IT Operations Operator and Fault Logs



Similar documents
IT Operations User Access Management Policies

IT Operations Monitoring System Access and Use

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

Shutting down / Rebooting Small Business Server 2003 Version 1.00

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

Your IT Helpdesk and On-Site and Remote Support Terms and Conditions. Document Revision 1 Sept 09

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

LT Auditor+ for Windows

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

Golden Jubilee National Hospital NHS National Waiting Times Centre

Office of Information Technology Hosted Services Service Level Agreement FY2009

Company Name IT Support

Sample of Hardware Equipment Acceptance Form

Remote Access: Internet Explorer

Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

VERITAS Backup Exec TM 10.0 for Windows Servers

NEXT. Tools of the Participant Portal: Scientific Reports & Deliverables

INCIDENT MANAGEMENT SCHEDULE

HP ProLiant Cluster for MSA1000 for Small Business Hardware Cabling Scheme Introduction Software and Hardware Requirements...

The FlexiSchools Online Order Management (FOOM) Installation Guide

Service Level Agreement

To provide an effective, professional and customer focussed ICT Service Desk service to the customers of the Council, NHS and all Hoople customers.

CLASS SPECIFICATION Systems Support Analyst II

3.2 Program Management (L ; C.7; G.1.3)

HP ProLiant ML150 System Monitor User Guide

HP Online ROM Flash. User Guide

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

To get started, you will need the following items Product Key Router with firewall capability Network cables

801.11n Wireless Broadband Router

Cloud Computing. Thin Client

Virtual Desktop Frequently Asked Questions (FAQs)

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

System Administration and Server Management Service Level Agreement (SLA)

LHRIC Network Support - Additional Service Features

Roles & Responsibilities for NHAIS (Exeter) System Key Users

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration

Procurement of Hosted Exchange Services by Commissionerate of Municipal Administration, Chennai

Deploying Windows Streaming Media Servers NLB Cluster and metasan


Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

[name of project] Service Level Agreement

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS

The Citrix service is now available to faculty and staff at Cypress College.

NETWRIX IDENTITY MANAGEMENT SUITE

Moving the TRITON Reporting Databases

How to Use Remote Access Using Internet Explorer

Net Protector Admin Console

Symantec Backup Exec 2010 R2. Quick Installation Guide

Auxilion Service Desk as a Service. Service Desk as a Service. Date January Commercial in Confidence Auxilion 2015 Page 1

QUICK START GUIDE MONDOPAD/WIN

1.1 SERVICE DESCRIPTION

IBM FileNet Image Services

Standard: Event Monitoring

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0

S1200 Technical Support Service Overview

IT Support for London

Part No. P Multimedia Call Center. Set Up and Operation Guide

Complete Managed Services. Proposal for managed services for the City of Tontitown

HP ProLiant Support Pack and Deployment Utilities User Guide. June 2003 (Ninth Edition) Part Number

Migration Strategies and Tools for the HP Print Server Appliance

QuickSpecs. Models. HP UPS Management Module. HP UPS Management Module. Overview

[Area] Technology Managing Agent Contractor Contract. Service Information. Annex SI 27 Regional Control Centre Technical Support Service

HIPAA Privacy and Security Risk Assessment and Action Planning

Installation Notes for Outpost Network Security (ONS) version 3.2

ESM s management across multi-platforms eliminates the need for various account managers.

IT OUTSOURCING SECURITY

Sentry Bulldog Shutdown Management Software (For UNIX Series)

ICT SUPPORT SERVICES

Directory-enabled Lights-Out Management

Meditech 5.6. Re R mot o e A ccess Tra r i a ning No N vemb m er r Page 1

VMware vsphere 5 Quick Start Guide

Managed Security Services SLA Document. Response and Resolution Times

Statement of Service Enterprise Services - AID Microsoft IIS

Storage Guardian Remote Backup Restore and Archive Services

[Type text] SERVICE CATALOGUE

USM IT Security Council Guide for Security Event Logging. Version 1.1

Configuring and Monitoring Database Servers

Transcription:

1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:- <Name> Approved by:- <Name> Authorised by:- <Name> Network/Systems Supervisor Information Security Officer Director of Finance & IT 2. Change History Version Date Reason Draft 1.0 First draft for comments Version 1.0 First Version Page 1 of 10

3. Contents 1. Approval and Authorisation... 1 2. Change History... 1 3. Contents... 2 4. Definitions Used in this Report... 3 5. Document Referred... 3 6.... 4 7. Maintenance of Logs... 5 8 Audit of Logs....5 9. Staff Involved... 6 10. System Startup/Shutdown Procedures... 6 11. Use of Systems Utilities... 8 12. Log bb1905...9 13. Report HlpdRpt... 10 Page 2 of 10

4. Definitions in this report Trust XXXXX NHS Trust BILLY Name of the Trust Network System First Line Support First level (Initial) user support Second Line support Second level technical support Third Line Support Specialist maintenance support RAC Remote Access Control SLA Service Level Agreement MS NT Microsoft Operating system Netware Novel network operating system 5. Documents Referred ISMS/HLP/001 ISMS/ACU/001 ISMS/ACU/001 Helpdesk Procedures Monitoring System Access and Use - Section 16 Monitoring Fault Logs Monitoring System Access and Use - Appendix 1- Details of Site 1 servers Page 3 of 10

6. staff are responsible for resolving faults related to the Trust network services on two levels; first line and second line support. Third line support and maintenance are carried out by the third party contracts. Operator Logs on the third party support are kept with contractors with a unique reference number assigned to a specific fault/task. will check third party Operator Logs periodically. Logs are sent to the when they are requested for random check. 6.1 External Operators At present third level support are provided by the following companies: British Telecom for voice and data communication. Logs are recorded by email and fax. reference number xxxxxxxxx XXX for network and data cabling. Logs are recorded on hard copies. Reference number XXXXXXXXXX BTN for Secure server maintenance. Logs are recorded on hard copies. Reference number XXXXXXXXXX UUNET for provision of the Internet service pack. Logs are recorded with the UUNet helpdesk. Reference number XXXXXXXXXX XXXXX - for out of warranty maintenance of PCs/Laptops. Logs are recorded on hard copies. Reference number XXXXXXXXX HP for hardware maintenance of printers. Logs are recorded on hard copies. Reference number XXXXXXXXXXXX XXXXXXXXX for 3 rd level software support. Logs are recorded electronically and in hard copies. Reference number XXXXXXXXXXXXX XXXXXX for facilities and maintenance of the computer room. Logs are recorded on hard copies. Reference number XXXXXXX Page 4 of 10

6.2 Internal Operators IT Operation staff maintain a log of their activities on the Helpdesk software. Each operator completes a log with a unique number for each event. E.g. Log bb1905. Maintenance of the operator logs is the responsibility of the Helpdesk manager The manager checks logs weekly and a report summary is presented to the Director of Finance & IT. Monitoring of the operator logs and their performance provide assessment to review the service level agreement. manager will review service performance quarterly with each of its internal customers. agrees service standards annually with its internal customers using service level agreement. SLA deliverables are: response time system availability service enhancements 6.3 Errors and corrective actions When faults are reported, the Helpdesk always requests for system errors to be added where applicable. Operators refer to technical manuals for the specific system errors and they take corrective actions 7. Maintenance of Logs Electronic copies of the Helpdesk logs are archived for at least 12 months. There is a procedure to follow for all servers shutdown/startup when equipment maintenance is needed shutdown/startup procedure. A privileged password is always used to maintain the Helpdesk Logs. This operation helps the Administrator to accurately monitor faults resolution by the support staff. Reference HlpdRpt Report. Special care is taken when using privileged utilities. section use of systems utilities. Major system maintenance and software reviews are carried out outside normal working hours to reduce downtime. Page 5 of 10

8. Audit of Logs - regular checks is subject to ongoing and detailed audit of its fault logs through Helpdesk. IT Operations will be continually monitoring operator logs, system maintenance and third party support to improve its service level agreement. Frequency of review will be determined by the availability of staff involved. In general following period applies: Daily: Helpdesk logs Weekly: Helpdesk summary Monthly: Privileged Logs Quarterly: Annually: Third party logs 9. Staff involved Table shows the level of responsibilities and actions taken by different members of staff in terms of resolution, edit, maintenance, production and auditing of Logs and reports Initials Full name Responsibilities Logs/Reports Location Page 6 of 10

10. System Shutdown/Startup Procedure The list below should be used whenever a complete system closedown is required for all systems located in the computer room at Site 1 This procedure must not be used in combination with Remote Control Access. 1. Shutdown follow the list from 1 to the end. For all NT servers, use Start, Shutdown and select Shutdown. For Netware Servers type down followed by exit at the console. Where there is a note On restart.. : wait for the machine to shut down. Wait 20 seconds between all other machines. Do not switch off until shutdown is complete. 2. Startup follow the list from the end to 1. All servers will restart following power up. Wait 1 minute after powering up one machine before starting the next unless instructed otherwise. Sequence Machine Name NT Netware Notes 1. 2. 3. 4. 5. 6. 7. On restart - wait for this to fully restart 8. On restart - wait for this to fully restart 9. 10. 11. 12. 13. 14. 15. 16. Further action may be required following reboot. 17. 18. On restart - wait for this to fully restart 19. 20. Page 7 of 10

Sequence Machine Name NT Netware Notes 21. On restart - wait for this to fully restart 22. On restart - wait for this to fully restart 23. On restart - wait for this to fully restart 24. On restart - wait for this to fully restart 25. On restart - wait for this to fully restart 26. 27. 28. 29. On restart - wait for this to fully restart 30. On restart - wait for this to fully restart 31. (On top shelf) 32. (In cabinet) 33. (next to cabinet) 34. (in cabinet) 35. (in cabinets and on shelves) power down. On restart wait for these to fully restart 11. Use of systems utilities It is important to restrict and control the use of system utility programs in the Trust s network. This will prevent the system utilities to override system and application controls The Trust uses the following controls: Use of authentication procedures for system utility Segregation of system utilities from application software Limitation of the use of system utilities to the minimum practical number of trusted, authorised users Authorisation for ad hoc use of systems utilities Limitation of availability of system utilities, e.g. for the duration of an authorised change Logging of all use of system utilities Defining and documenting of authorisation levels for system utilities Removal of all unnecessary software based utilities and system software Page 8 of 10

Log bb1905 Operator Log Log bb1905 represents full detail of an operator log with the Trust s Helpdesk responding to a fault logged by an internal customer. A reference number represents a Log made to an external operator, HP, third line support for maintenance. <Screen Print> Page 9 of 10

13. Report HlpdRpt Fault Logging report Report shows the review of faults identified by an operator within a timescales for fault resolutions being consistent with the SLA with internal customers. <Screen Print> Page 10 of 10