GOALS. Server Management Program Review / Training. To Review SMP structure, requirements, logistics. To increase quality and benefit of documentation
|
|
- Ronald Randall
- 8 years ago
- Views:
Transcription
1 Server Management Program Review / Training GOALS To Review SMP structure, requirements, logistics To increase quality and benefit of documentation Provide/review examples and upgraded templates Unit IT Managers are accountable for comprehensive application of SMP within the unit
2 SMP: Document Repository & Update Cycles SMP Portal is where all required documents are to be stored Updates for annual documents are due by Oct 31 st Monthly, Quarterly documents are due at end of each cycle Will be assumed content is always here and up to date
3 SMP: Document Naming Conventions Templates provided in Template Zip Do not change names Examples: AccountManagementLog.docx DisasterRecoveryPlan.docx Use Portal Checkout and Check-in Functionality (Demo) Up to 4 years of past documentation will be maintained for state record retention and audit requirements
4 SMP: Documentation Grouping Many units manage groups of servers with the same process and tools. For systems that are managed this way one document (e.g. Disaster Recovery) can be created to cover all servers with the same procedures Document should clearly list the DNS name for all the individual servers that the document applies to.
5 SMP: Procedures & Logs SMP consists of both Procedure documents and Logs Procedures should be written with enough detail to accommodate someone else performing the process (see examples) Logs should at a minimum identify who, when, what was performed and the associated server(s) Procedures require scheduled annual reviews to maintain familiarity and verify process viability with noted changes formally documented immediately
6 SMP: What Requires Documentation? The system will be SERVING a function to PUBLIC (i.e. web server, file server, video server, workstation with LAMP etc.) It is running a known server operating system (may require review of build/version edition information to determine) System is SERVING a function to INTERNAL user base (i.e. web server, file server, video server, etc.) Not a server but may still need account and patch management, firmware updates, etc. (i.e. NAS)
7 SMP: SERVER/DOCUMENT INDEX Each Unit should maintain updated Server/Document Index SERVER- INDEX.xlsx (see required template) Template facilitates SMP, MRT, ISAAC and System Audit Needs List Servers, Classify Server, fill in remaining detail Updates should be made immediately with any change in server consistency
8 SMP: Backup Procedure Documentation Goal : Protect specified data in a scheduled manner enabling quick and efficient restoration Procedures should identify all backup solutions, the associated hardware/software, data that is backed up, specific steps to setup the backup process and to recover the data Backups should be tested monthly and the recovery process tested annually with testing dates and results noted in log (DisasterRecoveryBackuplog.docx) Documented process of backup, recovery and testing procedures required (DisasterRecoveryPlan.docx)
9 SMP: Disaster Recovery Documentation Goal : Minimize negative operational impacts by identifying critical systems, prioritize their recovery, define steps to reconfigure and recover these systems to normal operation Procedures should include procuring replacement parts, access to necessary media and backups, steps for restoring/restarting systems and checking system/application functions Procedures should be tested annually with testing dates and results noted in log (DisasterRecoveryBackuplog.docx) Documented process of recovery and testing procedures required (DisasterRecovery.docx)
10 SMP: Account Management Documentation Only required for non-agnet Servers Must have documented Account Management Procedure including steps for account creation, change and removal (Example) Account Management template specifies minimum tracking information (AccountManagementLog.docx) necessary to log both creation and removal of accounts Reviews should occur to identify inactive (90 days) or former employee accounts potentially missed during off boarding Reviews are to be logged with changes noted per the account management log
11 SMP: Security Monitoring Goal : Review logs, etc. to identify unusual events that may indicate malicious activity Procedure should include steps for reviewing Failed login attempts Login attempts from foreign countries for legitimate accounts associated with faculty/staff not traveling overseas High resource consumption of disk space or high system processor utilization Large number of failed job executions Reviews should occur weekly for mission critical systems, monthly for non-mission critical systems with each review and its results logged (SecurityMonitorLog.docx) Documented review process required
12 SMP: Physical Security Goal : Monitor physical access to servers and network equipment Procedure should include steps for obtaining access to server room and whether escorted access is required If not using a key card swipe system must have a log sheet in room (PhysicalSecurityAccessLog.docx) List of those provided room access via cards/keys must be reviewed and renewal required at least once a year Documented process for obtaining access required (PhysicalSecurityAccessProcedure.docx)
13 SMP: Change Management Goal : Establish standardized, efficient methods for managing change Procedure should establish regimented steps for change requests spanning from the initial inquiry to notification of completion Changes must be logged (ChangeManagementLog.docx) when any of the following occurs on a server: Configuration change in hardware or software Relocation of a server Network configuration change Software installation, removal or reaffirmation (reaffirm need for software annually) Patch/updates applied to server if not using AGNET WSUS or Red Hat Subscription services
14 SMP: Confidential Information Identity Finder now available at no cost from sell.tamu.edu Scan should be performed annually at a minimum Each scan should be logged with findings and remediation steps noted (ConfidentialInfoScanLog.docx) Any violations must be logged and reported to AIT ISO immediately Servers persisting confidential information must be authorized by the ISO and TAMU System ISO, per System policy, prior to the storage commencing Identity Finder Installation available via AGNET domain on a scheduled basis
15 SMP: ISAAC Risk Assessment Process ISAAC REPORTS should cover ALL SERVERS and ALL WORKSTATIONS within your unit, no matter where they are located, funding source or owner. Unit IT Manager is accountable for comprehensive ISAAC assessment for unit. All units will be required to send completed reports to AIT for QA review 2 WEEKS PRIOR TO UNIVERSITY DEADLINE Any remediation resulting from ISAAC will be coordinated through the AgriLife ISO Starts September 1 and ends November 22 Due to AIT on NOVEMBER 8 th 2013
16 SMP: Patch Management Business owner or administrator, representing each server, must attend the monthly Information Systems Security meeting Critical patches/updates must be applied as identified Operating system and application software patches/updates must be applied and confirmed on a monthly basis Patch/update installation must be logged in the Change Management log (ChangeManagementLog.docx) for servers not using AGNET WSUS or Red Hat subscription services
17 SMP: Vulnerability Scanning and Remediation Goal : Perform scan on all systems to detect and remediate vulnerabilities Systems monitored by AIT Nessus scanner are provided with monthly report via Campus systems not reachable by AIT Nessus scanner can either utilize the CIS Nessus scanner or if no active scanning being performed a documented Risk Assessment Review report must be created Vulnerabilities should be reviewed, remediation scheduled and results logged (VulnerabilityScanLog.docx) Generally less than 30 days For more high/critical ASAP timeframe Accountabilities of Unit IT Manager Facilitator for entire unit even if not managing a server Must assist or source solutions to resolve vulnerabilities of all unit servers Alternatively, recommend to unit head alternative solution/resource Prepare for increasing scrutiny and potential shutdown actions
18 Workstation Management: WSUS Windows Server Update Service (WSUS) available to all departments and centers with update policy selected by adding computer to a group Three policy setting options available via groups Default: automatic patch download, install and reboot WSUS-NoReboot: automatic patch download, install with manual reboot WSUS-Servers: automatic patch download, manual install and reboot Note: Do not rename, delete or remove any of the groups Note: If computer is renamed it must be re-added to the appropriate group (other than default group)
19 Workstation Management: WSUS Default for all policies Computer checks for updates 3 am nightly If computer is not powered on at 3 am service will attempt updates 2-3 hours after the system is powered on - Under these circumstances options 1 & 2 automatically install updates after download and then prompt for reboot on hourly basis. User has option to defer reboot. Automated Report ed third Tuesday of each month Provides patch status for computers that have checked in within the last 30 days and that have outstanding patches
20 Workstation Management: WSUS Report entries include computer name,.. Security bulletin (SB) is a notice, sent upon release, detailing the release date, issue(s) addressed, actions to take, software impacted, etc. (Example: MS indicates release in 2013, 47 indicates sequence number of patch) Knowledge Base (KB) is same content as security bulletin but filed in MS system for reference and may have additions over time to reflect new data, etc. (Either SB or KB may be Googled to view the specific details) Severity rating indicates the impact of vulnerabilities addressed by patch Status indicates progress of patch install for system
21 Workstation Management: WSUS Severity Ratings Critical Vulnerability whose exploitation could allow code execution without user interaction. (apply immediately) Important Vulnerability that could result in compromise of confidentiality, integrity or availability of user data or processing resource. (apply asap) Moderate Vulnerability whose impact is mitigated significantly by factors such as authentication requirements, etc. (apply time dependent on factors impacted) Low Vulnerability s impact mitigated by characteristics of affected component Unspecified Vulnerability does not have a severity rating
22 Workstation Management: WSUS Status Not Installed An attempt to install the patch has not been made at time of report generation. Downloaded Update downloaded and is sitting on system waiting to be installed Installed Pending Reboot Update downloaded, installed and requires reboot to complete the installation Failed Update downloaded and an attempt made to install but install failed
23 Workstation Management Local Account Report Monthly Automated Delivery for AGNET Domain Systems IT Managers should review Remediate any extraneous, guest or unused accounts
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
More informationTEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGILIFE SEVE MANAGEMENT POGAM Policy Compliancy Checklist July2012 The server management responsibilities described within are required to be performed per University, Agency or State policy. Each
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationREDCENTRIC MANAGED SERVER SERVICE DEFINITION
REDCENTRIC MANAGED SERVER SERVICE DEFINITION SD062 V1.4 Issue Date 01 July 2014 1) OVERVIEW The Managed Server service (MSS) provides access to Redcentric s 24x7 support capability, technical skills and
More informationServer Security Checklist (2009 Standard)
Server Security Checklist (2009 Standard) Server identification and location: Completed by (please print): Date: Signature: Manager s signature: Next scheduled review date: Date: Secure Network and Physical
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationensure compliance with applicable statutes, regulations, and rules regarding data retention and management;
Texas A&M AgriLife Extension Service Procedures 29.01.99.X0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT
More informationICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
More informationSecurity Standard: Servers, Server-based Applications and Databases
Security Standard: Servers, Server-based Applications and Databases Scope This standard applies to all servers (including production, training, test, and development servers) and the operating system,
More informationExecutive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationDepartment of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
More informationISAAC Risk Assessment Training
ISAAC Risk Assessment Training v2013 Information Technology Risk Management 1 Agenda Why Assess? Information Security Standards Risk Assessment Process Using ISAAC Information Technology Risk Management
More informationInformation Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
More informationService Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
More informationHP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
More informationCollege of Agriculture and Life Sciences Guidelines
College of Agriculture and Life Sciences Guidelines ENTERPRISE FILE SERVICE Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 GUIDELINE STATEMENT This guideline
More informationMS-10751: Configuring and Deploying a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery
MS-10751: Configuring and Deploying a Private Cloud with System Center 2012 This course teaches students how to design, install and configure a private cloud, including how to configure and deploy the
More informationFully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationAgriLife Information Technology IT General Session January 2010
AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
More informationInformation Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
More informationSECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
More informationPatch Management. Module 13. 2012 VMware Inc. All rights reserved
Patch Management Module 13 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring and Managing
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationPREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
More informationNorth American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationTier3 Remote Monitoring System. Peace of Mind for Less Than a Cup of Coffee a Day
Tier3 Remote Monitoring System Peace of Mind for Less Than a Cup of Coffee a Day What if You Could Turn Traditional IT Support On Its Head? Know about problems before they cause costly outages Become proactive
More informationSystem Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
More informationNetwork Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
More information2012 Risk Assessment Workshop
2012 Risk Assessment Workshop Agenda Risk Assessment Strategy for Texas State Device Registration Application Risk Assessment using ISAAC Review Server Management responsibilities 1 Risk Assessment Strategy
More informationSAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015
SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015 FORWARD This document describes the installation procedure of SAS3 billing system on x86 64 bit host or virtual machine. The manual covers the installation and
More informationKeepVault Online Backup Quick Start Guide & User Manual
KeepVault Online Backup Quick Start Guide & User Manual Contents KeepVault Online Backup Quick Start Guide... 1 System Requirements, Installation & Startup...1 The Benefits of Online Backup & Local Backup...1
More informationTenable Network Security Support Portal. January 12, 2015 (Revision 14)
Tenable Network Security Support Portal January 12, 2015 (Revision 14) Table of Contents Introduction... 3 Activate Tenable Support Portal... 3 Locate Your Customer ID... 6 Manage Your Activation Codes...
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationOhio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
More informationCompleted. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
More informationNessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationThe first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
More informationInformation and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
More informationPatch Management Table of Contents:
Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever
More informationSAAS MADE EASY: SERVICE LEVEL AGREEMENT
SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationINFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationExhibit to Data Center Services Multisourcing Service Integrator Master Services Agreement
Exhibit to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department of
More informationGuide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
More informationM6430a Planning and Administering Windows Server 2008 Servers
M6430a Planning and Administering Windows Server Servers Course 6430A: Five days; Instructor-Led Introduction This five-day instructor-led course provides students with the knowledge and skills to implement,
More informationHP RDX Continuous Data Protection Software Quickstart Guide
HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationCourse 10751A: Configuring and Deploying a Private Cloud with System Center 2012
Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 OVERVIEW About this Course This course describes private cloud configuration and deployment with Microsoft System Center
More information15 Oct 2014. Technology Strategies for Small Business
15 Oct 2014 Technology Strategies for Small Business Chris Coleman Area9 Director Technology 30+ years working in IT 15+ years in 2 of my own small businesses Area9 7 years old with ~50 staff Professional
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationWolfTech Active Directory: SCCM 101
WolfTech Active Directory: SCCM 101 July 28th, 2011 2-5pm Daniels 201 August 5th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu/ What we are going to cover... The Console The Client Concepts Inventory
More informationLumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide
Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan
More informationWhite Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
More informationImplementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
More informationShutting down / Rebooting Small Business Server 2003 Version 1.00
Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases
More informationUNIT / CENTER XXX Disaster Recovery Plan
UNIT / CENTER XXX Disaster Recovery Plan Last Revision: Date Version: x.xx Prepared, Reviewed and Approved by: Unit IT Manager Name Unit IT Manager Title Reviewed and Approved by: Name of Unit Head Unit
More informationYour entire database (MySQL) All of your applications All of your images All of your configuration files All of your installation files
Your entire database (MySQL) All of your applications All of your images All of your configuration files All of your installation files All typically reside on your server. EDI Directory Structure EDI_Software
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationOCCS Procedure. Vulnerability Scanning and Management Procedure Reference Number: 9.4.2 Last updated: September 6, 2011
OCCS Procedure Title: Vulnerability Scanning and Management Procedure Reference Number: 9.4.2 Last updated: September 6, 2011 Purpose The purpose of this procedure is to define the management and controls
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationTechnical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
More informationUnitrends, Inc. Software and Hardware Support Handbook
1 Unitrends, Inc. Software and Hardware Support Handbook Overview This Customer Support Handbook details support services, contact information and best practices for contacting Unitrends Support to ensure
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationProviding Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationConfiguring and Deploying a Private Cloud with System Center 2012
Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This course describes private cloud configuration
More informationState of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
More informationData Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
More informationConfiguring and Deploying a Private Cloud
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Configuring and Deploying a Private Cloud Course: MS20247D
More informationPatch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
More informationAHS Flaw Remediation Standard
AGENCY OF HUMAN SERVICES AHS Flaw Remediation Standard Jack Green 10/14/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationCSUSB Vulnerability Management Guidelines CSUSB, Information Security & Emerging Technologies Office
CSUSB Vulnerability Management Guidelines CSUSB, Information Security & Emerging Technologies Office Last Revised: 09/17/2015 Final REVISION CONTROL Document Title: Author: CSUSB Vulnerability Management
More informationConfiguring and Deploying a Private Cloud with System Center 2012 MOC 10751
Configuring and Deploying a Private Cloud with System Center 2012 MOC 10751 Course Outline Module 1: Planning for the Private Cloud This module describes the core components of a private cloud and the
More informationHow To Use Qqsguard At The University Of Minneapolis
Qualys is a vulnerability scanner that is used for critical servers and servers subject to compliance reporting. This scanner is not generally to be used for desktop or laptop scanning. OIT has purchased
More informationIT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
More informationCSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
More informationHow To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
More informationHow To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
More informationOlav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
More informationTailored Technologies LLC
685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations
More informationWHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.
WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
More informationTECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS IT Services Service Level Agreement:LRC
More informationUpgrading Cisco UCS Central
This chapter includes the following sections: to Release 1.3, page 1 to Release 1.3 You can upgrade Cisco UCS Central release 1.1(2a) or 1.2 to 1.3 in either standalone or cluster mode. If you are already
More informationConfiguring and Managing Microsoft System Center Essentials 2010
Configuring and Managing Microsoft System Center Essentials 2010 50373: Configuring and Managing Microsoft System Center Essentials 2010 (2 Days) About this Course This two-day instructor-led course provides
More information