Remote Infrastructure Management

7,389 views

Published on

Published in: Business, Technology
0 Comments
14 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
7,389
On SlideShare
0
From Embeds
0
Number of Embeds
21
Actions
Shares
0
Downloads
0
Comments
0
Likes
14
Embeds 0
No embeds

No notes for slide

Remote Infrastructure Management

  1. 1. INFRASTRUCTURE MANAGEMENT
  2. 2. Network Management Routers, Switches, VoIP devices, Network Links Security Management Firewalls, Intrusion Protection Systems, VPNs, PKI, AAA Tools Data Center Management Servers, Databases, Middle Tier Apps, Messaging, Storage Systems Desktop Management Desktops, Laptops, File & Print Servers Process consulting, Audits & Reviews Availability management Asset management, Patch management Problem, change & Configuration management Pro-active monitoring & Incident management Implementation/Migration support ITIL compliant processes, SLA driven engagements
  3. 3. Monitoring & Management Services
  4. 4. Facility Management Services
  5. 5. <ul><li>Understand Requirement </li></ul><ul><li>Infrastructure study </li></ul><ul><li>Business dependency </li></ul><ul><li>Scope of work </li></ul>Assess Design Plan & Implement Performance Eng. Capacity Plng DR/BCP Data centre Networks Consulting Services ITIL Migration Audits Security Storage <ul><li>High Level design </li></ul><ul><li>Detailed Technical </li></ul><ul><li>design </li></ul><ul><li>Risk assessment </li></ul><ul><li>Risk mitigation plan </li></ul><ul><li>Project management </li></ul><ul><li>Pilot testing </li></ul><ul><ul><li>Acceptance </li></ul></ul><ul><li>Implementation </li></ul><ul><ul><li>Infrastructure </li></ul></ul><ul><ul><li>Processes </li></ul></ul>
  6. 6. <ul><li>Maintain an Up-to-Date Network Diagram </li></ul><ul><li>Maintain Switch and WAN Device Configuration and Backup </li></ul><ul><li>Fix Problems Reported on Time </li></ul><ul><li>Provide Support with regards to WAN and Switch Management </li></ul><ul><li>Port Configuration </li></ul><ul><li>Policy Configuration on devices like Access Lists, VLANs etc. </li></ul><ul><li>IOS / OS Upgrades and Fixes </li></ul><ul><li>Routing configurations (Static and Dynamic Routing) </li></ul><ul><li>QOS and Bandwidth/ Performance Optimization </li></ul><ul><li>Design, Re-architecture and Recommendations </li></ul>
  7. 7. <ul><li>Operating System supported : Windows / Linux / Solaris / HP-UX / AIX </li></ul><ul><li>User management </li></ul><ul><li>Patch management </li></ul><ul><li>Disk space management </li></ul><ul><li>Log management </li></ul><ul><li>Backup management </li></ul><ul><li>Scheduled job management </li></ul><ul><li>Performance management </li></ul><ul><li>Problem and change management </li></ul><ul><li>* </li></ul>
  8. 8. <ul><li>Database Management (MS SQL/ </li></ul><ul><li>Oracle) </li></ul><ul><li>User management </li></ul><ul><li>Database server installation </li></ul><ul><li>Log management </li></ul><ul><li>Space management </li></ul><ul><li>Object management </li></ul><ul><li>DB privilege management </li></ul><ul><li>Backup and recovery management </li></ul><ul><li>Replication management </li></ul><ul><li>Scheduled task management </li></ul><ul><li>Patch management </li></ul><ul><li>Performance management </li></ul><ul><li>Automation and procedure optimization </li></ul><ul><li>Mail Management (MS Exchange/ </li></ul><ul><li>Lotus Notes) </li></ul><ul><li>Server configuration </li></ul><ul><li>Space management </li></ul><ul><li>Exchange queue management </li></ul><ul><li>Junk e-mail filtering </li></ul><ul><li>Anti-SPAM Management </li></ul><ul><li>Proactive Monitoring </li></ul><ul><li>User Management </li></ul><ul><li>Mailbox and Address book Management </li></ul><ul><li>SMTP/ Delivery Log checks </li></ul><ul><li>Message Queue Management </li></ul><ul><li>Server installation </li></ul><ul><li>Backup management </li></ul><ul><li>Process management (Stop/ Start Services) </li></ul><ul><li>Performance management </li></ul>
  9. 9. <ul><li>Firewall configuration management </li></ul><ul><ul><li>Conduit/ACL </li></ul></ul><ul><ul><li>Firewall interfaces </li></ul></ul><ul><ul><li>NAT / DMZ </li></ul></ul><ul><ul><li>Failover </li></ul></ul><ul><ul><li>Site-to-site IPSec VPN tunnels </li></ul></ul><ul><ul><li>Roaming VPN clients </li></ul></ul><ul><ul><li>Security policies </li></ul></ul><ul><ul><li>IOS upgrade </li></ul></ul><ul><ul><li>Configuration backups </li></ul></ul><ul><li>IDS configuration management </li></ul><ul><ul><li>Latest signature updates </li></ul></ul><ul><ul><li>Filters </li></ul></ul><ul><ul><li>Enable port mirroring and configure IDS for traffic capture </li></ul></ul><ul><li>Log management </li></ul><ul><li>Performance management </li></ul><ul><li>Problem and Change management </li></ul>
  10. 10. <ul><li>Application Management </li></ul><ul><li>Directory Server installation and configuration </li></ul><ul><li>Domain controller installation and configuration </li></ul><ul><li>Internet Proxy Server installation and configuration </li></ul><ul><li>Security Server installation and configuration </li></ul><ul><li>Weblogic Server installation and configuration </li></ul><ul><li>Web Server installation and configuration </li></ul><ul><li>Log management </li></ul><ul><li>Backup management </li></ul><ul><li>Scheduled task management </li></ul><ul><li>Problem and Change management </li></ul>
  11. 11. <ul><li>New Installation </li></ul><ul><li>Manage storage environment </li></ul><ul><li>Backup </li></ul><ul><li>Monitor storage environment </li></ul><ul><li>Capacity planning </li></ul><ul><li>Storage evaluation </li></ul>
  12. 12. <ul><li>Configuration of desktops / laptops. </li></ul><ul><li>Troubleshooting desktop – OS and applications. </li></ul><ul><li>Coordinate with vendors to resolve hardware replacements. </li></ul><ul><li>Antivirus management (Client Side) </li></ul><ul><li>Support for installs, moves, adds and changes. </li></ul>
  13. 13. <ul><li>Set up Citrix Client </li></ul><ul><li>WinFrame and MetaFrame administration </li></ul><ul><li>Configure Policies for Servers, Users, and Groups </li></ul><ul><li>Configure and Manage Web Interfaces </li></ul><ul><li>Publish, Manage and Remove Applications </li></ul>
  14. 14. <ul><li>Study of existing </li></ul><ul><ul><li>IT Architecture (Systems, Network and Application) and their Relationships </li></ul></ul><ul><ul><li>Project and Change management process </li></ul></ul><ul><ul><li>Data center procedures </li></ul></ul><ul><ul><li>Backup, Archival and recovery process </li></ul></ul><ul><ul><li>Location / operation of the primary and secondary data centers </li></ul></ul><ul><li>Identify the Threats and Impact to each of the IT Applications / Devices </li></ul><ul><li>Conduct Comprehensive Vulnerability Assessment </li></ul><ul><li>Key Deliverables </li></ul><ul><ul><li>RTO/ RPO and BOM finalization based on Cost of Implementation and ROI </li></ul></ul><ul><ul><li>Disaster Recovery Architecture including Technical architecture of the DR site </li></ul></ul><ul><ul><li>Design Recommendations on Current Architecture </li></ul></ul><ul><ul><li>Different Options for Recovery/Replication to the DR site. </li></ul></ul><ul><ul><li>Activities/Tasks and Approximate Time Required to Recover the Systems in case of Disaster. </li></ul></ul><ul><ul><li>Implementation Plan, with Timelines and Milestones. </li></ul></ul>
  15. 16. PHASE I : E-Ticketing Only
  16. 21. <ul><ul><li>Compliment existing team with resources (offshore/on-site) </li></ul></ul><ul><ul><ul><li>Extended shift coverage </li></ul></ul></ul><ul><ul><ul><li>Consulting engagements </li></ul></ul></ul><ul><ul><ul><li>Audits </li></ul></ul></ul><ul><ul><li>Device monitoring & management </li></ul></ul><ul><ul><ul><li>Start only with network/systems monitoring </li></ul></ul></ul><ul><ul><ul><li>Scale up to management gradually </li></ul></ul></ul><ul><ul><li>Dedicated support team (fully outsourced) </li></ul></ul><ul><ul><ul><li>Dedicated resources available on-site </li></ul></ul></ul><ul><ul><ul><li>Remote support for 24x7 skills </li></ul></ul></ul><ul><ul><ul><li>Combination of on-site/off-site to provide cost effective services </li></ul></ul></ul><ul><ul><li>Dedicated customer port </li></ul></ul><ul><ul><ul><li>Separate operations center for a requirement (offshore) </li></ul></ul></ul><ul><ul><li>Pilot and Phased Approach </li></ul></ul><ul><ul><ul><li>Manage the defined pilot infrastructure </li></ul></ul></ul><ul><ul><ul><li>Stabilize and replicate across the entire infrastructure </li></ul></ul></ul>
  17. 22. Transition Management
  18. 23. Pro-active Performance Monitoring, Threshold Alerts, Dashboard Reporting Incident Management, Service Desk for escalations, knowledge repository Problem mgt, Change mgt, Capacity mgt, Performance mgt Onsite & Offshore combination ITIL best practices Risk mitigated transition Seamless integration of client processes Ongoing Risk Management Level 2 & 3 Support Level 1 Support Onsite Co-ordination Scoping, Knowledge Acquisition, Project Co-ordination, On-Site Support Remote Monitoring
  19. 24. Thank you.

×