Upload
kaseyaindia
View
472
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
1 Detailed IT Activities
Antivirus Activities
Active Directory Update Virus Definitions Installation of AD Schedule Virus Scan DNS Configuration Deploy AV Profiles/ Policy Deploying and Configuration of AD Quarantine the Virus Creation of Organization Unit and applying Group Policy Upgrade AV Version Deploying of software via Group Policy
Antivirus Scanning activity. Perform Replication Check
Antivirus Central Server Setup activity. Perform AD Health Check via DC Diag Antivirus definition updates activity. Logon Script
Antivirus activity reporting Define Security and Configuration of Security Clean Infected Item Create, Modify Users Monitor, Alert, Remediate the AV Services Monitoring of AD Services and Events Reboot machine after definition Update Perform System State Backup Centralized Monitoring User account disabling activity. Uninstalling Antivirus Create network share activity. Quarantine infected machine Adjust permissions on an existing share activity. Report for Virus File and Folder security set up and configuration activity. Reset user passwords activity.
Data Backup Add printers and print queues activity.
Install Backup Software Configure desktop policy
Server, Desktop, Laptop Backtop Configure power management policy
Schedule Backup User account creation activity.- AD
Type of Backup - Incremental, Differential, Full backup
Email Mailbox set up and configuration activity.- Exchange Server
Folder and Volume Backup Change administrator passwords activity.- AD Version Upgrade Active directory migration activity.- AD Offsite Backup Monitoring and Remediation of Backup Services Patch Management Restoration - File level, full volume, hard disk level Windows Update – Custom , Automatic Reporting Test Patches Approve Patches Database related Activities Centralized Patching Installing Database Schedule Patch Uninstalling Database Cancel Patches Upgrading Database Rollback Patches Monitoring Database performance Microsoft Patch Installation Database Performance Tuning Patch Scan activity. Reporting - Database Health Report Patch Update activity. Monitoring Database requests Non MS software Patches
2 Detailed IT Activities
Exchange Server
Software Installation Installation of AD, DNS, Exchange Server Identify the list of SW to be installed Configuration of Exchange Server Test Install Mail Box Creation Develop shell scripts for sw installation Restriction of Mail Box Size Installation of Software Monitoring Exchange Server Services Uninstall of Software
Monitoring Mail Queue Up gradation of Software
Configuration of Smart Handled Devices Report of Installed Software
Tracing the Messages
Performing Exchange health check Virtualization Management Offline defragmentation Installation of Virtual Server Exchange server client side install Monitoring of health state of Host Server Reporting Tracking Uptime of Host Server Exchange server installation activity Creation of Virtual Machine Exchange Server account creation and roles definition activity. Monitoring CPU, Memory, Network Utilization of VM
Exchange server configuration and policy setting Data Store Configuration & Monitoring
User Creation & Role Configuration
Inventory Management
Physical Machine Count Server Management
Installed Software, application Count Installation & Configuration of Server
License Count Monitoring Server Uptime
Software Metering Monitoring of CPU Ideal Time
Hardware Tracking Monitoring of CPU Usage
Vendor Tracking Monitoring of Memory & Network Usage
Hardware peripheral tracking Power Policy Configuration
Spare Asset Tracking User Account Configuration Hard disk space Tracking User Logon Hours IP Info Hard Disk Space Monitoring Date of Installation of Software Security Policy Configuration Tracking Asset Changes Patch Policy Configuration Tracking Hardware Changes Critical Service Monitoring Warranty Expiration Report – Uptime History AMC Expiration
3 Detailed IT Activities
Network Management
User Account Administration Bandwidth Utilization Monitoring Creation of User
Network Breakdown Alert Defining Right Policy – Admin, Limited User, Local User, Guest
Uptime of Networking Device User account disabling activity Inbound and Outbound Bandwidth Adjust permissions on an existing share activity Port Monitoring File and Folder security set up and configuration activity
Network Configuration report Reset user passwords activity. VPN Monitoring and Report Password Enforcement Policy Port Intrusion Monitoring User account lock out policy
Open Port Alert Password lockout policy SNMP Monitoring Configure desktop policy
IP Address Monitoring Configure power management policy Individual User bandwidth Monitoring Site/URL Monitoring Storage Monitoring Upload and Download Monitoring Storage Device configuration Inter Networking Device Breakdown alert (Router, firewall) monitor and alerts for disk space on critical servers
monitor the online backup procedures
Standard Operating Environment Policy Monitoring and maintain the validity and integration of the data files.
Creating SOE policy Monitoring performance-critical applications
Configuring SOE policy Monitoring Local and global status
Deploying SOE policy Monitoring Time-based snapshots
Monitoring SOE policy Monitoring Database snapshots
Blocking file, folder Monitoring Mirror management
Blocking Applications Monitoring the Storage filer AV engine Reporting SOE Policy Status E-mail reports of daily status Disable Regedit, Control Panel Standard Desktop Policy Disaster Recovery Configure Offsite replication Server OS Upgrade Monitoring Uptime of Offsite Server OS Upgrade via CD, Network Monitoring of Disk Space of the Offsite Server DNS , AD, DHCP Configuration Uptime of the Link Enable PXE boot on Client End Schedule Tape Backup feasibility check for the Upgrade
4 Detailed IT Activities
Distributed File System
Information Security Management Configure Dfs root, Dfs link, Dfs target (or replica) Hardening of Firewall, Router, Switches
Configure User Rights for the above folders Creation of VLAN to segregate the different groups Dump the Files, Folders in the Server Access permission to the Users
Monitoring User Access on the distributed file Restriction on Floppy, DVD, CD, Storage Devices to users
Monitoring Disk Space on the Server Scanning incoming and Outgoing emails
Monitoring Uptime of the Server Wifi restrictions Preparing vulnerability report Business Continuity plan Backup and Disaster Recovery Hardening of OS
Applying Patches
Applying Security Policies Applying Antivirus policies Restriction on file, folder and applications Content Filtering Bandwidth Usage monitoring
Daily Reports