Enterprise Infrastructure
Tag: OS – Patch Management
Registry Key Quick Reference
Hkey_Classes_Root This key displays information about OLE and associated mappings to support drag-and-drop operations. Hkey_Current_User This points to a branch of Hkey_Users for the currently logged on user. Hkey_Local_Machine This contains computer specific information including installed hardware and software. This is the one I tend to spend the most time in. Hkey_Users This contains information… Continue reading Registry Key Quick Reference
Windows Registry Key Quick Reference
Hkey_Classes_Root This key displays information about OLE and associated mappings to support drag-and-drop operations. Hkey_Current_User This points to a branch of Hkey_Users for the currently logged on user. Hkey_Local_Machine This contains computer specific information including installed hardware and software. This is the one I tend to spend the most time in. Hkey_Users This contains information… Continue reading Windows Registry Key Quick Reference
Sample Visio – Disk Subsystem
Free Sample Disk Subsystem Visio Download Sample Vision Disk Subsystem www.bestitdocuments.com
Windows 200x Service – Configuration Information
Free document download Windows 200x Service – Configuration Information www.bestitdocuments.com
Personnel Security Suggestions
Organizations should develop, document, and implement policies and procedures for the selection, orientation, and supervision of employees and contractors who have access to IT resources. The objective is to ensure that a high level of integrity and satisfactory staff conduct is achieved and maintained, and to promote an awareness of security matters. The following are… Continue reading Personnel Security Suggestions
Business Risk Impact
Risk is based on a systematic examination of assets, threats, and vulnerabilities that provides the foundation for the development of an appropriate IT Security Program. Adequate risk analysis is the key to determining the level of protection required for all computing assets such as networks, applications, systems, facilities and other enterprise assets. A risk analysis… Continue reading Business Risk Impact
Best Practices – Servers (Windows, Unix, AIX, etc…)
Physical Security Secure location or Server room. Server room locked. Server room with adequate, conditioned power. Server room with air conditioning. Server room with adequate ventilation. Services Unused default services removed. Known OS vulnerabilities are current and protected. Current patches and upgrades loaded and tested. Audit logs enabled. Access Privileges Only privileges necessary to the… Continue reading Best Practices – Servers (Windows, Unix, AIX, etc…)
List of Applicable Policies, Laws, and Standards
The law, regulations, polices, and guidelines that affect the system include: U.S. Congress – Public Law (PL) and United States Code (U.S.C) PL 107-347 Section III, Federal Information Security Management Act (FISMA) of 2002, 2002 PL 107-305, Cyber Security Research and Development Act of 2002 PL 96-456, Classified Information Procedures Act of 1980 5 U.S.C.… Continue reading List of Applicable Policies, Laws, and Standards
Desktop Virtualization XP, Vista, Windows PC Alternatives
There are many choices these day’s for your desktop solitions below a matrix that gives you more to consider especially related to virtualization. Free Virtualization document download. Desktop Virtualization Function Traditional PC SMC Thin Client Server Virtualization Video/Audio performance same as traditional PC Yes Yes No No Peripherals compatibility with traditional PC Yes Yes No… Continue reading Desktop Virtualization XP, Vista, Windows PC Alternatives
Windows 2000 Internet Information Server
IIS Components File transfer Protocol (FTP) Server World Wide Web (WWW) Server Simple Mail Transfer Protocol (SMTP) Service Network News Transport Protocol (NNTP) Service FrontPage 2000 Server Extensions Internet Services Manager (HTML) Internet Information Services Snap-in Visual InterDev RAd Remote Deployment Support Indexing Service Certificate Services Windows 2000 Professional can only support 10 network connections… Continue reading Windows 2000 Internet Information Server
IBM Guardium Appliance Port Usage
IBM Guardium Appliance port usage Database Server to Collector Appliance: Port Protocol Description 16016 TCP Linux/UNIX only, both directions, STAP (the probe installed on the database servers) registration, heartbeat, & data 16018 TCP Encrypted:Linux/UNIX only, both directions, STAP registration, heartbeat, & data 8075 UDP Windows only, both directions, STAP heartbeat 9500 TCP Windows only, DB… Continue reading IBM Guardium Appliance Port Usage
Suggested Security Architecture Overview
The security architecture is the layout and design of hardware employed to protect private networks. Best practices dictate that the architecture of a private network linked to the internet be divided by four distinct barriers: front – end firewall, proxy server, web server and back-end-firewall. These barriers are ordered from outside internet access through each… Continue reading Suggested Security Architecture Overview
Windows 2008 Security Guide
Windows 2008 Security Guide Windows Server 2008 Security Guide https://www.bestitdocuments.com/Samples
Excellent windows Tweaks and Internal Information
Great site for Tweaking Windows and understanding some of the internals. http://www.blackviper.com/
Active Directory Structure
To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to add new classes, attributes, and objects.… Continue reading Active Directory Structure
Why Backups alone are not enough
Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as everything we need archives for… Legal… Continue reading Why Backups alone are not enough
Caring for Archives
Physical maintenance of the records All metal paper clips, rusting staples, and rubber bands should be removed. Documents should be in containers that prevent dust from entering Large items should be stored flat. The ideal storage area for records: Amenable to consistent environmental control (temperature and humidity) No water pipes running nearby Little or no… Continue reading Caring for Archives
The Loss of Corporate Knowledge
The challenges are related to people and strategy: Attracting & Retaining Talented People 9% Identifying the Right Team/Leader for Knowledge 15% Defining Standard Processes for Knowledge Work 24% Setting the Appropriate Scope for Knowledge Initiatives 24% Mapping the Organizations Existing Knowledge 28% Justifying the Use of Scarce Resource for Knowledge… Continue reading The Loss of Corporate Knowledge
Management and Support Planning
Planning Fundamentals Understand: “To perceive and comprehend the nature and significance of” Communicate: “The exchange of thoughts” Involve: “To contain or include” Document: Take notes, write everything down Technical Architecture Establish a Technical Architecture and use it!!! TA is the hardware, operating system, applications software, transmission medium, and methodology for an information platform. Standards Based… Continue reading Management and Support Planning
TGIS – Sample Engineering Design / Development Considerations
Route Design and Seasonal Field Activity Cycles Route Design & Analysis – Happens continuously, but there are critical points where data and map products are required in a timely manner to support the following activities. Thaw Settlement Calculations Frost Heave Calculations Pipeline Design Criteria Stress Analysis for Frost Heave Stress Analysis for Thaw Settlement Thermal-Hydraulic… Continue reading TGIS – Sample Engineering Design / Development Considerations
News Flash – We would like your technical input
Please help us improve the content of this Website and this blog. Please submit your IT Technology documents for consideration to our site, your assistance is greatly appreciated. We are all about fostering a Community of Interest (COIs) Working together for: Deliverables Develop (and harmonize) reusable data exchange components Training and Technical Assistance Leverage (Internal… Continue reading News Flash – We would like your technical input
Business Continuation Project Considerations
Top 8 Things to Communicate Proactively ID and leverage existing information upfront Have a clear definition of scope and deliverables Team structure should include functional representation Equalize the workload between your project content experts Gather feedback along the way to make sure you’re meeting milestones Establish top down support and participation Build in project review… Continue reading Business Continuation Project Considerations
What is a process implementation ?
Very simple: Where are you now? Where do we want to be? How do we get there? https://www.bestitdocuments.com/Samples
eGIS Technical Needs
High speed access into Data Center (Large Spatial Data Loads) Administrative privileges over eGIS database schema’s Security Requirements for tGIS (external to Collaboration site) Database user privilege and security requirements Requirements for eGIS data in other systems Data Change Management process and procedures https://www.bestitdocuments.com/Samples
TOP Spot Directory
Excellent search reference. http://www.topspotdirectory.com/ 43 Popular search categories from Art to Weddings www.bestitdocuments.com
It’s about Business !
Business – > Information – > Technology We realize your current businesses have huge existing investments in IT These investments: Fill different needs, Are implemented on different platforms, and Are of different vintages No one in their right mind believes these huge investments will be discarded! Businesses are evolving to be IT centric More and… Continue reading It’s about Business !
Channel Sales – Items to Consider
Territory vs Major Account Manager, vs Channel Manager, vs Global Accounts Manager Forecast: Quota’s (top 10/20 deals) Commit, Top prospects, Most likely, (what moved) Revenue (where can is there low hanging fruit) Sell to and through Lead Generation, Call Activity, Professional association, Tradeshow, Internet resources Buyer: Economic,… Continue reading Channel Sales – Items to Consider
Competency
To perform the job successfully, an individual should demonstrate the following competencies: Customer Service – Responds promptly to customer needs; Responds to requests for service and assistance; Meets commitments. Oral Communication – Speaks clearly and persuasively in positive or negative situations. Written Communication – Writes clearly and informatively. Change Management – Develops workable implementation plans;… Continue reading Competency
Integration Test Team Roles and Responsibilities
The Integration Test Team consists of the IT Integration Test Lead, a System Integration Test Lead or Integration Test Point of Contact (POC) for each system participating in the integration test, and a Project Management point of contact. The roles and responsibilities for the test team members to facilitate the completion of Integration Test activities… Continue reading Integration Test Team Roles and Responsibilities
Sample Project Communications Plan Template
It’s rare that an IT project is completed successfully (on time and within budget) without good communications among all the stakeholders. That’s why it’s so important to make sure your project team develops a communication plan so that lack of communication does not derail your goals. Use this project communications planning template to identify the… Continue reading Sample Project Communications Plan Template