1. 1 Detailed IT Activities
Antivirus Activities Active Directory
Update Virus Definitions Installation of AD
Schedule Virus Scan DNS Configuration
Deploy AV Profiles/ Policy Deploying and Configuration of AD
Quarantine the Virus Creation of Organization Unit and applying Group Policy
Upgrade AV Version
Deploying of software via Group Policy
Antivirus Scanning activity. Perform Replication Check
Antivirus Central Server Setup activity. Perform AD Health Check via DC Diag
Antivirus definition updates activity.
Logon Script
Antivirus activity reporting Define Security and Configuration of Security
Clean Infected Item Create, Modify Users
Monitor, Alert, Remediate the AV Services
Monitoring of AD Services and Events
Reboot machine after definition Update Perform System State Backup
Centralized Monitoring User account disabling activity.
Uninstalling Antivirus
Create network share activity.
Quarantine infected machine Adjust permissions on an existing share activity.
Report for Virus File and Folder security set up and configuration activity.
Reset user passwords activity.
Data Backup
Add printers and print queues activity.
Install Backup Software Configure desktop policy
Server, Desktop, Laptop Backtop Configure power management policy
Schedule Backup User account creation activity.- AD
Type of Backup - Incremental, Differential, Full Email Mailbox set up and configuration activity.-
backup Exchange Server
Folder and Volume Backup
Change administrator passwords activity.- AD
Version Upgrade Active directory migration activity.- AD
Offsite Backup
Monitoring and Remediation of Backup Services
Patch Management
Restoration - File level, full volume, hard disk level Windows Update – Custom , Automatic
Reporting Test Patches
Approve Patches
Database related Activities Centralized Patching
Installing Database Schedule Patch
Uninstalling Database Cancel Patches
Upgrading Database
Rollback Patches
Monitoring Database performance Microsoft Patch Installation
Database Performance Tuning Patch Scan activity.
Reporting - Database Health Report Patch Update activity.
Monitoring Database requests Non MS software Patches
2. 2 Detailed IT Activities
Exchange Server Software Installation
Installation of AD, DNS, Exchange Server Identify the list of SW to be installed
Configuration of Exchange Server Test Install
Mail Box Creation Develop shell scripts for sw installation
Restriction of Mail Box Size Installation of Software
Monitoring Exchange Server Services
Uninstall of Software
Monitoring Mail Queue Up gradation of Software
Configuration of Smart Handled Devices Report of Installed Software
Tracing the Messages
Performing Exchange health check
Virtualization Management
Offline defragmentation Installation of Virtual Server
Exchange server client side install Monitoring of health state of Host Server
Reporting Tracking Uptime of Host Server
Exchange server installation activity Creation of Virtual Machine
Exchange Server account creation and roles
Monitoring CPU, Memory, Network Utilization of VM
definition activity.
Exchange server configuration and policy setting Data Store Configuration & Monitoring
User Creation & Role Configuration
Inventory Management
Physical Machine Count Server Management
Installed Software, application Count Installation & Configuration of Server
License Count
Monitoring Server Uptime
Software Metering Monitoring of CPU Ideal Time
Hardware Tracking Monitoring of CPU Usage
Vendor Tracking Monitoring of Memory & Network Usage
Hardware peripheral tracking Power Policy Configuration
Spare Asset Tracking
User Account Configuration
Hard disk space Tracking User Logon Hours
IP Info Hard Disk Space Monitoring
Date of Installation of Software Security Policy Configuration
Tracking Asset Changes Patch Policy Configuration
Tracking Hardware Changes Critical Service Monitoring
Warranty Expiration
Report – Uptime History
AMC Expiration
3. 3 Detailed IT Activities
Network Management User Account Administration
Bandwidth Utilization Monitoring Creation of User
Defining Right Policy – Admin, Limited User, Local
Network Breakdown Alert
User, Guest
Uptime of Networking Device
User account disabling activity
Inbound and Outbound Bandwidth Adjust permissions on an existing share activity
Port Monitoring File and Folder security set up and configuration activity
Network Configuration report Reset user passwords activity.
VPN Monitoring and Report Password Enforcement Policy
Port Intrusion Monitoring User account lock out policy
Open Port Alert Password lockout policy
SNMP Monitoring
Configure desktop policy
IP Address Monitoring Configure power management policy
Individual User bandwidth Monitoring
Site/URL Monitoring
Storage Monitoring
Upload and Download Monitoring Storage Device configuration
Inter Networking Device Breakdown alert
monitor and alerts for disk space on critical servers
(Router, firewall)
monitor the online backup procedures
Monitoring and maintain the validity and integration of
Standard Operating Environment Policy the data files.
Creating SOE policy Monitoring performance-critical applications
Configuring SOE policy
Monitoring Local and global status
Deploying SOE policy Monitoring Time-based snapshots
Monitoring SOE policy Monitoring Database snapshots
Blocking file, folder Monitoring Mirror management
Blocking Applications
Monitoring the Storage filer AV engine
Reporting SOE Policy Status E-mail reports of daily status
Disable Regedit, Control Panel
Standard Desktop Policy Disaster Recovery
Configure Offsite replication Server
OS Upgrade Monitoring Uptime of Offsite Server
OS Upgrade via CD, Network
Monitoring of Disk Space of the Offsite Server
DNS , AD, DHCP Configuration Uptime of the Link
Enable PXE boot on Client End Schedule Tape Backup
feasibility check for the Upgrade
4. 4 Detailed IT Activities
Distributed File System Information Security Management
Configure Dfs root, Dfs link, Dfs target (or
Hardening of Firewall, Router, Switches
replica)
Configure User Rights for the above folders Creation of VLAN to segregate the different groups
Dump the Files, Folders in the Server Access permission to the Users
Restriction on Floppy, DVD, CD, Storage Devices to
Monitoring User Access on the distributed file
users
Monitoring Disk Space on the Server
Scanning incoming and Outgoing emails
Monitoring Uptime of the Server Wifi restrictions
Preparing vulnerability report
Business Continuity plan
Backup and Disaster Recovery
Hardening of OS
Applying Patches
Applying Security Policies
Applying Antivirus policies
Restriction on file, folder and applications
Content Filtering
Bandwidth Usage monitoring
Daily Reports