SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
1        Detailed IT Activities 
       


       
Antivirus Activities                                     Active Directory
     
Update Virus Definitions                                 Installation of AD
Schedule Virus Scan                                      DNS Configuration
     
Deploy AV Profiles/ Policy                               Deploying and Configuration of AD
     
Quarantine the Virus                                     Creation of Organization Unit and applying Group Policy
Upgrade AV Version
                                                         Deploying of software via Group Policy
Antivirus Scanning activity.                             Perform Replication Check
     
Antivirus Central Server Setup activity.                 Perform AD Health Check via DC Diag
Antivirus definition updates activity.
                                                         Logon Script
Antivirus activity reporting                             Define Security and Configuration of Security
     
Clean Infected Item                                      Create, Modify Users
Monitor, Alert, Remediate the AV Services
                                                         Monitoring of AD Services and Events
Reboot machine after definition Update                   Perform System State Backup
    
Centralized Monitoring                                   User account disabling activity.
Uninstalling Antivirus
                                                         Create network share activity.
Quarantine infected machine                              Adjust permissions on an existing share activity.
    
Report for Virus                                         File and Folder security set up and configuration activity.
                                                         Reset user passwords activity.
Data Backup
                                                         Add printers and print queues activity.
Install Backup Software                                  Configure desktop policy
      
Server, Desktop, Laptop Backtop                          Configure power management policy
     
Schedule Backup                                          User account creation activity.- AD
Type of Backup - Incremental, Differential, Full         Email Mailbox set up and configuration activity.-
     
backup                                                   Exchange Server
Folder and Volume Backup
                                                         Change administrator passwords activity.- AD
Version Upgrade                                          Active directory migration activity.- AD
     
Offsite Backup
Monitoring and Remediation of Backup Services
                                                         Patch Management
Restoration - File level, full volume, hard disk level   Windows Update – Custom , Automatic
     
Reporting                                                Test Patches
                                                         Approve Patches
    
Database related Activities                              Centralized Patching
Installing Database                                      Schedule Patch
      
Uninstalling Database                                    Cancel Patches
Upgrading Database
                                                         Rollback Patches
Monitoring Database performance                          Microsoft Patch Installation
      
Database Performance Tuning                              Patch Scan activity.
Reporting - Database Health Report                       Patch Update activity.
                                                                                                                        




Monitoring Database requests                             Non MS software Patches

       
2        Detailed IT Activities 
           


           
    Exchange Server                                    Software Installation
          
    Installation of AD, DNS, Exchange Server           Identify the list of SW to be installed
    Configuration of Exchange Server                   Test Install
         
    Mail Box Creation                                  Develop shell scripts for sw installation
         
    Restriction of Mail Box Size                       Installation of Software
    Monitoring Exchange Server Services
                                                       Uninstall of Software
    Monitoring Mail Queue                              Up gradation of Software
        
    Configuration of Smart Handled Devices             Report of Installed Software
         
    Tracing the Messages
    Performing Exchange health check
                                                       Virtualization Management
    Offline defragmentation                            Installation of Virtual Server
          
    Exchange server client side install                Monitoring of health state of Host Server
          
    Reporting                                          Tracking Uptime of Host Server
    Exchange server installation activity              Creation of Virtual Machine
          
    Exchange Server account creation and roles
                                                       Monitoring CPU, Memory, Network Utilization of VM
    definition activity.
          
    Exchange server configuration and policy setting   Data Store Configuration & Monitoring
          
                                                       User Creation & Role Configuration
           
    Inventory Management
         
    Physical Machine Count                             Server Management
          
    Installed Software, application Count              Installation & Configuration of Server
    License Count
                                                       Monitoring Server Uptime
    Software Metering                                  Monitoring of CPU Ideal Time
         
    Hardware Tracking                                  Monitoring of CPU Usage
         
    Vendor Tracking                                    Monitoring of Memory & Network Usage
         
    Hardware peripheral tracking                       Power Policy Configuration
    Spare Asset Tracking
                                                       User Account Configuration
    Hard disk space                                    Tracking User Logon Hours
          
    IP Info                                            Hard Disk Space Monitoring
    Date of Installation of Software                   Security Policy Configuration
          
    Tracking Asset Changes                             Patch Policy Configuration
          
    Tracking Hardware Changes                          Critical Service Monitoring
    Warranty Expiration
                                                       Report – Uptime History
    AMC Expiration
 
                                                                                                            




           
3        Detailed IT Activities 
           


           
    Network Management                         User Account Administration
        
    Bandwidth Utilization Monitoring           Creation of User
                                               Defining Right Policy – Admin, Limited User, Local
        
    Network Breakdown Alert
                                               User, Guest
    Uptime of Networking Device
                                               User account disabling activity
    Inbound and Outbound Bandwidth             Adjust permissions on an existing share activity
         
    Port Monitoring                            File and Folder security set up and configuration activity
        
    Network Configuration report               Reset user passwords activity.
    VPN Monitoring and Report                  Password Enforcement Policy
         
    Port Intrusion Monitoring                  User account lock out policy
         
    Open Port Alert                            Password lockout policy
    SNMP Monitoring
                                               Configure desktop policy
    IP Address Monitoring                      Configure power management policy
         
    Individual User bandwidth Monitoring
    Site/URL Monitoring
                                               Storage Monitoring
    Upload and Download Monitoring             Storage Device configuration
    Inter  Networking Device Breakdown alert
                                               monitor and alerts for disk space on critical servers
    (Router, firewall)
          
                                               monitor the online backup procedures
                                               Monitoring and maintain the validity and integration of
    Standard Operating Environment Policy      the data files.
         
    Creating SOE policy                        Monitoring performance-critical applications
    Configuring SOE policy
                                               Monitoring Local and global status
    Deploying SOE policy                       Monitoring Time-based snapshots
         
    Monitoring SOE policy                      Monitoring Database snapshots
         
    Blocking file, folder                      Monitoring Mirror management
    Blocking Applications
                                               Monitoring the Storage filer AV engine
    Reporting SOE Policy Status                E-mail reports of daily status
         
    Disable Regedit, Control Panel
    Standard Desktop Policy                    Disaster Recovery
         
                                               Configure Offsite replication Server
        
    OS Upgrade                                 Monitoring Uptime of Offsite Server
    OS Upgrade via CD, Network
                                               Monitoring of Disk Space of the Offsite Server
    DNS , AD, DHCP Configuration               Uptime of the Link
          
    Enable PXE boot on Client End              Schedule Tape Backup
          
    feasibility check for the Upgrade
 
                                                                                                             




           
4        Detailed IT Activities 
           


           
    Distributed File System                          Information Security Management
          
    Configure Dfs root, Dfs link, Dfs target (or
                                                     Hardening of Firewall, Router, Switches
    replica)
          
    Configure User Rights for the above folders      Creation of VLAN to segregate the different groups
        
    Dump the Files, Folders in the Server            Access permission to the Users
                                                     Restriction on Floppy, DVD, CD, Storage Devices to
    Monitoring User Access on the distributed file
                                                     users
    Monitoring Disk Space on the Server
                                                     Scanning incoming and Outgoing emails
    Monitoring Uptime of the Server                  Wifi restrictions
        
                                                     Preparing vulnerability report
                                                     Business Continuity plan
                                                     Backup and Disaster Recovery
           
                                                     Hardening of OS
                                                     Applying Patches
                                                     Applying Security Policies
                                                     Applying Antivirus policies
           
                                                     Restriction on file, folder and applications
                                                     Content Filtering
                                                     Bandwidth Usage monitoring
           
                                                     Daily Reports
           

           

           

           

           

           

           
                                                                                                           




           

Weitere ähnliche Inhalte

Mehr von kaseyaindia

6.smart services
6.smart services6.smart services
6.smart serviceskaseyaindia
 
4.it activities one pager
4.it activities   one pager4.it activities   one pager
4.it activities one pagerkaseyaindia
 
1.ams cover page
1.ams cover page1.ams cover page
1.ams cover pagekaseyaindia
 
8.scope of the kaseya smart pilot
8.scope of the kaseya smart pilot8.scope of the kaseya smart pilot
8.scope of the kaseya smart pilotkaseyaindia
 
1.ams cover page
1.ams cover page1.ams cover page
1.ams cover pagekaseyaindia
 

Mehr von kaseyaindia (6)

6.smart services
6.smart services6.smart services
6.smart services
 
4.it activities one pager
4.it activities   one pager4.it activities   one pager
4.it activities one pager
 
1.ams cover page
1.ams cover page1.ams cover page
1.ams cover page
 
8.scope of the kaseya smart pilot
8.scope of the kaseya smart pilot8.scope of the kaseya smart pilot
8.scope of the kaseya smart pilot
 
7.smart sla
7.smart sla 7.smart sla
7.smart sla
 
1.ams cover page
1.ams cover page1.ams cover page
1.ams cover page
 

3.detailed it activities

  • 1. Detailed IT Activities      Antivirus Activities Active Directory   Update Virus Definitions Installation of AD Schedule Virus Scan DNS Configuration   Deploy AV Profiles/ Policy Deploying and Configuration of AD   Quarantine the Virus Creation of Organization Unit and applying Group Policy Upgrade AV Version   Deploying of software via Group Policy Antivirus Scanning activity. Perform Replication Check   Antivirus Central Server Setup activity. Perform AD Health Check via DC Diag Antivirus definition updates activity.   Logon Script Antivirus activity reporting Define Security and Configuration of Security   Clean Infected Item Create, Modify Users Monitor, Alert, Remediate the AV Services   Monitoring of AD Services and Events Reboot machine after definition Update Perform System State Backup   Centralized Monitoring User account disabling activity. Uninstalling Antivirus   Create network share activity. Quarantine infected machine Adjust permissions on an existing share activity.   Report for Virus File and Folder security set up and configuration activity.   Reset user passwords activity. Data Backup   Add printers and print queues activity. Install Backup Software Configure desktop policy   Server, Desktop, Laptop Backtop Configure power management policy   Schedule Backup User account creation activity.- AD Type of Backup - Incremental, Differential, Full Email Mailbox set up and configuration activity.-   backup Exchange Server Folder and Volume Backup   Change administrator passwords activity.- AD Version Upgrade Active directory migration activity.- AD   Offsite Backup Monitoring and Remediation of Backup Services   Patch Management Restoration - File level, full volume, hard disk level Windows Update – Custom , Automatic   Reporting Test Patches Approve Patches   Database related Activities Centralized Patching Installing Database Schedule Patch   Uninstalling Database Cancel Patches Upgrading Database   Rollback Patches Monitoring Database performance Microsoft Patch Installation   Database Performance Tuning Patch Scan activity. Reporting - Database Health Report Patch Update activity.   Monitoring Database requests Non MS software Patches  
  • 2. Detailed IT Activities      Exchange Server Software Installation   Installation of AD, DNS, Exchange Server Identify the list of SW to be installed Configuration of Exchange Server Test Install   Mail Box Creation Develop shell scripts for sw installation   Restriction of Mail Box Size Installation of Software Monitoring Exchange Server Services   Uninstall of Software Monitoring Mail Queue Up gradation of Software   Configuration of Smart Handled Devices Report of Installed Software   Tracing the Messages Performing Exchange health check   Virtualization Management Offline defragmentation Installation of Virtual Server   Exchange server client side install Monitoring of health state of Host Server   Reporting Tracking Uptime of Host Server Exchange server installation activity Creation of Virtual Machine   Exchange Server account creation and roles Monitoring CPU, Memory, Network Utilization of VM definition activity.   Exchange server configuration and policy setting Data Store Configuration & Monitoring   User Creation & Role Configuration   Inventory Management   Physical Machine Count Server Management   Installed Software, application Count Installation & Configuration of Server License Count   Monitoring Server Uptime Software Metering Monitoring of CPU Ideal Time   Hardware Tracking Monitoring of CPU Usage   Vendor Tracking Monitoring of Memory & Network Usage   Hardware peripheral tracking Power Policy Configuration Spare Asset Tracking   User Account Configuration Hard disk space Tracking User Logon Hours   IP Info Hard Disk Space Monitoring Date of Installation of Software Security Policy Configuration   Tracking Asset Changes Patch Policy Configuration   Tracking Hardware Changes Critical Service Monitoring Warranty Expiration   Report – Uptime History AMC Expiration      
  • 3. Detailed IT Activities      Network Management User Account Administration   Bandwidth Utilization Monitoring Creation of User Defining Right Policy – Admin, Limited User, Local   Network Breakdown Alert User, Guest Uptime of Networking Device   User account disabling activity Inbound and Outbound Bandwidth Adjust permissions on an existing share activity   Port Monitoring File and Folder security set up and configuration activity   Network Configuration report Reset user passwords activity. VPN Monitoring and Report Password Enforcement Policy   Port Intrusion Monitoring User account lock out policy   Open Port Alert Password lockout policy SNMP Monitoring   Configure desktop policy IP Address Monitoring Configure power management policy   Individual User bandwidth Monitoring Site/URL Monitoring   Storage Monitoring Upload and Download Monitoring Storage Device configuration Inter  Networking Device Breakdown alert monitor and alerts for disk space on critical servers (Router, firewall)   monitor the online backup procedures   Monitoring and maintain the validity and integration of Standard Operating Environment Policy the data files.   Creating SOE policy Monitoring performance-critical applications Configuring SOE policy   Monitoring Local and global status Deploying SOE policy Monitoring Time-based snapshots   Monitoring SOE policy Monitoring Database snapshots   Blocking file, folder Monitoring Mirror management Blocking Applications   Monitoring the Storage filer AV engine Reporting SOE Policy Status E-mail reports of daily status   Disable Regedit, Control Panel Standard Desktop Policy Disaster Recovery   Configure Offsite replication Server   OS Upgrade Monitoring Uptime of Offsite Server OS Upgrade via CD, Network   Monitoring of Disk Space of the Offsite Server DNS , AD, DHCP Configuration Uptime of the Link   Enable PXE boot on Client End Schedule Tape Backup   feasibility check for the Upgrade      
  • 4. Detailed IT Activities      Distributed File System Information Security Management   Configure Dfs root, Dfs link, Dfs target (or Hardening of Firewall, Router, Switches replica)   Configure User Rights for the above folders Creation of VLAN to segregate the different groups   Dump the Files, Folders in the Server Access permission to the Users Restriction on Floppy, DVD, CD, Storage Devices to Monitoring User Access on the distributed file   users Monitoring Disk Space on the Server   Scanning incoming and Outgoing emails Monitoring Uptime of the Server Wifi restrictions   Preparing vulnerability report   Business Continuity plan Backup and Disaster Recovery   Hardening of OS   Applying Patches   Applying Security Policies Applying Antivirus policies   Restriction on file, folder and applications   Content Filtering Bandwidth Usage monitoring   Daily Reports