3.detailed it activities


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

3.detailed it activities

  1. 1. 1  Detailed IT Activities      Antivirus Activities Active Directory   Update Virus Definitions Installation of AD Schedule Virus Scan DNS Configuration   Deploy AV Profiles/ Policy Deploying and Configuration of AD   Quarantine the Virus Creation of Organization Unit and applying Group Policy Upgrade AV Version   Deploying of software via Group Policy Antivirus Scanning activity. Perform Replication Check   Antivirus Central Server Setup activity. Perform AD Health Check via DC Diag Antivirus definition updates activity.   Logon Script Antivirus activity reporting Define Security and Configuration of Security   Clean Infected Item Create, Modify Users Monitor, Alert, Remediate the AV Services   Monitoring of AD Services and Events Reboot machine after definition Update Perform System State Backup   Centralized Monitoring User account disabling activity. Uninstalling Antivirus   Create network share activity. Quarantine infected machine Adjust permissions on an existing share activity.   Report for Virus File and Folder security set up and configuration activity.   Reset user passwords activity. Data Backup   Add printers and print queues activity. Install Backup Software Configure desktop policy   Server, Desktop, Laptop Backtop Configure power management policy   Schedule Backup User account creation activity.- AD Type of Backup - Incremental, Differential, Full Email Mailbox set up and configuration activity.-   backup Exchange Server Folder and Volume Backup   Change administrator passwords activity.- AD Version Upgrade Active directory migration activity.- AD   Offsite Backup Monitoring and Remediation of Backup Services   Patch Management Restoration - File level, full volume, hard disk level Windows Update – Custom , Automatic   Reporting Test Patches Approve Patches   Database related Activities Centralized Patching Installing Database Schedule Patch   Uninstalling Database Cancel Patches Upgrading Database   Rollback Patches Monitoring Database performance Microsoft Patch Installation   Database Performance Tuning Patch Scan activity. Reporting - Database Health Report Patch Update activity.   Monitoring Database requests Non MS software Patches  
  2. 2. 2  Detailed IT Activities      Exchange Server Software Installation   Installation of AD, DNS, Exchange Server Identify the list of SW to be installed Configuration of Exchange Server Test Install   Mail Box Creation Develop shell scripts for sw installation   Restriction of Mail Box Size Installation of Software Monitoring Exchange Server Services   Uninstall of Software Monitoring Mail Queue Up gradation of Software   Configuration of Smart Handled Devices Report of Installed Software   Tracing the Messages Performing Exchange health check   Virtualization Management Offline defragmentation Installation of Virtual Server   Exchange server client side install Monitoring of health state of Host Server   Reporting Tracking Uptime of Host Server Exchange server installation activity Creation of Virtual Machine   Exchange Server account creation and roles Monitoring CPU, Memory, Network Utilization of VM definition activity.   Exchange server configuration and policy setting Data Store Configuration & Monitoring   User Creation & Role Configuration   Inventory Management   Physical Machine Count Server Management   Installed Software, application Count Installation & Configuration of Server License Count   Monitoring Server Uptime Software Metering Monitoring of CPU Ideal Time   Hardware Tracking Monitoring of CPU Usage   Vendor Tracking Monitoring of Memory & Network Usage   Hardware peripheral tracking Power Policy Configuration Spare Asset Tracking   User Account Configuration Hard disk space Tracking User Logon Hours   IP Info Hard Disk Space Monitoring Date of Installation of Software Security Policy Configuration   Tracking Asset Changes Patch Policy Configuration   Tracking Hardware Changes Critical Service Monitoring Warranty Expiration   Report – Uptime History AMC Expiration      
  3. 3. 3  Detailed IT Activities      Network Management User Account Administration   Bandwidth Utilization Monitoring Creation of User Defining Right Policy – Admin, Limited User, Local   Network Breakdown Alert User, Guest Uptime of Networking Device   User account disabling activity Inbound and Outbound Bandwidth Adjust permissions on an existing share activity   Port Monitoring File and Folder security set up and configuration activity   Network Configuration report Reset user passwords activity. VPN Monitoring and Report Password Enforcement Policy   Port Intrusion Monitoring User account lock out policy   Open Port Alert Password lockout policy SNMP Monitoring   Configure desktop policy IP Address Monitoring Configure power management policy   Individual User bandwidth Monitoring Site/URL Monitoring   Storage Monitoring Upload and Download Monitoring Storage Device configuration Inter  Networking Device Breakdown alert monitor and alerts for disk space on critical servers (Router, firewall)   monitor the online backup procedures   Monitoring and maintain the validity and integration of Standard Operating Environment Policy the data files.   Creating SOE policy Monitoring performance-critical applications Configuring SOE policy   Monitoring Local and global status Deploying SOE policy Monitoring Time-based snapshots   Monitoring SOE policy Monitoring Database snapshots   Blocking file, folder Monitoring Mirror management Blocking Applications   Monitoring the Storage filer AV engine Reporting SOE Policy Status E-mail reports of daily status   Disable Regedit, Control Panel Standard Desktop Policy Disaster Recovery   Configure Offsite replication Server   OS Upgrade Monitoring Uptime of Offsite Server OS Upgrade via CD, Network   Monitoring of Disk Space of the Offsite Server DNS , AD, DHCP Configuration Uptime of the Link   Enable PXE boot on Client End Schedule Tape Backup   feasibility check for the Upgrade      
  4. 4. 4  Detailed IT Activities      Distributed File System Information Security Management   Configure Dfs root, Dfs link, Dfs target (or Hardening of Firewall, Router, Switches replica)   Configure User Rights for the above folders Creation of VLAN to segregate the different groups   Dump the Files, Folders in the Server Access permission to the Users Restriction on Floppy, DVD, CD, Storage Devices to Monitoring User Access on the distributed file   users Monitoring Disk Space on the Server   Scanning incoming and Outgoing emails Monitoring Uptime of the Server Wifi restrictions   Preparing vulnerability report   Business Continuity plan Backup and Disaster Recovery   Hardening of OS   Applying Patches   Applying Security Policies Applying Antivirus policies   Restriction on file, folder and applications   Content Filtering Bandwidth Usage monitoring   Daily Reports