Our documents are based on successfully executed projects which save you time and money.
compliances , sharepoint

A Sample – Change Management Process Flow

February 7, 2013

Changes requested by IT will be logged by the “Managed Service Provider” analyst. An impact analysis is done and a change request form is be submitted to the Application Team’s change review board or the Application Team Project Manager, whoever is designated for approval. All change requests that are approved...

Tags: , , Img
security , visio-stencils

Sample Visio – IT Integration Framework

February 6, 2013

Free Visio IT Integration Framework Document download Sample Visio – IT Integration Framework

Tags: , , Img
compliances , policies

Sample Word – IT Operations Support Policy

February 6, 2013

Free Policy Word Document Services download Sample – IT Operations Support Policy

Tags: , , Img
compliances , policies , security

Sample – Magnetic Media Policy

February 6, 2013

Policy All forms of magnetic storage media (i.e., floppy disk, data tape, data cartridge, flash drive storage drive, thumb drives, etc) must be properly secured in a locked file cabinet or desk when not in use. Open storage of magnetic media is prohibited. Media must be properly labeled to...

Tags: , , , Img
policies , web-services

Sample Word – Application Development Maintenance Policy

February 4, 2013

Free Poliy Word Document Services download Sample – Application Development Maintenance Policy

Tags: , , Img
application , web-services

Sample Visio – Visual IT Design Planes Drawing

February 4, 2013

Nested in this .zip file for your convenience. Sample – Application System Definition Model

Tags: , , Img
compliances , policies , security

Sample – Unauthorized Access Policy

February 3, 2013

Users are prohibited from: Gaining unauthorized access to any Corporate information system Abusing authorized access for personal gain, malicious purposes, or in a way that would result in damage, alteration, or disruption of these systems Capturing or obtaining passwords, encryption keys, or any other access control mechanism which could...

Tags: , , , Img
business , compliances , sample-it-spreadsheets , security

Powerpoint – Information System Security Plan Steps

February 1, 2013

Free Powerpoint document download. Sample Powerpoint – Information System Security Plan Steps

Tags: , , , Img
business , compliances , sample-it-spreadsheets

Powerpoint – COBIT ISO 17799 and ITIL

January 31, 2013

Free PowerPoint document download. COBIT ISO17799 ITIL 

Tags: , , , Img
business

Sample Project – Knowledge Discovery Verification Approach

January 29, 2013

Sample Project – Knowledge Discovery Verification Approach “Managed Service Provider” approach to Knowledge Discovery (KD) verification relies on a combination of “In-Process” Checkpoints and “Transition Completion” Assessment”. These are described below. Activity Description   In-Process Checkpoints Client sign-off on KT plan, goals, and timelines (end of “Project Initiation”) Document reviews to...

Tags: , , , Img
business , data-center-soc-noc , networking

Sample eHealth / Spectrum – Network Device Monitoring Considerations

January 28, 2013

Overview: Devices send traps the SDC – Secure Domain Connector  Central trap locations for all devices:  Primary Trap Director          Host-Name: IP Address: Location:  Failover Trap Director   Datacenter Network Devices:  eHealth eHealth Primary snmp-server “Host-Name” snmp-server “community”  Datacenter Network Devices: Host-Name: IP Address: Location:  eHealth eHealth Backup snmp-server “Host-Name” snmp-server...

Tags: , , Img
policies

Sample – Corporate Data Damage Policy

January 27, 2013

Policy Corporate & Company uses access controls and other security measures to protect the: Confidentiality, Integrity, Availability Impacting information handled by their computers and communications systems. In keeping with these objectives, management maintains the authority to: Restrict or revoke any user’s privileges, Inspect, copy, remove, or otherwise alter any...

Tags: , , , Img
security , visio-stencils

Sample Visio – Vulnerability Qualys Scanning Process Flow

January 26, 2013

Free Visio Document download Sample Visio – Vulnerability Qualys Scanning Process Flow

Tags: , Img
visio-stencils

Sample Visio – Employee Benefits Orientation Process

January 24, 2013

Free Visio Document Download Sample Visio – Employee Benefits Orientation Process

Tags: , Img
security , visio-stencils

Sample Visio – Employee Asset Recovery Considerations

January 23, 2013

Free Visio Document Download Sample Visio – Employee Asset Recovery Considerations

Tags: Img
business , projects

Sample Excel – HRIS Wage Traking Key Stakeholder User Requirement

January 22, 2013

Sample Excel HRIS document download Sample Excel – Wage Tracking Key Stakeholder User Requirement

Tags: , Img
compliances , security , visio-stencils

Sample Visio – Regulations Comliances Best Practices and Best Technology Alignment

January 21, 2013

Free Visio Compliance Document download Regulations Compliances Best Practices and Best Technology Alignment  www.bestitdocuments.com

Tags: , Img
compliances , itil , visio-stencils

Sample Visio – ITIL Server Application Administration (MACs)

January 20, 2013

Free visio ITIL document download Sample Visio – ITIL Server Application Administration (MACs)

Tags: , , Img
application , security , visio-stencils

Sample Visio – Java Virtual Machine Overview

January 19, 2013

Free Visio Document download Sample Visio – Java Virtual Machine Overview

Tags: , , Img
compliances

Sample Drawing – High Level CobiT Components

January 18, 2013

CobiT Links business goals to IT Goals Set Objectives IT is aligned with the business IT enables the business and maximizes benefits IT resources are used responsibly IT-related risks are managed appropriately Increase automation  (make the business effective) Decrease cost (make the enterprise efficient) Manage risks (security, reliability and...

Tags: , , Img
business , compliances , security

IT Controls who needs it ?

January 17, 2013

Supplies a common language for IT activities and key management practices To avoid misunderstandings, to have efficient communications and enable success Provide a business focus and supports governance expectations Executive alignment to business units and IT engagements Is consistent with general accepted IT good practices and corporate governance and...

Tags: , , Img
compliances , policies , security

Sample – Records Management Policy

January 17, 2013

Introduction The appropriate creation, use and disposition of records are important to the success of the Company and this policy outlines procedures that ensure that the Company remains in compliance with all laws and regulations. All records go through a life cycle. The vast majority of them reach a...

Tags: , , , Img
data-center-soc-noc , mindmap , security

Sample Mindmap – IT Service Architecture Overview

January 16, 2013

Free Mindmap document download Sample Mindmap – IT Service Architecture Overview

Tags: , , , Img
business , security

Bluecoat – Regular Expressions

January 15, 2013

3 Roles Bypass NTLM Dst – Do not Authenticate Force Authentication Regular express ( .*. (FE1 | FE2 | FE3 |…)$ Use splash screen Citrix bypass Proxy if going to Citrix farm / ssl The rules are in layers and can optionally be organized in one or more sections....

Tags: , , Img
business , security

Bluecoat – Using Rule Order to Define Exceptions

January 14, 2013

When the policy rules within a layer are evaluated, remember that evaluation is from the top down, but the first rule that matches will end further evaluation of that layer. Therefore, the most specific conditions, or exceptions, should be defined first. Within a layer, use the sequence of most-specific...

Tags: , , Img
business , sample-it-spreadsheets , security

Sample Excel – Financial Segregation of Duties Checklist

January 12, 2013

Sample Excel Financial Document download Sample – Financial Segregation of Duties Checklist

Tags: , , , Img
visio-stencils

Sample Visio – Virtual VMWareCenter Design

January 11, 2013

Really nice Backup Vendor Comparisons for VMWare  Sample Visio – Virtual VMWareCenter Design

Tags: , , Img
data-center-soc-noc , security , visio-stencils

Sample Visio – VMWare Virtualization Architecture

January 10, 2013

VMWare Server Runs on any x86 server hardware and OS Windows Server and Linux Host OS’s Partition a physical server into multiple virtual server machines Target market – IT centers providing multiple services Allows separate virtual servers to be separately configured for separate IT applications Provisioning Portability, replication, etc....

Tags: , , , , Img
compliances , security

Cloud Computing 3 of 3

January 9, 2013

Cloud Virtualization considerations: Snapshots & Migrations Snapshot: freeze a copy of virtual machine Identify all pages in disk files, VM memory Use copy-on-write for any subsequent modifications To revert, throw away the copy-on-write pages Migration: move a VM to another host Take snapshot (fast) Copy all pages of snapshot...

Tags: , , Img
data-center-soc-noc , policies , security

An effective Patch Management Reporting Tool can and should

January 9, 2013

Gernic Policy: All patches and updates to software installed on computer systems are reviewed and scheduled to be installed based on applicability and severity. In the unlikely event of a breach of security, audit trails are stored for one year and are reviewed by the IT department. Report details...

Tags: , , Img
business , security

High Level Network Assessment Considerations

January 8, 2013

Among the many functions to consider the 11 primary functions should be: 1)    Network Discovery of active hosts 2)    Discovery of Domains, Workgroups and Active Directory members including member servers and workstations 3)    Discovery of System, File and Security Identifications (ACLs) 4)    Enumeration of Registry Hives / keys 5)   ...

Tags: , , Img