{"id":87337,"date":"2022-06-24T09:46:49","date_gmt":"2022-06-24T07:46:49","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=87337"},"modified":"2022-06-24T10:48:46","modified_gmt":"2022-06-24T08:48:46","slug":"5-nezbytnych-funkci-pro-network-configuration-management","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/","title":{"rendered":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"87337\" class=\"elementor elementor-87337\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4428f76 elementor-section-boxed elementor-section-height-default elementor-section-height-default force-full-width-no\" data-id=\"4428f76\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-602854b\" data-id=\"602854b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-786b64b elementor-widget elementor-widget-text-editor\" data-id=\"786b64b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Network configuration management je discipl\u00edna, kter\u00e1 zahrnuje shroma\u017e\u010fov\u00e1n\u00ed, monitorov\u00e1n\u00ed a ukl\u00e1d\u00e1n\u00ed informac\u00ed o ka\u017ed\u00e9 sou\u010d\u00e1sti tvo\u0159\u00edc\u00ed firemn\u00ed s\u00ed\u0165. Skute\u010dn\u00fdm \u00fa\u010delem takov\u00e9ho \u0159e\u0161en\u00ed je o\u017e\u00edt v okam\u017eiku jak\u00e9koliv ud\u00e1losti; m\u016f\u017ee to b\u00fdt pot\u0159eba aktualizace, upgradu, obnovy nebo dokonce \u0159\u00edzen\u00ed hav\u00e1ri\u00ed. \u0158e\u0161en\u00ed NCM poskytne v\u0161echny relevantn\u00ed informace do rukou t\u00fdmu provozu IT a umo\u017en\u00ed mu rozhodnout o dal\u0161\u00edm postupu.<\/strong><\/p><p>\u00a0<\/p><p>Configuration management je pro v\u0161echny podniky kl\u00ed\u010dov\u00fd a n\u011bkter\u00e9 funkce jsou na\u0161imi z\u00e1kazn\u00edky pova\u017eov\u00e1ny za nezbytn\u00e9.<\/p><p>\u00a0<\/p><p>Poj\u010fme spole\u010dn\u011b zjistit, jak\u00fdch p\u011bt funkc\u00ed mus\u00ed m\u00edt \u0159e\u0161en\u00ed pro configuration management.<\/p><h3 style=\"text-align: center;\">1. Z\u00e1lohov\u00e1n\u00ed spou\u0161t\u011bc\u00edch a b\u011b\u017e\u00edc\u00edch konfigurac\u00ed v\u0161ech za\u0159\u00edzen\u00ed v s\u00edti<\/h3><p>\u00a0<\/p><p>Podniky cht\u011bj\u00ed, aby s\u00edt\u011b, kter\u00e9 provozuj\u00ed, byly nenaru\u0161en\u00e9. Na druhou stranu mus\u00edme tak\u00e9 uznat, \u017ee v\u00fdpadky s\u00edt\u011b a z nich plynouc\u00ed prostoje jsou realitou. K v\u00fdpadk\u016fm m\u016f\u017ee doj\u00edt kdykoli a bylo by v nejlep\u0161\u00edm z\u00e1jmu provozovatel\u016f s\u00edt\u00ed m\u00edt pro p\u0159\u00edpad v\u00fdpadku z\u00e1chrannou s\u00ed\u0165.<\/p><p>\u00a0<\/p><p>Z\u00e1lohov\u00e1n\u00ed se tak st\u00e1v\u00e1 op\u011brn\u00fdm bodem spr\u00e1vy s\u00edt\u011b a umo\u017e\u0148uje nahr\u00e1t aktu\u00e1ln\u00ed konfigura\u010dn\u00ed soubor, kter\u00fd se neprodlen\u011b nasad\u00ed p\u0159i v\u00fdpadku. Kdy\u017e dojde k hav\u00e1rii, pou\u017eije se z\u00e1loha konfigurace k obnoven\u00ed provozu s\u00edt\u011b a provoz bude pokra\u010dovat bez p\u0159eru\u0161en\u00ed.<\/p><h3 style=\"text-align: center;\">2. Automatick\u00e9 sledov\u00e1n\u00ed ka\u017ed\u00e9 proveden\u00e9 zm\u011bny<\/h3><p>\u00a0<\/p><p>Spr\u00e1va s\u00edt\u011b je kritick\u00e1 a citliv\u00e1 funkce, jeliko\u017e jak\u00e1koli chyba m\u016f\u017ee zp\u016fsobit ne\u0161t\u011bst\u00ed v \u0161ir\u0161\u00edm m\u011b\u0159\u00edtku. Kl\u00ed\u010dem k minimalizaci chyb p\u0159i zm\u011bn\u00e1ch konfigurace je m\u00edt pevn\u011b pod kontrolou a sledovat, &#8222;kdo, co a kdy&#8220; v s\u00edti d\u011bl\u00e1.<\/p><p>\u00a0<\/p><p><strong>IT t\u00fdm dohl\u00ed\u017eej\u00edc\u00ed na rozs\u00e1hlou s\u00ed\u0165 bude p\u0159et\u00ed\u017een nutnost\u00ed ru\u010dn\u011b sledovat v\u0161echny prov\u00e1d\u011bn\u00e9 zm\u011bny. Logov\u00e1n\u00ed v\u0161ak z\u016fst\u00e1v\u00e1 d\u016fle\u017eitou \u010dinnost\u00ed, proto\u017ee:<\/strong><\/p><ul><li>Slou\u017e\u00ed jako z\u00e1znam v\u0161ech proveden\u00fdch zm\u011bn a pom\u00e1h\u00e1 t\u00fdmu p\u0159i jejich kontrole a korelaci s p\u0159\u00edpadn\u00fdm v\u00fdpadkem.<\/li><li>Spr\u00e1vce by m\u011bl b\u00fdt okam\u017eit\u011b upozorn\u011bn, pokud dojde k \u010dinnosti, kter\u00e1 by mohla b\u00fdt znepokojuj\u00edc\u00ed.<\/li><li>V p\u0159\u00edpad\u011b v\u00fdpadku se logu projdou, aby se porovnaly verze konfigurace a dosp\u011blo se k p\u0159\u00ed\u010din\u011b v\u00fdpadku.<\/li><\/ul><p>Change management zaji\u0161\u0165uje, \u017ee ka\u017ed\u00e1 zm\u011bna proveden\u00e1 v s\u00edti je \u0159\u00e1dn\u011b zaznamen\u00e1na a ur\u010dit\u00e9 zm\u011bny, kter\u00e9 pova\u017eujete za kriti\u010dt\u011bj\u0161\u00ed, jsou okam\u017eit\u011b ozn\u00e1meny, kdy\u017e k nim dojde. Change management umo\u017e\u0148uje pohodln\u00e9 p\u0159ezkoum\u00e1n\u00ed v\u00fdpadk\u016f a rozhodov\u00e1n\u00ed o odstran\u011bn\u00ed budouc\u00edch chyb.<\/p><h3 style=\"text-align: center;\">3. Detekce autorizovan\u00fdch a neautorizovan\u00fdch zm\u011bn pomoc\u00ed RBAC<\/h3><p>\u00a0<\/p><p>Neautorizovan\u00fd p\u0159\u00edstup a zm\u011bny konfigurace nejsou z hlediska spr\u00e1vy s\u00edt\u011b ide\u00e1ln\u00ed. Proto je z\u00e1sadn\u00ed kontrolovat, kdo m\u00e1 p\u0159\u00edstup k za\u0159\u00edzen\u00edm, jak\u00e9 zm\u011bny lze prov\u00e1d\u011bt, a mechanismus kontroly platnosti t\u011bchto zm\u011bn. \u0158\u00edzen\u00ed p\u0159\u00edstupu v podstat\u011b zaji\u0161\u0165uje, \u017ee ka\u017ed\u00fd, kdo m\u00e1 p\u0159\u00edstup k s\u00edti, pracuje pouze v r\u00e1mci sv\u00fdch odborn\u00fdch znalost\u00ed nebo pravomoc\u00ed, co\u017e v\u00fdrazn\u011b sni\u017euje pravd\u011bpodobnost chyb v syst\u00e9mu.<\/p><p>\u00a0<\/p><p><strong>Aby byl zaji\u0161t\u011bn hladk\u00fd chod a chr\u00e1n\u011bna integrita, spr\u00e1vce IT by m\u011bl rad\u011bji zav\u00e9st tyto osv\u011bd\u010den\u00e9 postupy:<\/strong><\/p><ul><li>P\u0159i\u0159adit za\u0159\u00edzen\u00ed, kter\u00e1 spadaj\u00ed do oblasti p\u016fsobnosti ka\u017ed\u00e9ho IT technika, aby nikomu nehrozilo riziko chyby nebo neopr\u00e1vn\u011bn\u00e9ho vstupu.<\/li><li>M\u00edt velmi m\u00e1lo \u00fa\u010dt\u016f s p\u0159\u00edstupem ke kritick\u00fdm za\u0159\u00edzen\u00edm, aby byla v\u017edy zachov\u00e1na exkluzivita a integrita.<\/li><li>Zajist\u011bte, aby \u017e\u00e1dn\u00fd po\u017eadavek na zm\u011bnu nepro\u0161el bez kontroly, kde spr\u00e1vce m\u016f\u017ee rozhodnout o p\u0159ijet\u00ed nebo zam\u00edtnut\u00ed zm\u011bny konfigurace.<\/li><\/ul><h3 style=\"text-align: center;\">4. Zjednodu\u0161en\u00ed n\u00e1ro\u010dn\u00fdch \u00fakol\u016f pro spr\u00e1vce IT pomoc\u00ed Configlets<\/h3><p>\u00a0<\/p><p>P\u0159i spr\u00e1v\u011b s\u00edt\u011b se implementace zm\u011bn a nov\u00fdch aktualizac\u00ed v s\u00edti st\u00e1v\u00e1 d\u016fle\u017eit\u00fdm \u00fakolem. Tv\u00e1\u0159\u00ed v tv\u00e1\u0159 rozs\u00e1hl\u00e9 s\u00edti s mnoha za\u0159\u00edzen\u00edmi se v\u0161ak zd\u00e1nliv\u011b jednoduch\u00fd \u00fakol prov\u00e9st drobnou zm\u011bnu na za\u0159\u00edzen\u00ed n\u00e1hle st\u00e1v\u00e1 pracn\u00fdm. Configlets jsou \u0161ablony skript\u016f, kter\u00e9 umo\u017e\u0148uj\u00ed vytvo\u0159it \u0161ablonu konfigurace pro proveden\u00ed konkr\u00e9tn\u00ed zm\u011bny na mnoha za\u0159\u00edzen\u00edch v jeden okam\u017eik.<\/p><p>\u00a0<\/p><p>Funkce Configlets \u0161et\u0159\u00ed v\u00e1\u0161 drahocenn\u00fd \u010das a umo\u017e\u0148uje vytv\u00e1\u0159et \u0161ablony pro jednoduch\u00e9, ale v\u0161edn\u00ed \u00falohy, jako je p\u0159ihl\u00e1\u0161en\u00ed, zm\u011bna hesla atd.<\/p><ul><li>M\u00edsto toho, aby bylo nutn\u00e9 p\u0159istupovat ke ka\u017ed\u00e9mu za\u0159\u00edzen\u00ed zvl\u00e1\u0161\u0165 a prov\u00e1d\u011bt stejn\u00e9 zm\u011bny, lze vytvo\u0159it \u0161ablonu se skriptem, kterou lze jedn\u00edm kliknut\u00edm pou\u017e\u00edt na v\u0161ech za\u0159\u00edzen\u00edch najednou.<\/li><li>Takov\u00e9 \u00falohy mohou b\u00fdt cyklick\u00e9 a opakuj\u00edc\u00ed se. Pomoc\u00ed \u0161ablon skript\u016f proto t\u00fdm IT u\u0161et\u0159\u00ed spoustu \u010dasu, kter\u00fd by mohl vyu\u017e\u00edt jinde.<\/li><li>Lze tak\u00e9 vytv\u00e1\u0159et reporty zji\u0161\u0165uj\u00edc\u00ed trend dosud proveden\u00fdch zm\u011bn konfigurace. Takto zji\u0161t\u011bn\u00e9 vzorce pomohou rozhodnout, jak\u00e9 zm\u011bny je t\u0159eba prov\u00e9st do budoucna.<\/li><\/ul><h3 style=\"text-align: center;\">5. Skenov\u00e1n\u00ed, detekce a oprava zranitelnost\u00ed firmwaru<\/h3><p>\u00a0<\/p><p>Firmware chr\u00e1n\u00ed ka\u017ed\u00e9 za\u0159\u00edzen\u00ed v s\u00edti p\u0159ed vn\u011bj\u0161\u00edmi hrozbami, jako je naru\u0161en\u00ed dat, pokusy o hackersk\u00e9 \u00fatoky atd. Kontrola zranitelnost\u00ed firmwaru nejen\u017ee chr\u00e1n\u00ed za\u0159\u00edzen\u00ed p\u0159ed t\u011bmito hrozbami, ale tak\u00e9 se pr\u016fb\u011b\u017en\u011b aktualizuje, aby byla v souladu s nejnov\u011bj\u0161\u00edm v\u00fdvojem z hlediska mo\u017en\u00fdch zranitelnost\u00ed.<\/p><p>\u00a0<\/p><p><strong>Pochopme, jak mechanismus kontroly zranitelnosti firmwaru zjednodu\u0161uje pr\u00e1ci t\u00fdmu IT:<\/strong><\/p><ul><li>Kontrola zranitelnosti firmwaru vyhled\u00e1 zranitelnosti firmwaru ve v\u0161ech za\u0159\u00edzen\u00edch v s\u00ed\u0165ov\u00e9m prost\u0159ed\u00ed.<\/li><li>V n\u00e1vaznosti na identifikaci zranitelnosti by m\u011bla b\u00fdt nalezena z\u00e1plata, kter\u00e1 ji oprav\u00ed.<\/li><li>Zranitelnost firmwaru je dynamick\u00e1. Je to nikdy nekon\u010d\u00edc\u00ed proces, proto\u017ee se objevuj\u00ed nov\u00e9 zranitelnosti. Pravideln\u00e9 kontroly zaji\u0161\u0165uj\u00ed znalost nejnov\u011bj\u0161\u00edho v\u00fdvoje v t\u00e9to oblasti, co\u017e zaru\u010duje, \u017ee ka\u017ed\u00e1 kontrola zranitelnost\u00ed je p\u0159esn\u00e1 a nikdy nevynech\u00e1 \u017e\u00e1dnou mezeru.<\/li><\/ul><p>Funkce tak zaji\u0161\u0165uje, \u017ee v syst\u00e9mu nejsou \u017e\u00e1dn\u00e9 mezery a s\u00ed\u0165 z\u016fst\u00e1v\u00e1 spolehliv\u00e1.<\/p><h4 style=\"text-align: center;\">Network Configuration Manager od spole\u010dnosti ManageEngine je komplexn\u00ed \u0159e\u0161en\u00ed pro pot\u0159eby komplexn\u00edho network configuration managementu<\/h4><p>\u00a0<\/p><p>Network configuration management znamen\u00e1 dlouh\u00e9 hodiny opakuj\u00edc\u00edch se a v\u0161edn\u00edch \u00fakoly s vysokou pravd\u011bpodobnost\u00ed chyb, pokud se prov\u00e1d\u011bj\u00ed ru\u010dn\u011b. Bezpe\u010dnost a integrita s\u00edt\u011b jsou prvo\u0159ad\u00e9 a nutnost prov\u00e1d\u011bt i v\u0161edn\u00ed \u00fakoly sn\u00ed\u017e\u00ed \u010das, kter\u00fd m\u00e1te k dispozici pro \u00fakoly s vysokou prioritou.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/monitoring-it\/network-configuration-manager\/\">Network Configuration Manager<\/a> (NCM) od spole\u010dnosti <a href=\"https:\/\/www.manageengine.com\/\">ManageEngine<\/a> je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.<\/p><p>\u00a0<\/p><p><strong>Hlavn\u00ed v\u00fdhody n\u00e1stroje <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/monitoring-it\/network-configuration-manager\/\">Network Configuration Manager<\/a>:<\/strong><\/p><ul><li>Z\u00e1lohov\u00e1n\u00ed s\u00ed\u0165ov\u00fdch konfigurac\u00ed pro p\u0159ekon\u00e1n\u00ed n\u00e1hl\u00fdch v\u00fdpadk\u016f.<\/li><li>Zji\u0161t\u011bn\u00ed v\u0161ech proveden\u00fdch zm\u011bn a tak\u00e9 sledov\u00e1n\u00ed t\u011bchto zm\u011bn v re\u00e1ln\u00e9m \u010dase prost\u0159ednictv\u00edm v\u00fdstrah na kritick\u00fdch za\u0159\u00edzen\u00edch.<\/li><li>Mo\u017enost ud\u011blen\u00ed p\u0159\u00edstupov\u00fdch opr\u00e1vn\u011bn\u00ed k za\u0159\u00edzen\u00edm s\u00a0kontrolou akc\u00ed, kter\u00e9 lze prov\u00e9st, s mechanismem kontroly p\u0159ed proveden\u00edm ka\u017ed\u00e9 zm\u011bny.<\/li><li>Srovn\u00e1n\u00ed r\u016fzn\u00fdch konfigurac\u00ed za\u0159\u00edzen\u00ed a p\u0159\u00edstup k p\u0159ehled\u016fm o spr\u00e1v\u011b zm\u011bn.<\/li><li>Ochrana s\u00ed\u0165\u011b p\u0159ed potenci\u00e1ln\u00edmi zranitelnostmi a mezerami pomoc\u00ed kontrol zranitelnosti firmwaru.<\/li><li>Automatizace opakuj\u00edc\u00edch se \u00faloh, kter\u00e9 maj\u00ed tendenci zab\u00edrat \u010das, pomoc\u00ed n\u00e1stroje Configlets.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Network configuration management je discipl\u00edna, kter\u00e1 zahrnuje shroma\u017e\u010fov\u00e1n\u00ed, monitorov\u00e1n\u00ed a ukl\u00e1d\u00e1n\u00ed informac\u00ed o ka\u017ed\u00e9 sou\u010d\u00e1sti tvo\u0159\u00edc\u00ed firemn\u00ed s\u00ed\u0165. Skute\u010dn\u00fdm \u00fa\u010delem takov\u00e9ho \u0159e\u0161en\u00ed je o\u017e\u00edt v okam\u017eiku jak\u00e9koliv ud\u00e1losti; m\u016f\u017ee to b\u00fdt pot\u0159eba aktualizace, upgradu, obnovy nebo dokonce \u0159\u00edzen\u00ed hav\u00e1ri\u00ed. \u0158e\u0161en\u00ed NCM poskytne v\u0161echny relevantn\u00ed informace do rukou t\u00fdmu provozu IT a umo\u017en\u00ed mu rozhodnout o [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":87339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[274,289],"tags":[443,631],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions<\/title>\n<meta name=\"description\" content=\"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-24T07:46:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-24T08:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2022\/06\/Network-Configuration-Manager.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2403\" \/>\n\t<meta property=\"og:image:height\" content=\"1259\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"5 nezbytn\u00fdch funkc\u00ed pro network configuration management\",\"datePublished\":\"2022-06-24T07:46:49+00:00\",\"dateModified\":\"2022-06-24T08:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\"},\"wordCount\":1345,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"IT monitoring\",\"Network configuration\"],\"articleSection\":[\"\u010cl\u00e1nky\",\"Novinky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\",\"name\":\"5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2022-06-24T07:46:49+00:00\",\"dateModified\":\"2022-06-24T08:48:46+00:00\",\"description\":\"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/cs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 nezbytn\u00fdch funkc\u00ed pro network configuration management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions","description":"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/","og_locale":"cs_CZ","og_type":"article","og_title":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions","og_description":"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.","og_url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/","og_site_name":"MWT Solutions","article_published_time":"2022-06-24T07:46:49+00:00","article_modified_time":"2022-06-24T08:48:46+00:00","og_image":[{"width":2403,"height":1259,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2022\/06\/Network-Configuration-Manager.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"marketing@mwtsolutions.eu","Odhadovan\u00e1 doba \u010dten\u00ed":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management","datePublished":"2022-06-24T07:46:49+00:00","dateModified":"2022-06-24T08:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/"},"wordCount":1345,"commentCount":0,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["IT monitoring","Network configuration"],"articleSection":["\u010cl\u00e1nky","Novinky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/","url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/","name":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2022-06-24T07:46:49+00:00","dateModified":"2022-06-24T08:48:46+00:00","description":"Network Configuration Manager je ucelen\u00e9 \u0159e\u0161en\u00ed, kter\u00e9 va\u0161\u00ed spole\u010dnosti pom\u016f\u017ee monitorovat, analyzovat a automatizovat zm\u011bny v \u0161ir\u0161\u00ed s\u00edti.","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/5-nezbytnych-funkci-pro-network-configuration-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"5 nezbytn\u00fdch funkc\u00ed pro network configuration management"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Kolejna witryna oparta na WordPressie","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/87337"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/comments?post=87337"}],"version-history":[{"count":15,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/87337\/revisions"}],"predecessor-version":[{"id":87360,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/87337\/revisions\/87360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media\/87339"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media?parent=87337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/categories?post=87337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/tags?post=87337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}