{"id":49869,"date":"2022-05-03T09:28:13","date_gmt":"2022-05-03T01:28:13","guid":{"rendered":"https:\/\/version-2.com\/?p=49869"},"modified":"2022-05-30T10:42:11","modified_gmt":"2022-05-30T02:42:11","slug":"what-is-remote-network-monitoring","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/05\/what-is-remote-network-monitoring\/","title":{"rendered":"What is remote network monitoring?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"49869\" class=\"elementor elementor-49869\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p>Remote network monitoring is a technical specialty that was born almost at the same time as networks themselves. Since then, many strategies have emerged when it comes to monitoring network elements.<\/p>\n<p>In this article we will talk about the current techniques based on SNMP polling and network statistic collection through Netflow, and we will also mention outdated systems such as RMON.<\/p>\n<p>Most techniques are purpose-oriented, so they are especially useful. Some more modern ones use combined techniques to offer higher control and network knowledge.<\/p>\n<p>What advantages does each one of them offer?<\/p>\n<h2>What is remote network monitoring?<\/h2>\n<p>Remote network monitoring consists of<strong> detecting and knowing the status of any<\/strong> device connected to the network.<\/p>\n<p>It can be network-specific hardware (such as a router, server, printer) or a specialized device (such as a probe or IoT element).<\/p>\n<p>Simple, right?<\/p>\n<p>Then let\u2019s talk about the different techniques you have to monitor a network remotely.<\/p>\n<h3>Basic Remote Network Monitoring Techniques<\/h3>\n<p>Often this monitoring takes place through <strong>basic techniques.<\/strong><\/p>\n<p>With basic techniques we mean something as well known as pinging and checking whether the computer responds to the network.<\/p>\n<p>What is <em>pinging<\/em>? It is a communication mechanism that allows you to find out whether a computer is connected and responds when you \u201cknock\u201d on its door.<\/p>\n<p>To use it you just have to know its IP address.<\/p>\n<p>Other basic techniques include measuring latency times (network lagging) or packet loss (<a href=\"https:\/\/version-2.com\/en\/2022\/04\/what-is-packet-loss-how-can-it-affect-your-network\/\">network packet loss<\/a>).<\/p>\n<h3>Advanced Remote Network Monitoring Tool \u2013 Netflow<\/h3>\n<p><strong>The most common<\/strong> and already much more network specific techniques include the use of the<a href=\"https:\/\/version-2.com\/en\/2022\/04\/snmp-monitoring-tips-to-use-the-simple-network-management-protocol\/\"> SNMP protocol (Simple Network Monitoring Protocol)<\/a> that helps to obtain specific information from devices connected to the network: number of connections, incoming traffic through its network interface, firmware version, CPU temperature, etc.<\/p>\n<p>Something that, if we use technical terms, is known as SNMP polling.<\/p>\n<p>Other tools use protocols from the <strong>Netflow<\/strong> family (JFlow, SFlow, Netflow) to obtain <strong>statistical information<\/strong> about network usage.<\/p>\n<p>This statistical information is incredibly useful to be able to analyze the use of the network, detect bottlenecks and, above all, to have a clear vision of what the communication flows between the different elements of a network are.<\/p>\n<h3>Advanced Network Remote Monitoring Techniques \u2013 RMON<\/h3>\n<p>There is an almost obsolete protocol called RMON. However, it is worth mentioning, because we can still find it in some installations.<\/p>\n<p>This protocol used a technology network monitoring technology that listened to the wire to obtain statistical information using a specific SNMP agent. Something like what Netflow does.<\/p>\n<h3>Advanced Remote Network Monitoring Tools \u2013 SNMP Traps<\/h3>\n<p>On the other hand, most devices still use SNMP TRAPS to report incidents in asynchronous mode.<\/p>\n<p>Although it is a very old method, it is still used today as a monitoring method on almost all network devices.<\/p>\n<p>Not to be mistaken with the SNMP Polling that we discussed at the beginning!<\/p>\n<h2>Benefits of Network Monitoring<\/h2>\n<p>The most important and simple benefit is to find out the status of the network:<\/p>\n<ul><li>Whether it is active<\/li><li>Whether it is overloaded<\/li><li>Which devices have the most traffic<\/li><li>What kind of traffic is circulating over the network<\/li><li>Bottlenecks<\/li><li>Jams<\/li><li>\u2026<\/li><\/ul>\n<p>An example of a traffic flow diagram captured with Pandora FMS could be the following:<\/p>\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"519\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Remote-network-monitoring-tools-960x519.png\" alt=\"Remote network monitoring tools\" class=\"wp-image-298063\"><figcaption>Remote network monitoring tools<\/figcaption><\/figure>\n<p>Most network management and monitoring systems automatically detect connected systems and draw a<a href=\"https:\/\/version-2.com\/en\/2022\/04\/etwork-maps-with-pandora\/\"> network map<\/a> representing the network.<\/p>\n<p>The most advanced tools allow you to update that map in real time and see even the physical connections between interfaces (known as a link-level topology or Layer 2).<\/p>\n<p>For example, like this automatic network map generated with Pandora FMS:<\/p>\n<div class=\"wp-block-image\" bis_skin_checked=\"1\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"481\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Remote-monitoring-in-network-management.png\" alt=\"Remote monitoring in network management\" class=\"wp-image-298068\"><figcaption>Remote monitoring in network management<\/figcaption><\/figure><\/div>\n<p>Some systems incorporate what is known as IPAM (IP Address Management) and, at the same time, monitor the network status, allowing IP addressing to be mapped and controlled so that you know which networks are free and how they are used.<\/p>\n<h2>How does a remote network monitoring service work?<\/h2>\n<p>Generally, a tool like this one has a <strong>central server<\/strong> that allows you to detect systems and launch network tests (ping, icmp, snmp) to find out the status of each device.&nbsp;<\/p>\n<p>To know the network in detail through its network flows in real time, you will need to configure the network routers and switches with the Netflow protocol and send that information to a Netflow collector. Although only professional medium\/top-range network equipment supports the use of Netflow.<\/p>\n<p>If you use an advanced monitoring tool, it will have its own Netflow collector.<\/p>\n<p>Sometimes it is necessary to monitor devices that are in <strong>inaccessible networks<\/strong>, so intermediate polling servers, called proxies or satellites, are used.<\/p>\n<p>These secondary servers perform network scans and monitoring on the devices nearby, and then send the collected data to a central system.<\/p>\n<p>But what do we do with all this numerical data?<\/p>\n<p>It is <strong>essential<\/strong> that the monitoring tool you use has graphs, reports and visual screens to display that data.<\/p>\n<p>If we\u2019re already talking about the top-of-the-range tools, those visual network maps will allow you to manually correct and add the details you need to manage those networks.<\/p>\n<h2>What are the best remote network monitoring software?<\/h2>\n<p>The professional tools that cover SNMP, Netflow, network maps and IPAM that work best today are:<\/p>\n<ul><li>SolarWinds<\/li><li>Whatsup Gold<\/li><li>Pandora FMS<\/li><\/ul>\n<p>Although they differ from each other in several respects, you may cover all your monitoring needs with any of them.<\/p>\n<p>Would you like to know more about remote network monitoring tools? Then this will no doubt interest you:<\/p>\n<p class=\"has-text-align-center\"><a class=\"button\" href=\"https:\/\/version-2.com\/en\/2022\/04\/top-16-best-network-monitoring-tools\/\">Best network monitoring systems<\/a><\/p>\n<p>Not all market tools cover these areas.<\/p>\n<p>Some only support basic SNMP, but do not support Netflow. Others do not have good discovery or map editing capabilities and most of them do not have IPAM features.&nbsp;<\/p>\n<p>The basic thing a good network monitoring tool should have is:<\/p>\n<ul><li>SNMP v1, v2 and v3 capabilities<\/li><li>To be able to use proxy servers<\/li><li>SNMP Trap Collection<\/li><li>Device Discovery<\/li><li>Map drawing<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Remote network monitoring is a technical specialty that [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,488,61],"tags":[475,489],"class_list":["post-49869","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-488","category-press-release","tag-pandorafms","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is remote network monitoring? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is remote network monitoring? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Remote network monitoring is a technical specialty that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T01:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-remote-network-monitoring\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"What is remote network monitoring?\",\"datePublished\":\"2022-05-03T01:28:13+00:00\",\"dateModified\":\"2022-05-30T02:42:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-remote-network-monitoring\\\/\"},\"wordCount\":991,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Monitorizacion-remota-de-redes-980x536.png\",\"keywords\":[\"Pandorafms\",\"2022\"],\"articleSection\":[\"PandoraFMS\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-remote-network-monitoring\\\/\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/\",\"name\":\"What is remote network monitoring? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Monitorizacion-remota-de-redes-980x536.png\",\"datePublished\":\"2022-05-03T01:28:13+00:00\",\"dateModified\":\"2022-05-30T02:42:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Monitorizacion-remota-de-redes-980x536.png\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Monitorizacion-remota-de-redes-980x536.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/what-is-remote-network-monitoring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is remote network monitoring?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is remote network monitoring? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"What is remote network monitoring? - Version 2","og_description":"Remote network monitoring is a technical specialty that [&hellip;]","og_url":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/","og_site_name":"Version 2","article_published_time":"2022-05-03T01:28:13+00:00","article_modified_time":"2022-05-30T02:42:11+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/what-is-remote-network-monitoring\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"What is remote network monitoring?","datePublished":"2022-05-03T01:28:13+00:00","dateModified":"2022-05-30T02:42:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/what-is-remote-network-monitoring\/"},"wordCount":991,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png","keywords":["Pandorafms","2022"],"articleSection":["PandoraFMS","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/what-is-remote-network-monitoring\/","url":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/","name":"What is remote network monitoring? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png","datePublished":"2022-05-03T01:28:13+00:00","dateModified":"2022-05-30T02:42:11+00:00","breadcrumb":{"@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/04\/Monitorizacion-remota-de-redes-980x536.png"},{"@type":"BreadcrumbList","@id":"https:\/\/pandorafms.com\/blog\/what-is-remote-network-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"What is remote network monitoring?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cYl","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=49869"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49869\/revisions"}],"predecessor-version":[{"id":49917,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49869\/revisions\/49917"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=49869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=49869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=49869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}