VM Service Catalog. Allocation Of Resources: Services IT-DC Offers to the User

Size: px
Start display at page:

Download "VM Service Catalog. Allocation Of Resources: Services IT-DC Offers to the User"

Transcription

1 VM Service Catalog Overview: The purpose of this document is to detail Virtual Resources and Blade(s) Server Hosting services offered by IT-DC. The CSUSB MPP of the Organization/Department/Affiliate herein will be referred to as User. Allocation Of Resources: A User will be given a standard Virtual Machine (VM) or multiple VM s within a VM Resource Pool (memory, processing power, storage and network). In some cases, a department may have domain over more than one Resource Pool. A System s Administrator/ITC(s) working as an agent/employee of that business unit can be designated as a VM Admin for the objects within that Resource Pool, however a VM Admin is not required. Be aware that having a Resource Pool and a VM Admin will allow for the autonomy of that department, under restrictions, to do administrative tasks for the User s VM s within their designated Resource Pool(s). If that User does not have a System s Administrator/ITC(s) for these tasks, IT-DC may assist in the administration of the User s Resource Pool, if agreed upon by the User and IT-DC. Variables to be allocated for the User include but may not be limited to Storage, Memory, Network, and Processing Power. These resources are subject to change as the environment changes. Services IT-DC Offers to the User The following services are offered to the User, for housing their resources within the IT-DC equipment. A full description of each service is detailed below in the section labeled Service Levels of Understanding. 1. Virtual Environment Administration 2. Operating System Maintenance & Administration 3. Application (Non Native) Administration 4. System Monitoring 5. Data Backup/Restoration Service Service Levels of Understanding Items: Note: The client may perform the following tasks, however these are also services offered by IT-DC: 1. Virtual Environment Administration If there is an understanding between IT-DC and the User, to manage the Virtual Environment Resource Pool, IT-DC requires that the User keep up-to-date maintenance software support licenses, and may have to purchase/obtain any required updates (as appropriate). 2. Operating Systems Maintenance and Administration. If there is an understanding between IT-DC and the User, to support/maintain an Operating System(s) for the User, IT-DC requires that the User keep maintenance software support licenses up-to-date with the vendor, and obtain any required updates (as appropriate). These updates typically include planned enhancements, but can also include fixes for security vulnerabilities and functional issues discovered, before or after the system has been installed. IT-DC reserves the right to modify the configuration of the system or to change certain types of practices/access to the system. These changes will be done in coordination with the User. These changes may be done to protect the system or any part of the system that IT-DC feels may be at risk of becoming compromised/corrupted by an authorized or unauthorized individual(s). IT -DCHS may also require or recommend that modifications be done to that system, for the purpose of moving towards maintaining the integrity and reliability of that system. 1

2 If User chooses to administer non-native application(s) housed within an Operating System that IT-DC is administering for the User, IT-DC requires that the User maintain the application(s) so that it does not negatively impact, interfere or affect the Operating System, this includes supporting the application(s) to where they are properly configured and maintained, according to IT-DC. IT-DC also requires that the User notify IT-DC via prior to the User making any changes that may affect that system. IT -DCHS may not be able to provide technical support for all Operating Systems or may discontinue technical support for previously supported Operating Systems, depending on available IT-DC resources. If IT -DCHS agrees to give technical support to a User for a particular Operating System and at a further point in time, can no longer continue providing that support, IT-DC will contact the User and an amendment will be made to the previous agreement stating the changes. Examples of Operating Systems Maintenance and Administration: - Installation and Configuration of Operating System and native services. - Regular Operating System updates. - Provide support to native services to maintain vendor desired operations and communications. - Provide support or work with the application administrators(s) to keep the system functioning as intended by the vendor. 3. Application (Non Native) Administration If there is an understanding between IT-DC and the User regarding assistance in the support of an application(s), then IT-DC requires that the User keep up-to-date maintenance software support license(s) with the vendor, and obtain any required updates, as appropriate. These updates typically include planned enhancements, but can also include fixes for security vulnerabilities and functional issues discovered before and after a system has been installed. If IT-DC assists with administering the User s application(s), IT-DC reserves the right to enforce a policy of using strong passwords or disallowing certain types of practices/access to the system, and if IT-DC feels that a practiced method of communication/activity is placing the system or any part of that system at risk or of becoming compromised/corrupted by an authorized/unauthorized party, IT-DC may require that a modifications be done to that system, in moving towards maintaining the integrity and reliability of that system. IT-DC may not be able to provide technical support for all applications or may discontinue technical support for previously supported applications, depending on available IT-DC resources. If IT-DC agrees to give technical support to a particular application and at a further point in time can no longer continue providing that support, then IT-DC will contact the User and an amendment will be made to previous agreement stating that IT-DC will no longer provide technical support for that application. Examples of providing Assistance with Non-Native Application(s): - Installation and Configuration of Application - Install Application updates upon request of Application owner, - Support operation and communication of Application as intended by vendor 4. System Monitoring If there is an understanding between IT-DC and the User, to monitor the User s System(s), IT-DC will attempt to notify the User for any system failures detected as stated in the IT-DC Escalation Procedures. In order to provide monitoring services to the User, current contact information must be supplied to IT-DC by the User. This information will be noted for the User s VM or related resource in IT-DC s Escalation Procedures. The User may be required to either provide technical details on monitoring the User s system or collaborate with IT-DC to monitor the User s system. Examples of providing System Monitoring: - Monitor Operating System for the following variables: - CPU - Memory - Storage - Perform ping requests to ensure network connectivity - Follow escalation procedures to notify owner of any system errors - Collect default System Logs. 2

3 5. Data Backup/ Restoration Service If there is an understanding between IT-DC and the User, in regards to providing backup services for the User, on and off-site data storage will be provided to the User. A backup schedule can be provided to the User if requested by the User; however, backup schedules may change as time elapses and availability of resources changes. Recovery of data from the IT-DC backup system may be requested during or after regular business hours by contacting IT-DC. If irregular data recovery is requested by the User, for instance, data recovery during nonnormal business hours or for data to be brought to CSUSB from off site, the User may incur a financial cost. The IT-DC backup system is very reliable but it does have limitations. Any files that change between backups should be included in each subsequent backup run. However, it is possible that a file could be created and lost or damaged between backup cycles in which case those file(s) cannot be recovered. IT-DC may not be able to backup some particular application(s), due to the design or requirements of that application. If the User desires for IT-DC to back up their system(s), IT-DC may require the User to purchase special backup software so as to be included with the IT-DC backup system. In rare cases, Backup Software may not be available or may have of been discontinued by the vendor of that application and so backup functions for that application may not be performed. Because of limited resources, IT-DC has a Backup retention practice and a schedule that has a time frame limitation. On a rotations basis, backup tape media is overwritten, usually but not always, on a cycle. For any deviations or special backup requests to be made, outside the normal backup schedule, the User has to make a request to IT-DC. IT-DC will attempt to meet these requests but so long as there is no negative impact made to the normal backup schedule and/or there are available resources for this request. If irregular data backup functions are requested by the User, the User may incur a financial cost. For the User s data being backed up by IT-DC, it is the responsibility of the User to arrange for periodic data recovery testing of any/all data belonging to the User. IT-DC may be able to provide the restoration of raw data but IT-DC is not responsible for applications/systems properly functioning after the data has been restored, unless there is an understanding by the User and IT-DC that states that IT-DC will administer the User s system, such as the Operating System(s) / Application(s). For this reason, it is the responsibility of the User to arrange for and to do periodic data recovery with IT-DC, for testing any/all data belonging to the User. And if IT-DC is not responsible for administering the User s System (Operating System/Application), it is the responsibility of the User to ensure that the Data recovery process properly restores the User s System (Operating System/Application). Examples of providing Data Backup/ Restoration Service: - File Level Backup and Recovery Every day to be kept for 30 days. DCHS can restore raw data for User. User is responsible for manipulating restored files/system into a working state. - System Level Backup and Recovery - snap-shot of VMDK file (image of system)- Done 1 time a week To be kept for 1 week after backup occurs DCHS Staff can restore VMDK file for User. Important Note In order for DCHS Staff to restore a Virtual Machine, the user needs to have the available data storage space. For example, if a user wants to restore a VM with a 2 TB hard drive, but the user only has 900 GB of available space, that VM will not be able to be restored. - Testing Recovery of System - For the User s data being backed up by IT-DC, it is the responsibility of User to arrange for periodic data recovery testing of any/all data belonging to the User. DCHS can provide raw data, technical support and information about the restore process. DCHS requires at least 1 week of prior notice when User whishes to conduct a system recovery test; notification via . - Archiving: (System State Snap-shot) In accordance with the Academic Calendar, every December. 3

4 Service Exclusions IT-DC does not guarantee timeframes for the following situations: Issues referred to a third party service provider Systems in a disaster recovery state Issues that involve troubleshooting the operating system, applications, or content on a VM or Server User Responsibilities: Complete one Service Levels of Understanding (SLU) per one VM or associated resource, if a form does not exist for a particular VM/Resource, IT-DC is not responsible for providing services to that VM/Resource, the data housed within that VM, applications residing with in that VM or for Data belonging to the User. 1. Management of VM Environment and VM Lifecycles Because resources for supporting VM s are limited, every VM should be absolutely necessary for the User s official operational needs. This will prevent the unnecessary creation of VM s, (A.K.A. VM Sprawl Prevention ). A review of VM s or VM resources may be done prior or on a periodic basis, to granting new or additional resources. It will be the responsibility of the User to power off, remove or notify IT-DC when a VM or VM resources are no longer needed. If the User needs assistance for the removal of a VM, steps may be taken between IT-DC and the User to either move the data to another VM, to archive that data, or to delete the VM(s). IT-DC recommends turning off the testing/development VM(s) after the testing/development phase have been completed; in order to conserve allocated resources and keep performance optimal for the other VM s within the User s Resource Pool. Also, please keep in mind that the User is responsible for upgrading the tools needed to interact/manage the Resource Pool, unless otherwise specified by IT-DC. VM Naming Convention: In order for DCHS to keep a consistent inventory, it is required that all Virtual Machines use the following naming convention reflecting department ownership of the VM. E.g. DCHS- VMname. VMware Tools: In order for DCHS to provide a reliable service in virtualization, all virtual machines hosted within vcenter.dchs.csusb.edu must have the latest version of VMware Tools installed and properly running. If VMware tools are not installed, updated, or running, DCHS reserves the rights to proceed with the installation and the update of VMware Tools during the DCHS maintenance windows (please refer to the DCHS maintenance calendar). Prior to the installation or update of VMware Tools, DCHS will notify the VM Admin 10 days in advanced via . VMware Snapshots: VMware Snapshots are only to be used temporarily. Please be aware that snapshots exceeding 72 hours from creation will be deleted by DCHS. In the event that a VM Admin has formally requested services for Data backup from DCHS, please be aware that having snapshots will result in an unsuccessful backup during the backup window(please reference section 5 Data Backup/ Restoration Service, of the Service Levels of Understanding Items). Snapshots are designed to be used as a temporary rollback solution, not as a backup. 2. Backup or Disaster Recovery Unless the User makes arrangements with IT-DC to create backups of their data/vm(s), IT-DC is not responsible for the backup and recovering the User s data/vm(s). IT-DC offers Backup and Recovery services only upon the Users documented request and approval by IT-DC. IT-DC is not responsible for the User s failure to implement a working backup and recovery plan for any of the User s system(s). Even if there is an understanding with IT-DC, for IT-DC to do data backup for the User s data, the User is responsible for developing, implementing, testing and maintaining a Business Continuity Plan of their Systems, to ensure that their System functions after a data restoration. 4

5 3. Maintaining system updates/network security on the VM(s)/Applications IT-DC is not responsible for maintaining the software updates/configuration levels on the Operating System/Application belonging to the User, unless there is a documented agreement between the User and IT-DC. A security scan/analysis by the Information Security Office may be conducted for any new VM/applications before being placed into production or granted network access. After a VM/application is placed into production, the IT-ISO may do periodic security scans/audits on those systems. 4. Network Management In order to increase efficiency but limit unnecessary risk, the Users may be given the ability to add and remove Virtual Machines from segmented parts of the CSUSB network (VLANS). Each User (MPP) is responsible for the actions of their staff, malicious or accidental. 5. Storage Management In order to limit the unnecessary usage of resources, storage for the Users is subject to these restrictions: What storage is used should be absolutely necessary for official CSUSB/department operational needs. The review of storage usage may be done periodically. Also, to keeping the allocated storage space from becoming prematurely filled, the User must properly manage their data, according to IT-DC practices. Examples include but are not limited to: a. Proper system data/log rotation/removal/archival practices b. Removal of data that is not part of the operations of that department and removal of data in which its relevance to the function of the department is no longer valid c. Thin provisioning of virtual hard-drives whenever possible Upon request to IT-DC, for an increase in Data Storage, the requesting User may be required to provide evidence of proper Data Storage Management. User Contact Details: Updating IT-DC with the User s contact information is solely the User s responsibility. This information will be placed into the Escalation procedures. The User needs to provide IT-DC with the required contact details; on whom, how and when these individuals should be contacted. Emergency System Safeguard: Under normal circumstances, IT-DC will not access, use or modify any systems/applications belonging to the User, that is not directly under the care of IT-DC. However, in the event of an unforeseen emergency occurring, IT-DC will attempt to contact the owner of the system(s), as designated by the Escalation Procedure, and notify them of the perceived emergency and may require for those designated contacts to take action so as to suppress any negative impacts caused to or by this system/application. If the designated contacts of the User s department are unreachable, and it is deemed necessary, IT-DC may take steps to suppress any perceived negative situations caused to/by the User s system/application. Such action may include cutting off normal communication to that systems and/or performing a Cold Shut Down of that system. Note: When a cold shut-down is performed; this action may cause loss of data and/or application failure/corruption, so it may be reserved as a last resort. Service Request Change A new SLU form is always required for a service, however if the request is for a change to an existing service/slu, or if User wishes to cancel a service currently performed by IT-DC, User may send an to the director of IT-DC and that may be used as an amendment. The (s) may serve to assist with updating the existing SLU. IT-DC may choose to print out and attached the s to the SLU. 5

6 Example of IT-DC Level of Escalation: Impact Criteria Escalation and Procedure Urgent A component, application or critical - (24x7) (365 days/year) feature is down and as a result, no work can be performed. Non-urgent Abnormal or inconsistent system behavior or a system problem that does not prevent work on the system. Report during normal business hours. - (8am 5pm) Monday-Friday - Summer Schedule:(7am 5:30pm) Mon- Thursday - Excludes: Holidays and Furloughs Service Request Routine request for maintenance. - (8am 5pm) Monday-Friday - Summer Schedule:(7am 5:30pm) Mon- Thursday Business Inquiry A question regarding a change to (new, increased/decreased, disconnected) the contracted service. - Excludes: Holidays and Furloughs - (8am 5pm) Monday-Friday - Summer Schedule:(7am 5:30pm) Mon- Thursday - Excludes: Holidays and Furloughs Last Updated: June

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided

More information

The Service Provider will monitor the VM for the Customer and provide notifications on an opt in basis, which is strongly recommended.

The Service Provider will monitor the VM for the Customer and provide notifications on an opt in basis, which is strongly recommended. Virtual Machine Service Level Agreement 1. Agreement This agreement is to define Virtual Server Collocation services provided to a Customer. Typically, services definitions include hours, availability,

More information

i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections

i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

Schedule 2Z Virtual Servers, Firewalls and Load Balancers

Schedule 2Z Virtual Servers, Firewalls and Load Balancers Schedule 2Z Virtual Servers, Firewalls and Load Balancers Definitions Additional Charges means the charges payable in accordance with this schedule. Customer Contact Centre means Interoute s Incident management

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

Departmental On-Site Computing Support (DOCS) Server Support SLA

Departmental On-Site Computing Support (DOCS) Server Support SLA 1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The

More information

Managed Storage Service Level Agreement (SLA)

Managed Storage Service Level Agreement (SLA) Service Level Agreement Page 1 of 8 Managed Storage Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Parties to the Agreement This service level agreement is valid from the start

More information

Snapshot Technology: Improving Data Availability and Redundancy

Snapshot Technology: Improving Data Availability and Redundancy Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot

More information

Administrators Guide Multi User Systems. Calendar Year

Administrators Guide Multi User Systems. Calendar Year Calendar Year 2012 Enter Facility Name Here HIPAA Security Compliance Workbook For Core Measure 15 of Meaningful Use Requirements Annual Risk Analysis Administrators Guide Multi User Systems 1 HIPPA Compliance

More information

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration. HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

Configuring and Managing Microsoft System Center Essentials 2010

Configuring and Managing Microsoft System Center Essentials 2010 Configuring and Managing Microsoft System Center Essentials 2010 50373: Configuring and Managing Microsoft System Center Essentials 2010 (2 Days) About this Course This two-day instructor-led course provides

More information

How To Protect Your Data From Being Damaged On Vsphere Vdp Vdpa Vdpo Vdprod (Vmware) Vsphera Vdpower Vdpl (Vmos) Vdper (Vmom

How To Protect Your Data From Being Damaged On Vsphere Vdp Vdpa Vdpo Vdprod (Vmware) Vsphera Vdpower Vdpl (Vmos) Vdper (Vmom VMware vsphere Data Protection 6.0 Maciej Kot Senior Systems Engineer VMware Overview vsphere Data Protection Overview Data protection for VMs and applications Agent-less VM backup and restore Agents for

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

This policy is not designed to use systems backup for the following purposes:

This policy is not designed to use systems backup for the following purposes: Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa

More information

RSA SecurID Tokens Service Level Agreement (SLA)

RSA SecurID Tokens Service Level Agreement (SLA) RSA SecurID Tokens Service Level Agreement (SLA) 1. Agreement This Agreement defines RSA SecurID services provided to a Customer. Service definitions include responsibilities, hours, availability, support

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

VMhosting Memorandum of Understanding

VMhosting Memorandum of Understanding VMhosting Memorandum of Understanding Scope of the Document This document outlines the services provided by VMHosting regarding the lease and use of virtual machines offered via the VMhosting service.

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Customer Support Policy

Customer Support Policy Customer Support Policy This Customer Support Policy ( Policy ) describes the Support that Invenias provides to Customers that have paid all applicable fees and that are using Licensed Software in a Supported

More information

1.1 SERVICE DESCRIPTION

1.1 SERVICE DESCRIPTION ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

FileCruiser Backup & Restoring Guide

FileCruiser Backup & Restoring Guide FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

College of Agriculture and Life Sciences Guidelines

College of Agriculture and Life Sciences Guidelines College of Agriculture and Life Sciences Guidelines ENTERPRISE FILE SERVICE Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 GUIDELINE STATEMENT This guideline

More information

Hosting as a Service (HaaS) Playbook. Version 0.92

Hosting as a Service (HaaS) Playbook. Version 0.92 (HaaS) Playbook Version 0.92 2014 CrownPeak Technology, Inc. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

1 Introduction. 2 Design and Functionality. 3 Client Support

1 Introduction. 2 Design and Functionality. 3 Client Support Changefirst Enterprise Service Level Agreement 1 Introduction This Service Level Agreement between Changefirst and the Client describes the support processes and services which Changefirst provides to

More information

Introduction to VMware vsphere Data Protection TECHNICAL WHITE PAPER

Introduction to VMware vsphere Data Protection TECHNICAL WHITE PAPER Introduction to VMware vsphere Data Protection TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Architectural Overview... 3 Deployment and Configuration.... 5 Administration.... 5 Backup....

More information

ensure compliance with applicable statutes, regulations, and rules regarding data retention and management;

ensure compliance with applicable statutes, regulations, and rules regarding data retention and management; Texas A&M AgriLife Extension Service Procedures 29.01.99.X0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT

More information

CHANGE MANAGEMENT POLICY

CHANGE MANAGEMENT POLICY DEPARTMENT OF TECHNOLOGY (DTECH) CHANGE MANAGEMENT POLICY Revised: 10/20/14 799 G Street, Sacramento, CA 95814 Table of Contents Introduction... 3 Definition of Change... 3 Definition of Change... 3 Objectives...

More information

Ixonos Cloud Solutions - A Review

Ixonos Cloud Solutions - A Review Capacity Services Ixonos Plc 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1 Service description... 3 1.1 Environment... 3 1.2 Security services... 4 1.3 Data Center facilities... 5 2 Service levels...

More information

Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Multi User Guide

Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Multi User Guide Volume 1 UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Multi User Guide UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Guide Table of Contents Introduction General Instructions SECTION

More information

Vodacom Managed Hosted Backups

Vodacom Managed Hosted Backups Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers

More information

Hyper-V recovery. User Guide

Hyper-V recovery. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. Recovery Solutions... 3 Full VM Recovery... 3 Rapid VM Recovery... 3 When to use Rapid VM Recovery... 3 3.

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP Final Audit Report Audit of Data Integrity MCCS Feeder System Interfacing with SAP April 2008 Table of Contents Executive Summary... ii Introduction...........1 Background... 1 Audit Objectives... 1 Scope

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

How To Backup A Virtual Machine With Thinware Vbackup

How To Backup A Virtual Machine With Thinware Vbackup vbackup Administrator s Guide Thinware vbackup 4.0.1 Thinware vbackup Administrator s Guide Thinware vbackup Administrator s Guide Revision: 4.0.1-1 The latest product updates and most up-to-date documentation

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

San Francisco Chapter. Information Systems Operations

San Francisco Chapter. Information Systems Operations Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

Error and Event Log Messages

Error and Event Log Messages APPENDIXA and Event Log Messages Client Messages Login Failed Clean Access Server is not properly configured, please report to your administrator. A login page must be added and present in the system in

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

SAAS MADE EASY: SERVICE LEVEL AGREEMENT SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

BACKUP & RESTORATION PROCEDURE

BACKUP & RESTORATION PROCEDURE BACKUP & RESTORATION PROCEDURE KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY ALTAMASH SAYED NASSER A. AMMAR DR. MOHAMMED

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...

More information

How To Write A Successful Automation Project

How To Write A Successful Automation Project ch01.fm Page 1 Thursday, November 4, 1999 12:19 PM Chapter 1 Lights Out Exposed Planning and executing a successful automation project begins by developing realistic expectations for the purpose and scope

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Acronis Backup & Recovery 11. Backing Up Microsoft Exchange Server Data

Acronis Backup & Recovery 11. Backing Up Microsoft Exchange Server Data Acronis Backup & Recovery 11 Backing Up Microsoft Exchange Server Data Copyright Acronis, Inc., 2000-2012. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc.

More information

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1 (CAT-360) Version 1.1 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as the Materials ) are for the end user s educational purposes only and are subject

More information

Internet Banking Agreement and Disclosure

Internet Banking Agreement and Disclosure Internet Banking Agreement and Disclosure This Internet Banking Agreement and Disclosure ("the Agreement") explains the terms and conditions governing the basic Internet banking services and bill payment

More information

SERVICE SCHEDULE DEDICATED SERVER SERVICES

SERVICE SCHEDULE DEDICATED SERVER SERVICES SERVICE SCHEDULE DEDICATED SERVER SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such Gabian Technology and its partners SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, Advisor Earnings, Email Archive, CRM

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Play IT Safe. I love that everything just works with Unitrends. Unitrends Disaster Recovery as a Service. Backup, Archiving & Disaster Recovery

Play IT Safe. I love that everything just works with Unitrends. Unitrends Disaster Recovery as a Service. Backup, Archiving & Disaster Recovery Unitrends Disaster Recovery as a Service (DRaaS) Frequently Asked Questions (FAQ) Backup, Archiving & Disaster Recovery Play IT Safe Unitrends Disaster Recovery as a Service (DRaaS) is a white-glove service

More information

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Determine if the expectations/goals/strategies of the firewall have been identified and are sound. Firewall Documentation Develop background information about the firewall(s) in place: Segment diagrams Software Hardware Routers Version levels Host names IP addresses Connections Specific policies for

More information

Securing Information in LiveBackup

Securing Information in LiveBackup . Atempo, Inc. Securing Information in LiveBackup How LiveBackup secures data in transmission and storage Date: December 7, 2007 Author: Amy Gracer, Version: alb.lbsg.311.2 en Copyright 2008 Atempo Inc.

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

Service Level Agreement

Service Level Agreement Exhibit No. 1 to Agreement No. H/ of 201_ 1. Terms and Definitions Service Level Agreement 1.1. Services (see description of tariff plans at Provider s web site at: http://www.inoventica-services.ru) 1.1.1.

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Can You Recover Active Directory from a Disaster?

Can You Recover Active Directory from a Disaster? Can You Recover Active Directory from a Disaster? Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

Hosted Virtual Machine Service Policy

Hosted Virtual Machine Service Policy Hosted Virtual Machine Service Policy Introduction CSU s Hosted VM Service is designed to be a persistent IT service provided to the CSU community by ACNS. The Service will lease virtual machines (VMs)

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such PLEX SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, CRM and other remotely provided services

More information

Cloud Services for Backup Exec. Planning and Deployment Guide

Cloud Services for Backup Exec. Planning and Deployment Guide Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING

INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 2.2 Approved by : Information Governance

More information

Virtual Server Agent v9 with VMware. March 2011

Virtual Server Agent v9 with VMware. March 2011 Virtual Server Agent v9 with VMware March 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...

More information

Access Control In Virtual Environments

Access Control In Virtual Environments In Virtual Environments A FoxT White Paper Rapid growth in the use of virtualization tools means system administrators are now able to isolate processes in exclusive run-time environments. While helping

More information