Our documents are based on successfully executed projects which save you time and money.
application , compliances , o-s , policies , security

Sample Word – Simple Patch Management Standard Example

April 12, 2012

Free Word – Document download Patch Management Standard

Img
application , business , compliances , networking , o-s , security , visio-stencils , web-services

Sample Visio – Network DMZ Drawing with Backup considerations

April 11, 2012

Free – Visio Network DMZ Drawing with Backup considerations Document download DMZ Drawing with Backup considerations www.bestitdocuments.com

Img
application , compliances , itil , security

Grouped Pieces of ITIL V3 Processes

April 11, 2012

ITIL Change Management o Service Catalog o Service Design o Design coordination o Service Level Management o Availability Management o Capacity Management o IT Service Continuity Management o Information Security Management o Vendor / Supplier Management ITIL Service Transition o Financial Management o Demand Management o Service Portfolio Management...

Img
application , compliances , security , web-services

Corporate IT Domain Knowledge

April 11, 2012

How to build or enhance your Corporate IT Domain Knowledge Objectives:   Build an understanding of 1. Business processes and workflows and dependencies 2. Build Domain Oriented Software Development Environment 3. Systems & Software (licensing, licensing recovery and cost to organization) 4. Asset management, know what you have where assets are and classify...

Img
application , compliances , networking , security

A Multi-Layered Security Approach

April 10, 2012

The best security plan is a multi-layered one that creates circles of protection within one another, so that if one defense is penetrated, an intruder still has to get through more levels in order to do damage. Such an approach is called a defense-in-depth design. Computer security should also...

Img
application , compliances , security , web-services

Sample Word – Data Classification and Encryption guidelines

April 9, 2012

What is Confidential Information?  1) Any information not known to outsiders that has value to corporate or whose premature disclosure would help competitors or be harmful to the corporate.  2) Can include physical, electronic, or oral information.  3) Must be classified and protected according to guidelines set in Global Information Classification...

Img
application , networking , sample-it-spreadsheets , security

Sample Excel – Network Communication Speed Comparison Table

April 8, 2012

Free – Excel document download Network Communication Speed Comparison Table www.bestitdocuments.com

Img
application , compliances , projects , web-services

Project Review by Management Considerations?

April 8, 2012

Does management effectively review the progress of new developments (cost and timing) and costs of computing resources? Consider Reporting to senior management Forecasts/budgets Costing method Monitoring process All costs captured www.bestitdocuments.com

Img
application , compliances , web-services

SDLC – Package software support Considerations

April 7, 2012

Are packages appropriately supported and maintained? Consider Maintenance agreement with the supplier Changes and upgrades checked and tested before installation Source code provided Measures to prevent unauthorized access to the software Software supplier: number of support staff, references, reliability Contracts Software certified Where software is owned by the supplier-escrow...

Img
application , business , compliances , networking , o-s , security , visio-stencils

Sample Visio – Windows Access Token and the Security Descriptor

April 6, 2012

 Free – Document download The Access Token and the Security Descriptor  

Img
application , business , compliances , networking , o-s , security , visio-stencils , web-services

Sample Visio – Windows 200x IPSEC flows

April 6, 2012

 Free – Document download Windows 200x IPSEC flows IKE Kerberos v5 Certificate Manual Key (Pre-shared Key) AH SHA1, MD5 ESP DES, 3DES IPSec mode Tunnel Transport

Img
application , compliances , projects , web-services

Integration Test Process Summary

April 3, 2012

Test Planning Test Planning begins once scope closure has occurred and the list of projects is identified for which IT will be performing integration test.  The final deliverable from test planning will be a detailed Integration Test Plan which is the overarching document IT produces to govern the conduct...

Img
application , compliances , networking , o-s , policies , security

Security – Standard Patch and Cert Update Policy Recommendations

April 1, 2012

Suggested Standard for Patch, Cert and Vendor updates Policy Standard Security Update Recommendations Statement All security patch fixes and Cert recommendation, and other such materials provided by vendors or official computer emergency response teams (CERTs) must be promptly implemented for testing, and production. Within 30 days of receipt of...

Img
application , compliances , security , web-services

Suggestion – Securing Oracle Environments

April 1, 2012

Suggested Oracle Standard Corporate’s business functions rely upon the integrity, confidentiality, and availability of its computer systems and the information assets stored within them. Responsibilities and procedures for the management, operation and security of all information processing facilities must be established. This standard supports the stated objectives. Requirements and...

Img
application , compliances , o-s , policies , security

Sample Word – Remote Desktop Protocol Standard

April 1, 2012

Free Word document download Remote Desktop Protocol Standard

Img
application , compliances , security

Sample Word – Third Party Connectivity Guidelines

March 28, 2012

Free Word document download Third Party Connectivity Guidelines www.bestitdocuments.com

Img
application , business , compliances , information-rights-management , security , visio-stencils , web-services

Sample Visio – Certificate Life-Cycle Management (CLM)

March 28, 2012

Free – Visio Document download Certificate Life-Cycle Management www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Sample Word – System Protection Monitoring Standard

March 27, 2012

Free Word document download System Protection Monitoring Standard

Img
application , compliances , networking , policies , security , web-services

Sample Word – Secure Password Storage Standard

March 26, 2012

Free Word document download Secure Password Storage Standard

Img
application , compliances , networking , policies , security , web-services

Sample Word – Corporate Authentication Standard

March 26, 2012

Free Word document download Corporate Authentication Standard

Img
application , compliances , policies , security , web-services

Sample Word – Secure Solaris Standard

March 26, 2012

Free Word document download Secure Solaris Standard

Img
application , business , compliances , visio-stencils , web-services

Sample Visio – Organized Java Layers

March 25, 2012

Free – Visio Document download Organized Java Layers www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Sample Word – Secure Java Coding Standard

March 25, 2012

Free Word document download Secure Java Coding Standard

Img
application , compliances , o-s , security , web-services

Oracle Server Performance Monitoring Considerations

March 25, 2012

The following Oracle Server 10g or higher counters that can be monitored as part an SLA: Number of active connections Buffer Cache Hit Ratio CPU Usage Per Second CPU Usage Per Transaction Current Logons Count Current Open Cursors Count Current OS Load Cursor Cache Hit Ratio. Database CPU Time...

Img
application , compliances , o-s , security , visio-stencils

Sample Visio – Solaris Disk Diagnostics Flow

March 24, 2012

Free – Document download Solaris Disk Diagnostics www.bestitdocuments.com

Img
application , compliances , security

US EMR Adoption Model

March 23, 2012

Common knowledge that you should know. Stage 0 All three ancillaries not installed Stage 1 Ancillaries – Lab, Rad, Pharmacy – All installed Stage 2 CDR, Controlled Medical Vocabulary, CDS, may have document imaging; HIE capable Stage 3 Nursing / clinical documentation (flow sheets), CDSS (error checking), PACS available...

Img
application , compliances , o-s , sample-it-spreadsheets , security

Simple Excel – Backup Schedule Spreadsheet

March 21, 2012

Job Start and end time are approximate due to changes in file size Day of the Week Job Type Jobs Run Job Start and end Times Job Name Monday Differential (Data) Tuesday Differential (Data) Wednesday Differential (Data) Thursday Differential (Data) Friday Differential (Data) Saturday Clean Tape Drives Saturday Full...

Img
application , compliances , o-s , security

Questions to Consider in Developing Backup Procedures

March 21, 2012

Who These are questions to consider when you are deciding who should be doing certain tasks: Who determines what files and computers will be backed up, and how will the policy be published? Who is responsible for doing the backup? Is this responsibility formally part of their job description?...

Img
application , compliances , o-s , security

Summary description of different OS Backup Types

March 21, 2012

Full, Incremental, and Differential Backups: Full Backup Advantages: All files from the selected drives and folders are backed up to one backup set.  In the event you need to restore files, they are easily restored from the single backup set. Disadvantages: A full backup is more time consuming than...

Img
application , email

Simple Script to Stop – Start MS Exchange Services (2000 – 2003)

March 21, 2012

In an emergency like, this might be useful to you for stopping / starting MS Exchange Services: net stop MSExchangeMSMI /y net stop MSExchangePCMTA /y net stop MSExchangeFB /y net stop MSExchangeDX /y net stop MSExchangeIMC /y net stop MSExchangeMTA /y net stop MSExchangeIS /y net stop MSExchangeDS /y...

Img
application , compliances , security

Sample Partial – Backup Tape Rotation Strategy

March 21, 2012

The following is based on the use of 10 tape for a backup rotation. This increases your daily file recovery length to ten days and increases your maximum recovery length to ten days. Mon Tues Wed Thurs Fri Tape 1 Tape 2 Tape 3 Tape 4 Tape5 Mon Tues...

Img