Network Management

IronOak managed services keeps all your computers running like new. With auto deployed disk defragmentation, and removal of restricted files and software your computer will perform at peak efficiency.
Managed services increases security with simple to comprehensive policy enforcement by ensuring applications, files and network places are accessed only by those who are authorised to do so.

With continuous monitoring of each device on your business network (server, workstation and laptop, routers, printers, etc.), the IronOak staff is alerted and will identify and resolve problems before they become serious.


Build comprehensive trending reports for long-term management of client networks.

Machine Changes Report – Managed Services Providers can easily track changes on a per-machine basis by comparing the current audit information (hardware specs, disk space, installed software) against the baseline audit information. Highlight the differences between the audits or compare audit information between two different machines.
Network Statistics Report – Display the network bandwidth consumption by machine or individual application over a configurable time period.
Uptime History Report – Easily view machine uptime status over a configurable time period and determine if a machine is online, offline or has been shut down abnormally. Track server uptime, faulty workstations, or be notified when remote users come online.
Monitor Reports – these reports are particularly useful for trending since they allow you to see data collected by windows performance counters and SNMP objects over a configured time period.

SNMP Monitoring

SNMP Monitoring collects status and error information for print servers, firewalls, routers or any other SNMP-compatible device on the network.
Includes many popular MIB sets from award-winning technology vendors such as Microsoft, HP, Cisco, Sonicwall, Dell and more.
Custom MIB sets can be uploaded to monitor virtually any SNMP-compatible device.

Event Log Monitoring

Comes with many pre-defined Event Log sets for popular application vendors such as Veritas, Microsoft, Trend Micro and many more.
Collect, Archive and Centralize Windows Event Logs
Alert Administrators on hardware and software changes
Monitor system status for online/offline condition
Supports custom Windows Events

Windows Performance Counter, Services and Processes Monitoring

In-depth troubleshooting tools to monitor and diagnose Windows services and processes
Administrators can set notification alerts when services fail or when a particular process consumes too many resources
Scheduled disk defragmentation
File search and remove (for unwanted files like MP3 and programs like “Limewire”)

Easy and Comprehensive Managed Services Scripts

  • Manipulate any file and/or registry key
  • Ability to launch/close any applications
  • Deploy any type of script and execute locally
  • Automated error and failure handling
  • Automatic OS detection

Remote Software Deployment

  • Provides an easy, fast and reliable method to automatically deploy applications, updates and upgrades throughout the entire organization. From simple executables to complete application suites.
  • Anything that can be done from the command line of a computer can be created in minutes using a IronOak IT Script. The scripts can be scheduled to run at anytime on a one-time or recurring basis.
  • Custom Software Packager to simplify the deployment of custom applications or software that does not follow standard installation methods.
  • The software packager creates a snap-shot of the system before and after program installation and then creates a custom installation package that can be deployed automatically.

IronOak IT Managed Services software helps administrators by providing

  • Simple Wizard Based Application Deployment
  • Flexible Scheduling
  • Fill in the Blank Scripting
  • Automate System Management Functions
  • Custom Application Packager
  • Comprehensive Error Handling and Reporting

Network Security with Policy Enforcement

A quick and easy method to implement and enforce access policies across multiple networks, locations and organizations.

Apply and Enforce Policies Easily

  • Works with all Microsoft Windows environments

Microsoft Windows 95 thru 2003 Server

  • Domains and active directory not required

File, Application and Network access policies

  • Detailed network usage reports with drill-down
  • File Access Policies
  • Apply policies to all, groups or specific computers
  • Block access to one or multiple files
  • Block entire disk or specific applications

Network Access Policies

  • All, groups or specific computers
  • Integrated with software inventory
  • Permit or Deny application access
  • Automatically “learn” application access
  • User notification option
  • Track network usage by computer and application

Application Access Policies

  • All, groups or specific computers
  • Select one or several applications

IronOak IT Additional Features

  • File Distribution / Collection: The IronOak IT system can securely distribute a file to one or more target machine(s) and also be configured to collect a file or set of files for review. This is especially useful for collecting 3rd-party vendor logs that are not natively supported by Microsoft Windows or the IronOak IT application.
  • End-User Communication: The IronOak IT system provides a built-in capability to broadcast messages to one or more users. Administrators can inform end-users of outages due to system maintenance or any other action.
  • Remote Wake on LAN (RWoL): Administrators can easily perform remote management by using Remote Wake On LAN (RWoL) to start powered down machines or use the IronOak IT Agent to restart or shutdown remote systems as needed.