Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
email

Sample Messaging (Email) Consolidation Project

March 12, 2010

In conjunction with the directory services consolidation project, the organization will also benefit from a messaging (email) consolidation effort. Consolidating to a single messaging platform, likely Microsoft Exchange 2000, across departments provides many benefits and cost savings. This effort will tie in very closely with the directory services project...

Img
networking , security

Download Sample External Vulnerability Assessment

March 12, 2010

External Vulnerability Assessment https://www.bestitdocuments.com/Samples

Img
projects

Project Manager’s Checklist

March 12, 2010

      A. Project Organization 1. Is there a formal Project Mission Statement stating the objectives and strategy of the project? 2. Does the Mission Statement define:   a. The approach to managing the project?   b. The scope and objectives of the project?   c. The business...

Img
projects

Master Project Plan Check List

March 11, 2010

Project Code Project/Application Name Project Acronym Project Coordinator QCC Date Received Date Completed Document Section Description First Review Second Review Third Review Mandatory Checks Does the cover page identify the Application with its Name and Project Code? Have the appropriate Authorities approved this deliverable (via signature or appropriate email...

Img
projects

Keep project team meetings on task

March 11, 2010

How many times has this happened to you? You attend a meeting where members of a project team have enthusiastically volunteered to complete a variety of assignments. Then, a week later at a follow-up meeting, very few team members completed their assignments while others could not even remember the...

Img
compliances , projects

Sample IT Wide Status Definitions

March 11, 2010

GREEN:  Project on schedule with no gating issues.  AMBER:  Significant issues with interim deliverable(s), possible Interim deliverable slips. However, final deliverable(s) is/are still achievable with proper attention/involvement. RED:  Serious issues.  Unlikely to make final deliverable MIS Status Amplifications: Amplification on status for MIS Integration Test Leads and Release Leads: ...

Img
compliances , security

Regulation Impact by IT Technology Domains

March 11, 2010

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email...

Img
networking , security

Suggested Perimeter Network TCP/IP Filters

March 11, 2010

Carefully consider which TCP/IP services will be allowed through and to the perimeter routers and firewalls (inbound and outbound). Use the following guidelines for creating filters:  those services that are not explicitly permitted are prohibited.  The following tables present common services to restrict because they can be used to...

Img
compliances , networking , sample-it-spreadsheets , security

Sample Architectural Key Components Planning Document

March 11, 2010

Introduction Technology Component Name: Initiator: Problem/Opportunity Definition This is the problem or opportunity that caused the inception of the project. Business Drivers This section contains any business drivers that are associated with this component (if applicable). High Level Business Requirements This section provides the “what” of the business need....

Img
networking , security

Network Fault Management Description

March 11, 2010

Faults can be defined as any failure or outage in the network.  These can be system or service related and often times are masked as a downstream product of a combination of the two.  Proactive fault analysis is an essential component of network management deployment. The same type of...

Img
compliances , security , visio-stencils

Sample Visio – MIL-STD-100 and DOD-STD-1000

March 11, 2010

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description...

Img
networking , security

VLAN Security Test

March 11, 2010

Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report http://www.sans.org/security-resources/idfaq/vlan.php  

Img
networking , security

Sample VLAN Project Charter

March 11, 2010

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed,...

Img
networking , security

Sample VLAN Request Form

March 11, 2010

  Overview   Add or Remove Specify “add” to add new access, or “remove” to remove access that is no longer required. Note that to achieve the best protection for your application, you should request the removal or any access that is no required. Subnet / Mask The IP...

Img
compliances , security

Wireless Security Checklist

March 10, 2010

Data collection: via Kismet. (freeware): · Is the access point (AP) beaconing? (Is the AP configured to send beacon packets?) · Is the access link layer encryption enabled? (Wireless Encryption Protocol) · Is strong link layer encryption enabled? (128 bit WEP) · What channel is the traffic broadcast on? · Is the network...

Img
compliances , security

Sample MIL-STD-100 Objectives

March 10, 2010

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including...

Img
security , virtual-vmware

Citrix Security Checklist

March 9, 2010

· Does a unique account group for Citrix users exist? · Are default user accounts disabled on the server? · Does the server have the latest security patches installed? · Is the Administrator account name default? · Are one-time-passwords used?

Img
o-s , security

Windows XP Host Assessment Checklist

March 9, 2010

· Are Physical Security measures in place? · Is the BIOS password protected? · Does the computer Boot from a CD? · Is AutoRun for the CD-ROM enabled? · Is it possible to run Programs from the CD? · Are Operating System Restrictions in place? · Is NTFS enabled on all partitions? · Is File Sharing...

Img
projects

Sample Clarity Integraton Project Plan

March 8, 2010

Integration Set Up Technical Startup Perform Engagement Management Setup Activities Prepare for Engagement Review Implementation Information with Client Review Project Schedule with Client Architecture and Design Conduct Briefing with Client Project Sponsor Conduct Kick-Off Session Gather Service Desk Information Gather Clarity Information Gather Users and Role Information Gather Service...

Img
application , projects , web-services

Software Security and SDLC Considerations

March 8, 2010

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define...

Img
compliances

Information system Catalog service management Considerations

March 8, 2010

Configuration and asset management Release Management Development Integration  Service Desk / Help Desk    Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information...

Img
networking , security

Network Security Items to Consider

March 8, 2010

Hardware Security Hardware asset management Inventory of assets Inventory of IT assets Hardware maintenance and support Network Security Network security management Security of network services Network controls Security of network services Network access control Network routing control User authentication for external connections User authentication for external connections Equipment identification...

Img
business

Autocad 2006/7 File Path Settings

March 8, 2010

Suggested Autocad Settings for reliable and optimal performance. Support File Search Path C:Document and SettingsAdministratorapplication DataAutodeskAutodesk Land Desktop 2006/7R16.2enusupport C:Program FilesAutodesk Land Desktop 2006/7support C:Program FilesAutodesk Land Desktop 2006/7fonts C:Program FilesAutodesk Land Desktop 2006/7help C:Program FilesAutodesk Land Desktop 2006/7express C:Program FilesAutodesk Land Desktop 2006/7supportcolor C:Program FilesAutodesk Land Desktop 2006/7land...

Img
compliances , information-rights-management , security

Identifying Identity Management Needs

March 8, 2010

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added?...

Img
compliances , information-rights-management , security

Solaris Role-Based Access Controls

March 7, 2010

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who...

Img
information-rights-management , security

Manually Configuring Privileges

March 7, 2010

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
email

Sample Email Backup Procedures for Windows

March 7, 2010

No matter what you read in this, alway promote backups of your email and data files. It costs 10 times more time and money to recover lost information than it does to store it.   Purpose This document provides guidelines / instructions that enable Corporate users or the Technology Services Department...

Img
email

Suggested Exchange pre-requisites

March 7, 2010

  Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4   NO W2k3 NT4   NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server...

Img
email

Sample Exchange 2000 Migration Plan

March 7, 2010

Prepare current Email system(s): Backup & restore the complete email system to alternate servers, this is to ensure internal & external (Internet) email can be processed with this standby system. 1. Install IIS if it isn’t already installed. Ensure IIS is installed. 2. Uninstall Outlook from the server. (Outlook...

Img