Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
application , compliances , o-s , security

Questions to Consider in Developing Backup Procedures

March 21, 2012

Who These are questions to consider when you are deciding who should be doing certain tasks: Who determines what files and computers will be backed up, and how will the policy be published? Who is responsible for doing the backup? Is this responsibility formally part of their job description?...

Img
application , compliances , o-s , security

Summary description of different OS Backup Types

March 21, 2012

Full, Incremental, and Differential Backups: Full Backup Advantages: All files from the selected drives and folders are backed up to one backup set.  In the event you need to restore files, they are easily restored from the single backup set. Disadvantages: A full backup is more time consuming than...

Img
application , email

Simple Script to Stop – Start MS Exchange Services (2000 – 2003)

March 21, 2012

In an emergency like, this might be useful to you for stopping / starting MS Exchange Services: net stop MSExchangeMSMI /y net stop MSExchangePCMTA /y net stop MSExchangeFB /y net stop MSExchangeDX /y net stop MSExchangeIMC /y net stop MSExchangeMTA /y net stop MSExchangeIS /y net stop MSExchangeDS /y...

Img
application , compliances , security

Sample Partial – Backup Tape Rotation Strategy

March 21, 2012

The following is based on the use of 10 tape for a backup rotation. This increases your daily file recovery length to ten days and increases your maximum recovery length to ten days. Mon Tues Wed Thurs Fri Tape 1 Tape 2 Tape 3 Tape 4 Tape5 Mon Tues...

Img
application , compliances , security

Sample Partial – Disaster Recovery Plan

March 21, 2012

A disaster recovery plan consists of information and procedures required to make a rapid recovery from an occurrence which would disable Corporate Services for more than 24 hours such as a tornado, earthquake, fire, or act of sabotage or terrorism. Successful recovery of operations is dependent upon a complete...

Img
application , compliances , security , web-services

Sample – Disaster Recovery Record Salvage Procedures

March 21, 2012

If a disaster strikes and records are damaged, knowing the correct salvage procedures can minimize lost data.  Magnetic, photographic and paper media can require different techniques.  The chart on the following pages indicates the appropriate initial and follow-up action for each media.  Prompt restorative action can minimize or prevent...

Img
application , compliances , o-s , security , web-services

Hardening Enterprise Apache Installations

March 20, 2012

Great PDF document reference. Check it out… www.bestitdocuments.com

Img
application , projects

Sample Word – User Acceptance Test Plan

March 18, 2012

Free Word document download Template document: User Acceptance Test Plan www.bestitdocuments.com

Img
application , business , compliances , visio-stencils

Sample Visio – Business Applications Framework

March 17, 2012

Free – Visio Document download Simple Sample Drawing. Business Applications Framework www.bestitdocuments.com

Img
application , compliances , policies

Sample Word – WINXML Query Interface Standards

March 17, 2012

Free Word document download  Sample WINXML Query Interface Standards

Img
application , business , compliances , networking , security , visio-stencils , web-services

Sample Visio – High Level Hyperion Topology Drawing

March 14, 2012

Free – Visio Document download Sample High Level Hyperion www.bestitdocuments.com

Img
application , web-services

Sample Word – Quick Reference – Useful SQL queries

March 9, 2012

Free Word document download Useful SQL queries for popular SQL servers www.bestitdocuments.com

Img
application , compliances , web-services

Sample Word – SQL Service Response Time Considerations

March 8, 2012

Great information for a Storage Analyst or DBA analyst. SQL dba performance considerations. We would appreciate any backlinks you can create. Free Word document download SQL Service Response Time Considerations www.bestitdocuments.com

Img
application , compliances , o-s , policies , security , web-services

IT Operations and Maintenance and NIST standards that apply

March 7, 2012

IT Operations and Maintenance Review Operational Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-53A SP 800-100 Conducting Continuous Monitoring SP 800-53A SP 800-100 Conduct Re-Authorization SP 800-37 SP 800-53A Engineering and Development Controls SP 800-53 FIPS-200 www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Assessment descriptions and NIST standards that apply

March 7, 2012

Integrate Security into Established Environments SP 800-64 Certify System Security SP 800-37 SP 800-53A Test and Assess Security Controls SP 800-37 SP 800-53A Accredit System Security SP 800-37 Operation and Maintenance Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-100 SP 800-53A Conduct Continuous Monitoring SP 800-100 SP...

Img
application , compliances , policies , security , web-services

SDLC Descriptions and NIST Standards that apply

March 6, 2012

SDLC Activity and supporting NIST publications NIST SP 800-64 Project Initiation – Security Planning SP 800-64 SP 800-100 SP 800-37 SP 800-53 Categorize Security for the System SP 800-60 FIPS-199 Assess Risk to a System SP 800-30 Analyze Risk Requirements SP 800-53 Assess Business Impact SP 800-34 Assess Policy...

Img
application , compliances , web-services

Sample of Application Support Management Services

March 4, 2012

When considering an Application Service Provider consider the understand that changes that are inevitable in any IT environment. Changes can happen in a business environment for many reasons; some key reasons are listed below: 1. Application Consolidation 2. Application Decommissioning etc. 3. Acquisitions 4. Divestiture 5. Down sizing Considering an Application Service Provider...

Img
application , business , visio-stencils

Sample Visio – High Level – Outlook 200x Overview

March 3, 2012

Show your appreciation with a backlink? Free – Visio Document download High Level – Visio Sample Outlook 200x Overview www.bestitdocuments.com

Img
application , compliances , security

Compliance – Audit Reporting Requirements (SOX, HIPAA, GLBA and PCI)

March 2, 2012

SOX, HIPAA, GLBA and PCI requirements: SOX Audit Reports User Logons Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. User Logoffs Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. Logon Failures...

Img
application , compliances , networking

Great reference: NAT & Private IP Address Ranges

February 18, 2012

Great reference: NAT & Private IP Address Ranges

Img
application , business , visio-stencils

Sample Visio – ERP Service Portal Drawing

February 18, 2012

High level ERP Service Portal. Free – Visio Document download ERP Service Portal Drawing

Img
application , visio-stencils , web-services

Sample Visio – Software Parametric Estimations considerations

February 18, 2012

High Level – Software Parametric Estimations Free – Visio Document download Software Parametric Estimations

Img
application , visio-stencils , web-services

Sample Visio – IIS6 / 7 – Apache Policy Architecture

February 18, 2012

High Level Siteminder architecture drawing. Free – Document download IIS6 / 7 – Apache Policy Architecture

Img
application , projects , visio-stencils

Sample Visio – Simple Application upstream / downstream flow and interactions

February 17, 2012

This Sample drawing demonstrates how IT Applications should be documented. Systems, Databases flows and dependencies are important for Testing, Development, Support, reliability and auditing. Free – Visio Document download Application and flows www.bestitdocuments.com

Img
application , compliances , security

What is Data Retention Compliance?

February 11, 2012

The ability to stipulate specific life cycle for different types of corporate IT documents. 1) Data usability and accessibility, the document must be in a useful form, e.g. viewable / reusable. The retrieval must meet the business process requirements. 2) Data security, the document must be held so as to...

Img
application , business , o-s , security

OS Patch Management Challenges Today

February 6, 2012

Patch Management Challenges Today, all of the assets that have to be analyzed for risk, prioritized and approach. www.bestitdocuments.com

Img
application , business , compliances , security

OSI 7498-2 Security Reference Model Function Layers

February 4, 2012

OSI Layers OSI 7498-1 Network Model Description OSI 7498-2 Security Service 1 The Physical Layer contains the data represented as electronic bits. Data travels over a physical medium using specific transmission devices and media. Connection Confidentiality, Traffic Flow Confidentiality 2 The Data Link Layer organizes electronic bits into logical...

Img
application , business , compliances , networking , o-s , security

Audit is Managing Client Expectations

February 4, 2012

There are 6 basic entry points into any network: Through a firewall / DMZ Usually a single IP address or perhaps a couple but it is not too difficult to launch an audit against these targets. Most audits reveal issues related to the OS, Services running, and Web Servers...

Img
application , compliances , security

ISO 27002 – Information Security Controls

February 1, 2012

Introduction Today, generally Corporate Information Security Controls, use the international standard ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice for information security management as an organizational framework to map security controls to and from the Corporate Policy, Standards and procedure documents. Each of the Corporate Enterprise...

Img
application , security

Sample Word – DRM – Livelink Evaluation Summary

January 25, 2012

Free document download Livelink Evaluation Summary

Img
application , sample-it-spreadsheets

Sample Excel – DRM – Complete Livelink Research Excel Spreadsheet

January 25, 2012

Free Excel document download Complete Livelink Research Spreadsheet

Img