a pattern (what characters are being substituted, in the example below the apostrophe was replaced by  ’ ) then running an queries against the database to reverse the effect. Here's a quick example (common tables that store content): UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  'Â' ,  '' )      UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  '’' ,  "'" )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (meta_value,  'Â' ,  '' )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (me...
  AI Agents as Trusted IoT/Software Defined Devices 🤖 Your Newest Endpoint Isn’t a Laptop; It’s an AI Agent. Are You Ready to Secure It? Dive into the next frontier of cybersecurity. Autonomous AI agents are no longer just code; they are powerful actors in our digital ecosystems. Treating them as simple software leaves a massive security gap. Our latest report introduces a new paradigm: The AI Agent as a Software-Defined Device. Discover the essential framework for securing the agentic future: ➡️ The Agent-as-Device Model: Learn why abstracting agents as software-defined devices, similar to IoT endpoints, is the key to managing their complexity and risk. Secure the “hardware” (host), “software” (agent logic), and “network” (communications). ➡️ A Digital Passport for AI: Move beyond static API keys. Explore how Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) create a cryptographic root of trust, giving every agent a verifiable identity and provable permissions. ➡️...