SlideShare a Scribd company logo
1 of 2
1.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification
For This Request,A = Required for Server access to
get the CPU , MEMORY and DB Graphs.
UIN 606522883
BoaT ID PATILR
Email ramamohan.patil@bt.com D
2.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,A = Security devices,
4930Q = Additional Information/Justification For This Request,A = Role within
TNA7,
required for monitoring and reporting of walls of fire or Firewalls!
UIN 701762269
BoaT ID AKHTARK
Email kamran.2.akhtar@bt.com D
3.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,A = Servers, 4930Q
= Additional Information/Justification For This Request,A = Hi Jez,To monitor
the echat servers,
we need access to Monitor IT URL. This is the replacement of CIRRUS
Tool.ThanksVinoth
UIN 607736821
BoaT ID SUBBAIV3
Email vinoth.2.subbaiyan@bt.com Delted
4.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,A = Servers,
4930Q = Additional Information/Justification For This Request,A = Need SMARTS IT
TOOL access
UIN 609178865
BoaT ID RAMASUM
Email manikantan.ramasubramanian@bt.com Delted
5.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification
For This Request,
A = Working in DSS as technical Architects and very frequently need to monitor
system performance for improvement perspective.
UIN 604314909
BoaT ID BHUNIAS
Email santanu.bhunia@bt.com https://monitorit.bt.com/APG/
3rd Party Email santanu.bhunia@tcs.com Delted
6.Access:
5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q =
Select Profile,A = Servers,
4930Q = Additional Information/Justification For This Request,A = Hi Team,I am a
part of eChat ASG (APP04132).
As our application servers are not under cirrus we are unable to check on the
memory
and CPU usage. Could you please provide the access to monitor the same.Many
thanks in advance.Regards,Simoni KeChat ASG
UIN 607329344
BoaT ID KANNANS4
Email simoni.kannan@bt.com Delted
7.Access:
5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q =
Select Profile,A = Servers, 4930Q = Additional
Information/Justification For This Request,A = Required for my role in Security
Compliance & Operations, Dynamic IT TNA7
UIN 803379976
BoaT ID THOMP397
Email phil.thompson@bt.com Delted
8.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User,
5244Q = Select Profile,
A = Servers, 4930Q = Additional Information/Justification For This Request,A =
Please provide access to the MonitorIT tool.
REELHSK
UIN 611481540
BoaT ID REELHSK
Email sumeetkaur.reelh@bt.com Deleted
9.

More Related Content

Similar to Monitor it accesspending

TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Project 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docxProject 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docxsimonlbentley59018
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
PURSe and the PURSe Portlets
PURSe and the PURSe PortletsPURSe and the PURSe Portlets
PURSe and the PURSe Portletsmarcuschristie
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Why Cant I Access The Portal
Why Cant I Access The PortalWhy Cant I Access The Portal
Why Cant I Access The PortalDan Usher
 
SRS wifistudy.com
SRS wifistudy.comSRS wifistudy.com
SRS wifistudy.comAjay844
 
Deep Dive - Usage of on premises data gateway for hybrid integration scenarios
Deep Dive - Usage of on premises data gateway for hybrid integration scenariosDeep Dive - Usage of on premises data gateway for hybrid integration scenarios
Deep Dive - Usage of on premises data gateway for hybrid integration scenariosSajith C P Nair
 
Tenrox Workflow Overview 200907
Tenrox Workflow Overview 200907Tenrox Workflow Overview 200907
Tenrox Workflow Overview 200907nightskyy
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
Top 13 best security practices for Azure
Top 13 best security practices for AzureTop 13 best security practices for Azure
Top 13 best security practices for AzureRadu Vunvulea
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededQuest
 
SharePoint 2010 Global Deployment
SharePoint 2010 Global DeploymentSharePoint 2010 Global Deployment
SharePoint 2010 Global DeploymentJoel Oleson
 
CISCO ACS 5.6 Migration Guide
CISCO ACS 5.6 Migration GuideCISCO ACS 5.6 Migration Guide
CISCO ACS 5.6 Migration GuidePCCW GLOBAL
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...Nur Shiqim Chok
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_PresentationJoseph Baca
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overviewali raza
 
Design Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionDesign Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionMichele Leroux Bustamante
 
Challenge to Implementing "Scalable" Authorization with Keycloak
Challenge to Implementing "Scalable" Authorization with KeycloakChallenge to Implementing "Scalable" Authorization with Keycloak
Challenge to Implementing "Scalable" Authorization with KeycloakHitachi, Ltd. OSS Solution Center.
 

Similar to Monitor it accesspending (20)

TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
Project 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docxProject 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docx
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
PURSe and the PURSe Portlets
PURSe and the PURSe PortletsPURSe and the PURSe Portlets
PURSe and the PURSe Portlets
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
KMS (1)
KMS (1)KMS (1)
KMS (1)
 
Why Cant I Access The Portal
Why Cant I Access The PortalWhy Cant I Access The Portal
Why Cant I Access The Portal
 
SRS wifistudy.com
SRS wifistudy.comSRS wifistudy.com
SRS wifistudy.com
 
Deep Dive - Usage of on premises data gateway for hybrid integration scenarios
Deep Dive - Usage of on premises data gateway for hybrid integration scenariosDeep Dive - Usage of on premises data gateway for hybrid integration scenarios
Deep Dive - Usage of on premises data gateway for hybrid integration scenarios
 
Tenrox Workflow Overview 200907
Tenrox Workflow Overview 200907Tenrox Workflow Overview 200907
Tenrox Workflow Overview 200907
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
Top 13 best security practices for Azure
Top 13 best security practices for AzureTop 13 best security practices for Azure
Top 13 best security practices for Azure
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
SharePoint 2010 Global Deployment
SharePoint 2010 Global DeploymentSharePoint 2010 Global Deployment
SharePoint 2010 Global Deployment
 
CISCO ACS 5.6 Migration Guide
CISCO ACS 5.6 Migration GuideCISCO ACS 5.6 Migration Guide
CISCO ACS 5.6 Migration Guide
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
Design Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionDesign Practices for a Secure Azure Solution
Design Practices for a Secure Azure Solution
 
Challenge to Implementing "Scalable" Authorization with Keycloak
Challenge to Implementing "Scalable" Authorization with KeycloakChallenge to Implementing "Scalable" Authorization with Keycloak
Challenge to Implementing "Scalable" Authorization with Keycloak
 

More from ♛Kumar Aneesh♛ (19)

Introduction about Kubernates Cluster
Introduction about Kubernates ClusterIntroduction about Kubernates Cluster
Introduction about Kubernates Cluster
 
Live issues resolution on Kubernates Cluster
Live issues resolution on Kubernates ClusterLive issues resolution on Kubernates Cluster
Live issues resolution on Kubernates Cluster
 
Nagios
NagiosNagios
Nagios
 
My onboarding
My onboardingMy onboarding
My onboarding
 
Monitor it access
Monitor it accessMonitor it access
Monitor it access
 
Missing on both stacks
Missing on both stacksMissing on both stacks
Missing on both stacks
 
load errorcmd
 load errorcmd load errorcmd
load errorcmd
 
Kibana
KibanaKibana
Kibana
 
tp smarts_onboarding
 tp smarts_onboarding tp smarts_onboarding
tp smarts_onboarding
 
derby onboarding (1)
derby onboarding (1)derby onboarding (1)
derby onboarding (1)
 
Issues chmk (1)
Issues chmk (1)Issues chmk (1)
Issues chmk (1)
 
Invoke
InvokeInvoke
Invoke
 
Inventory after onboarding
Inventory after onboardingInventory after onboarding
Inventory after onboarding
 
Implementation c100229805
Implementation c100229805Implementation c100229805
Implementation c100229805
 
Icmp s outh
Icmp s outhIcmp s outh
Icmp s outh
 
Hws&reigate south fitzoy
Hws&reigate south fitzoyHws&reigate south fitzoy
Hws&reigate south fitzoy
 
Hempoint
HempointHempoint
Hempoint
 
Dmctl cmd
Dmctl cmdDmctl cmd
Dmctl cmd
 
Asg dashboard usage_guide_v1
Asg dashboard usage_guide_v1Asg dashboard usage_guide_v1
Asg dashboard usage_guide_v1
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Monitor it accesspending

  • 1. 1.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request,A = Required for Server access to get the CPU , MEMORY and DB Graphs. UIN 606522883 BoaT ID PATILR Email ramamohan.patil@bt.com D 2.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Security devices, 4930Q = Additional Information/Justification For This Request,A = Role within TNA7, required for monitoring and reporting of walls of fire or Firewalls! UIN 701762269 BoaT ID AKHTARK Email kamran.2.akhtar@bt.com D 3.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request,A = Hi Jez,To monitor the echat servers, we need access to Monitor IT URL. This is the replacement of CIRRUS Tool.ThanksVinoth UIN 607736821 BoaT ID SUBBAIV3 Email vinoth.2.subbaiyan@bt.com Delted 4.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request,A = Need SMARTS IT TOOL access UIN 609178865 BoaT ID RAMASUM Email manikantan.ramasubramanian@bt.com Delted 5.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request, A = Working in DSS as technical Architects and very frequently need to monitor system performance for improvement perspective. UIN 604314909 BoaT ID BHUNIAS Email santanu.bhunia@bt.com https://monitorit.bt.com/APG/ 3rd Party Email santanu.bhunia@tcs.com Delted 6.Access: 5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request,A = Hi Team,I am a part of eChat ASG (APP04132). As our application servers are not under cirrus we are unable to check on the memory and CPU usage. Could you please provide the access to monitor the same.Many thanks in advance.Regards,Simoni KeChat ASG UIN 607329344 BoaT ID KANNANS4 Email simoni.kannan@bt.com Delted
  • 2. 7.Access: 5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile,A = Servers, 4930Q = Additional Information/Justification For This Request,A = Required for my role in Security Compliance & Operations, Dynamic IT TNA7 UIN 803379976 BoaT ID THOMP397 Email phil.thompson@bt.com Delted 8.Access:5261Q = Application Role,A = CoreIT, 5242Q = Select Role,A = User, 5244Q = Select Profile, A = Servers, 4930Q = Additional Information/Justification For This Request,A = Please provide access to the MonitorIT tool. REELHSK UIN 611481540 BoaT ID REELHSK Email sumeetkaur.reelh@bt.com Deleted 9.