SlideShare a Scribd company logo
1 of 2
Download to read offline
STANDARD OPERATING
PROCEDURE
DEPARTMENT : " IT Department"
PROCEDURE NO: none REVISION : 1/2014
EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 2
TITLE : Creating Log-in ID to access the Server/Network Resources
PURPOSE/ SCOPE
To describe Create log-in id for Users at Laptop and Desktop to access the Server as well as Network Resources within Active
directory.
RESPONSIBILITY
1. IT Head is responsible to approve this Log-in id.
2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure.
MATERIALS AND EQUIPMENT
1. Desktop or Laptop and Server
FREQUENCY
1. When needed.
PROCEDURES
1. IT Requisition form from signed by Department Head and HR owner and submit to IT dept.
2. IT Head will check the form whether all necessary details are fill in the form or not.
3. Form will sent to data network IT Service Engineer/ Data center team / IT help desk team of
IT Dept.
4. IT Service Engineer/ Data center team / IT help desk team will create the login id in server and
respectively security right is given for central Data and network security purpose.
5. They will generate the login id and password.
6. IT Service Engineer/ Data center team / IT help desk team will intimate the IT Head as well as
respective department about the login id and password in turn responsible for configuration
of login id in system.
7. After the completion of job IT Requisition Form will be signed by user and submitted to IT
Dept.
PREPAID BY:
"IN CHARGE IT"
CHECKED BY:
"HEAD IT"
APPROVED BY:
"HEAD QA"
"Signature"

More Related Content

Similar to Creating log in id to access the server

Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document LJ PROJECTS
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Reinier Eiman
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYITLokesh Singrol
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010ShivanchalSingh
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT DepartmentAhmad Suhendro
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srsBek5042
 
Contents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxContents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxmercylittle80626
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemdharm18
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).docMadihaKhalid43
 
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxDocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxjacksnathalie
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IT Risk Assessment Tool
IT Risk Assessment ToolIT Risk Assessment Tool
IT Risk Assessment ToolKevinM48
 
System design document visa
System design document visaSystem design document visa
System design document visaShaily Dubey
 

Similar to Creating log in id to access the server (20)

Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 
Report final
Report finalReport final
Report final
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT Department
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srs
 
Contents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxContents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docx
 
IT Department
IT DepartmentIT Department
IT Department
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxDocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
 
Aditya_2015
Aditya_2015Aditya_2015
Aditya_2015
 
PDD Template.docx
PDD Template.docxPDD Template.docx
PDD Template.docx
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IT Risk Assessment Tool
IT Risk Assessment ToolIT Risk Assessment Tool
IT Risk Assessment Tool
 
Plan training session
Plan training sessionPlan training session
Plan training session
 
Online help desk
Online help deskOnline help desk
Online help desk
 
ServiceDesk Plus Employee Onboarding
ServiceDesk Plus Employee OnboardingServiceDesk Plus Employee Onboarding
ServiceDesk Plus Employee Onboarding
 
System design document visa
System design document visaSystem design document visa
System design document visa
 

More from Danai Thongsin

สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อDanai Thongsin
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgementDanai Thongsin
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedureDanai Thongsin
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284Danai Thongsin
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อDanai Thongsin
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านDanai Thongsin
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจDanai Thongsin
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยวDanai Thongsin
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์Danai Thongsin
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานDanai Thongsin
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance payDanai Thongsin
 

More from Danai Thongsin (20)

3CX Powerful APP
3CX Powerful APP3CX Powerful APP
3CX Powerful APP
 
3cx interface
3cx interface3cx interface
3cx interface
 
สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อ
 
DNSSystemServicesLTD
DNSSystemServicesLTDDNSSystemServicesLTD
DNSSystemServicesLTD
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgement
 
social media policy
social media policysocial media policy
social media policy
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedure
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284
 
Cctv
CctvCctv
Cctv
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อ
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจ
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยว
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
 
ระเบียบ
ระเบียบระเบียบ
ระเบียบ
 
It samui club letter
It samui club   letterIt samui club   letter
It samui club letter
 
Rights and duty
Rights and dutyRights and duty
Rights and duty
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงาน
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance pay
 
Internet system plan
Internet system planInternet system plan
Internet system plan
 

Recently uploaded

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Recently uploaded (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Creating log in id to access the server

  • 1. STANDARD OPERATING PROCEDURE DEPARTMENT : " IT Department" PROCEDURE NO: none REVISION : 1/2014 EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 2 TITLE : Creating Log-in ID to access the Server/Network Resources PURPOSE/ SCOPE To describe Create log-in id for Users at Laptop and Desktop to access the Server as well as Network Resources within Active directory. RESPONSIBILITY 1. IT Head is responsible to approve this Log-in id. 2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure. MATERIALS AND EQUIPMENT 1. Desktop or Laptop and Server FREQUENCY 1. When needed. PROCEDURES 1. IT Requisition form from signed by Department Head and HR owner and submit to IT dept. 2. IT Head will check the form whether all necessary details are fill in the form or not. 3. Form will sent to data network IT Service Engineer/ Data center team / IT help desk team of IT Dept. 4. IT Service Engineer/ Data center team / IT help desk team will create the login id in server and respectively security right is given for central Data and network security purpose. 5. They will generate the login id and password. 6. IT Service Engineer/ Data center team / IT help desk team will intimate the IT Head as well as respective department about the login id and password in turn responsible for configuration of login id in system. 7. After the completion of job IT Requisition Form will be signed by user and submitted to IT Dept.
  • 2. PREPAID BY: "IN CHARGE IT" CHECKED BY: "HEAD IT" APPROVED BY: "HEAD QA" "Signature"