Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
o-s

Sample Production Server Cut-over Checklist

January 11, 2011

Sample server details to consider: Administrator / Root Administration in place User Security is in place File system NAS / DAS storage setup File Shares Setup connections Printer Server Setup connections Syncronize Time System Server Setup, OS Build, connections F5 Cache server setup for new server Server Certificate Server...

Img
information-rights-management

Role Based Access Controls – SUDO suggestions

January 10, 2011

Sudo: A Unix command enabling accounting for root actions Sudo (superuser do) intends to replace su; it allows certain users (or groups of users) to run some (or all) commands as root while logging all commands and arguments. Create appropriate Web, Application and Service dedicated Groups to sandbox priveleges. Create...

Img
networking

eHealth – Corelating Interface Indexes to Interface Names

January 9, 2011

Alarms may be generated in Spectrum by either Spectrum itself or eHealth that reference interfaces that seem to have no tie to the device itself. This is because eHealth might refer to the interface using the MIB Index instead of the name.  The MIB indexes can be quickly correlated...

Img
networking

Sample Network Management Project requirements

January 8, 2011

First Tier Network Management Solution support Support Datacenters, Main sites / Disaster Recovery Sites: Graphically configuring and monitoring all equipment Firewalls, Routers, Switches, Modems, Servers, SAN’s, NAS’s, PC’s Network Printers, UPS… etc, Issue periodical reports: Daily, weekly, monthly… Device, configurations & connectivity    Network Fault Management: Network connectivity between...

Img
application

Web Server Security – Suggestions

January 7, 2011

Common Web Vulnerabilities Buffer Overflow Attacks Denial of Service Attacks on vulnerable scripts URL Manipulation Sniffing / Spoofing Credentials Client Parameter Manipulation Brute Force Attacks Web Server Fingerprinting Web Defacements Take web servers seriously, server security is essential for web security, recommendations: Harden servers from attack • Use a...

Img
compliances , networking

Network categories of System Monitoring

January 5, 2011

Monitoring System Configuration Changes This category includes monitoring for changes in hardware and software configurations that can be caused by an operating system upgrade, patches applied to the system, changes to kernel parameters, or the installation of a new software application. The root cause of system problems can often...

Img
projects

Sample Project – Service Life Cycle Management

January 4, 2011

Submitting a project proposal A project is a temporary undertaking with a beginning and end date that uses resources to produce a specific result. A project has a defined outcome, a deadline by which the project must be completed, and a budget that limits the amounts of human resources,...

Img
o-s

Sample Solaris – OS Installation Build Procedures

January 3, 2011

Sample Ultra – OS Installation Procedures The following steps include information about installing and hardening the Operating System. Power On –          As soon as the Initialize Memory starts press STOP A –          The OK prompt appears –          Insert the Solaris 8 Server Configuration CD ROM –          At the OK...

Img
application , compliances , networking , security , web-services

Web Server Security Guidelines

January 2, 2011

A web server is a program, which listens for http requests on a TCP/IP port (normally either port 80 or port 443) and serves html pages in response. There are several web servers currently in the market. The most popular are: Apache SunONE Internet Information Server (IIS 6/7/8) NCSA...

Img
o-s

Excellent – Windows 2000 AD Server site link

January 1, 2011

Excellent web-link to Windows server / Active Directory Reference. http://www.comptechdoc.org/os/windows/win2kgraph/win2kadservers.html

Img