SlideShare a Scribd company logo
1 of 5
SYSTEM ADMINISTRATION
PRESENTED BY:
ADEEL KHURRAM
Definitions.
1. Being the consultant for Computer Problems b
eyond the knowledge ofTechnical Support sta
ff.
2. It is a job that require to maintain and operate
a computer system and/or network.
3. Activities performed by a system administrator
such as monitoring security configuration,
managing allocation of user names and
passwords, monitoring disk space and other
resource use, performing backups, and setting
up new hardware and software.
Duties Of SA!
1. • Performing routine audit of system and software
2. • Performing backup
3. • Applying operating system updates, patches, and
configuration changes
4. • Installing and configuring new hardware and software
5. • Adding, removing, or updating user account
information, resetting password. • Answering technical
queries.
Duties Of SA!
1. * Responsibility for security
2. * Responsibility for documentation the configuration of the system
3. *Troubleshooting any reported problems
4. * System performance tuning * Insuring that the network
infrastructure is up and running.
5. • Performing routine audit of system and software
6. • Performing backup
7. • Applying operating system updates, patches, and configuration
changes
8. • Installing and configuring new hardware and software
9. • Adding, removing, or updating user account information, resetting
password.
10. • Answering technical queries
ThankX.

More Related Content

What's hot

introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administrationgamme123
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administrationckuyehar
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)Vimarsh Padha
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in osDevAdnani
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systemsDr. Loganathan R
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information securityVijay Sekar
 

What's hot (20)

introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)
 
Section01 overview
Section01 overviewSection01 overview
Section01 overview
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Introduction to Computer Programming
 Introduction to  Computer Programming  Introduction to  Computer Programming
Introduction to Computer Programming
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
General computer - Software and hardware
General computer - Software and hardwareGeneral computer - Software and hardware
General computer - Software and hardware
 
Security
SecuritySecurity
Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Operating System
Operating SystemOperating System
Operating System
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 

Viewers also liked

Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1Jadwega Handorf
 
Rashad professional cv (3)
Rashad professional cv  (3)Rashad professional cv  (3)
Rashad professional cv (3)Rashad Elmulla
 
Дизайн как он есть
Дизайн  как он естьДизайн  как он есть
Дизайн как он естьbntulibrary
 
Carrefour certificate
Carrefour certificateCarrefour certificate
Carrefour certificateLubna Nser
 
Современный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продажСовременный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продажUltraUnion
 
Chinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima PatricChinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima Patrickusrick29
 
Thistle DevOps Solutions Offerings
Thistle DevOps Solutions OfferingsThistle DevOps Solutions Offerings
Thistle DevOps Solutions OfferingsTracy Peck
 
Linux Training Workshop
Linux Training WorkshopLinux Training Workshop
Linux Training WorkshopMeraj Khattak
 
Teaching System Administration
Teaching System AdministrationTeaching System Administration
Teaching System Administrationguesta7a59e
 
ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.Kumaran Balachandran
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISProsmida
 

Viewers also liked (18)

Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1
 
DBMS & DP Seatwork
DBMS & DP SeatworkDBMS & DP Seatwork
DBMS & DP Seatwork
 
Rashad professional cv (3)
Rashad professional cv  (3)Rashad professional cv  (3)
Rashad professional cv (3)
 
Дизайн как он есть
Дизайн  как он естьДизайн  как он есть
Дизайн как он есть
 
Carrefour certificate
Carrefour certificateCarrefour certificate
Carrefour certificate
 
Современный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продажСовременный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продаж
 
Chinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima PatricChinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima Patric
 
Thistle DevOps Solutions Offerings
Thistle DevOps Solutions OfferingsThistle DevOps Solutions Offerings
Thistle DevOps Solutions Offerings
 
3tier
3tier3tier
3tier
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
 
Linux Training Workshop
Linux Training WorkshopLinux Training Workshop
Linux Training Workshop
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Teaching System Administration
Teaching System AdministrationTeaching System Administration
Teaching System Administration
 
Ch02 system administration
Ch02 system administration Ch02 system administration
Ch02 system administration
 
Linux lecture6
Linux lecture6Linux lecture6
Linux lecture6
 
ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISP
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
 

Similar to System administration(adeel khorram)

CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptxams1ams11
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Resume_Kunal Sakpal
Resume_Kunal SakpalResume_Kunal Sakpal
Resume_Kunal Sakpalkunal sakpal
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptxJayLloyd8
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills AbilityJoseph Lynn
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12gameaxt
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful UsersHelpSystems
 
PENTRATION TESTING Linux Escalation.ppt
PENTRATION TESTING Linux  Escalation.pptPENTRATION TESTING Linux  Escalation.ppt
PENTRATION TESTING Linux Escalation.pptjospinjj
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 

Similar to System administration(adeel khorram) (20)

CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
Resume_Kunal Sakpal
Resume_Kunal SakpalResume_Kunal Sakpal
Resume_Kunal Sakpal
 
A075434624
A075434624A075434624
A075434624
 
gautam_resume
gautam_resumegautam_resume
gautam_resume
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
Resume
ResumeResume
Resume
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
Kempu
KempuKempu
Kempu
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
 
PENTRATION TESTING Linux Escalation.ppt
PENTRATION TESTING Linux  Escalation.pptPENTRATION TESTING Linux  Escalation.ppt
PENTRATION TESTING Linux Escalation.ppt
 
Moamen CV
Moamen CVMoamen CV
Moamen CV
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

System administration(adeel khorram)

  • 2. Definitions. 1. Being the consultant for Computer Problems b eyond the knowledge ofTechnical Support sta ff. 2. It is a job that require to maintain and operate a computer system and/or network. 3. Activities performed by a system administrator such as monitoring security configuration, managing allocation of user names and passwords, monitoring disk space and other resource use, performing backups, and setting up new hardware and software.
  • 3. Duties Of SA! 1. • Performing routine audit of system and software 2. • Performing backup 3. • Applying operating system updates, patches, and configuration changes 4. • Installing and configuring new hardware and software 5. • Adding, removing, or updating user account information, resetting password. • Answering technical queries.
  • 4. Duties Of SA! 1. * Responsibility for security 2. * Responsibility for documentation the configuration of the system 3. *Troubleshooting any reported problems 4. * System performance tuning * Insuring that the network infrastructure is up and running. 5. • Performing routine audit of system and software 6. • Performing backup 7. • Applying operating system updates, patches, and configuration changes 8. • Installing and configuring new hardware and software 9. • Adding, removing, or updating user account information, resetting password. 10. • Answering technical queries