Operations | Monitoring | ITSM | DevOps | Cloud

December 2023

IT Festivus 2023: A Festivus for the Admins of Us

It's that time of year again — YOUR time of year. Time to gather round the virtual fire and bask in the warm company of your favorite IT experts and peers. Time to regale us with your greatest feats of IT strength, and — as is tradition — time to get those grievances you've been harboring all year finally off your chest. Serenity now. It's time for IT Festivus, baby!

Omdia's Top 5 IT Predictions for 2024 and Beyond

As we look toward 2024, the IT landscape is poised for a significant transformation, influenced by evolving business needs, technological advancements, and economic factors. The insights from the “Leading IT Trends for 2024” report, a collaborative effort between Omdia and NinjaOne, offer a look into the future of IT, highlighting key areas that organizations must focus on.

G2 Winter 2024 Report: Customers Rate NinjaOne #1 in 7 Key IT Categories

We are thrilled to announce NinjaOne’s remarkable achievement in G2’s Winter 2024 Report, where we’ve secured the number one ranking in seven critical IT categories: Endpoint Management, Patch Management, Remote Monitoring and Management (RMM), Network Monitoring, IT Asset Management, PC Backup, and Remote Support.

Where are Chrome Extensions Stored in Windows, Mac, and Linux?

Chrome extensions are incredibly helpful for adding additional functionality to your browser without downloading and navigating a brand-new application. They are easy to install and easy to access. Knowing exactly where Chrome extensions are stored can be useful for backups, troubleshooting, and security purposes. Let’s look at where you can find them, no matter what operating system you use.

Guide to Command-Line Arguments and Best Practices

Many users tread lightly around the command prompt, sticking to the familiarity of graphical interfaces. Yet, what if you could use the command line to unlock hidden software features and gain more control over your files? It’s all possible with the power of command-line arguments. Command-line arguments transform static, boring scripts into flexible, dynamic tools. By the end of this guide, you’ll be able to accomplish important tasks using command-line arguments without altering code.

How to Export a Windows Registry Key

Navigating the Windows system registry can seem like traversing a minefield, especially if you are new to it—a single misstep could create complex issues in your system. Specifically, incorrect manipulations of the registry key might lead to errors or even complete system crashes. Fortunately, understanding how to export a registry key can make things significantly easier and safer. Below, we’ll talk through some of the basics of Windows Registry operations.

How to Deploy Microsoft LAPS

Securing privileged accounts is of utmost concern to cybersecurity professionals, and Active Directory, Microsoft’s identity and access management service, forms the backbone of the majority of organizations. Active Directory (AD) centralizes user accounts, computers, and resources, ensuring access control, and local administrator accounts wield substantial power within Windows systems.

What Is IPv6? Definition & Full Overview

Poised to redefine the landscape of digital communication stands the groundbreaking achievement that is IPv6, the sixth generation of the Internet Protocol. The evolution from IPv4 to IPv6 marks a pivotal shift in internet technology, driven by the increasing scarcity of IPv4 addresses and the expanding scale of the global network.

What Is CIDR? Classless Inter-Domain Routing Explained

In the early 1990s, as the digital world stood on the cusp of an explosive expansion, the foundational structure of the internet faced a critical challenge: the classful IP addressing system was buckling under its own rigidity and inefficiency. Locked into fixed classes (A, B, and C), this system squandered valuable IP space, leaving the burgeoning network gasping for air as it grappled with rapidly depleting IP addresses.

How to Install and Set up a VPN on Windows Server 2022

A VPN, or Virtual Private Network, enables secure communications over an untrusted network. It enables users to connect to servers and networks from virtually anywhere, creating a secure tunnel between the user and a remote network or server. VPNs ensure data privacy and prevent unauthorized access, ensuring the data transmitted remains confidential and protected from external threats.

Azure AD Connect: What It Is and How to Configure It

Azure AD Connect offers organizations the power of hybrid identity solutions, providing a seamless bridge between on-premises Active Directory and Azure Active Directory. This guide will introduce the functions and features of Azure AD Connect, from understanding its core purpose to configuring it securely. With this information, you’ll have the knowledge needed to set up and maintain a robust hybrid identity solution.

2023 Release (5.6) - Enhanced Reporting Features & Multi-Tenant M365 Management with CIPP Integration

Coming this November and December to all regions, this update offers our partners a revamped reporting interface, seamless CyberDrain Partner Portal integration (CIPP) for streamlined M365 management via NinjaOne, and new advanced Backup features. Here’s what you can expect in this innovative release.

Managing Disasters: Exploring RPO & RTO Configurations for Seamless Recovery

Backing up your data is only half the battle. Data recovery is the other half. When a disaster strikes, organizations need to get their systems up and running quickly and efficiently to minimize downtime. Join Dan Myers, Backup Product Manager, and Nick DeStefano, Backup Product Marketing Manager as they walk through how to seamlessly recover from a disaster – like a ransomware attack – while focusing on meeting restore point and restore time objectives within your backup solution.

Introducing the NinjaOne + CIPP Integration

We’re excited to announce our latest collaboration with the CyberDrain Improved Partner Portal (CIPP), a highly regarded, open-source tool for Microsoft 365 monitoring and management, widely beloved within the community. In this blog, we’ll delve into the specifics of CIPP’s offerings, explore the significance of this integration, and highlight the exciting new features and capabilities that emerge when NinjaOne and CIPP are used together.

2023 in Review: A Year of Exceptional Growth and Innovation

2023 has marked an extraordinary year of transformation and growth for NinjaOne, a journey made possible by the unwavering support and collaboration of our esteemed customers and partners. Throughout the year, we’ve soared to new levels of innovation and service, relentlessly pursuing a vision to craft a more intuitive and user-focused IT management experience.

Top 4 Takeaways from the Omdia IT Trends 2024 Webinar

NinjaOne, in partnership with Omdia, recently hosted a webinar focused on the future of information technology, leveraging insights from their latest joint report. Key speakers included Adam Holtby, Principal Analyst at Omdia; Peter Bretton, Senior Director of Customer & Product Marketing at NinjaOne; and Nesta Hayward, Director of Technology, CISSP and CISM certified, at National Fire & Safety.

Celebrating 2023: NinjaOne's Year in Review

Join us for a walk down memory lane as we explore the products, features, and enhancements we brought to our customers this year. We’re bringing some special guests to walk through the capabilities we’re most excited about and show off how they’re used by customers in the field. Best of all, we’ve got a sneak peek at what’s coming up next in early 2024.

How Much Does Cloud Backup Software Cost?

Cloud backup solutions are characterized by diverse offerings, each with its own set of features, security measures, and pricing schemes. Our analysis will dissect the various components that constitute the cost of utilizing these services, ranging from storage and bandwidth fees to data transfer and retrieval expenses.

Voice of the Customer: NinjaOne's Success Stories in Omdia's IT Trends Report

The landscape of IT constantly presents businesses with new challenges and opportunities. The “Leading IT Trends for 2024” report, a collaborative effort between Omdia and NinjaOne, offers a comprehensive exploration of how businesses are harnessing cutting-edge IT strategies to maintain a competitive edge.

What Is Network Access Control (NAC)? Overview & Implementation

Whether you’re an in-house IT professional or a managed service provider, ensuring the security and integrity of your networks is a crucial part of your bailiwick. In pursuit of greater security, Network Access Control (NAC) serves as a formidable guardian, ready to protect digital assets by regulating who gains entry to a network. Understanding the fundamental concepts and best practices of NAC is essential for any organization that values data security and network integrity.