State of Ohio Private Cloud Provisioning and De-provisioning Servers
|
|
- Sharlene May
- 8 years ago
- Views:
Transcription
1 State of Ohio Private Cloud April 28, 2014
2 Table of Contents Action or Event that Requires the Procedure Goal of the Procedure Provisioning: Procedure Flow and Narrative Provisioning a Server Flow Provisioning a Server Narrative De-provisioning: Procedure Flow and Narrative De-provisioning a Server Flow De-provisioning a Server Narrative... 9 Page 2
3 1 The procedures in this document cover Provisioning and de-provisioning servers on all platforms. 1.1 Action or Event that Requires the Procedure Requests can be from any of several roles. The procedure to build a new server begins with either: A request from the Customer Service Center (CSC) through the ticketing system Or a verbal or request from management Members of the Technical Team (TT) meet to review the request. The Technical Team can consist of representatives from Network, Security, Database, Shared Hosting, and other areas as required by the particular request. The Technical Team can also be thought of as additional or other service lines. The TT either rejects or approves the request. No official paperwork indicating approval is required from the TT. After the TT meeting to approve: A member of the TT documents the request in the ticket already entered in the CSC system. Or, if the request was verbal or through , a member of the TT submits a project ticket through the CSC. Notes: A ticket must be submitted through the CSC before work can begin. A ticket can be auto-created or created by Tier 1. s participating in the server build update the ticket in the CSC system as the tasks are completed. 1.2 Goal of the Procedure At a high level, the goal of the procedure is to produce consistent and repeatable results when building a new server. Specifically, the goals of the procedure are to: Build the sever to the Requester s specifications Install all necessary tools Update all attributes and Source of Authority repositories Complete all related tasks as determined by the TT Page 3
4 Source of Authority includes various sources used to record server information, including IBM Endpoint Manager (IEM) server contacts field in the IEM Console and local Microsoft Access database information. Meets the requirements of a finished server as defined by Ohio DAS Meets the finish-by date needed by the agency 2 Provisioning: Procedure Flow and Narrative 2.1 Provisioning a Server Flow The following flow illustrates the interactions between the Requester and OIT personnel. Page 4
5 2.2 Provisioning a Server Narrative The following table describes the steps for completing a request to activate a server. Table 1: Provisioning a Server Requester 1 Submit a ticket. Tickets are submitted through the CSC or through a verbal or request to OIT. Note: Work cannot begin until a ticket is submitted through the CSC. System Admin 2 All information included? Review the ticket or request to verify that all the information needed is provided. o If more information is needed, go to step 3. o If all needed information is included, go to step 5. Requester System Admin 3 Meet to fill in gaps in information. System Admin 4 Update the CSC ticket, or create a CSC ticket. Use the information from the meeting with the Requester to: o Update the CSC ticket, if one was submitted. o Create a CSC ticket, if it was a verbal or request. 5 Determine Technical Teams for the Discovery phase. 6 Set up meeting and invite participants. 7 Determine the request s requirements. This is the Discovery phase. Determine requirements, including: o Type of software o Minimum hardware o Network o Storage o Backup o Database o Internal/Internet-facing o High Availability Note: The goal is to determine all of the tasks to build the server based on the needs of the request. Page 5
6 8 Request impacts JFS? Determine if the request has an impact on the JFS. o For Yes, go to step 9. o For No, go to step Obtain JFS authorization letter. For UNIX servers, depending upon the agency, ensure that any additional requirements are in place before proceeding. For example: Job and Family Services require an authorization letter for activating or de-provisioning a server. When the requirements are in place, proceed to the next step Complex or simplified build? Determine if the build is simple or complex. A complex build requires additional steps. o For a complex build, go to step 11. o For a simplified build, go to step 13. Determine needs. Discovery phase of the complex build: o Determine any number of multiple needs related to the build. o Determine the child ticket needed for each function in the System Admin s area. Child tickets are created under the original CSC ticket. Child tickets are required for the complex build in areas including: o Network o Storage o Backup o Database o Internal/Internet-facing o High Availability Note: Typically, child tickets are created by sending an request to the CSC. 12 Create child tickets. Create the child tickets for the service lines, which were determined in the previous step. Page 6
7 Technical Teams 13 System Admin Provision the server. o For virtual servers, use the standard template for the type of request and provision the server. Note: The standard template includes installing the operating system and all the tools. o For physical servers, complete the manual build process. Install the operating system and all the tools. Validate the server build. Validation includes confirming that: o Tools installation was successful. o Billing number is populated. o Server attributes are updated, such as server owner, application owner, patch window, maintenance window, and so on. Notes: o Server attributes are captured from three sources: Inventory DB, VSphere attributes, and IBM Endpoint Manager. o Fields are different from source to source. Validated? o No, go to step 16. o Yes, go to step 19. Technical Teams System Admin 16 Create additional child tickets as required. 17 Solve the issue Issue solved? o No, go to step 16. o Yes, go to step 19. Notify the Requester. Send an to inform the Requester that the build is complete. Requester 20 Review the server. 21 System Admin Approved? o No, go to step 16. o Yes, go to step 22. Close the parent and all child tickets. The Requester is automatically notified by the ticketing tool. The Requester has three days to validate that their request was fulfilled accurately and completely. Ticket reopened? o No, exit the procedure. o Yes, go to step 16. Page 7
8 3 De-provisioning: Procedure Flow and Narrative 3.1 De-provisioning a Server Flow The following flow illustrates the interactions between the Requester and OIT personnel. Page 8
9 3.2 De-provisioning a Server Narrative The following table describes the steps for completing a request to de-provision a server. Table 2: De-provisioning a Server Requester 1 System Admin 2 Requester and System Admin System Admin 4 Submit a ticket. Tickets are submitted through the CSC or through a verbal or request to OIT. Note: Work cannot begin until a ticket is submitted through the CSC. All information included? Review the ticket or request to verify that all the information needed is provided. o If more information is needed, go to step 3. o If all needed information is included, go to step 5. 3 Meet to fill in gaps in information. Update the CSC ticket, or create a CSC ticket. Use the information from the meeting with the Requester to: o Update the CSC ticket, if one was submitted. o Create a CSC ticket, if it was a verbal or request. 5 Determine Technical Teams for the Discovery phase. 6 Set up meeting and invite participants. 7 8 Determine the request s requirements. This is the Discovery phase. Determine requirements, including removing: o Software o Hardware o Network o Storage o Backup o Database o Internal/Internet-facing o High Availability Note: The goal is to determine all of the tasks to de-provision the server based on the needs of the request. Use a checklist if one is available. Request impacts JFS? Determine if the request has an impact on the JFS. o For Yes, go to step 9. o For No, go to step 10. Page 9
10 Technical Teams Obtain JFS authorization letter. For UNIX servers, depending upon the agency, ensure that any additional requirements are in place before proceeding. For example: Job and Family Services (JFS) require an authorization letter for Provisioning or de-provisioning a server. When the requirements are in place, proceed to the next step. Physical or virtual server? o Physical, go to step 9. o Virtual, go to step 11. Submit a SAN de-allocation request. The form is typically added as a child ticket to the original ticket. Create child tickets. Create the child tickets for the service lines to complex the de-provisioning tasks. Child tickets are created under the original CSC ticket. 13 Remove application software. 14 Remove network connections. 15 Remove allocated storage. 16 Archive, then clear backups and backup schedule. Note: Retain backup files if requested. 17 Remove Antivirus software and cleanup AV console, as applicable. 18 Update / Cleanup DNS entries 19 Remove Server Support tools Note: Refer to List of Server Support tools. 20 Remove databases. 21 Remove all firewall / DMZ-specific rules Submit a request to reclaim network port Note: Port reclaim is important to ensure accurate port-based billing. Physical server? a. Yes, go to step 24. b. No, go to step Remove hardware and cabling from the rack. Page 10
11 System Admin Requester Follow disposal procedure. Note: Disposal procedure is managed by Asset Management group. This procedure includes two week holding period. Notify the Requester. Send an to inform the Requester that the build is complete. Review de-provision completion criteria. Approved? o No, go to step 31. o Yes, go to step Open appropriate child ticket. Technical Teams 30 System Admin Solve the issue. Go to step 28. Close the parent and all child tickets. The Requester is automatically notified by the ticketing tool. The Requester has three days to validate that their request was fulfilled accurately and completely. Ticket reopened? o No, exit the procedure. o Yes, go to step 7. Page 11
State of Ohio Private Cloud. Installing Patches on Windows, Linux and UNIX Servers
State of Ohio Private Cloud Installing Patches on Windows, Linux and UNIX Servers June 9, 2014 Table of Contents 1 Patch Management: Installing Patches on Windows, Linux and UNIX Servers... 3 1.1 Action
More informationState of Ohio Private Cloud Managing Severity 1 Tickets
State of Ohio Private Cloud Managing Severity 1 Tickets April 29, 2014 Table of Contents 1 Document Overview... 3 1.1 Scope... 3 1.2 Action or Event that Requires the Procedure... 3 1.3 Goal of the Procedure...
More informationServer Team Asset Transfer Process
June 9, 2014 Table of Contents 1 Overview... 3 2 Roles and Responsibilities... 3 3 Key Terms and Information... 4 4 Phases... 4 4.1 Inventory... 4 4.2 Recommendation... 5 4.3 Transfer... 5 4.4 Validate...
More informationGet what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
More informationStorSimple Appliance Quick Start Guide
StorSimple Appliance Quick Start Guide 5000 and 7000 Series Appliance Software Version 2.1.1 (2.1.1-267) Exported from Online Help on September 15, 2012 Contents Getting Started... 3 Power and Cabling...
More informationLarry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationOverview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationUSER GUIDE. Snow Inventory Data Receiver Version 2.1 Release date 2013-04-26. Installation Configuration Document date 2014-12-02
USER GUIDE Product Snow Inventory Data Receiver Version 2.1 Release date 2013-04-26 Content Prerequisites Installation Configuration Document date 2014-12-02 CONTENT ABOUT THIS DOCUMENT... 3 PREREQUISITES...
More informationOffice 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
More informationHow To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
More informationHow To Get Your Computer To Comply With Pca
Assessing PCI Compliance with EMC Software Solutions Glenn O Donnell Principal Product Marketing Manager Resource Management Software Group Email: odonnell_glenn@emc.com Service Management Soapbox Blog:
More informationCLOUDSTORE GUIDELINES
CLOUDSTORE GUIDELINES Version 1.0, 17 Feb 2015 Info-communications Development Authority of Singapore 10 Pasir Panjang Road #10-01 Mapletree Business City Singapore 117438 Copyright of IDA, 2015 This document
More informationCheck Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
More informationCLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as
More informationActive Directory Infrastructure Design Document
Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationVirtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationREDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION SD021 V2.2 Issue Date 01 July 2014 1) OVERVIEW Redcentric s Infrastructure as a Service (IaaS) enables the to consume server, storage and network
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationCompliance Procedure
Old Dominion University Compliance Procedure Title: Reference Number: System Backups and Restoration (Non- Db) Procedure 3.4.2.2 Purpose The purpose of this compliance procedure is to define the methods
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationI N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
More informationGeorgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
More informationCloudBerry Dedup Server
Getting Started Guide: CloudBerry Dedup Server Getting Started Guide Getting Started with CloudBerry Dedup Server We are glad to announce our new product CloudBerry Dedup Server. CloudBerry Dedup is a
More informationMS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Description: Days: 5 Prerequisites: This course will provide you with the knowledge and skills to configure and manage
More informationBasic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
More informationHow To Manage A System Vulnerability Management Program
System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows
More informationKaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationBarracuda Backup Vx. Virtual Appliance Deployment. White Paper
Barracuda Backup Vx Virtual Appliance Deployment White Paper DOCUMENT SCOPE This document provides guidance and best practices on designing and deploying Barracuda Backup Vx Virtual Appliance on VMware
More informationCloud Computing, Virtualization & Green IT
Cloud Computing, Virtualization & Green IT Cloud computing can change how IT supports business Consider the following: As much as 85% of computing capacity sits idle in distributed computing environments.
More informationIT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
More informationSymmetry Networks. Corporate Managed Services Schedule
Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You
More informationRight Start RIS Plus of a Dell DL4300 Backup & Recovery Appliance
Right Start RIS Plus of a Dell DL4300 Backup & Recovery Appliance Description The Right Start RIS Plus of a Dell DL4300 Backup & Recovery Appliance Services Offering consists of five hours and thirty minutes
More informationCentral Server Hosting Service Detail
Central Server Hosting Service Detail Overview: CIO/OFT s Data Centers hosts more than 1,800 operating system instances on over 1300 physical servers in centralized centers and more than 350 servers in
More informationITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1
ITPS AG DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System Aplication overview SQL Informational Management System 1 Contents 1 Introduction 3 Modules 3 Aplication Inventory 4 Backup Control
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationVirtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationHow to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
More informationCourse 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager
Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Microsoft System Center Virtual
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationWeb Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
More informationIT Labor (Hourly Billable) Data Base Hosting
Cost Pool Definitions for Information Technology (IT) Services FY16/17 (Effective July 1, 2015) IT Labor (Hourly Billable) B/A 1365 - Programmer/Developer: EITS provides a variety of software development
More informationThirtyseven4 Endpoint Security (EPS) Upgrading Instructions
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior
More informationShifting Roles for Security in the Virtualized Data Center: Who Owns What?
Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationInstalling and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
More informationApp Orchestration Setup Checklist
App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App
More informationService Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationBest Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationINSTALLATION GUIDE. Snow License Manager Version 7.0 Release date 2014-03-31 Document date 2015-04-01
INSTALLATION GUIDE Product Snow License Manager Version 7.0 Release date 2014-03-31 Document date 2015-04-01 CONTENT ABOUT THIS DOCUMENT... 3 PREREQUISITES... 3 INSTALLATION... 5 UNINSTALL A PREVIOUS VERSION...
More informationUser Guide Secure Configuration Manager
User Guide Secure Configuration Manager January 2015 www.netiq.com/documentation Legal Notice NetIQ Secure Configuration Manager is protected by United States Patent No(s): 5829001, 7707183. THIS DOCUMENT
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationRight Start RIS Essentials of a Dell AppAssure Environment
Right Start RIS Essentials of a Dell AppAssure Environment Description The Right Start RIS Essentials of a Dell AppAssure Environment Services Offering consists of two hours and forty-five minutes of consulting
More informationCHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
More informationLumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
More information3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...
More informationINFORMATION TECHNOLOGY. SERVICE ASSET AND CONFIGURATION MANAGEMENT PROCESS Version 3, Rev. May 5, 2015
SERVICE ASSET AND CONFIGURATION MANAGEMENT PROCESS Version 3, Rev. May 5, 2015 Document Version Control Document Name Process Owner Service Asset and Configuration Management Process Rebecca Nguyen Version
More informationCourse Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange
Course Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Learning Method: Instructor-led Classroom Learning Duration: 5.00
More informationHow To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
More informationData Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
More informationFile Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.
File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides Sophia.germanides@novell.com David Condrey dcondrey@novell.comcom Agenda Customer Challenges
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationAWS Plug-in Guide. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved.
AWS Plug-in Guide Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
More informationCybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
More informationAppendix A: Installation and upgrade checklists
Appendix A: Installation and upgrade checklists This appendix provides checklists to help guide you through the various installation, upgrades and migration tasks. Before you start a new Modular Messaging
More informationAcronis Backup & Recovery 10 Server for Windows. Workstation. Quick Start Guide
Acronis Backup & Recovery 10 Server for Windows Acronis Backup & Recovery 10 Workstation Quick Start Guide 1. About this document This document describes how to install and start using any of the following
More informationExam Name: Fundamentals of Applying Tivoli Storage
Vendor: IBM Exam Code: 000-564 Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3 Version: DEMO 1.Which difference is reflected in a gap analysis? A. between software versions B. between expected
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationSystem Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana
2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...
More informationHow to install/upgrade the LANDesk virtual Cloud service appliance (CSA)
How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) The upgrade process for the virtual Cloud Services Appliance is a side- by- side install. This document will walk you through backing
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationData Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
More informationBMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationAVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
More informationPreflight Checklist: Preparing for a Private Cloud Journey
Preflight Checklist: Preparing for a Private Cloud Journey Preflight Checklist: Preparing for a Private Cloud Journey What do you need to have in place before you move forward with cloud computing? This
More informationComponents. Key features
BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationEVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics
EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365
More informationTEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
More informationParallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
More informationIBM Tivoli Provisioning Manager V 7.1
IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for
More information1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
More informationATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT
ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT OVERVIEW The New Jersey Statewide Voter Registration System (SVRS) was purchased from Covansys, Inc in 2005 based on their ElectioNet application. While the core
More informationReceptionist-Small Business Administrator guide
Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,
More informationExperiences with Transformation to Hybrid Cloud: A Case Study for a Large Financial Enterprise
New York University, CSCI-GA.3033-011, Spring 2015 Hari Ramasamy, Ph.D. Manager and Research Staff Member, IBM Research Member, IBM Academy of Technology hvramasa@us.ibm.com http://researcher.watson.ibm.com/researcher/view.php?person=us-hvramasa
More informationManagement Packs for Database
Management Packs for Database Diagnostics Pack for Database Oracle Diagnostics Pack for Database offers a complete, cost-effective, and easy to use solution for managing the performance of Oracle Database
More informationMS-10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010. Course Objectives. Price. Duration. Methods of Delivery
MS-10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 This five-day instructor led course will provide you with the knowledge and skills to configure and manage an Exchange
More informationMicrosoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Introduction The recent increase in virus and worm activity has created the
More informationInstallation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
More informationCCH Portal. Installation Guide. June 2013
CCH Portal Installation Guide June 2013 Legal Notice Disclaimer CCH Software has made every effort to ensure the accuracy and completeness of this Guide. However, CCH Software, its staff and agents will
More information