Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Avigilon: 10 ways to keep video servers running optimally

Avigilon: 10 ways to keep video servers running optimally
Any security manager who has been tasked with overseeing a network can understand the frustration of server and other equipment failure. Sometimes, these malfunctions are a result of manufacturing errors or electrical issues, but more times than not, server issues are a result of user negligence.

Any security manager who has been tasked with overseeing a network can understand the frustration of server and other equipment failure. Sometimes, these malfunctions are a result of manufacturing errors or electrical issues, but more times than not, server issues are a result of user negligence. Servers are a lot like cars; it is important to perform periodical maintenance to ensure they are running optimally and more importantly, to ensure their longevity.

Failure to consistently check the overall condition of user's servers can lead to a variety of problems such as overheating, network inefficiency, and unauthorized security breaches.

To ensure user's video servers continue to run like a well-oiled machine, Avigilon created a monthly IT maintenance checklist that will help you save both time and money.

1. Visually inspect servers
Conducting visual checks on servers and hard drives is an important aspect in ensuring they run optimally. Most servers have intuitive lights (or LEDs) externally displayed so that an end-user is always aware of the server's status and can spot any immediate red flags. Typically, blue or green lights signal good status, while red or orange lights often signal some sort of failure - whether it is the device or connection. Some servers can email users alerts whenever there is a hardware failure. Ignoring the server status lights could result in system failure and the potential for video loss if it's a hardware malfunction.

2. Update and schedule user's operating system and anti-Virus software
Just like user's home computer, servers are susceptible to viruses. If one have a publically accessible server, be sure to consistently keep your operating system up to date and frequently run an anti-virus scan on it. Users' anti-virus software should be the most current version and should meet all industry standards. A corrupt server is not only prone to slower performance and internal server errors, but also leaves users' servers open to possible external security risks. Finally, it is important to ensure that users' firewall software is properly configured and turned on.

3. Schedule a defragmentation
When a server attempts to locate files that are fragmented across the hard drive, the bandwidth it takes to locate and group individual files into one can slow down user's entire system. Scheduling and performing a defragmentation to the server's hard drive will pool all fragmented files together, making them easier to find. Keep in mind that some servers, such as Avigilon's, do not require users to perform a defragmentation because fragmented files are already blocked together and written to the hard drive in the same place upon installation.

4. Review operating system logs
The practice of reviewing operating system logs is standard to server operation. If users have a Windows-based system, make sure they check the activity logs to ensure there are no out-of-the-ordinary or suspicious audit entries. Not following up with “Critical” or “Warning” events may lead to system failure, resulting in loss of video and disconnected system access.

5. Audit the active accounts
In organizations of all sizes, over time there is bound to be turnover. As a security measure, it is important to keep track of the employees that have access to servers and ensure that former employees do not have access to users' systems. Be sure to delete old users and change passwords when necessary.

6. Verify Retention
Make sure having record of servers' storage capacity. Since cameras typically record on motion detection, if there is an increase in activity in the area users are monitoring, the retention time may be affected. To verify the amount of storage users have, check out the software's timeline and confirm the number of days that are being recorded. Don't try to locate important footage from a few weeks back only to find out it has been erased.

7. Delete unnecessary bookmarks
Managing your server's saved footage is very similar to using your TV's DVR. Keeping old bookmarks for surveillance video in your server is the equivalent to hoarding a stockpile of recorded TV shows you don't watch. Too much data saved unnecessarily will impact your storage space and the amount of footage you are able to retain. Be sure to delete and/or export saved footage you don't need to maximize your server's storage space.

8. Check UPS battery
Power outages happen. As a result, it is important to ensure the security and servers are not compromised in the event of electrical failure. When installing a server, customers should add a UPS or backup power supply to protect their information in the event of a power failure. Upon installation, customers should also perform a quick test to confirm the backup battery is working correctly.

9. Ensure software is up to date
Verify that software is up to date for both the video management client and the server. This will enable users to optimize your software and ensure that bugs from previous versions do not affect the current system. Being negligent with software updates could be a security risk as updates may fix important issues in previous versions of the software.

10. Auditing logs of users activity
It is always a good idea to audit user activity on a site to ensure users are adhering to protocol. Check activity logs to be sure users are being responsible and ethical with their access.

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to:
Most Viewed Articles