Part of Information Security is making sure your data is protected against loss, regardless of how the loss occurs. Any properly written Information Security policy will have a section about Business Continuity, which documents what to do in major disasters. But in addition, business continuity means making sure you’ve got regular backups of all your critical data and applications.
As an extension of this sort of policy, one should engage in routine hardware monitoring to try and detect hardware failures, before they can cascade into bigger failures. In this article, I’ll describe the technical steps on how to install and configure hardware monitoring on a Red Hat Enterprise Linux 4 Workstation. In theory, these steps would be the same for the Advanced Server version.