COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, AND INFORMATION MANAGEMENT (C4IM) SERVICES LIST (UNCLASSIFIED FOUO)
|
|
|
- Shana Mitchell
- 10 years ago
- Views:
Transcription
1 COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, AND INFORMATION MANAGEMENT (C4IM) SERVICES LIST Version 6, October 2015 for FY16 Implementation List of Network Enterprise ()/Directorate of Information Management (DOIM) and Cyber s C4IM s - The C4IM s List pertains to /DOIM and Cyber provided services and managed infrastructure. There will be only one physical plant on the installation with one /DOIM network and multiple mission networks. - The USAR treats all reserve Facilities as a single virtual installation. The USAR provides all services listed in the C4IM s List which have a listed provider as either or Cyber to its facilities off Army installations. It adheres to aseline and categories, but may utilize different funds for providing specific services. - aseline s - These services are specifically designated as "aseline" in the C4IM s List. Installation /DOIMs will provide baseline IT services to Army activities on a non-reimbursable basis. - Enhanced s - These services are "aseline" services with "Enhanced" performance measures that exceed one or more of the standards listed in the C4IM s List. Army Activities desiring "Enhanced" IT services will request and obtain these services from the installation /DOIM on a reimbursable basis. Army activities and the /DOIM will enter into support agreements for "Enhanced" s. - Funded s - These services are specifically designated as " Funded" in the C4IM s List, Army activities will reimburse the /DOIM for these services unless the /DOIM determines that the /DOIM operations cannot reasonably provide the required services. Army activities and the /DOIM will enter into support agreements for " Funded" s. - does not make Partner Acquisitions or process their GOAL 1 Waivers. ID aseline () / Funded () Automation - Provide electronic messaging, software development and maintenance, database support, automation training, administration and policy support, network support, and COOP development. Primary Category (PSC) Mail Messaging ( /OMS) and Storage s - Provide electronic messaging and directory support and electronic messaging application system development and maintenance support. Provide administration of common-user storage. Includes touch labor support for this PSC. Function (Unclassified and Classified up to Secret) Provide the capability to: send, store, process, sign/encrypt, and receive and multi-media attachments, with interoperability across the Army, within the DoD. DISA MSNS services (less scheduled down time) After escalation by /Cyber, GISMC will resolve outages and degradations within two hours; corrupt mailboxes repaired within four hours. OWA Users 512M mailbox size; usiness Class Users 4G mailbox size Provide services including directory replication, access to public DISA MSNS services folders, connector services, internet mail, and calendar service. (less scheduled down time) Provide archiving, searching, and retrieval of anytime from anyplace DISA MSNS services IAW IA policy. (less scheduled down time) Provide account management (involves creating, deleting, supporting/guiding to connect with new cards, PCS moves, general troubleshooting, and serving as a liaison to DISA). DISA MSNS New accounts requested within 2 business days of request Page 1 of 51
2 ID aseline () / Funded () Provide backup/archival Storage, consisting of local and remote replication, ability to efficiently support Exchange Mailbox Enclave backup and recovery requirements currently based on 90 days after deletion retention -- and the ability to efficiently support various NetOps enclave backup and recovery requirements. DISA MSNS Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Support local clusters for Tier 1 APC users that include one active/one DISA MSNS 24X7 passive located at APC #1 and a hot backup cluster of one active/one passive located at APC # Perform or support full / Exchange system backups at least once per week for each provisioned Exchange enclave and supported / DOIM Installation Local Processing. DISA MSNS Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Ensure 98.9% of backups/ archives are current within established timelines for each supported element, and backups/ archives are useable when restore is required Provide the ability for disaster recovery in prioritized order in the event of an DISA MSNS active Performance Optimized Data ceter (POD) failure Provide security administration by creating client policy Provide Enterprise Request/Trouble Ticket Resolution for DISA MSNS Outages and managed service infrastructure. degradations resolved according to Army-DISA SLA; corrupt mailboxes repaired according to Army-DISA SLA Function Organizational Messaging (OMS) / Automated Message Handling System (AMHS) Provide the capability for users to compose, format, transmit, and receive formal organizational messages at individual workstations. Provide classified and sensitive but unclassified (SU) and classified organizational messaging capabilities. services (less scheduled down time) Meet 99% Mailbox size 100M with attachment size determined by local IA policies Operate, maintain, and manage the Local Control (LCC). Page 2 of 51
3 ID aseline () / Funded () Install, configure, and maintain OMS and AMHS servers, software, and other hardware Provide post offices, delivery systems, and backup and restore capability Troubleshoot OMS/AMHS problems. Elevate to next higher level (LCC/Area Control (ACC), Cyber, DISA Network Operations [NOC]) via Request if problems cannot be solved locally Operate, maintain, and manage Certification Authority Workstation (CAW). Process X.509 certificates and create FORTEZZA cards. Post certificates to Directory Information Tree (DIT). Create and activate FORTEZZA cards within 1 business day of request Process and deliver messages (e.g., Organizational Messaging (less scheduled [OMS] Automated Message Handling System [AMHS]). Function Directory s Operate and maintain classified and unclassified Installation Organizational (less scheduled Meet 98% Unit (OU) Design and manage directory synchronizations with other systems Create utilities and scripts to synchronize directory services. Ensure information integrity. Add user functionality. Coordinate actions with other organizations. /Cyber / Perform weekly updates of directory services Operate, manage, and defend the classified and unclassified active directory forest. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Meet 98% Provide top-level OU administrator Management Provide AD infrastructure management and monitoring. Meet 98% Provide AD situational awareness. Meet 98% Page 3 of 51
4 ID aseline () / Funded () Provide and other customers with information regarding AD service Immediate degradation or interruptions. notification Meet 98% Maintain AD domain controllers and other NETCOM managed AD CIs; Meet 98% update all CI as required to meet minimum security baseline requirements Continuously monitor domain controllers in order to detect malfunction, intrusion attempts, and anomalies Provide local touch labor (troubleshooting, repairing, etc.) for Cyber Critical: Priority 1 = assets. Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function Storage s Maintain file storage (home directories, workgroup shares). Provide 100M per authorized user as baseline. Additional storage (along with required maintenance for additional storage) is mission-funded. Create common shared folders on a storage drive to enable a group of employees to share and work on same files. Meet 98% Maintain Storage Area Network, Network Attached Storage (e.g., home directories, workgroup shares) for mission-specific requirements. Free disk space should be greater than 20% of disk capacity. 100M storage per use authorized Perform weekly backup outside of normal business hours; perform weekly scan Proactively monitor hardware storage space. / Cyber / Critical: Priority 1 [Cyber only] = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Meet 98% Free disk space should be greater than 20% of disk capacity Perform weekly scan Provide high availability fiber channel for hosted application data storage. Meet 98% Provide IP data paths for hosted application data storage (I-SCSI). Meet 98% Page 4 of 51
5 ID aseline () / Funded () Perform and support full storage system backups at least once per week for each provisioned volume with application based transaction log backups to recover data created between full backups daily Perform and monitor full backups daily. Full system backups monthly Perform data replication at a remote location to enable real-time recovery of 98% data and application. Replication supports scheduled data replication consistent with MAC requirements of the system Perform and support full storage system backups at intervals specified by Cyber the application owner for each provisioned volume with application-based transaction log backups to recover data created between full backups Provide protected local COOP storage. Cyber Provide COOP data recovery at second APC using remote storage backup Cyber that is a final operational capability (FOC for Microsoft applications, post FOC for Unix and Linux applications) Provide a capability to move storage from one APC to another. Cyber Provide performance capacity planning, management, operations and maintenance of SAN equipment and services Provide storage management functions at the APC that includes monitoring, allocation, and recommend storage usage based on agreed-upon directives Provide tailorable protection and segregation of unclassified and classified As required hosted application data by various methods Provide high availability SAN-based data pathing for hosted application 98% data storage Provide an APC Enterprise class SAN which supports the underlying 98% foundation of a flexible storage architecture that will allow the Army to transition more applications to reside at the APC in the future Provide alternate heterogeneous storage connectivity support. 98% Provide data storage access and capacity in support of Army deployments, 98% RAC, DoD, and other related hosted applications. Page 5 of 51
6 ID aseline () / Funded () Provide storage utilization, performance reporting, trending, and management capabilities Manage SAN administration and operation at theater level for the APC Provide support for DR/COOP that will have the ability to effectively and efficiently use bandwidth in support of synchronous and asynchronous replication to and from heterogeneous storage and server platforms (frame will be negotiated between the Cyber and the ). 98% Provide local touch labor (troubleshooting, repairing, etc.). 3 business days; 2 hours for Priority users Provide local touch labor for troubleshooting and repair of mission related tasks Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Primary Category (PSC) Database Administration s - Provide database, master file, and data warehouse support, and administration and support for standard database software. Function Administration and Maintenance Perform local database administration for standard database software for on Army Enterprise Systems as directed. non-holiday weekdays Develop, field, and support database applications Perform database builds, reorganizations, maintenance, tuning, backups, restorations, and query design Perform file transfers (file transfer protocols [FTPs]), loads, downloads, data file manipulation, data archiving, coordination, familiarization, and implementation of actions required. Processing of superscans, driver actions, and updates/changes to unique and standard master files. Page 6 of 51
7 ID aseline () / Funded () Perform incremental backups and full system backups for standard databases for Army Enterprise Systems as directed by Army CIO/G-6. Perform full systems backups weekly and incremental backups daily. ack-ups will be performed outside normal business hours Provide SQL Database storage and server incident/event resolution for the Common Operating Picture (COP) solution being used by the Installation Emergency Support on non-holiday workdays 30 minutes; 4 hours all other times Function Data Warehouses and Data Mining s response plus 2 hours Provide data mining services. Primary Category (PSC) Desktop/ Software/Peripheral Support s - Provide desktop, software, and peripheral support, release management, and account management. Includes touch labor for this PSC. Function Desktop Software Provide interoperable and integrated standard office automation desktop software as approved for use by the Army Golden Master program Provide centrally funded software to all Army users or as part of a standard Army system Perform release management to include commercial software, standard software, and site license management, and new system releases. 2 business days to respond to the request/contact the Customer by the Electronically "push" software updates, security updates, vendor patches (service packs, service releases), etc. to end user devices. / Cyber / 100% of affected available devices within 20 business days. operations, leave, TDY, etc. may affect availability of devices for push Maintain accountability for COMMON USER ENTERPRISE desktop Perform annual software licenses. inventory certification Page 7 of 51
8 ID aseline () / Funded () Provide Local Touch Labor s to include installation, troubleshooting, 3 business days; 2 and software updates, security updates, vendor patches (service packs, hours for Priority service releases), etc, when electronic application means do not exist. users Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users Provide local touch labor for troubleshooting and repair of mission related tasks. Function Software / Application Development for All Automation System Types Design, develop, and maintain all types of application systems using standard programming languages. Develop applications to support user requirements, but not limited to creation of the data models, databases, survey/add/update of reuse library, development of interfaces, application control logic, forms (screens), objects, reports, queries and menus Design and develop mainframe applications and bridges to meet local requirements Plan tests, prepare test data, execute testing, identify, analyze and repair errors and retest an application or module prior to implementation and placing into production Prepare, update and distribute end-user and/or system operator's manuals that contain the product design and procedures and other relevant information necessary to use and administer the system. Also prepare, update and distribute on-line help facilities, technical manuals, Standing Operating Procedures (SOPs), Instructions on the Army Standard software suite and maintain automation documentation and application software inventory documentation library Assist users in identifying service requirements and developing appropriate 2 business days to technical specifications that are consistent with user needs. Provide advice on automating functions, integrating requirements with existing capabilities, communication requirements, control and administration of systems, types of information management systems, operating systems, equipment; infrastructure compatibility. The will not produce requirement documentation for the customer; however, the will provide users recommended equipment and software lists. respond to the request/contact the Customer by the. Function Password Control Management Issue, maintain, and delete end-user device accounts. Issued within 1 business day of request; delete accounts on a weekly basis Function Computers and Peripheral Devices Page 8 of 51
9 ID aseline () / Funded () Acquisition and replacement (to include life-cycle) of end user devices to include computers, printers, lap tops, scanners, and other hardware Configuration of authorized end user and network devices to include computers, printers, lap tops, scanners, and other hardware. Respond within 2 business days; 2 hours for Priority users. Resolution within 5 days; 2 days for Priority users Evaluate customer prepared request for acquisition and life-cycle Resolve within 5 replacement of end user devices to include computers, printers, lap tops, business days. scanners, and other hardware Configuration of bulk authorized end user and network devices to include Respond within 2 computers, printers, lap tops, scanners, and other hardware. When request business days is for 15 or more devices to replace existing operational devices Provide Local Touch Labor s to include installation, troubleshooting, 3 business days; 2 repairing; DOES NOT INCLUDE cost for replacement parts, unpacking, hours for Priority hardware setup and moving equipment. users Provide local touch labor for troubleshooting and repair of mission related tasks. Resolution within 45 days Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users. Up to 500 devices per mission partner Provide local touch labor (troubleshooting, repairing, etc.)for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function IT Training Provide any required end-user training that is not available through Army e-learning. Function Copier Management Evaluate customer prepared requests (DA Form 4951 etc.) for network Within 2 business multi-function copiers, copiers, and Printers. Advise and recommend days of request placement and consolidation of network multi-function copiers. Page 9 of 51
10 ID aseline () / Funded () Assist and advise customers of copier requirements and maintenance IAW Within 2 business DA Form days of request Primary Category (PSC) Web Support s - Provide web hosting operations and management services. Operate and maintain web proxy servers. Function Web Hosting Install, configure, operate, maintain and administer common user web and (less scheduled Meet 98% portal servers. Perform full systems backups weekly and incremental backups daily. ack-ups will be performed outside normal business hours Provide a formal web application change management process to deploy and maintain web sites, portals, web pages, and customized applications Monitor web pages and applications for security and standards compliance Perform and verify that user developed web pages follow regulations (508 and monthly scan Department of Defense [DoD] web policy). for compliance Monitor systems for disk usage, disk performance, and system performance. Free disk space should be greater than 20% of disk capacity Perform weekly scan Configure operating systems, web and portal applications for common user servers Manage user access controls. New accounts within 2 business days of request Ensure Information Assurance incidents are reported, e.g., registry hacks. (less scheduled Within 2 hours of receipt Provide Web Application incident/event resolution for the Common Operating Picture (COP) solution being used by the Installation Emergency Support on non-holiday workdays 30 minutes; 4 hours all other times Function Web Site and Web Page Development and Maintenance response plus 2 hours Design, develop, and maintain static and dynamic web sites or portals using standard programming languages. Page 10 of 51
11 ID aseline () / Funded () Design, develop, and maintain web pages using standard programming languages Provide web master services. Function Web Application Development Develop, deploy, and maintain web based applications. Function Proxy, Caching, and Web Filtering Maintain, update and operate web monitoring and filtering systems IAW applicable laws and regulations. / Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Operate and maintain web proxy servers. / Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Meet 98% Continuous Continuous Monitor web proxy cache hit rate / disk usage daily performance. / Cyber / Monitor logs and reports Provide operations, management, monitoring and defense of all Army Web servers at the theater level through the use of reverse Web proxy system. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Continuous Page 11 of 51
12 ID aseline () / Funded () Maintain reverse proxy security configurations in a current state to provide bi-directional protection of local web sites and prevent web site defacing from outside sources. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Continuous Perform continuous monitoring of the reverse proxy in order to detect malfunctions, intrusion attempts, or anomalies. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Assume ownership of a web proxy incident event when detected and continuously monitor the event while managing restoration activities. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Continuous Continuous Primary Category (PSC) File, Print & Server Support s - Provide hardware and software support to any type of common-user server (e.g., application, file, print, thin client). Includes touch labor for this PSC. Function Server Administration Provide system administration and operating system support for file, print, and common user application servers, server farms/banks. Includes hardware monitoring Provide and install hardware, operating system, and software for file, print, / Cyber / Per established and common-user applications servers, and server farms/banks. schedule Perform weekly backup Install security, operating system service packs, patches and application updates and patches on all common user servers and test and verify system is not adversely affected by patch. (less scheduled Within suspense time /date provided in the applicable IAVA Perform security checks on operating systems and system backups for Perform full each server. systems backups weekly and incremental backups daily. ack-ups will be performed outside normal business hours Page 12 of 51
13 ID aseline () / Funded () Monitor system logs, security logs, and application logs. At least once daily Provide Microsoft Active Directory organizational unit (OU) administration Provide domain administration and service support for primary and backup / Cyber / domain controllers (PDC & DC). (Login to network and operating system) Manage dynamic allocation of internet protocol (IP) address space Assign and maintain IP address database using DHCP or Static IP Addressing Maintain DNS tables and update tables. Maintain records of registered DNS registrations and set standard naming conventions for DNS registrations Develop and modify IP Assignment Schema Provide Domain Name Server (DNS) services that include the address / Cyber / Meet 98% resolution of Uniform Resource Locator (URL) to IP addresses. Fully Qualified Domain Name (FQDN) to IP address Install, configure, and maintain Tier 2 DNS servers. / Cyber / Perform weekly backup, check logs daily Maintain WINS server for windows networking name resolution. Meet 98% Perform weekly backup Perform release management to include commercial software, standard software, site license management, for new system releases Maintain accountability for software licenses and non-mission unique server licenses Maintain the Tier 1DNS servers. As directed Operate the Tier 2 DNS servers. Continuous Page 13 of 51
14 ID aseline () / Funded () Coordinate with sites on DNS-related problems. Responds upon receipt of Incident Report / after business hours contacts site in accordance with recall procedures As required Establish perimeter boundaries for IPs Monitor IP address utilization. Continuous Analyze logs and reports for DNS usage patterns to detect malicious activity. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Minimum 98% As required Daily log audits Own army.mil name space daily /w Per established On Call After Hours SOP Allocate IP address blocks to Army organizations daily /w Per established On Call After Hours SOP As requested Provide 911/E911 Emergency Server Support. This support consists of operating and maintaining data center environment for backend computing resources necessary to operate a 911/E911 Emergency Support (for servers that are -managed). (less scheduled within 2 hours Provide local touch labor (troubleshooting, repairing, etc.) 4 hours for mission critical systems; next business day for routine systems Repair within 4 hours of request. Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users. Page 14 of 51
15 ID aseline () / Funded () Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function Specific Server Administration System Administration for mission-specific servers Provide and install hardware, operating system, and software for / Cyber mission-specific servers Provide local touch labor for troubleshooting and repair of mission related tasks. Function Server Administration Support to Tactical Deployable Systems System Administration for mission-specific servers Provide and install hardware, operating system, and software for / Cyber mission-specific servers Maintain Storage Area Network, Network Attached Storage (e.g., home directories, workgroup shares) for mission-specific requirements Provide local touch labor for troubleshooting and repair of mission related tasks. Function Other Servers to Tactical Deployable Systems Operate, maintain, and administer PDA, SMS (system management server), Streamed Video Server, Virtual Conferencing Server, Structured Query Language (SQL), and other servers Provide local touch labor for troubleshooting and repair of mission related tasks. Primary Category (PSC) Management of Data Network s - Provide management of various types of Local Area Network (LAN) and Campus Area Network (CAN); Provide management of Wide Area Network (WAN) connectivity to include supporting the automated systems linked to the network; manage local dial-in server and access. Function External Networks Page 15 of 51
16 ID aseline () / Funded () Manage and maintain connection to external networks, to include but not limited to: NIPRNET, SIPRNET, Defense Switched Network (DSN), Public Switched Telephone Network (PSTN), Army Reserve Network (ARNET), Army National Guard Network (GUARDNET), Defense Research Engineering Network (DREN), Simulations Network (SIMNET), and Army intranets within existing capability. (less scheduled At least 98% operational installation data network Manage additional network requirements beyond existing capabilities. NIPRNET and SIPRNET circuit utilization < 80% (local time) Daily system files backup, weekly data backup. Required end user buildings IAW Installation Information Infrastructure Architecture (I3A) Report IDS/IPS outage. 30 min open ticket Report Communications Systems OSI Layer 2/3 switch failure/isolation. 15 min open ticket Report National Communications Systems (NCS) trunk/circuit outage. 15 min open ticket Report NCS OSI Layer 2/3 switch failure/isolation. 15 min open ticket Report NCS significant network service degradation. 15 min open ticket Report CS/NCS DSN HAZCONS. 30 min open ticket Conduct after-action analysis of all intrusions and report the results. ACOIC Provide local common-user LAN and ICAN touch labor (troubleshooting, repairing, etc.) 4 hours for mission critical systems; next business day for routine systems Provide mission-specific LAN touch labor (troubleshooting, repairing, etc.) Function Virtual Private Network (VPN) Page 16 of 51
17 ID aseline () / Funded () Install, configure, operate and maintain a VPN server capability for remote broadband network access from remote locations for point to point VPN tunnel Monitor and manage Remote Access Servers (VPN, Remote Web Access, etc) Confirm that the VPN client workstation is IAVA compliant and has an enterprise management solution installed and properly configured Configure, implement, and maintain VPNs for a dynamic site to site VPN structure that will support efficient, confidential communication directly between sites, APC to APC, and site to APC connections Provide mission-specific LAN touch labor (troubleshooting, repairing, etc.) Function Coalition WAN Manage Coalition WAN service Install, configure operate and maintain a classified but releasable coalition / Cyber network to support coalition partners and foreign liaison officers Engineer, configure and install and expansion of the secret releasable / Cyber coalition network and new requirements are identified Operate and maintain a secret coalition WAN to include all normal network functions Provide mission-specific LAN touch labor (troubleshooting, repairing, etc.) Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function Local Area Network (LAN) and Campus Area Network (CAN) Page 17 of 51
18 ID aseline () / Funded () Manage and maintain connectivity and operate LAN and (limited user* classified up to Secret) LAN between computers and associated devices for a specific user group. (*SIPRNET down to attalion) (less scheduled At least 98% operational installation data network Manage SU LAN network expansion. 100M to the desktop Required end user buildings IAW I3A Manage and maintain connectivity and operate ICAN between LANs and computer resources. (less scheduled At least 98% operational installation data network Required end user buildings IAW I3A Manage SU CAN network expansion Manage CAN and LAN classified user expansion Provide local common-user LAN and ICAN touch labor (troubleshooting, repairing, etc.) 4 hours for mission critical systems; next business day for routine systems Provide mission-specific LAN touch labor (troubleshooting, repairing, etc.) Function Network Management Monitor the ICAN and LAN by utilizing enterprise management software to / Cyber / monitor network performance, analyze network activity, and maintain network availability. Perform network discovery and conduct fault analysis Conduct event management on network infrastructure and monitor services. / Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Provide network utilization reports. / Cyber / y request Manage network equipment/software to include configuration management and capacity management. / Cyber / non-holiday workdays; Cyber s: Page 18 of 51
19 ID aseline () / Funded () Perform undisclosed classified incident recovery across network. / Cyber Operate and maintain common core (backbone infrastructure) network / Cyber / Meet 99.9% infrastructure equipment. for the infrastructure Provide network trapping via the 802.1X protocol. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Monitor and direct compliance with Army-wide and theater Information ased on specific Operations directives and policies to defend Army theater -level computer directive network operations in support of the warfighter Perform major TLA management functions to include: operate and maintain the ASR and switch; configuration control of TLA baseline; problem resolution for WAN/LAN traffic issues traversing the TLA. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Provide assistance and coordinate theater network problem resolution actions that effect theater operations. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Meet 99.9% Meet 99.9% Conduct reporting of theater facilities, telecommunications, and information system problems. time per theater CCIR Matrix identifies specified response times Coordinate with effected organizations (e.g., ) to ensure timely recovery and minimal operational impact when responding to network outages. Page 19 of 51
20 ID aseline () / Funded () Monitor and direct compliance with Army-wide and theater Information Operations directives and policies to defend Army theater -level computer network operations in support of the warfighter. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Report Army security/router/adrp/hub/premise router outage. 15 min open ticket Report trunk/circuit outage. 15 min open ticket Report significant network switch degradation. 30 min open ticket Report NIPRNet HAZCONs. 30 min open ticket Provide Deployable Network Monitoring Capability. As required Provide Network Capacity and Monitoring System service Coordinate and synchronize theater and functional Cyber s for global ACOIC response actions Provide technical support and assessment of Computer Network Defense ACOIC (CND) operations Provide guidelines for user identification and authentication for controlling ACOIC user access within the LWN Define enterprise access controls to manage authentication, authorization, ACOIC and access privileges. This includes providing enterprise access control guidance and policies Provide local common-user LAN and ICAN touch labor (troubleshooting, repairing, etc.) 4 hours for mission critical systems; next business day for routine systems Page 20 of 51
21 ID aseline () / Funded () Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function Data Network Planning Design, engineer and develop contract specifications for network equipment in support of Military Construction Army (MCA) projects, Unspecified Minor Military Construction Army (UMMCA) projects, and local minor construction/ renovation/expansion projects. Update and maintain installation network standards utilized in solicitation or contractual documents. Provide field evaluation reports on contractor performance. non-holiday workdays. Function Wireless Computing s Manage wireless LAN and Computer s. Operate and maintain on within 3 business Wireless Network Infrastructure as part of the installation infrastructure non-holiday weekdays days; 2 hours for Priority users Establish and delete wireless PED user accounts. Issued within 1 business day of request; delete accounts on a weekly basis Provide local common-user LAN and ICAN touch labor (troubleshooting, 4 hours for mission repairing, etc.) critical systems; next business day for routine systems Function Cross Domain Solutions Implement, maintain cross domain solutions Ensure accreditation Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Function WAN-s Page 21 of 51
22 ID aseline () / Funded () Operate and maintain various WAN services to include ATM, SONET, MPLS Report outage. 5 min open ticket Meet 98% Report failure and maintain system Provide local touch labor (troubleshooting, repairing, etc.) for Cyber assets. /Cyber / Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = Issue daily Performance Reports Primary Category (PSC) Automation & Network Continuity of Operations Plan (COOP) and OPLAN Support s - Provide Continuity of Operations Plan (COOP) planning and preparation support. Function COOP Administration Develop, implement and exercise IT Continuity Management in Exercise COOP support of installation COOP for critical portions of the automation annually infrastructure Prepare, monitor, and evaluate IT Continuity Managementin Review annually support of installation COOP with each /DOIM supported customer activity. Store weekly backups at offiste location. Function Disaster Recovery Restore critical automation services and data in event of disaster. Restore within 24 hours Develop, implement and exercise the disaster recover plan for critical Exercise portions of the automation infrastructure, to include critical services and annually data. Store weekly backups at offsite location. Function Operations Plan (OPLAN) Support Provide Automation and Network Operations planning support to OPLAN development. Identify automation and network requirements resulting from any surge/change in on-post staffing due to force/equipment/supply flow & support requirements. Develop contingency service level agreements (SLA) to implement any increases in support upon OPLAN activation at the time it is required Develop infrastructure upgrade plans to support operational surge requirements. Accommodate projected requirements driven by projected Army Transformation initiatives Exercise or review the OPLAN with supported customer activity. Exercise or review annually Page 22 of 51
23 ID aseline () / Funded () Primary Category (PSC) Automation and Network Support - Provide hardware, software, and telephone support to include: provide customers with initial POC for service requests and problem reporting; track, audit, and resolve issues; and provide feedback and close loop with customer. Function Support Receive, document, assign, monitor, and close Requests. (via AESD) Open Request within 30 minutes of notification Process service orders (program switch, update assignments, extend Process service to customer) and Requests (test, troubleshoot and repair) Requests in 30 for all approved moves, adds, and changes (MAC) requirements. minutes or less 60% of 15 Requests resolved at Tier 1 [First contact resolution] Provide service desk / systems management data analysis: includes / Cyber / Issue daily service desk management tool and outputs associated to trend analysis Performance and service desk performance. Reports Provide timely notifications of planned or unplanned system maintenance or degradation. / Cyber / Notifications sent no less than 24 hours prior to scheduled outage Send out customer satisfaction surveys after completion of work. Surveys sent within 3 business days of work completion Review and analyze customer satisfaction surveys and initiate follow-up and corrective action. Follow-up with corrective action within 2 business days Provide bills/invoices to customers for services received on a quarterly basis Receive (quarterly) payment from customers for reimbursable services Property accountability for -managed equipment. / Cyber / Operate a Network Operations Desk that monitors supported systems, provides situational awareness, and serves as the single point of contact for service users in theater Install, operate, and maintain Enterprise Management Tools. 98% Page 23 of 51
24 ID aseline () / Funded () Report Army critical site facility isolation. 5 min open ticket Report critical site power failure. 5 min open ticket Report Army non-critical site facility isolation. 5 min open ticket Report non-critical site power failure. 5 min open ticket Report CS/NCS facilities HAZCONs. 30 min open ticket Function Automation and Network Support Planning Plan, define, and integrate the interdependencies of various IT/ IA programs, budgetary requirements, funding profiles, and prioritization of requirements for the Develop a comprehensive IT Master Plan comprised of new system program plans, existing equipment modernization plans, and projected IT requirements Exercise control and configuration, as well as day-to-day management and protection, of the Army theater-level networks, systems, and applications Customer IT requirement review to ensure installation architectural Within Regulatory compatibility (e.g., Requirements Documents, Army Knowledge Guidance Management GOAL 1 waiver) Coordinate with management of Configuration Management Database ACOIC (CMD) entries in order to provide enterprise-wide dissemination and access supporting/follow-on work orders and tasks. Function Level Management Provide technical support to customer activities in defining the C4IM services to be provided and responsibilities of each party in the development of SLA Support the government in negotiations with DoD level activities and customer organizations, including depot tenant activities Prepare, coordinate, negotiate, monitor, measure, evaluate, and report baseline and above-baseline service delivery and support to leadership and customers. Page 24 of 51
25 ID aseline () / Funded () Conduct financial analyses to determine total costs of services provided. Perform financial management of IT services functions and perform incident and problem management functions Report the requirements, availability, and performance to support service delivery and capabilities Sponsor and convene the local Information Management Support Council (IMSC) IAW DA Pam Provide training and guidance for Information Management Officers (IMOs) and others Communications Systems and System Support - Provide the cable infrastructure, internal and external networks necessary to deliver electronic information to, from, and among customers. Primary Category (PSC) Telephone and Data Infrastructure - Provide cable infrastructure, premise equipment, telephone service, (except customer required calling features and modernization programs). Includes touch labor support for this PSC. Function Telephone Provide dial tone service (voice and data) on government property to (less scheduled Meet 99.9% connect to any location worldwide. (Does not include usage by customer) Provide Dual Tone Multi-Frequency (DT) type telephones. (less scheduled Meet 98% Add, move or change within 5 business days of request One (1) per installation user One (1) Add, move or change per 10 individuals in same office or organization per year Design, engineer, install, configure, operate, maintain and repair digital, (less scheduled Meet 99.9% local Voice over Secure Internet Protocol (VoSIP) telephone and UC service.. (PROCUREMENT OF VoSIP EQUIPMENT IS MISSION FUNDED) Provide VoIP support (ONCE LOCAL SESSION CONTROLLER IS IN PLACE) Provide telephone moves, adds, and changes for MCA/SRM/Projects other than construction. Page 25 of 51
26 ID aseline () / Funded () Provide local touch labor (troubleshooting, repairing, changing cable pairs, 3 business days; 2 etc.) hours for Priority users Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users Provide local touch labor for troubleshooting and repair of mission related tasks. Function Calling Features Provide Central Office (CO) switch features e.g. call forwarding, call transfer (less scheduled (3-way conference), ring again, last number redial, call pickup, speed calling, caller ID, and others if the phone supports Provide integrated voice conference bridge (up to 30 parties). Function Wireline Access Features Provide access to service for the transmission of official government business incurring commercial or international long distance charges Provide access to service for the transmission of official government (less scheduled Meet 98% business to include on post, local commercial and DSN. Function Telephone Firewall Operate and maintain an installation telephone switch firewall. [ A firewall helps secure your enterprise against many vulnerabilities, including: hacker access to modems. Removal of proprietary or classified information from the enterprise via unauthorized modems. Toll fraud (improper use of fax or other lines for personal voice calls or other unauthorized purposes). Access to and other cost-per-call numbers. Access to unauthorized Internet s (ISPs). The Firewall performs firewall-like functions for the telecommunications system between end-user stations and the Private ranch Exchange (PX) or Central Office (CO) switches]. (less scheduled Page 26 of 51
27 ID aseline () / Funded () Provide local touch labor (troubleshooting, repairing, changing cable pairs, etc.) 4 hours for mission critical systems; next business day for routine systems Function Telephone Switch Operation s Operate and maintain common user telephone switches, remote switches, nodes, and PXs. Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users Upgrade and modify telephone switches, remote switches, nodes, and Installs, upgrades, Installs, PXs. and swaps of network equipment performed after normal business hours upgrades, and swaps of network equipment performed after normal business hours Provide local touch labor (troubleshooting, repairing, changing cable pairs, etc.) 4 hours for mission critical systems; next business day for routine systems Function Operator Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users Provide common user automated attendant or attended operator services. Attended support on non-holiday workdays; automated Within three rings for both attended and automated attendant support services Function Voice Mail ox Meet 98% Provide voice mail box service. (less scheduled Meet 98% Phone sets will advertise waiting messages visually and/or audibly. (If capability currently exists, the service is provided as aseline. Customer pays for establishing upgrading or expanding service). Function Integrated Voice Messaging System (IVMS) / Call Management System Within 5 business days of request One (1) per installation user Page 27 of 51
28 ID aseline () / Funded () Provide voice messaging transmission, reception, and voice message storage 24 hours-per-day except for periodic maintenance downtime, accessible anywhere and anytime. Each IVMS shall be interoperable with DSN Phone sets will advertise waiting messages visually and/or audibly Provide a IVMS service with interaction with DT signaling Provide user security via password management Provide a user review of message(s) before release, with options to edit only, send, and delete Provide user transmission and receipt of messages for optional access and storage for future retrieval Provide a notification method of non-delivery of messages Provide call answering with personal greeting Includes a call transfer and an escape feature Install phones in automatic call distribution (ACD) call group and set up switch programming/features Provide local touch labor for troubleshooting and repair of mission related tasks. Function Installation Infrastructure Design, engineer and configure, the common user building information technology infrastructure support voice and video. This includes the layers 1 through 7 of the Open Systems Interconnection (OSI) asic Reference Model for common user voice/video networks or layers 1 through 4 of the OSI asic Reference Model. (less scheduled for the infrastructure Meet 98% for the infrastructure Provide installation and maintenance services for mission-specific requirements. Page 28 of 51
29 ID aseline () / Funded () Inspect and maintain communication infrastructure within underground Inspect yearly cable enclosures (manholes, handholes, pull holes, and vaults). and repair as required Maintain an electronic & hard copy Plant in Place (PIP) drawing library. Redline drawings completed within 3 days of required changes Operate and maintain common core (backbone infrastructure) Installs, upgrades, Installs, voice/telephony network infrastructure equipment. and swaps of network equipment performed after normal business hours Assist, coordinate, troubleshoot and identify problems involving the connectivity to Deployable Networks and digital service range support which exists on or connected to the Generating Force or installation common user networks infrastructure. Within 2 hours Provide support for the Installation Information Infrastructure Modernization Program (I3MP) (e.g. site surveys, data calls). upgrades, and swaps of network equipment performed after normal business hours Maintain one of the Army systems for managing and storing engineering drawings (e.g., Joint Engineering Data Management and Control System) Property accountability for telecom equipment Provide and maintain Fly away communication teams for VIPs. / Cyber Design, engineer, install, configure, operate and maintain a Dense (less scheduled Touch labor Wavelength Division Multiplexing (DWDM) capability in support of the support within 2 common user installation information technology infrastructure. hours Meet 99.9% Design, engineer and develop contract specifications for building mass notification systems in support of Military Construction Army (MCA) projects, Unspecified Minor Military Construction Army (UMMCA) projects, and local minor construction/ renovation/expansion projects. Update and maintain building mass notification standards utilized in solicitation or contractual documents. Page 29 of 51
30 ID aseline () / Funded () Design, engineer and develop contract specifications for network connectivity to support building energy management/monitoring systems in support of Military Construction Army (MCA) projects, Unspecified Minor Military Construction Army (UMMCA) projects, and local minor construction/ renovation/expansion projects. Update and maintain building network energy management/ monitoring standards utilized in solicitation or contractual documents Design, engineer, and install Wireless Network Infrastructure as part of the installation infrastructure (installation, training, and equipment costs are paid by the customer) Operate and maintain various multiplexing services to include 5 min open ticket Meet 98% IDNX/PROMINA; DWDM. Report failure and maintain system Provide local touch labor (troubleshooting, repairing, changing cable pairs, etc.) 4 hours for mission critical systems; next business day for routine systems Resolve within 4 business days of incident generation less authorized wait time for Non-priority users; Within1 business day of incident generation less authorized wait time for Priority Users Provide local touch labor for troubleshooting and repair of mission related tasks Remove and terminate IT infrastructure cabling from existing manhole and duct systems and aerial poles following installation directed demolition of facilities where demolition leaves IT infrastructure abandoned in place. Function Defense Switch Network (DSN) Provide DSN to Headquarters Commandant for transmission, switching, and support of DSN Report DSN outage 15 min open ticket Report CS significant network degradation 30 min open ticket Function Defense Red Switch Network (DRSN) Provide secure red switch support. Provide customer access as required. Page 30 of 51
31 ID aseline () / Funded () Report DRSN outage. Switch failure/outage 15min open ticket Report General Officer call failure. 30 min open ticket Report DRSN trunk/circuit outage. 15 min open ticket Report DRSN HAZCONS. 30 min open ticket Provide local touch labor for troubleshooting and repair of mission related tasks. Function Integrated s Digital Network (ISDN) Provide Primary Rate Interface (PRI) and asic Rate Interface (RI) access (for video teleconferencing [VTC], secure telephone equipment [STE], etc.) Fund equipment and usage sensitive costs Function Toll Free Subscribe to toll free service (e.g., via FTS) 800, 888, 877, etc. Performs an annual review and revalidation of assigned inbound toll-free numbers. Function Multiline Telephone Install and maintain two-line telephones. Function Long Haul and Commercial Lease Circuits Order, account for, and administer local and long-haul leased circuits with Defense Information Systems Agency (DISA). / Cyber / Submit required documents and track leased circuits Plan diverse and/or alternate routing as required. / Cyber / Order, account for, and administer local circuits with commercial carriers. / Cyber / Submit required documents and track leased circuits Function Communications Facilities Planning Page 31 of 51
32 ID aseline () / Funded () Validate and update the number of cable pairs used for cable lease agreements Maintain, turn in for calibration, and update Test Measurement Diagnostic Equipment (TMDE) Plan transport requirements for LAN/CAN/WAN Design, engineer and develop contract specifications for telecom closets, outside cable plant (fiber & copper), and inside wiring in support of Military Construction Army (MCA) projects, Unspecified Minor Military Construction Army (UMMCA) projects, Sustainment, Restoration, Modernization (SRM) and local minor construction/ renovation/ expansion projects. Update and maintain installation telecom standards utilized in solicitation or contractual documents. Provide design is in accordance with the Technical Criteria for the Installation Information Architecture (I3A), dated Feb non-holiday workdays Plan and manage circuit installation and maintenance services. Primary Category (PSC) Emergency Communications/Telephone s - Provide 911, E911, Gets, COP, and MWN support. Includes touch labor for this PSC. Function Government Emergency Telecommunications System (GETS) Federal Emergency Management Agency (FEMA) Issue, maintain, and/or delete Government Emergency Telecommunications (GETS), Wireless Priority (WPS), and Federal Emergency Management agency (FEMA) PIN numbers and calling cards. Submit user applications to the National Communications System (NCS). Review usage reports, monitor for potential fraud, and alert customers and officials with concerns. Issued within 1 business day of request; delete accounts on a weekly basis Review usage reports on a monthly basis Customer pays usage charges. Function /e911 Emergency Provide 911/E911 Emergency Support. This support consists of (less scheduled Repair within 2 operating and maintaining transport network infrastructure necessary to hours operate a 911/E911 Emergency Support Input government telephone Requests into the e 911 telephone company (telco) data base and assist in reconciliation of Public Safety Answering Point (PSAP) errors and military numbers provided e911 service. Request input within 1 business day Coordinate 911/e911 interface with local Emergency Action (EAC). Page 32 of 51
33 ID aseline () / Funded () Interface the e911 system including the Fire Department Telephone System, Telecommunications Device for the Deaf (TDD) support, telephone answering system, automated number and location information, and computer aided dispatch Provide local touch labor (troubleshooting, repairing, etc.) on non-holiday workdays 30 minutes; 4 hours all other times Provide 911/E911 System Support. This support consists of performing regular maintenance and updates of subscriber data in the Telephone Management System (TMS) or TMS like systems used to update 911/E911 systems necessary to operate a 911/E911 Emergency Support. 1 business day Provide Mass Warning and Notification (MWNS) Network Alerting System emergency service support. Distribute and maintain a Network Alerting System structure that will support efficient communicaiton directly between end users and the affected population as determined by installation Emergency Operations 1 business day Primary Category (PSC) Wireless Infrastructure - Provide voice and data wireless service. Includes touch labor for this PSC. Function Cellular Fund equipment and usage costs Provide access to PED, cell phone and pager service contract vehicle via ATD WASC existing NETCOM PAs. (CUSTOMER PAYS USAGE AND ASSOCIATED MAINTENANCE COSTS) Function Pager Provide internal organizational pagers and usage Provide commercial pagers and usage. Function Personal Electronic Device (PED) Wireless (including but not limited to PDAs, lackberry, and smart phones) Provide Personal Electronic Devices (PED) and service contracts. Function Communications Towers Install, maintain or provide tower modification for mission antennas on common-user towers. Page 33 of 51
34 ID aseline () / Funded () Maintain common user services communications towers and allocate space on those towers Provide local touch labor (troubleshooting, repairing, etc.) 4 hours for mission critical systems; next business day for routine systems Provide local touch labor for troubleshooting and repair of mission related tasks. Function Satellite Communications Provide satellite communications support (e.g., procurement, request for service, troubleshooting, repair, warranty) and satellite phone usage charges Provide access to a Strategic Tactical Entry Point (STEP) and Military Strategic, Tactical and Relay (MILSTAR) Provide user representative support, order keys, key instruments, and coordinate support requirements for Iridium Develop requirements, procure terminals, install equipment, and operate terminals for International Maritime Satellite (INMARSAT) Report MILSTAR/earth/tactical/ commercial/trojan/step outage. 5 min open ticket Provide local touch labor for troubleshooting and repair of mission related tasks. Function AFN s Receive, document, assign, monitor, and close service requests. Open the service request within 30 minutes Respond to events and reports Primary Category (PSC) Video Teleconference (VTC) s - Operate (schedule, facilitate) and maintain SU and SECRET common-user VTC Studio; provide interface access for VTC and secure telephone equipment; provide design and installation advice and technical support. Includes touch labor for this PSC. Function VTC Studio Page 34 of 51
35 ID aseline () / Funded () Operate and maintain sensitive but unclassified (SU) and SECRET common user VTC Studio (Schedule, facilitate, and maintain Defense Information Systems Network (DISN) Video s - Global (GVS) suite to VTC Studio). 12 hours/day x 5 days/week, operational (local 98% fully operational DVTC circuit(s) and switch(es) time) on non-holiday weekdays. Scheduling and facilitating included Report CS trunk/circuit outage. ARNG/ USAR 15 min open ticket One (1) per installation. Additional VTC(s) if requirements exceed schedule capability Report CS/NCS VTC HAZCONs. ARNG/ USAR 15 min open ticket Function VTC ridge Operate and maintain a VTC ridge (switch) to allow multiple sessions and multiple users per session for mission VTC suites Operate and maintain a VTC ridge (switch) within the common-user VTC suite to allow multiple sessions and multiple users per session Provide common user local touch labor (troubleshooting, repairing, etc.) 3 business days; 2 hours for Priority users Provide local touch labor for troubleshooting and repair of mission related tasks. Function Specific VTC Operate and maintain mission specific SU and SECRET VTC services as required when connected to the Defense Information Systems Network (DISN) or local area network. This includes VTC service in classrooms, transportable, command and control, conference room, briefing rooms, collaboration suites, and desktops. Provide design, installation advice and technical support for VTC studio suite equipment Provide local touch labor for troubleshooting and repair of mission related tasks Provide advanced connection troubleshooting and support for customer provided endpoints. Includes support for room based VTC endpoint, desktop VTC endpoint, and Multi-point Connection Unit (MCU). (Classified and Unclassified). /Cyber / IP-VTC Tools to provide scheduling and management of customer provided endpoints. Provide capability to manage and schedule customer provided VTC endpoint. Includes Scheduling and Management tools for room based VTC endpoint, desktop VTC endpoint, and Multi-point Connection Unit (MCU). (Where Available). (less scheduled downtime) Page 35 of 51
36 ID aseline () / Funded () Function Secure VTC Support Support the VTC as a managed network device on the classified network. Provide technical support and assistance in the design, acquisition, installation, and operation of the equipment to limited user population (to rigade level at PPP/PSP and installations supporting 2 or more non-tactical Command HQs). Support the SVTC capability on a highly restricted basis, in support of extremely critical collaborative efforts involving O-6 Commanders and higher personnel, either locally or as part of the interconnected collaboration event. (less scheduled 30 min response for on-site support for critical senior officer VTC 98% fully operational SVTC circuit(s) and switch(es) Primary Category (PSC) Range/Field Telephone s - Provide range/field lines and phones to range perimeter. Includes touch labor for this PSC. Function Mag Lines, Field Phone Lines, and Range Phones Install and maintain voice telephone for exercises and training events at field/training locations Install and maintain range/field lines and telephones (CONUS). (less scheduled Meet 98% Problems corrected within 1 business day Install and maintain range/field lines and telephones (OCONUS) Provide local touch labor (troubleshooting, repairing, etc.) 3 business days; 2 hours for Priority users Provide local touch labor for troubleshooting and repair of mission related tasks. Primary Category (PSC) Telecommunications Continuity of Operations Plan (COOP) and OPLAN Support s - Provide Continuity of Operations Plan (COOP) implementation operational support. Function COOP Administration Develop, implement and exercise IT Continuity Management in Exercise COOP support of installation COOP for critical portions of the automation annually infrastructure Prepare, monitor, and evaluate IT Continuity Management in Review annually support of installation COOP with supported customer activity. Function Disaster Recovery Restore critical telecommunications network infrastructure services in event Respond within 2 of disaster. hours. Page 36 of 51
37 ID aseline () / Funded () Maintain procedures to prepare for recovery of network information from Exercise disasters and execute preparatory procedures. Store weekly backups at annually offsite location for telephone data switch Develop plans to restore critical wired and wireless services in event of disaster. Function Operations Plan (OPLAN) Support Provide Telecommunications Operations planning support to OPLAN development. Identify telecommunications requirements resulting from any surge/change in on-post staffing due to force/equipment/supply flow & support requirements. Develop contingency service level agreements (SLA) to implement any increases in support upon OPLAN activation at the time it is required Develop infrastructure upgrade plans to support operational surge requirements. Accommodate projected requirements driven by projected Army Transformation initiatives Exercise or review the OPLAN with supported customer activity. Exercise or review annually Primary Category (PSC) Fire, Safety, Security, and Other Circuits - Design, install and maintain required circuits for fire and intrusion alarms and other safety/security systems. Includes touch labor for this PSC. Function Safety/Security/Other Circuits Design, install, and maintain DA or local regulation directed circuits supporting fire alarms, intrusion alarms, elevator emergency intercoms, telemetry, and other safety/security systems and monitoring/control systems (e.g., water, fuel, command destruct transmitters, read back receivers, range operations, flight termination equipment/software). (less scheduled Meet 99.9% Install within 1 working week of request. Repair, if required, within 1 business day Design, install, and maintain mission specific monitoring circuits Provide commercial subscriber lines and transport channels (e.g., Off Premise Extensions, Foreign Exchanges, Telecommuting) Design, engineer, install and maintain dedicated or common user circuits to support the operation of installation post bugle call/public address ( PA) systems, giant voice system and other special localized PA systems, all of which are operated / maintained by other activities other than the. (less scheduled Repair within 1 week Provide local touch labor (troubleshooting, repairing, etc.) on non-holiday workdays 30 minutes; 4 hours all other times Page 37 of 51
38 ID aseline () / Funded () Provide local touch labor for troubleshooting and repair of mission related tasks. Function Digital Subscriber Line (DSL) and Asynchronous Digital Subscriber Line (ADSL) Install and maintain or provide access to DSL / ADSL lines for services other than Internet access, which will be provided via NIPRNET Provide local dedicated point-to-point voice and data services Provide local touch labor for troubleshooting and repair of mission related tasks. Primary Category (PSC) Non-tactical Radios and Non-tactical/Tactical Radio Spectrum Management s - Provide Non-Tactical radio service to include spectrum management. Includes touch labor for this PSC. Function Non-Tactical Trunked Radios (NTTR) Provide narrow band digital trunk radio service. (less scheduled Meet 99.9% 95% access Maintain NTTR infrastructure and services Review/validate customer requirements for end user radio device (customer purchases device) Maintain end-user NTTR equipment (radios, peripheral devices, features). Function Non-Trunked Radios provided is coordination and support for the non-trunked and non-tactical single and multi channel radio system. This includes other single channel, multi-channel frequency dependent equipment not outlined as a radio system Provide Non-trunked radio systems support Provide Non-Trunked & Tactical Radios Provide local touch labor for troubleshooting and repair of mission related tasks. Page 38 of 51
39 ID aseline () / Funded () Function Spectrum Management Provide spectrum coordination support to each unit, organization, or activity authorized the use of frequencies in accordance with ( IAW) applicable Army Regulation (AR) 5-12 and local supplemental regulations and procedures Assign and update authorized radio frequencies or submit requests to appropriate frequency management office to support mission requirements and external agencies operating in the local spectrum. Assign authorized frequencies or submit request within 2 business days Identify installation frequency requirements. Perform annually Assist installation units in obtaining frequency assignments and clearances Within 1 week of for operations, training, and equipment acquisition. or on-call as required Provide a Frequency Spectrum Manager. scheduled exercise or within 2 hours for unscheduled activities Report, Investigate, and resolve interference caused or received by Army Per training Start 1 day of radio frequency (RF) operations. event/required daily, notification Upon request from user, verify Spectrum certification for new user equipment. Meet 100% Reliability Provide resolution within 30 days Function Military Affiliate Radio System (MARS) Provide auxiliary communications for military, civil, and/or disaster officials during periods of emergency Assist in effecting normal communications under emergency conditions Provide local touch labor for troubleshooting and repair of mission related tasks Multimedia/Visual Information Processes - Provide Multimedia/Visual Information support and services to support a diverse customer base. Primary Category (PSC) Graphic Arts s - Provide all types of Graphic Arts services. Function Graphic Self Help Page 39 of 51
40 ID aseline () / Funded () Operate a Media Self-Help Facility by providing equipment for customer use for Graphic arts s. Function Graphic Arts Support Furnish graphics art services and support to include consultation, design, estimate, and produce graphic art products, records, information, reports, and statistical data. Complete all graphic arts products in 6 business days Provide animation capabilities. Two (2) paper only copy up to 24x36 inches 98% of requests are completed Provide custom framing, lamination, mounting and matting for artwork Produce large format graphic images Provide VI displays and exhibits, i.e., fabricate 2 or 3 dimensional objects Provide recordings or copies of historical and significant events. Primary Category (PSC) Photography s - Provide all types of Photography services. Function Photography Scan negative or positive film or other flat media, up to 11x17 in size, to electronic or optical media and/or produce hardcopy prints from scans not to exceed 24x36 inches. (Includes non-still camera based imagery capture). Complete all photography products in 5 business days of the assignment date Provide digital photographic services in studio (such as Head & Shoulders, tabletop photography and passports) and field environments (such as ceremonies, on-location assignments, and special events). (Includes still camera based imagery capture) Complete all photographic products in 5 business days of the assignment date One paper only copy up to 24x36 inches per scan or one optical disc DA Photos per AR standards. Historical occasion/ significant event or ceremony - all images provided on digital media 98% of requested are completed 98% of requests are completed Page 40 of 51
41 ID aseline () / Funded () Provide large format prints, and/or lamination and mounting where required Provide large scale printing and plotting with DoD print plant facilities or Army Enterprise Multimedia s Provide recordings or copies of historical and significant events. Primary Category (PSC) Multimedia s - Provide all types of Multimedia services. Function Multimedia Produce 508 compliant non-linear, interactive multimedia products (maximum limits established locally). Local multimedia products are those that cost less than $5,000 (to include man-hours, equipment rental, admin expenses, and other operating costs), are within the garrison area of responsibility (as per AR 5-9), and incur no direct out of pocket expenses (e.g., narration services, equipment rentals or closed captioning services). Complete all multimedia products within 16 business days Produce 508 compliant non-linear, interactive multimedia products. Non-Local multimedia products are those that cost more than $5,000 (to include man-hours, equipment rental, admin expenses, and other operating costs), are distributed Army wide, and incur direct out of pocket expenses Outsource portions of multimedia productions. One copy of the Multimedia Production on requested medium such as a data DVD / CD or customer provided hard drive 98% of requested work orders completed Primary Category (PSC) VI roadcast/video/audio s - Provide Command Channel and closed circuit TV (CCTV) s; provide local and non-local audio/video productions. Function Television/roadcast s roadcast Command Channel. (less scheduled Provide closed-circuit television (CCTV) support to a defined area Provide satellite downlinks. (less scheduled Page 41 of 51
42 ID aseline () / Funded () Provide Commercial Cable Contract s to the Installation Function Video/Audio Produce audio tapes, files, and other digital media. Complete all audio products in 6 business days One (1) copy per Work Order Provide video streaming and multicast service Provide script preparation Operate and maintain a video documentation capability Produce 508 compliant products in accordance with DoDI instruction for local VI video productions. Local video products are those that are less than $5,000 (to include man-hours, equipment rental, admin expenses, and other operating costs), are within the garrison area of responsibility (as per AR 5-9), and incur no direct out of pocket expenses (e.g., narration services, equipment rentals or closed captioning services). Complete all video products within 7 business days of event date Produce 508 compliant products in accordance with DoDI instruction for non-local VI video productions. Non- Local video products are those that are greater than $5,000 (to include man-hours, equipment rental, admin expenses, and other operating costs), are distributed Army wide, and incur direct out of pocket expenses Research and acquire imagery from internal DoD archives. 10 day turn around for all work orders Two (2) copies for local productions 98% of requests are completed Research and acquire imagery from outside/commercial sources Provide the service to duplicate video tapes, CDs, and digital video discs (DVDs) up to locally established limits. (no copyrighted material) Provide recordings or copies of historical and significant events. Primary Category (PSC) VI Media/Equipment Support s - Provide various VI Media / Equipment Support s. Function Media/Equipment s Page 42 of 51
43 ID aseline () / Funded () Provide instruction and briefings in the use of VI systems and instructional technology Maintain VI library of applicable media products for loan Provide VI equipment loans. Primary Category (PSC) Presentation Support - Provide public address system / presentation support for official functions (set up, operations, and tear down). Function Presentation Support Provide basic public address system/presentation support (set up, operation, and tear down) within the area of operation of the VI facility. Not to exceed two (2) operators, one (1) appropriate sized screen with one (1) projector, and audio systems; may be satisfied with self-help loans where necessary 98% of requests are completed Provide professional public address system/ presentation support (set up, operation, and tear down). Primary Category (PSC) VI Support - Provide customers with initial POC for work requests and problem reporting; track, audit, and resolve issues; and provide feedback and close loop with customer. Function Support Receive and process work requests using automated software Provide Property ook Accountability, where applicable, for VI production equipment and equipment above $25, for user VI equipment and accession Provide dedicated VI consultations to customers where a work request is Complete not expected. consultations within 15 minutes Page 43 of 51
44 ID aseline () / Funded () Receive, document, assign, monitor, and close work requests via VIOS Provide help desk / systems management data analysis: includes help desk management tool and outputs associated to trend analysis and help desk performance Provide timely notifications by the Enterprise VI help desk of planned or unplanned system maintenance or degradation. Notifications sent no less than 24 hours prior to scheduled outage Send out customer satisfaction surveys after completion of work. Surveys sent within 3 business days of product Review and analyze customer satisfaction surveys and initiate follow-up and corrective action. Follow-up with corrective action within 2 business days Provide quotes to customers for work requests Information Assurance - Provide necessary infrastructure and management services to protect information and information systems from unauthorized access and to protect the data within systems. Primary Category (PSC) DoD Public Key Infrastructure (PKI) - Provide support for the Department of Defense (DoD) Public Key Infrastructure (PKI) service. Function DoD Public Key Infrastructure (PKI) Provide DoD PKI s including directory support, certification validation, registration, interface to related Army systems, hosting of PKI-enabled servers, and required key management services as well as PKI solutions for , web applications, file transfer, and Virtual Private Networks. / Cyber / (less scheduled Meet 99.9% Provide PKI authentication for users devices (e.g. alternate Smat cards or tokens), and applications to discover and utilize global information services data and enable CAC Cryptographic Logon (CCL), (when applicable), for controlling logical access. / Cyber / (less scheduled Meet 99.9% Provide technical support Responsible for requesting, receiving, installation, and accountability of system PKI certificates. Page 44 of 51
45 ID aseline () / Funded () Administer registration of all Army-owned PKI protected devices. Critical: Priority 1 = Immediate response (); Urgent: Priority 2 = (4 hrs); Routine: Priority 3 = (24 hrs) Priority 4 = (3 days) Priority 5 = (3 days) Primary Category (PSC) Communications Security (COMSEC) - Provide all aspects of communications security (COMSEC) support. Function COMSEC Operations Provide for the accountability of COMSEC keying material up to the level of TOP SECRET for -managed equipment and units classified as tenant, mobilizing, or detached from parent unit without organic COMSEC account support. Units with suspended or terminated COMSEC accounts are not authorized this service as baseline. Responsibility includes ordering, receiving, accounting, issuing, safeguarding, and keying material in support of COMSEC equipment or Controlled Cryptographic Items (CCI). or on-call as required 99.9% fully operational 100% accountability of all COMSEC equipment and materials; semi-annual 100% inventory of COMSEC equipment and materials Operate and maintain COMSEC facility. Does not include storage of 99.9% fully organizational/customer Controlled Cryptographic Item (CCI) assets. operational or on-call as required Operate and maintain managed secure communications devices residing in controlled communication closets/facilities that supports managed infrastructure (this includes the property book accountability of equipment up to Top Secret) (Unit will laterally transfer COMSEC items to the for asset control). COMSEC EQUIPMENT UNDER MISSION PARTNER ACCOUNTAILITY AND CONTROL WILL NOT E THE RESPONSIILITY OF THE. or on-call as required 100% accountability of all managed COMSEC equipment; semi-annual 100% inventory of managed COMSEC equipment Perform local element compliance inspections for all hand receipt holders receiving support from the COMSEC account as required by AR and Technical ulletin (T) Coordinate and publish inspection schedules in accordance with AR , T , and COMSEC standard operating procedures. or on-call as required 99.9% fully operational Conduct annual inspections of units Ensure all reporting suspenses are met for both Controlled Cryptographic Item (CCI) and COMSEC incidents. (Initial reports are required within hours, depending on the type of incident). or on-call as required Report CCI and COMSEC violations within 24 hours of incident Report COMSEC resource requirements to the s higher headquarters. Page 45 of 51
46 ID aseline () / Funded () Store, account, control & destroy all TOP SECRET COMSEC keying material for tenant organizations, mobilizing units, and units in training (Component 2 and 3) in the absence of Division or Corps COMSEC accounts. Tenant organizations provide their own storage facility for COMSEC hardware devices & TOP SECRET material. & on call as required 99.9% fully operational Primary Category (PSC) Risk Management/Accreditation/Certification Policy s - Provide Risk Management Framework (R) and Automated Information System Accreditation support. Function Vulnerability Assessment Provide Security Risk Assessment support IAW AR 25-2, para 7-1; perform risk analysis of resources, controls, vulnerabilities, threats and the impact of losing systems' capabilities on the mission objective; facilitate decisions to implement security countermeasures or mitigate risk; implement countermeasures; periodically review program Recognize possible threats & review evaluations for compliance and / Cyber / non-compliance Provide updated vulnerability risk assessment criteria with input from U.S. /Cyber / CYERCOM and coordination with other DoD Agencies. /ACOIC Provide analysis and reports to known or potential LWN vulnerability risks. Cyber /ACOIC Assess the effectiveness of countermeasures based on the information ACOIC gathered from the data collection activity. Function Risk Management Framework (R) Manage the R process in accordance with AR Provide guidance and review of R accreditation for all installation activities. Respond to customer requests for guidance within 2 business days Facilitate the Certificate of Networthiness (CoN) process in accordance with AR Provide guidance and review of CoN requests for all installation activities. Primary Category (PSC) Network Security s - Plan, implement and manage a Defense in Depth for the total / DOIM-managed network and/or enclaves. Provide Information Assurance Vulnerability Alert (IAVA) compliance and compliance monitoring of all network connected assets. Function Defense In Depth for the Total Network Page 46 of 51
47 ID aseline () / Funded () Plan, implement, and manage a Defense In Depth for the total network and/or enclaves within the network to include such items as: scanning, remediation, host and network intrusion detection/prevention, firewalls, proxy servers, web cache, virus programs, vulnerability scanning, content filtering, remote dial-in protection, Host ased Security s, Directory s, and Risk Management Framework (R), DoD Instruction , accreditation guidance and advice IAW AR 25-2 and IA est usiness Practices (P's). / Cyber / Detect and report malicious /unauthorized activity up the CERT chain (local CERT to JTF) within 2 hours of detection Provide input into the installation Information Security (INFOSEC) Program and provide guidance (e.g., Information System Security Plan). Respond to customer requests for guidance within 2 business days Meet 99.9% Perform vulnerability scan weekly or more often as required Procure, install, administer, monitor, and report software solutions to track Internet access from government devices. lock customer access to those Internet sites that have been deemed inappropriate for use by a government owned and operated computer system. / Cyber / (less scheduled Meet 99.9% Conduct Mobile Scanning (war driving) for Unauthorized Wireless intrusion/access points Plan, respond, investigate, and report undisclosed classified incident remediation. / Cyber / Detect and report malicious /unauthorized activity up the CERT chain (local CERT to JTF) within 2 hours of detection Design, engineer, install, configure, maintain, operate and repair Wireless Intrusion Detection Sensors (WIDS) access points as part of the wireless infrastructure on the installation. (Does not include equipment procurement) Report IA resource requirements to the higher headquarters Filtering of Internet traffic inbound and outbound occurs at the enterprise / Cyber / Meet 98% level at layers 1 (externally originated) and 2 (internally originated) using a combination HW/SW solution Provide information about managed systems that may be compromised Provide success or failure information and reports about signature updates and last-run status Establish procedures for dissemination of network defense and related / Cyber / Generate TTPs advisories, alerts, and warning notices, including those originating out Army and SOPs and DoD to all customers. Page 47 of 51
48 ID aseline () / Funded () Provide reporting of dissemination to ACOIC of network defense and related advisories, alerts, and warning notices, including those originating from Army and DoD to all theater customers Provide input to Army network enterprise security initiatives. ACOIC Aggregate IA sensor data collected from the theater and functional Cyber ACOIC s Coordinate LWN-wide management of vulnerability risks and ACOIC implementation of damage control and mitigation strategies Review and analyze network events and develop solutions and strategies to ensure survivability of Army networks against attacks aimed at disrupting /Cyber /ACOIC / services, gaining unauthorized access or violating the integrity of Army Information systems. Function Installation Network Security DMZ Provide an installation network security DMZ to protect installation assets, to include life cycle management of Information Assurance enclave devices and other equipment that is under full control of the / DOIM/ Cyber. / Cyber / (less scheduled Meet 99.9% Maintain firewall configurations and alerts; monitor attacks; and review audit logs. / Cyber / (less scheduled Detect and report malicious /unauthorized activity up the CERT chain (local CERT to JTF) within 2 hours of detection Review audit logs daily; report anomalies to the CERT Ensure that all connections with entities outside the Army pass through / Cyber / forward and reverse application level proxies at the DMZ perimeter Support the overall Army IA architecture by ensuring that publicly / Cyber / accessible information is provided through proxy services and confined to public DMZs at the TLA Provide security that ensures enclave boundaries are protected by layered / Cyber / defenses including firewalls, NIDS/NIPS, and HIDS/HIPS. Function Information Assurance Vulnerability Alert (IAVA) Manage the IAVM program for all installation and customer activities. / Cyber / Page 48 of 51
49 ID aseline () / Funded () Institute procedures for anti-virus system maintenance, virus detection/prevention, contact received from the Regional Computer Emergency Team (RCERT), incoming RCERT advisories or patches, and locally owned RealSecure detection. / Cyber / Perform network or workstation scans and compile vulnerability reports to facilitate corrections. / Cyber / Vulnerability reports forwarded up the CERT chain as detected Perform Network and workstation scans weekly or more often as required Support the monitoring/reporting program IAW AR Plan, detect, respond, investigate, and report malicious and unauthorized activities. / Cyber / (less scheduled Detect and report malicious /unauthorized activity up the CERT chain (local CERT to JTF) within 2 hours of detection Gather relevant security event information (e.g., intrusions) from monitored Cyber managed network devices, such as network guards and firewall systems that ensure emission security, communications security, computer security, and information security. 98% Provide patches for each authorized PC baseline and server as required / Cyber / Compliance checks upon entry to the network. / Cyber / Include analyzing event and time-based scans. If systems are found to be / Cyber / non-compliant, IA incidents are reported to include registry hacks Issue IAVM messages and reports: Information Assurance Vulnerability Alerts (IAVA), Information Assurance Vulnerability ulletin (IAV), Information Assurance Technical Tips (IATT), and Situational Awareness Reports (SAR). ACOIC Manage the Army Knowledge Online (AKO) IAVM community group. ACOIC Conduct research analysis to assess known or potential threats to all /Cyber / computer systems and network assets. /ACOIC Page 49 of 51
50 ID aseline () / Funded () Review and analyze intelligence products and provide operational ACOIC assessment Report IAVM compliance in the required database/ systems. / Cyber / Review all IAVM Plan of Action and Milestones (POA&M) for feasibility and ACOIC suitability Manage compliance reporting to ensure that IAVM messages are acknowledged, corrective action implemented, extensions requested, compliance verified and reporting data entered into required database/system. /Cyber /ACOIC / Develop Mitigation Action Plan (MAP) and IAVM Plan of Action and / Cyber / Milestones (POA&M). Function IA Inspection Program Perform IA oversight and inspections of IA Program. Function Password Control Management Issue, maintain, and delete network accounts and passwords. Issue accounts within 3 business days of request; delete accounts on weekly basis Administer levels of network access per customer and per group. / Cyber / Control network access by ACLs. / Cyber / Function Information Assurance Policy Establish, publish, and execute the installation program IAW AR 380-5, AR 25-2, and other appropriate DoD/Army guidance, to include publishing a security awareness policy and Local Network Security Policy and providing other guidance Provide a secure remote access policy for the Installation's network IAW Army, Army Command, & Local Network Security Policy parameters. Access policy will include limited levels of confidentiality, accreditation, access control, and assessments. / Cyber / Provide IA representation in the installation Configuration Control oard (CC). Page 50 of 51
51 ID aseline () / Funded () Manage IA hardware and software changes for the installation Ensure compliance with operating and security policy. / Cyber / Develop technical guidance and Courses of Action to mitigate current and /Cyber / future threats. /ACOIC Develop and publish electronic messaging security guidance in conjunction with the Local Network Security Guidance. Function Host-ased Security System Provide HIPS management and updates for enterprise managed assets 98% and workstations Provide host-based firewall management for enterprise-managed assets 98% and workstations Provide success or failure information and reports about HIPS, AV, and 98% other agents deployed and managed. Function Compliance Monitoring and Enforcement Determine abnormalities, attacks, damages, and unauthorized modifications in the network via mechanisms such as intrusion detection devices. / Cyber / 98% Review logs daily and determine appropriate action Conduct security reviews and vulnerability assessments of subordinate ACOIC units for compliance with IAVM policies and messages Issue IAVM non-compliance letters/notices. / Cyber / Coordinate the review of alternate security request, based on Mitigation ACOIC Action Plan (MAP) and Plan of Action and Milestones (POA&M) before approval by the appropriate Designated Approving Authority. Page 51 of 51
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
APPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator
MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator Job Number: 07229P Date Finalized: 7/14/11 Service Department: Information Accountable To: Director, Information
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
MCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Implementation Guide. Simplify, Save, Scale VoIP: The Next Generation Phone Service. A single source for quality voice and data services.
Implementation Guide Simplify, Save, Scale VoIP: The Next Generation Phone Service A single source for quality voice and data services. > > > > > > > > > > All signs point to VoIP so letês get started.
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 2 May 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #16-051
המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Managed ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN - 33 051 775 556
Possibilities that are built in www.telstra.com.au/networkcomputing Managed ICT Services User Guide Corporation Limited ABN - 33 051 775 556 Table of Contents 1. What does this User Guide do?... 3 2. Responsibilities...
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Job Description Information Services Coordinator
Job Description Position Title: Information Services Coordinator Department: Reports To: Technology & Infrastructure Manager Purpose The Information Services Coordinators role is to ensure the stability,
Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0)
Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Prepared by: State of Indiana Indiana Office of Technology Delivery Services Prepared for: State of
Network Technology (10101)
Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use
A Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Core Data Service 2015 IT Domain Definition Change Overview
Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning
Get what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement
January 2015 Brennan Voice and Data Pty Ltd Service Level Agreement 1. Introduction This document describes the service level commitment to Brennan Voice and Data Clients in relation to the following services
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
IT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
OWG 60 IT Backend Systems Approved Recommendations
OWG 60 IT Backend Systems Approved Recommendations 1. Recommends working with OWG 62 on developing a comprehensive inventory tracking process for the new institution inventory and record all assets purchased
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
n2grate Open Positions March 2015
n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013
1. Provide hardware/software installation, updates, configuration, troubleshooting and resolution.
When replying to this job posting please: Send your resume to [email protected] Subject Line: Response to 6252012PCT No phone calls at this time please Title: PC Technician Start Date: October 1, 2012
CLASS SPECIFICATION Systems Support Analyst II
San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210
CHARTER BUSINESS FIBER INTERNET Interactive welcome kit 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET 2 Turn your contacts on to affordable, powerful solutions from
Network Documentation Checklist
Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation
DISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Managed Information Technology Services For the Town of Moraga
Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative
Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month
SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
One Hope United Help Desk Service Level Agreement. Help Desk Mission... 1. Scope... 1. Availability of Services... 1. Phone Response...
One Hope United Help Desk Service Level Agreement Table of Contents Help Desk Mission... 1 Scope... 1 Availability of Services... 1 Phone Response... 2 Service Level Response (SLR)... 3 Escalation of Tickets...
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Enterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012 Program Description Network Services is a service unit in Information Technology Services responsible for designing, acquiring, deploying, operating,
