Skip to content

【產品資訊】Pandora FMS – 企業級整合監控解決方案

Pandora FMS 是西班牙 Ártica ST 公司開發的企業級整合監控解決方案,自 2005 年起便專注於 IT 基礎架構、應用程式與雲端環境的可觀察性。強調「一站式監控」,能同時管理伺服器、網路設備、虛擬化平台、容器與公有雲服務,並支援自動化告警、視覺化報表與 SLA 分析。

產品分為免費的 Community Edition 與功能更完整的 Enterprise Edition,後者特別適合大型企業與 MSP 廠商,提供高可用性、多租戶管理及集中控制能力。整體而言,Pandora FMS 以彈性與擴充性著稱,能有效取代多套分散工具,幫助企業降低監控與維運的複雜度與成本。

Pandora FMS 特色
1. 一站式平台:取代多套分散的監控工具
2. 靈活擴展:支援 Plugin、自訂 Script,滿足企業客製化需求
3. 降低成本:開源基礎 + 企業版延伸,讓組織能按需升級
4. 支援 MSP:多租戶、多客戶管理,適合託管服務供應商

Pandora FMS 的核心優勢
1. 全方位整合監控
單一平台即可同時監控伺服器、網路設備、應用程式、資料庫、虛擬化與雲端服務,減少依賴多套工具。
2. 高度彈性與可擴充架構
從中小企業到跨國組織都能靈活部署,支援自動化發現、集中管理與遠端監控,隨需求擴充。
3. 商業導向的可視化與報告
提供即時告警、可自訂 Dashboard 與 SLA 報告,協助管理層以商業角度理解 IT 狀態。

Pandora FMS 的應用場景與適合行業
1. 金融業
常見困難:系統需 7×24 運作、交易延遲或停機造成巨大損失、法規要求高。
導入 Pandora FMS 的效益:即時偵測故障並快速定位,降低停機時間;提供 SLA 與合規報告;提升交易系統穩定性。

2. 製造業
常見困難:生產線 IoT/SCADA 設備分散,異常難以即時掌握,停機成本高。
導入 Pandora FMS 的效益:集中監控生產系統與設備,異常快速告警,減少意外停工,提升生產效率。

3. 零售與電商
常見困難:POS、電商網站與後端系統需高可用性,任何宕機影響營收。
導入 Pandora FMS 的效益:端到端監控(POS→網站→伺服器),快速排除故障,提升用戶體驗與交易成功率。

4. 電信與科技業
常見困難:網路設備龐大、跨數據中心環境,難以集中管理。
導入 Pandora FMS 的效益:提供大規模網路設備監控;集中管理異地資源,減少網路中斷影響。

適合對象

適用對象
導入原因與需求說明
大型企業 (金融、製造、電信、零售)
大型企業 (金融、製造、電信、零售)
中小企業 (科技、服務業、教育)
缺乏多套專用監控工具的維運成本,導入單一平台降低成本並提升可視性
跨國企業 / 多據點組織
分散在不同地區的伺服器與應用難以管理,Pandora FMS 可集中化管理並即時告警
雲端與混合環境用戶
傳統監控工具對雲端支持不足,Pandora FMS 同時支援本地端、虛擬化與公有雲

關於 PandoraFMS
Pandora FMS 是一個靈活的監控系統,能夠監控設備、基礎設施、應用程式、服務和業務流程。當然,Pandora FMS 可以控制的東西之一就是您電腦的硬碟。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

Pandora FMS 777.8 LTS 修補程式更新:全新功能一覽

777.8 LTS 修補程式詳情

Pandora FMS 正式推出了 777.8 LTS 修補程式,帶來多項修復與改進:包括 Web 控制台功能的修復、事件過濾器中正則表達式搜尋的效能提升、儀表板過濾與評論顯示的改善;指令中心新增代理詳情視圖並更新分配節點;安全性方面,QuickShell 配置限制端口欄位僅接受數字值,並強化 Chromium 安裝路徑驗證以生成 PDF 圖表;Warp Update 進度條現每隔數秒顯示一次更新進度;同時改進了高可用性(HA)環境中的模組負載平衡、代理批量操作,以及集中式模組管理功能。欲了解更多詳情,請參閱以下修補程式說明。

錯誤修復

FIX LTS#
GitLab#
描述
14001
13964
修復事件視圖過濾器中正則表達式自由文本搜尋的功能異常
14953
N/A
修正儀表板列表過濾問題,確保無報告權限的閱讀操作員用戶也能正常使用
15022
14660
恢復事件詳情視圖中評論過濾器的自訂間隔功能(僅限超級管理員使用)
15270
14833
修復 PFMS 網頁伺服器中的可用伺服器查詢,確保 HA 環境下網頁模組負載平衡正常運作
15277
N/A
修正代理修改視圖的分頁功能,確保在任何代理狀態下都能正常顯示
15334
15306
允許所有用戶在一般配置設為可選時啟用 Web 控制台的雙因素認證
15356
14740
修復批量編輯 async_string 模組時關鍵狀態與警告狀態欄位的分配錯誤
15372
15017
改善 PFMS 佈建伺服器,妥善處理代理數據缺失的情況
15377
15376
修正活動通知訊息中的拼寫錯誤,提升訊息品質
15403
15402
修復數據伺服器中代理模組更新流程的問題
15607
15585
改善監控策略選擇與添加時的節點與代理過濾流程
15757
15751
修復透過 Web 控制台添加的評論在事件視圖中的顯示問題
15781
15782
修正指令中心中分配節點更新的錯誤
15785
15784
改善 Warp Update,每五秒顯示一次下載進度條,提升用戶體驗

功能改進與細微調整

FIX LTS#
GitLab#
描述
14983
15397
相關 14726,在指令中心的監控策略應用中新增僅按節點搜尋的代理過濾選項
14984
14722
在指令中心新增代理詳情視圖(位於 監控→代理詳情 選單),提供更直觀的操作體驗
15172
15024
在 Warp Update 離線功能中新增應用自訂特殊修補程式的支援
15284
13917
修復集中式環境中代理批量操作功能,特別針對描述編輯與次要群組管理
15462
15459
改善 Linux 軟件代理中的 “module_regexp” 功能,確保在日誌輪替時正常運作

已知變更與限制

FIX LTS#
GitLab#
描述
14162
14717
相關 14351,在 Web 控制台新增特別通知,提醒用戶 Chromium 報告生成引擎缺少寫入權限

安全性漏洞修復

FIX LTS#
GitLab#
描述
15353
15305
強化 QuickShell 配置,確保端口號欄位僅接受數字輸入,提升安全性
15354
15308
修復 Chromium 安裝路徑驗證(用於 PDF 圖表生成),並新增 Web 控制台通知,提示用戶路徑配置錯誤

關於 PandoraFMS
Pandora FMS 是一個靈活的監控系統,能夠監控設備、基礎設施、應用程式、服務和業務流程。當然,Pandora FMS 可以控制的東西之一就是您電腦的硬碟。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

Pandora FMS NG 779 RRR 新功能概覽

Pandora FMS NG 779 RRR 新功能概覽
這是一個小更新的版本,帶來了一些新功能。目前穩定性最高的最新版本為 Pandora FMS 777 Andrómeda LTS(長期支援版本)。
LTS 版本每年發布一次,而常規版本(RRR)約每兩個月更新一次。您可以前往我們的網站了解更多有關版本和更新系統的詳細資訊。

新功能與改進

1. 漏洞監控的強化
針對 MS Windows® 代理新增了全新的清單模組,並改進了現有模組,可以監控已安裝的軟件和系統修補程式。此改進大幅拓展了漏洞數據庫,並同時增強對 Windows 和 Linux 系統的可見性與管理能力。

2. 新增報表項目:事件列表
全新報表元素「事件列表」已加入,使用者可像傳統事件視圖一樣篩選和查看事件。未來版本中,此功能將逐步取代現有的事件報表元素。

3. 新增審核資訊小工具
儀表板新增了審核資訊小工具,可顯示當前使用者的詳細資訊,進一步提升系統操作的透明度與可追溯性。

4. 更多更新

Pandora FMS 779 除了推出全新功能外,還優化平台性能與自訂功能的技術改進。SAML 認證已升級,確保與 Azure 和 simpleSAML 2 的兼容性,同時增強安全性並提升企業環境中的整合效率。

另一個重大改進是支援為事件配置通用指令,即使沒有特定的狀態變更指令,也能加速事件回應。Windows® 的 IPAM 外掛現在支援更新例如「已佔用」和「可用」等數據,並可在 Satellite 伺服器上執行 IPAM 任務,進一步提高分佈式環境的操作靈活性。

為了加強系統安全,Satellite 伺服器新增了憑證存儲功能,支援 SSH、WMI 和 SNMPv3,並在配置檔中提供了加密選項。MongoDB® 的 Discovery 外掛新增了支援自訂 SQL 查詢的功能,用戶可據此創建專屬的監控模組,為資料庫管理提供了更大的靈活性。

在代理自動配置方面,Pandora FMS 779 引入了策略優先級功能,優先執行高優先級策略以提升效能。此外,新增的“agentalias”與“agentname”可作為網絡模組中的 IP 目標。現在可以透過「子類型」欄位過濾 SNMP 陷阱警報。在日誌收集中,Web 控制台加入了全新的 OpenSearch® 配置選項,可針對不同環境進行精確調整。

 

SAML Authentication Enhancements

Updated and improved authentication in Pandora FMS console using SAML, ensuring compatibility with SAML environments in Azure and with simpleSAML 2.

New General Event Instructions

Just like the instructions for changing the state of events, it is now possible to configure general default instructions that will be displayed when the instructions for changing the state are missing or should not be displayed.

IPAM Plugin Improvements

The IPAM Discovery MS Windows® Agent Plugin has new enhancements that allow you to update all the “Occupied”, “Available”, “Managed” and “Unmanaged” data that was previously only possible to update from Pandora FMS server.

IPAM Tasks from Satellite Servers

It is now possible to configure IPAM tasks in Pandora FMS console so that they can be run from a Satellite server with remote configuration enabled.

Credential Store Improvement in Satellite servers

Pandora FMS Satellite Servers now have the credential store for SSH, WMI and SNMPv3 modules. These credentials can also be encrypted in the configuration files used by Satellites to ensure their privacy.

Improvement in Discovery Plugin: MongoDB®

Included the ability to launch custom SQL queries to generate monitoring modules in the Discovery MongoDB plugin.

Policy Enforcement Priority in Autoconfiguration

To improve performance in monitoring policy enforcement, it is now possible to prioritize agent autoconfiguration rules, so that policies with higher priority are applied before the rest.

New macros for network modules

It is now possible to use “_agentalias_” and “_agentname_” macros as the target IP address in network modules.

Improved SNMP Trap Alerts

SNMP trap alerts can be configured to filter their triggers by the “Subtype” field.

Improved Alert Recovery

Included an option in alert recovery to be performed only upon the change of status to “normal” of a module. This option is configurable on each alert template.

Configuration Options for Collecting Logs

OpenSearch® setup in Pandora FMS Web Console for collecting logs now has more options that allow you to adjust some OpenSearch® configuration parameters for each environment.

Improvements and small changes

Case#GitLab#Description
N/A2361New feature for credential encryption in monitoring through SSH, WMI and SNMP 3. It includes new tokens that are used globally in the Satellite server or at agent level for their corresponding modules.
107196728By means of the macros _agentalias_ and _agentname_, and if these fields contain a valid IP address, these macros can be added to the Target IP field of the modules for subsequent monitoring.
12514

8092

  • Related: MR 79
Alerts by SNMP trap can also be filtered by subtype (Subtype trap).
N/A9669New audit Information widget.
14567 and 145859905You may add general read-only instructions to any type of event, regardless of the rest of the fields. Included the same mechanism for API 2.0 and PFMS CLI.
N/A11527For IPAM discovery tasks, you may now configure PFMS server or the Satellite server to handle said task.
N/A11748Added prioritization to agent autoconfiguration when applying monitoring policies.
N/A12755New event list report based on saved filter.
N/A13638Added the Recovery only on Normal status token to alert templates, so that alert recovery is performed only for normal state.
N/A

13785

  • Related: 12463, 12489, 13786, 13787, 13790, 14110, 14643.
New feature for Software Agents in MS Windows® performed through Inventory of installed patches and comparison with the list of patches to be installed.
N/A14193New custom queries for MongoDB® database monitoring using Discovery PFMS

Known changes and limitations

Case#GitLab#Description
N/A

9918

  • Related: 13642 and 13991
Added support for user authentication with SAML 2.0 (SimpleSAMLphp server) while supporting previous versions.
N/A12781Module-based, agent-based, and group-based event reports will be deprecated in the LTS release in 2025.
N/A13945Added new index configuration section to the Log Collector, so that, optionally, four important parameters may be defined in OpenSearch.

Fixed vulnerabilities

Case#GitLab#Description
N/A CVE-2024-35308 Acknowledgement: i[@]qvq.im14684Fixed the arbitrary reading of the operating system file by a user registered in PFMS Web Console (plugins section).
N/A CVE-2024-9987 Acknowledgement: i[@]qvq.im14685Fixed access to read-only CSV data for any agent module by a registered user in PFMS Web Console (console extensions section).

Bug Fixes

Case#GitLab#Description
N/A10062Fixed searches by module name in the Monitor detail view to make literal queries with the following characters: %, _, [, ], {, }, -, ^.
The only non-verbatim search character is the asterisk, so it can be searched literally if between quotation marks (and any search that includes quotation marks will be literal).
N/A

12962

  • Related: MR 79
Fixed special days for leap years.
N/A13073Fixed the display and style of the applied updates view (Warp Journal) to the product style.
N/A13114Fixed the description of the DNS plugin.
N/A13250Fixed the CLI PFMS command update_agent option update_gis_data, to only take values zero and one.
N/A13255Fixed the update_group command (PFMS CLI) to avoid hierarchy paradoxes against the same group or with groups related to other groups.
N/A13442Fixed the default value and description of token syncserver.
N/A

13511

  • Related: MR 79
Removed widget “Welcome message to” for failing to function as expected.
N/A13522Fixed visual glitches for both dark and light themes in the Credential Store.
N/A13523Added a warning message to module template management in case you did not select any Private Enterprise Number (PEN).
N/A13553Fixed visual glitches in Permissions Report PDF.
N/A13747

Fixed the following commands in HTTP 500 errors in API 1.0:

  • get id_group_agent_by_name
  • get id_group_agent_by_alias
  • get group_agent_by_name
1762013782Fixed Cron Jobs task editing and/or addition in the Command Center (Metaconsole).
N/A13792Fixed the scope of users regarding the special group All in Inventory Alerts, so that they may have access to it only if they have specific permissions on it.
N/A13794Fixed the Cluster view so that only users who have permissions on the group to which the cluster belongs may access it.
N/A13797Fixed and limited agent deletion in Monitoring Policies for users who do not have permissions on the agent groups.
N/A

13799

  • Related: 14585
Fixed the display of tasks belonging to group ALL in IPAM if users do not have permission on said group. Fixed other permissions for different types of user profiles.
N/A13811Fixed the first uninitialized state in web module creation if applicable.
N/A

13818

  • Related: 13731, 13783, 14581
Fixed the correct interpretation and execution of macros in custom event responses if the display command option is enabled when running a command (view used for debugging).
N/A

13857

  • Related: 13803, 13804, 13840, 13848
Fixed a major bug in the Command Center (Metaconsole) that affected centralized services and services on nodes when added as a service element.
N/A13819Restricted access to Visual Consoles both in nodes and in the Command Center (Metaconsole) by means of the use of URLs by users without a VM profile.
1773813826Fixed the application of Regex conditions for received monitoring data in character string imodules, to detect state changes.
1765613829Fixed external alert addition in monitoring policies when extended characters are used in modules. To that end, the exact matching feature in regular expressions was also added.
N/A13836Removed repetitive message in HA environment alerting. It is verified that it appears in a timely manner according to the type of detected error and without repetitions.
N/A13854Removed the warning message in the event alerts view, which was only valid for versions prior to 779.
N/A13855Fixed the operation of basic security monitoring in the installation of the Software Agent for MS Windows® (Windows Server 2022®).
1782713865Fixed error HTTP 500 when saving bulk monitoring policy operations without having made any changes.
N/A13917Fixed mass operations on agents in centralized environments, specifically in the secondary group description editing.
N/A13952Fixed agent group disabling for counting agents in use according to license terms.
1754114065Fixed the token to explore all virtual machines and CPU and memory data collecting for monitoring XenServer® with Discovery PFMS.
N/A14095Fixed the token generation process for users using the PFMS API 2.0.
N/A14109Fixed several errors in the API 2.0 PFMS when paying certain fields with special enumeration.
1832914137Fixed image display in base64 in WUX monitoring when generating PDF.
1834914147Fixed unsolicited login to Web Console when using PFMS API 2.0.
1836214152Fixed inverse threshold application in monitoring policies.
N/A14163Fixed the WUX server to stop if the specified IP address to be monitored is out of reach.
N/A

14171

  • Related: 12374, MR 79
Fixed Oracle monitoring to connect in sysdba, thick and thin mode while maintaining cryptographic compatibility ®.
18394

14189

  • Related: MR 79
Fixed the use of threads and cores used to streamline data collecting in VMWare monitoring in Discovery PFMS.
1846514192Fixed duplicity in agent creation caused by a misconfigured token in VMWare monitoring with Discovery PFMS.
18651

14273

  • Related: 11815
Fixed the possibility of choosing another agent in synthetic module creation.
18691

14305

  • Related: 14289
Fixed access to users with ACLs and secondary groups to remote operation with Pandora RC.
N/A

14291

  • Related: 12941, 13973, MR 79
Interval correction in Dataserver modules.
N/A14342Fixed token display in the PFMS API 1.0.
1884814381En Fixed graph display in Monitor view in the Command Center (Metaconsole).
N/A

14417

  • Related: 14418
Fixed inventory enablement (basic options) in Software Agents.
1890214507Fixed agent duplication in MySQL monitoring with Discovery PFMS.
N/A14822Fixed connection to the nodes for alert display from the Command Center (Metaconsole).
N/A14521Fixed the default event filter assignment in every user profile in both Command Center and nodes.
N/A14533 and 14639Fixed the use of the Command Center as an update repository for centralized nodes.
N/A

14536

  • Related: 14164
Fixed the use of double quotation marks (character escape) in event update in PFMS API 2.0.
N/A14540Fixed the Discovery server for updating the extra_data field (data received in JSON).
N/A14651Fixed Error 500 when accessing the View Map in Recon Task.
N/A

14657

  • Related: 14256
Fixed filter in event reports for the Command Center and nodes.
N/A14701Fixed offline update (version comparison).
N/A14706Visually enhanced the agent configuration interface and the module interface.
N/A14734Fixed plugin pandora_df_used to always return values in bytes and thresholds in percentages.
N/A

14825

  • Related: 14844 and 14848
Checked the operation in Visual Consoles of the elements Serialized pie graph, Bars graph, Event history graph and Simple value.
N/A

14867

  • Related: 14865
Fixed ratings in vulnerability monitoring so that they fit a range of 0 to 10 points.
N/A14865Fixed the duplicated addition of the same software with different versions in vulnerability monitoring. Now it only takes into account the next version to the one installed for rating calculation.
N/A14862Fixed PFMS server restart for version 780 after an online update. For version 779, Pandora FMS must be manually restarted.

關於 PandoraFMS
Pandora FMS 是一個靈活的監控系統,能夠監控設備、基礎設施、應用程式、服務和業務流程。當然,Pandora FMS 可以控制的東西之一就是您電腦的硬碟。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

您需要它,我們為您帶來:新的 Pandora FMS 社區!

Pandora FMS Community was first launched sixteen years ago. Today, it has more than 2.5K active members* that visit it to participate, learn, answer questions, and contribute everything they can and know. *4.6K discussion threads and over 16K responses. But the time for change has come!

The new Pandora FMS Community is here!!!

With the growth of the community, and the extensive scope of useful content available, we knew it was time to invest in updates to support our users and welcome new members with open arms. We migrated to a new platform. A platform for Pandora FMS Community that allows new user experience with categorized questions and answers as well as private and public groups. New knowledge base and integrated blog. Because of that, the domain changed from https://pandorafms.com/forums/ to https: //pandorafms.com/community/ But don’t worry, all the previous links are redirected to your new home!

The question is: Why are we launching a new community site?

Simply put, we want to help our whole community connect, collaborate, and share knowledge in every way possible. And this launch is our particular investment to provide you with the technologies and capabilities to enhance your experiences and increase support, education and contribution.

What new features await you?

  1. Private and public groups
Would you like to contribute with your own ideas? What would you like to improve? This is your group, open to anyone who wants a better IT world. Restricted group for users who manage complex Pandora FMS configurations (Open or Enterprise) and want to contribute. Discuss the roadmap, usage issues… Access to unpublished material will be restricted. Pandora FMS Beta program helps to publicize what is currently being developed in Pandora FMS, both in the Community and Enterprise versions, accessing development versions generated daily. These versions can be used to test new features, evaluate bug fixes, and evaluate development progress in test environments. Since the group is closed and small, it is an excellent group to propose improvements, usability failure detection or non-contemplated use cases, etc. To join the group, which is a restricted-access one, you must request access through our community website. In this group there are community users and Enterprise version customers alike, there is no need to give away any personal data or identify yourself in any way, all those who want to be part of the group and can contribute something are welcome. Whether you are an IT company professional, a teacher of a technical course or an open source enthusiast, this group is geared towards helping coordinate Pandora FMS working groups and events.
  1. Categories established with different topics
  1. Range ranks and badges with karma system updates
  1. Private messaging on the platform

Its main differences with the previous forum?

The previous forum was limited to questions and answers, a forum for pure and simple discussion. The new Pandora FMS online community, in order to enhance bilateral communication between users, integrates many more options apart from the forum:
  • Its very own blog.
  • A knowledge base.
  • Public and private groups.
  • Q&A.
  • Resources.
  • Private instant messaging.
  • Online merchandising store.
In short, we wanted to open a wide range of information, concentrated into a single place, to make it easier for all of our users to understand so much information, instead of just using it to their advantage.

Conclusions

The new Pandora FMS Community brings together in one place everything you may need to share, expand and improve knowledge about monitoring with Pandora FMS, both for Enterprise users and those from the OpenSource version. It is not just about bringing together people with the same interest, but about taking advantage of the knowledge of the team and the community so that members can achieve their goals in an integrated way in the same place.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

馬德里網絡安全峰會:“歐洲已經警惕數據不依賴第三方”

Madrid hosted on October 26th and 27th one of the major international cybersecurity summits. 

The fair Cyber Security World has brought together large technology companies, public administrations and references from the IT sector to address the main topics. 

Among them that of cybersecurity

An increasingly analyzed concept that, in the midst of the Ukrainian war, has multiplied its concern among companies and governments.

What do you know about the Madrid cybersecurity summit?

Data hosting in the cloud, the adaptation of the different administrations and the emergence of new solutions are some of the issues addressed by the major players in the sector with the aim of preparing for the new digital era.

“Europe is already on alert for data to not depend on third parties.

It is a maxim both among public administrations and among companies, who may see their systems attacked by hackers or simple computer errors,” 

ensures monitoring expert Sancho Lerena, CEO of the IT company Pandora FMS

The European Commission, in fact, has already set ahead the goal of achieving technological independence by 2030. 

According to the data they provided, 90% of the data of the European Union are managed by American companies

In addition, less than 4% of major online platforms are European. 

An example of this technological fragility is that the European market represents less than 10% in the microchip manufacturing sector. 

“In a couple of years, more than 50% of companies should be using the Cloud,” the expert says. 

The European future of cybersecurity

The challenge for 2030 is to maximize digitisation within the European Union. 

The project Compass Digital, for example, includes multiple investments and objectives, but the sector agrees that many steps must be taken to achieve full cybersecurity nowadays. 

“There are many companies that still have legacy, outdated systems that cannot incorporate the latest security developments,” acknowledges Lerena.

The IT company Pandora FMS is one of those that works with both digital administrations and companies through its monitoring system. 

The concept of monitoring is increasingly widespread in the sector, as it allows the real-time management of all data generated within an IT structure. 

That way, companies achieve greater efficiency and reduce costs.

“This technology not only helps improve the control of data and activity of a platform, it also strengthens security and warns about possible errors to improve reaction time.” 

Explains the head of technology, whose solution is present in institutions such as Madrid Digital, relying on the Comunidad de Madrid, or the EMT

Also, having international giants such as Rakuten or Toshiba shows the importance that this type of technology currently has.

Europe is already looking to 2030 with the intention of extending this digitisation.

Companies are incorporating monitoring systems and strengthening the cybersecurity of their companies.The objective is none other than to prevent European actors from being “well below the EU’s global economic weight” in technologically relevant areas.

Essential for Smart Cities

Cybersecurity will become increasingly important.

Especially considering that the objective of the most developed countries is to implement those known as Smart Cities where technology and data control will be fundamental for the efficient management of cities.

The concept of Smart Cities responds to those cities where, through data analysis and the use of the latest technological solutions, services are more efficient for citizens and do not generate a negative impact either in economic terms or in the environmental field. 

For example, to find out in which areas more waste is generated to improve the garbage service in that area or the management of public transport through citizen accessibility. 

Therefore, the proper processing of these data and their security will be a pillar for the cities of the future

“Without the control of these data, and without technological independence, it will be very difficult to develop these Smart Cities in a stable way”, says Lerena. 

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

歷史上最危險的計算機病毒

Here, in our beloved Pandora FMS blog, we have talked a big deal about computer risks. This does not mean of course that we consider ourselves to be faint-hearted or timid, but rather cautious heroes. And in order not to be alone in a battle against the evil that lurks around, today, continuing with this theme of terror and digital desolation, we bring you: some of the most dangerous computer viruses in human history!

These are the computer viruses you should fear the most!

What is a computer virus?

Before bringing on the storm, listing malicious software, we’d better explain a little what this whole thing about computer viruses is and why, although you have to be careful with them, you don’t need to use masks.

A computer virus is a malicious program or code created and conceived to truncate the operation of a computer. 

Like the biological microorganism, they are also infectious, although these replicate only within computer equipment.

They propagate from one computer to another, usually attached to a legitimate document, then execute their cursed code.

Although you may think the computer virus has been with us since the first pulley system, it was Leonard M. Adleman, in 1984, the first to use the term while finding similarities between his student Fred Cohen’s college experiment and the HIV virus.

List of the most dangerous computer viruses that have ever existed

Now, let’s get down to business!

We go into it!

I LOVE YOU

Funny thing is, this virus does everything but love and appreciate you for who you are. In fact, on its own, it has devoted itself to creating chaos around the world with about 10 million dollars in damages.

It came to be believed that 10% of all computers in the world were infected by it and it caused large institutions and governments to disable their email system for not wanting to take any risks.

You see, something not even the tiresome, stalking Linkedin publicity achieved.

I love you was created in the Philippines by Reonel Ramones and Onel de Guzman using social engineering (“A set of techniques that cybercriminals use to trick incautious users into sending them confidential data, infecting their computers with malware, or opening links to infected sites”) they sneaked it into the Philippines, to all of Asia, and in a short time to the rest of the world.
Fun fact:

As the email they sent for you to click on the attachment was a declaration of love, the virus was called “I Love You”.

MELISSA

Its creator was David L. Smith and detonated in ’99 as an infected Word document that was presented to the world as the best thing ever for perverts:

“Hello, I am a list of passwords for pornographic websites.”

At that time the virus was mailed to the fifty most important people in your email and created havoc with his deceptive list of passwords. Of course, the most curious and salacious ones fell for it right away.

It also came with a sort of cover letter, a reference to the Simpsons.

Less than a week after his presentation to the public, David L. Smith was captured by the police. Oh, I’m sorry, David.

However, for his special collaboration with the authorities in trapping other perfidious virus creators, his sentence was reduced from 10 years to 20 months.

Still… His virus caused 80 million dollars in damage.

Fun fact:

If “Melissa” sounds like a sinuous and more like the name of a hurricane, it has to do with the fact that it comes from an exotic dancer from Florida.

ZEUS

A trojan (“A malware that presents itself to the user as a seemingly legitimate and harmless program, but which, when executed, gives an attacker remote access to the infected computer”) created especially to truncate computers with Windows.

It did a number of awkward things on your computer, including capturing forms.
Most computers became infected due to hidden downloads or phishing (“A technique that involves sending an email from a cybercriminal to a user pretending to be a legitimate entity”).

It was used for such ominous things as stealing login credentials from social networks, emails, and bank accounts.

In the United States alone, more than one million computers were infected.

Fun fact:

It compromised corporations such as Amazon, Oracle, Bank of America, Cisco, and many more.

STUXNET 

The virus is believed to have been created by the Israel Defense Forces along with the United States Government.

With these two agents involved, what do you think? That the virus was spawned as an experimental project and that it got out of hand? Or that it was done, expressly, to bring chaos upon our civilization?

Bingo!

This virus was designed for cyber warfare.

It had the goal of halting Iran’s advances in nuclear defense. And so it was, much of the infection took place in Iran.

Fun fact:

It spread through infected pen drives and altered the speed of the devices until they became damaged.

CRYPTOLOCKER 

A ransomware (“A type of malicious program that restricts access to certain parts or files of the infected operating system and asks for a ransom in exchange for removing this restriction”) Trojan that uses, among other means, email to spread.

Once your computer was infected it went on to encrypt some files from the hard drive.

The thing here is that, even though it’s easy to remove as a virus, the files it encrypted stayed still encrypted, unless you paid a ransom by a deadline.

The ransom used to be $ 400, although it could increase, and the number of infected computers was 500,000.

Make the numbers yourself… With only half paying the scammers, you could afford a house in Florida!

Thank God, Evgeny Bogachev, leader of the organization that operated with this virus was arrested and forced to return all encrypted keys.

Fun fact:

In the end, only 1.3% of those infected fell into the scam… That’s about 3 million dollars. Not bad at all!

Dimas P.L., de la lejana y exótica Vega Baja, CasiMurcia, periodista, redactor, taumaturgo del contenido y campeón de espantar palomas en los parques. Actualmente resido en Madrid donde trabajo como paladín de la comunicación en Pandora FMS y periodista freelance cultural en cualquier medio que se ofrezca. También me vuelvo loco escribiendo y recitando por los círculos poéticos más profundos y oscuros de la ciudad.

Dimas P.L., from the distant and exotic Vega Baja, CasiMurcia, journalist, editor, thaumaturgist of content and champion of scaring pigeons in parks. I currently live in Madrid where I work as a communication champion in Pandora FMS and as a freelance cultural journalist in any media offered. I also go crazy writing and reciting in the deepest and darkest poetic circles of the city.

 
 

 

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

數據中心架構將走向何方?

You know what data centers* are, we’ve told you a lot about the on this blog. Today, however, it is time to check out a particular aspect such as the singleness of their architecture**. In addition to what role they play in the present and which one they will play in the future.

* Physical facility that organizations use to host their information, applications, critical data…

**There’s a good example of alliteration, great rhetorical figure.

So let’s go!

Data center architecture, present and future

Lately with so much cataclysm and recession, it seems that the world is going backwards. However, there are things that improve. The Succession TV show is cooler every season and last summer they released a new variety of Magnum ice cream that is superior to the previous ones. For instance.

Technology is also evolving. In fact, you can see right now how all sorts of innovations take us to the next level.

Data centers are not left behind

About moving forward, I mean.

Why?

Well, because in recent years, IoT technology, the overwhelming need to accumulate data and our beloved Cloud have lovingly promoted the modernization of traditional data centers.

Otherwise these would be obsolete.

As many of you know, the design of a data center is based on a network of computing and storage resources that allows delivering shared data. 

Its key components include:

  • Routers. 
  • Switchgear. 
  • Firewalls. 
  • Storage systems.
  • Servers.
  • Etc.

This is when a number of companies are shifting to modern forms of data centers*.

*Which pose as many advantages as challenges. 

More than twenty years ago, when data center architecture became a hot topic, there was debate between the CISC (Complex Instruction Set Computer) and RISC (Reduced Instruction Set Computer) architectures, and between SMPs, mainframes, and small systems. 

All this happened before the surprising emergence of coprocessors, AISCs and other accelerators, to boost data access and optimize complex operations. 

Currently, data centers are mostly aligned on x86 CPUs, small two-socket servers, and a general standardization of the components that make up the modern data center. 

Even so, corporations continue to look for ways* to increase their efficiency and productivity by helping themselves with technological advances.

*Always at a lower cost.

Where do data centers come from and where are they headed to?

Like all technologies, from the pulley system to home ice-cream maker, data centers have also gone through a long way of transformation.

  • Before the 1990s, data centers were made up of large computer rooms. There, any computer error made them stand out within the system.
  • In the 1990s, as the Internet began to take shape and take center stage, data centers became popular among businesses. 
  • As the new century began, folks began to become more aware of the data centers and brought to light incredible improvements.  Such as data center services, outsourcing demands, shared hosting, application hosting, managed services, ISPs, ASPs, MSPs, etc. 

During later years, data centers became stabilized as a concept in society. The focus, then, was on energy efficiency, refrigeration technologies and management facilities.

Is this the end of ordinary data centers?

Today, a good Intel CPU is considered the most powerful on the market. 112 cores, an incredible number of features to handle all kinds of workloads or technical machine learning activities. 

Even so, companies seek, as police hounds, a new solution.

They are aware that big data analytics, machine learning, artificial intelligence, the so-called “Internet of Things” and other high-spectrum technologies are changing the approach to data centers. 

Modern technologies, as they have been doing from the pulley system to home ice-cream makers, try to minimize costs.

That’s why, if we take into account the money, efficiency, power and optimization in a modern data center, you’ll find old architectures no longer work. 

They consume more energy and take up more space. 

Furthermore, there are already better services, more attractive ones

GPUs are being used, for example, for specialized tasks that suppress single-core CPU performance. 

In fact, GPU-enabled platforms have caused a readjustment of system designs, addressing the data-avid nature of processors.

Despite what it may seem, in recent times, cloud providers are switching to independent data centers, and, of course, large corporations are following suit. 

In the immediate future, the evolution of data centers is expected to approach a new paradigm, probably because the Covid 19 pandemic has pushed the world to work in the cloud like no one imagined.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

新品 Pandora FMS 765 RRR

Let’s check out together the features and improvements included in the new Pandora FMS release: Pandora FMS 765.

What’s new in the latest Pandora FMS release, Pandora FMS 765

NEW FEATURES AND IMPROVEMENTS

Improved network maps

Multiple changes have been made to network maps to improve the usability, performance and network map setup.

  • Map drawing and refreshing is automatic and dynamically reflects the changes in the network, highly improving the existing display in previous versions.
  • The possibility of deleting “Pandora FMS” node as well as all its relationships has been added. Usability has also been improved in manual relationship management between nodes.
  • Added linking between network maps. When there is a dummy node pointing to another network map, it will be possible to access that map from the options of the dummy node. 

New report type: System module inventory

The new type of report “System module inventory” has been created, through which you will see an inventory of the modules generated in your Pandora FMS installation registered by module name, remarking the necessary information for those modules that have the same module name.

Sending reports by mail as an alert action

A new feature has been added to Pandora FMS alert system whereby it is possible to send reports by email in PDF thanks to its incorporation as new actions/commands within Pandora FMS.

Support for Ubuntu 22.04

Ubuntu 22.04 is officially supported by Pandora FMS server

New scheduled downtime option. Disable modules

A new feature has been added within the scheduled downtimes. Now you may choose the option to disable modules without stopping the agent itself.

History database in Metaconsole

Just as it existed in Pandora FMS nodes, there is now the possibility of having a history database within the Metaconsole.

Pandora WMIC package for ARM systems

Usage in ARM environments is growing, and we have created an ARM-supported binary for environments that use the Satellite to remotely monitor Windows environments.

IP console access control

Diferentes usuarios solicitaron controlar el acceDifferent users requested to control access to the console by source IP, which can be defined individually by user. We implemented it so that masks can also be defined, e.g.: 192.168.100.*

Plugin imap open

Plugin with which emails can be filtered or the number of emails of an account through a series of filters. Useful for detecting whether an alert email arrived or to look for a certain email.

Plugin Azure Hubs enterprise

Plugin with which to monitor a space of names of Event Hubs. It returns several types of metric, like SuccesfulRequests, CapturedBytes or ActiveConnections.

Plugin Azure Postgresql enterprise

Plugin with which to monitor an Azure PostgreSQL data server and to receive metrics such as cpu_precent, memory_percent, storage_used or active_connections, among others.

Plugin Cisco inventario enterprise

Inventory plugin with which to show the configuration of a Cisco device.

Plugin Xenserver enterprise

Updated python2 plugin to python3. Added macros all_vm and all_sr to discard virtual machine agent and MR agent creation if required.

Plugin Openweathermap enterprise

Plugin with which to remove weather data from a zone through the openweathermap API, entering the area’s coordinates.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Pandora FMS 現已通過紅帽企業 Linux 軟件認證

In Pandora FMS we are in luck, we now have Pandora FMS RHEL8 software certification.

Some called it impossible, others the next step to take, whatever the case everyone received it with applause!

But hold on…

What is Pandora FMS RHEL8 software certification?

This certification now features a set of executable tests for partners that produce results that are then reviewed by Red Hat

Your non-containerized software is certified when test results show successful interoperability with Red Hat Enterprise Linux 8 in a safe and supportable manner using best practices. 

Once verified, you can promote your product(s) in the Red Hat Ecosystem catalog.

In addition, Red Hat will grant partners a free limited subscription to TSANet for collaborative customer case management to improve their ongoing user experiences.

Does anyone give more?

Why Red Hat Enterprise Linux 8?

Well, because Red Hat Enterprise Linux, the industry leader in enterprise Linux deployments, is the foundation of Red Hat’s open hybrid cloud portfolio, providing the underlying engine for developing and deploying complex workloads across physical, virtual, private, and public cloud environments in a more secure and controlled way. 

After just a few months, Red Hat Enterprise Linux 8 is already the number one RHEL version among developers, with hundreds of thousands of downloads.

*Don’t worry, if you need to learn more about RHEL 8, visit the developer page  RHEL 8.

 Certification Features

This new Red Hat Enterprise Linux software certification means that:

  • Our executable is verified with a Red Hat seal of approval.
  • Our products are differentiated by being more compatible, interoperable and safe.
  • We get a limited TSANet membership (courtesy of Red Hat) to improve your customers’ long-term support and experiences.
  • We get free technical support for the certification.

 Benefits for partners

The benefits that partners receive from this certification include:

  • Have your certified software published and promoted in the new Red Hat Ecosystem catalog.
  • Co-branded product overview.
  • Exposure to Red Hat sales.
  • The opportunity to participate in Red Hat Partner Connect podcasts.
  • Awareness in Social Networks

 Advantages for the client

The benefits that clients receive from this certification include:

  • A higher degree of operationality assurance when using Red Hat certified products.
  • Mitigate security risks through verified best practices.
  • Improved supportability of Red Hat and Red Hat partners through TSANet.

As usual, around here we could not be happier!

Tell me, what about you?

How will you make the most out of this wonderful chance? 

El equipo de redacción de Pandora FMS está formado por un conjunto de escritores y profesionales de las TI con una cosa en común: su pasión por la monitorización de sistemas informáticos.

Pandora FMS’s editorial team is made up of a group of writers and IT professionals with one thing in common: their passion for computer system monitoring.

 

 

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Pandora FMS 是乾旱的補救措施?

As you know, this summer half of Spain has been on drought alert. A consequence, without a doubt, of the extreme summer heat and rain scarcity. 

Andalusia was one of the most affected.

Therefore, companies and public administrations in the area have raised the alarm. Especially because of environmental and economic effects. 

Thank heaven and science, technology experts already point out some solutions to reduce the impact of this type of phenomenon.

Pandora FMS and drought monitoring

Nowadays, many cities go for digital and technological help to improve resource management. 

One of the most popular practices among companies is monitoring. It is known that this can work, without a doubt, as a defense against catastrophes such as the one that devastated Andalusia this summer. 

“Monitoring systems improve the effectiveness of any workforce. And, therefore, their resource management.” 

Indicates Sancho Lerena, general director of the monitoring company Pandora FMS

“Monitoring how reservoirs are falling, the level of rainfall compared to the usual figures, or even finding out whether household water consumption is increasing significantly can help anticipate scenarios such as the current lack of water.”

This type of approach, monitoring, is increasingly used. For now public administrations are adapting, but this is already something common in the business field

Monitoring can reduce the workload in the retail sector by 30%. In addition, it can triple the response time to citizen service. Which, frankly, would be very good for any public administration.

Andalusia and its battle against drought

Andalusia has already referred to the year 2022 as one of the driest of the last 50 years

The Doñana National Park has been one of the most affected scenarios, along with the rest of the reference reservoirs, which are below 11% of flow.

These circumstances are also having a negative economic impact. For the time being, olive oil production in 2022 is expected to be reduced by 50%. The poorest year of the last decade, compared to over one million tons in 2021.

But initiatives to alleviate these problems have already been set in motion, many of them proving the effectiveness of monitoring. 

Malaga, just as any other example, has recently started a test project to monitor the operation of the counters of 8,000 households with older residents or dependents. The administration will be able to identify strange behaviors through this method. Such as families with long periods of inactivity in water consumption or households in which an increase in consumption may be a sign of a resident accident.

And the CSIC is leading a different case focused exclusively on environmental control. A monitoring system that analyzes meteorological drought nationwide, providing experts with additional information to predict the phenomena of the coming months.

This is where Pandora FMS is proposed as the key to measure, for example, how widespread water use is in particular months and therefore predict some measures in case a drought is foreseen during the year.

Do you think Pandora FMS could help you too?

We tell you how:

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.