Our documents are based on successfully executed projects which save you time and money.
o-s , sample-it-spreadsheets

Sample Excel – Unix – Redhat, etc… Master VI Commands spreadsheet

April 4, 2012

Free – Excel document download Master VI Commands www.bestitdocuments.com

Img
o-s , sample-it-spreadsheets , security

Sample Excel – Unix – Redhat, etc… UNIX / Linux Command Summary

April 4, 2012

Free – Document download UNIX / Linux Command Summary

Img
o-s

Sample Word – Installed – OS Build – HPUX 10.xx and 11.x

April 4, 2012

Free Word document download OS Build – HPUX 10.xx and 11.x

Img
application , compliances , networking , o-s , policies , security

Security – Standard Patch and Cert Update Policy Recommendations

April 1, 2012

Suggested Standard for Patch, Cert and Vendor updates Policy Standard Security Update Recommendations Statement All security patch fixes and Cert recommendation, and other such materials provided by vendors or official computer emergency response teams (CERTs) must be promptly implemented for testing, and production. Within 30 days of receipt of...

Img
application , compliances , o-s , policies , security

Sample Word – Remote Desktop Protocol Standard

April 1, 2012

Free Word document download Remote Desktop Protocol Standard

Img
application , compliances , o-s , security , web-services

Oracle Server Performance Monitoring Considerations

March 25, 2012

The following Oracle Server 10g or higher counters that can be monitored as part an SLA: Number of active connections Buffer Cache Hit Ratio CPU Usage Per Second CPU Usage Per Transaction Current Logons Count Current Open Cursors Count Current OS Load Cursor Cache Hit Ratio. Database CPU Time...

Img
business , compliances , o-s , security , visio-stencils

Sample Visio – Solaris Disk States

March 24, 2012

Free – Visio Document download Solaris Disk States www.bestitdocuments.com

Img
application , compliances , o-s , security , visio-stencils

Sample Visio – Solaris Disk Diagnostics Flow

March 24, 2012

Free – Document download Solaris Disk Diagnostics www.bestitdocuments.com

Img
application , compliances , o-s , sample-it-spreadsheets , security

Simple Excel – Backup Schedule Spreadsheet

March 21, 2012

Job Start and end time are approximate due to changes in file size Day of the Week Job Type Jobs Run Job Start and end Times Job Name Monday Differential (Data) Tuesday Differential (Data) Wednesday Differential (Data) Thursday Differential (Data) Friday Differential (Data) Saturday Clean Tape Drives Saturday Full...

Img
application , compliances , o-s , security

Questions to Consider in Developing Backup Procedures

March 21, 2012

Who These are questions to consider when you are deciding who should be doing certain tasks: Who determines what files and computers will be backed up, and how will the policy be published? Who is responsible for doing the backup? Is this responsibility formally part of their job description?...

Img
application , compliances , o-s , security

Summary description of different OS Backup Types

March 21, 2012

Full, Incremental, and Differential Backups: Full Backup Advantages: All files from the selected drives and folders are backed up to one backup set.  In the event you need to restore files, they are easily restored from the single backup set. Disadvantages: A full backup is more time consuming than...

Img
compliances , networking , o-s , security , web-services

Apache Benchmark For Unix (Apache) Weblink

March 20, 2012

A great Weblink reference…. Apache check it out…. www.bestitdocuments.com

Img
application , compliances , o-s , policies , security , web-services

IT Operations and Maintenance and NIST standards that apply

March 7, 2012

IT Operations and Maintenance Review Operational Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-53A SP 800-100 Conducting Continuous Monitoring SP 800-53A SP 800-100 Conduct Re-Authorization SP 800-37 SP 800-53A Engineering and Development Controls SP 800-53 FIPS-200 www.bestitdocuments.com

Img
compliances , o-s , security

System Log Events that should be logged

March 2, 2012

Therefore, logs shall be created whenever any of the following activities are requested to be performed by the system: Create, read, update, or delete confidential information, including confidential authentication information such as passwords; Create, update, or delete information not covered in above (1); Initiate a network connection; Accept a...

Img
compliances , o-s , security

Windows Level Certification Checklist

February 23, 2012

Window policy information for Account Information [ ] List Groups and Their Users [ ] List Users and Their Groups [ ] List Users and Their Rights [ ] List Users With Admin Privilege [ ] List Locked Out Accounts [ ] List Disabled Accounts [ ] List Expired...

Img
compliances , o-s , security , visio-stencils

Sample Visio – Active Direcotry Architecture Sample

February 23, 2012

Free – Visio Document download AD Architecture sample www.bestitdocuments.com

Img
o-s

The value of Securing Your online Link

February 12, 2012

Internet crime rising With all the advent of the internet in just about all spheres, including e-commerce to be able to shopping as well as networking, world wide web has become one of the biggest means of communication on the planet. Instances of incorrect use regarding important information just...

Img
business , compliances , o-s , security

Sample – Estimated effort and cost to Patch 1000 Physical / Virtual Servers

February 6, 2012

Estimates and costs may vary. www.bestitdocuments.com

Img
business , compliances , o-s , security

Sample – Estimated effort and cost to Patch 100 servers

February 6, 2012

Estimates and costs may vary. www.bestitdocuments.com

Img
application , business , o-s , security

OS Patch Management Challenges Today

February 6, 2012

Patch Management Challenges Today, all of the assets that have to be analyzed for risk, prioritized and approach. www.bestitdocuments.com

Img
application , business , compliances , networking , o-s , security

Audit is Managing Client Expectations

February 4, 2012

There are 6 basic entry points into any network: Through a firewall / DMZ Usually a single IP address or perhaps a couple but it is not too difficult to launch an audit against these targets. Most audits reveal issues related to the OS, Services running, and Web Servers...

Img
business , compliances , o-s , security

Sample – Windows Services Suggestions

February 4, 2012

 Free – Document download Windows Services Suggestions

Img
o-s , sample-it-spreadsheets , security

Sample Excel – Windows Migration Planning spreadsheet

February 3, 2012

Free – Document download Windows Migration Planning spreadsheet www.bestitdocuments.com

Img
networking , o-s , security

Wireless 2.4GHz ISM Band Channels 802.11 DSSS

February 3, 2012

Channels allowed by Country www.bestitdocuments.com

Img
business , o-s , security

What Can Go Wrong During an IT Pen – Test – Slide Deck

February 2, 2012

 Free – Document download What Can Go Wrong During an IT Pen – Test

Img
business , compliances , o-s , security

Information Security Threat Assessment – Slide Deck

February 2, 2012

Author uknown. Information Security Threat Assessment

Img
business , compliances , o-s , security

Securing Your E-Business Assets – Slide Deck

February 2, 2012

 Free – Document download Securing Your E-Business Assets

Img
business , o-s

Engineering Essential Characteristics – Slide Deck

February 2, 2012

Free – Document download Engineering Essential Characteristics  

Img
business , compliances , o-s , security

Sample IT Operational Risk Management Slide Deck

February 2, 2012

 Free – Document download IT Operational Risk Management Slide Deck

Img
business , compliances , o-s

Reference: IT Outsourcing Slide Deck

February 2, 2012

 Free – Document download IT Outsourcing Slide Deck

Img
business , o-s

Sample – Software Installation and Maintenance Architecture

February 2, 2012

Overall Architecture This section provides information on the Software Installation and Maintenance architecture. It discusses the architecture in terms of the software deployment phases that were introduced in the preceding section. Windows 200x Software Installation and Maintenance requires Windows 200x Server, Active Directory, Group Policy, and Windows 200x Professional. ...

Img