Presentation held by Mr.Diarmuid Kelly as a part of The road to better Broadband Session at the 8th SEEITA and 7th MASIT Open Days Conference, 14th-15th October, 2010
IT technical support/helpdesk ismonitoring and maintaining the computer systems and networks within an organisation in a it it
it technical support role. If there are any issues or changes required, such as forgotten passwords, viruses or email issues, you'll be the first person employees will come to.
Top 3 Help Desk Challenges & What You Can Do About ThemSolarWinds
Learn more about the Top 3 Help Desk Challenges and how you can best tackle them.
-- Difficulty of Handling Growing Ticket Volume
-- Complexity of Managing the Ticketing Process
-- Lack of Proper Reporting & Metrics
Presentation held by Mr.Diarmuid Kelly as a part of The road to better Broadband Session at the 8th SEEITA and 7th MASIT Open Days Conference, 14th-15th October, 2010
IT technical support/helpdesk ismonitoring and maintaining the computer systems and networks within an organisation in a it it
it technical support role. If there are any issues or changes required, such as forgotten passwords, viruses or email issues, you'll be the first person employees will come to.
Top 3 Help Desk Challenges & What You Can Do About ThemSolarWinds
Learn more about the Top 3 Help Desk Challenges and how you can best tackle them.
-- Difficulty of Handling Growing Ticket Volume
-- Complexity of Managing the Ticketing Process
-- Lack of Proper Reporting & Metrics
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
this slides explains basics of system administration by raising these question, what is system administration? who can become syss admin? how to become sys admin? and discusses about tools used by sys admins.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Pass4sure 200-310 CCDA attests your professional competence and helps you achieve your career heights in the most competitive world of Information Technology.
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
this slides explains basics of system administration by raising these question, what is system administration? who can become syss admin? how to become sys admin? and discusses about tools used by sys admins.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Pass4sure 200-310 CCDA attests your professional competence and helps you achieve your career heights in the most competitive world of Information Technology.
This Solution Guide describes best practices for implementing an Aruba 802.11 wireless network that supports thousands of highly mobile devices (HMDs) such as Wi-Fi phones, handheld scanning terminals, voice badges, and computers mounted to vehicles. It describes the design principles particular to keeping devices that are in constant motion connected to the network as well as best practices for configuring Aruba Networks controllers and the mobile devices. The comprehensive guide addresses six areas of network planning to ensure a high quality of service for roaming data and voice sessions: device configuration, airtime optimization, roaming optimization, IP mobility configuration, IP multicast configuration, and interference resistance. A detailed troubleshooting section covers common issues that arise with these types of WLANs.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The primary goal of the checklist is to make it useful and as a trusted guide for IT Auditors,Security Consultant in Network Architecture Review assignments.The checklist is drawn from numerous resources referred and my experience in network architecture reviews.Though the essentially doesn't essentially cover all elements of a network architecture review,I have tried to bring in aspects of the security element in a network architecture
This presentation will cover a brief insight into how Mixed model IAP deployments are done and what are the effects of APP RF feature within IAP deployments.
Check on the link below for the webinar recording where this presentation was used.
http://community.arubanetworks.com/t5/Aruba-Instant-Cloud-Wi-Fi/Airheads-Technical-Webinar-Recording-Slides-Instant-AP-APP-RF/td-p/273380
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
Learn how venues that already have a mobile app can use the Meridian Software Development Kits (SDKs) to integrate navigation, proximity notification and other location based services indoors.
This presentation will show you how to optimize IAP’s traffic prioritization features for Voice and Video deployments and relative best practice solutions widely practiced across multiple verticals. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/recording/3338982991176626689
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This presentation will tackle Bonjour and DLNA services offered in the Aruba Instant AP and what happens in the background across mobility domains when AirGroup services are enabled. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/register/840318630118348801
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
As part of its mobile engagement solution, Aruba offers all mobile app developers the opportunity to take advantage of Aruba Beacons and Aruba Meridian SDK to create engaging experiences within a venue's existing mobile app. Join us for a discussion of best practices on how you can engage with internal or external mobile app developers.
The new trend of open source based hardware and software is disrupting the data center market unleashing unprecedented value to the customers. Come join us to see how the community based open source networking software OpenSwitch completes the all open sourced data center solution end to end, from the hardware layer to the cloud stack, and to see how HPE and its partners accelerating its adoption with the industry leading HPE Altoline, and OpenSwitch product line.”
In this presentation, we will be sharing a collection of several vital configuration tips and tricks which are widely implemented across mid-size to large enterprise WLAN. Our primary focus would be on Security as well as Performance characteristics of Aruba WLAN networks. Check out the webinar recording where this presentation was used: https://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Webinar-Recording-Slides-Aruba-OS/m-p/277294
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
BMIS 520IT Infrastructure Project Designing LAN Networks AssignJeniceStuckeyoo
BMIS 520
IT Infrastructure Project: Designing LAN Networks Assignment Instructions
All labs must be submitted using the version of Packet Tracer in the online course/learning management system. Please do NOT use other versions of Packet Tracer to assure licensing compliance and proper assessment/credit. In addition, please do NOT add users or passwords to any device, leave all credentials blank for assessment purposes.
Project Background
Please reference Figure 1. Friendly Care Hospital is one of the biggest hospitals in DC. You have recently bought the hospital, naming it [Your Firstname Lastname] Hospital. For example, Jane Doe Hospital. Jane Doe Hospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated local area network (LAN). The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services.
Their original design, depicted in Figure 1, was categorized as a small network, providing services for up to 200-500 devices. They have well surpassed this. You, as their senior network administrator, are tasked with the job of a complete re-design. This design must support a medium to large sized network for over 1,000 devices. Thus, it should surpass the current capabilities.
Figure 1. Current Friendly Care Hospital Network Design
Overview
In this project, you will study performance improvements in a congested, wired LAN/WAN environment that can be solved to varying degrees by a new IT infrastructure design and fully functional implementation in Packet Tracer. To learn more about Packet Tracer please read the Cisco Packet Tracer DS PDF. Later, in Phase II of the project, you will scale this design to a larger enterprise IT infrastructure.
To begin the projects, you will complete a review of related literature to identify what is appropriate to improve system feasibility, RAS (reliability, availability, serviceability), security, and disaster recovery of the existing IT infrastructure and model of your hospital. Once this review of literature is complete, you will use the outcomes and research results to advance and improve the IT infrastructure. Proper data analysis, comparison, and contrast will be summarized within in-text tables and figures as well as appendixes to explain the results of the IT infrastructure re-design and improvement.
Packet Tracer is limited given it is a simulator. Be creative! For instance, if Packet Tracer does not have a file sharing service for a file sharing server, turn on any other related and relevant services that are available. As another example, use LAN and WAN protocols that are optimal given what the ver ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Windows Server Deployment ProposalOverview Each student .docxadolphoyonker
Windows Server Deployment Proposal
Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario
“We Make Windows”, Inc. (referred to as “WMW”) has hired you as an IT consultant for implementing their Windows network infrastructure. WMW is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WMW with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WMW wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WMW which will have an impact on your choices:
· WMW will start with 90 employees, in the following departments:
o Executives (9 employees) – manage and run the company
o Accounts and Sales Department (15 employees) – perform market research and maintain accounts
o Creative, Media and Production Department (49 employees) – advertising
o Human Resources and Finances (12 employees) – perform HR and financial duties
o IT (5 employees) – manage IT for the company
o WMW will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity. Please be sure to state these assumptions.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). You may make assumptions about how data should be shared or kept private, but they must be stated in your paper.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ten steps for network documentation
1. Ten steps for Network Documentation:
JUSTIFICATION
Although network documentation is always a good idea, it's especially important
for technicians (service providers) to document your customers' networks to make the
troubleshooting process much more efficient when problems arise.
These same network documents can also help you spot areas of your customers' networks
that may need to be upgraded, giving you the possibility of earning extra revenue.
Finally, good network documentation proves that you adhere to industry best practices, and
could be your best defense should a customer ever file litigation against you for something
network-related.
2. TOOLS
There are a number of network documentation
products available that can assist with the
documentation process.
Some of the more well-known network documentation
applications include:
SmartDraw
QonDoc
LAN Surveyor
NetZoom
ConceptDraw
Microsoft Vision 2007
3. Create a network documentation policy
A network documentation policy should detail what aspects of
a network need to be documented, especially each server.
A documentation policy also communicates to each
administrator exactly what is expected of them regarding the
documentation process.
4. Create a network topology diagram
Ideally, you want this map of the network's
topology to include each network segment, the
routers connecting the various segments, and the
servers, gateways and other major pieces of
networking hardware that are connected to each
segment.
For larger networks, you may have to create a
general segment map and make more specific maps
of each individual segment.
5. Document server names, roles and IP addresses
While the information included in a network topology diagram
is not necessarily specific, there is certain information that you
should include for each server, even if that information has to
be placed in an appendix.
For each server, list the server's name, its IP address and the
role that the server is performing (DNS, DHCP, mail server,
etc.).
Keep in mind that a server may be assigned multiple IP
addresses or have multiple NICs, so you should document that
information too.
6. Create a change log for each server
When a server fails, the failure can often be traced to a recent
change.
As a part of the network documentation, consider making
a log book for each server for documenting changes such as
patch and application installations and modified security
settings.
Not only will the log help you troubleshoot future problems, it
can help you rebuild the server in the event of a catastrophic
failure.
7. Document the applications and their versions running
on each server.
You might also include a copy of the software license
or a receipt within this documentation just in case
your customer becomes involved in a software audit.
8. Document hardware components
The documentation should include information such as:
•How is the device connected to the network?
•How is the device configured?
•Does a backup of the configuration exist?
•What firmware revision is the device running?
•Is the device configured to use a password?
9. Document the Active Directory
Things that you should consider documenting:
•The names of the domains in the forest.
•The Active Directory site structure.
•Where the various servers exist within the Active Directory
hierarchy.
•The location and contents of each group policy.
•Any external trusts that may exist.
10. Document your backup procedures
Backup is your customer's best defense against a catastrophe, but it
will do little good if nobody can figure out how to use it.
Be sure to document the backup software used and its version.
You will also want to document the tape rotation scheme, a general
description of what's included in each backup job and where the
backup tapes are stored.
11. Label everything
Get a label maker and label all servers, critical hardware
components (gateways, routers, etc.) and the most important
cables.
This will make it easy to identify the various pieces of
hardware listed in your network document.
12. Evaluate your documentation
The last step in the documentation process is to evaluate
your network documentation to make sure that it's sufficient
for you and your customer's needs.
Think of your network documentation as a critical part of
your disaster recovery strategy.
When the first draft of your documentation is complete, you
must ask yourself if it's good enough to help someone with
no prior knowledge of the setup to rebuild the network from
scratch in the event of a catastrophe.
If the answer is yes, then you've done a good job on the
documentation.
Editor's Notes
There are a number of network documentation products available that can assist with the documentation process, and Windows Vista also has mapping capabilities built in. Some of the more well-known network documentation applications include:SmartDrawQonDocLAN SurveyorNetZoomConceptDrawMicrosoft Vision 2007