(Hardware & Infrastructure)

Slides:



Advertisements
Similar presentations
Software Asset Management (SAM) ITS Offsite Workshop 2002 November 8, 2002.
Advertisements

5-9/12/2005 CPE How to format your computer and re-install Windows XP.
YNG Solutions Website Usability Review Prepared by Josepha Rood December 19, 2008.
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Managing a computerised PO Operating environment 1.
Network security policy: best practices
Content Management and Process Automation Presented by Mark Chambers SE Regional Manager Document Imaging Solutions, Inc.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Protecting ICT Systems
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computers & Employment By Andrew Attard and Stephen Calleja.
Managing Computerised Offices Operating environment
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Chapter 4: Overview of Preventive Maintenance
Information Systems Security Operational Control for Information Security.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Enterprise Resource Planning ERP Systems
Appendix C: Designing an Operations Framework to Manage Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Module 15 Managing Windows Server® 2008 Backup and Restore.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Network Security & Accounting
HalFILE 2.1 Network Protection & Disaster Recovery.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
1 Determining a client’s peripheral requirements  Determine current business practices  Determine peripheral requirements  Analyse and document existing.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
«My future profession»
Slide Template for Module 4 Data Storage, Backup, and Security
Information Technology Acceptable Use An Overview
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Welcome © GTM Software. Welcome © GTM Software.
Discovering Computers 2012: Chapter 8
Leverage What’s Out There
UNIT 19 Data Security 2.
Your Computer Wants To Ruin Your Life
Information Technology (IT) Department
Unit 2 Computer Systems HND in Computing and Systems Development
Information and documentation media systems.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Dumps Questions
VCE Questions Dumps
Computer Ethics.
LO2: Understand Computer Software
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
County HIPAA Review All Rights Reserved 2002.
Windows exam.
INFORMATION SYSTEMS SECURITY and CONTROL
Operating System Review
Part 3.
Operating Systems Tasks 17/02/2019.
Database Backup and recovery
What is Information Security?
Operating Systems Tasks 04/04/2019.
Security week 1 Introductions Class website Syllabus review
PLANNING A SECURE BASELINE INSTALLATION
WJEC GCSE Computer Science
Operating Systems Tasks 05/08/2019.
Presentation transcript:

(Hardware & Infrastructure) DLM IT POLICY 2010 Speed Informative Reliable Optimal Performance (System) (Hardware & Infrastructure) Reliable & Secure Smart & Responsible (Users)

What is it Why

What Safety  IT Assets Security  Prevent & Protect What : Hardware, Software & User When : From Inquiry to Disposal Where : DLM Who : Everyone How : Detail Process Safety  IT Assets Security  Prevent & Protect Consistency  Data

90% Why Operational Using IT Email Drawing Administration Purchasing Production Logistic Marketing 90% Operational Using IT

Icons : User : Management : IT : Logistic : Purchasing : HR-GA

External Data Storage Usage No. Title Manager Staff IT 1 User Guideline v 2 Procurement 3 Installation 4 Email & Internet Usage 5 Emergency 6 Disposal 7 Budgeting 8 Server SOP 9 Audit 10 Maintenance 11 Backup 12 External Data Storage Usage 13 Virus handling

1. User Guidance Done by HR. Applied to all employee. Place at suitable position Y evaluate each user skills Socializing Standard User Guidance Give training Fulfill Standard ? N Evaluate every new employee Revaluate Done by HR. Applied to all employee.

Skill vs. Work area Marketing Engineering Logistic Finance Manager Plant Operator Outlook High Medium Word Low Excel Power Point CRM TruTopFab Platinum - Optipro

2. Procurement Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Approve Y N Returned to Requester Give to Purchasing to be executed

Procurement WHY : WHAT : Standardized IT Inventory Standardized Maintenance Standardized Services Standardized Operation Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services

Backup Softcopy to Server 3. Installation Received by Logistic & Informed IT Register & Labeled Backup Softcopy to Server Setup according Standard N Testing Y Ready to use

Installation WHY : WHAT : Manageable IT Asset Optimal performance Can be outsourced Smart User WHAT : 1. Hardware 2. Software Manageable IT Asset: Terlabel dengan baik Standardized Driver & copy tidak hilang Optimal performance : Asset : karena ga diinstall aneh2 dan yang diperlukan pasti ada Personel : IT tidak disibukkan dengan stupid thing. Smart user : 1. Bisa setup email sendiri, dll

4. Internet & Email Work Communication Educative Informative Legal

Email Do & Don’t Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast email for non work related Send oversized attachment Use personal email for work communication

Internet Do & Don’t Do Communicate with colleague Communicate with Business Partner Gather information Work related research Don’t Illegal usage Blast email for non work related

Why all those Do & Don’t Working time efficiency Network Security Network Traffic Resource Company image

5. Emergency Case : Inconsistency data Power failure Nature disaster

Case 1 : Inconsistency data User inform to IT Analyze Problem Find Solution Inform User Log Problem Report to management

Wait for Confirmation from IT to start using ERP Case 2 : Power Failure After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP

Case 3 : Nature Disaster Locate the closets fire extinguisher Pull off all hard disk & take it to save area Go to server room Shut down server

6. Disposal WHAT : WHY : 1. Hardware 2. Software 3. Hard disk Controlled Data Security

Hardware Disposal Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Approved Y N End Revised Asset List Execute Asset disposal process

Software Disposal User request to IT IT Analyze request Approved Y N End Uninstall Software Update IT Asset List

Hard Disk Disposal Prepare new Hard disk Backup current Hard disk Restore Backup on new hard disk Do testing Keep Old Hard disk for 2 Years N Problem Put on Log Y > 2 years Destroy Hard disk Y Solve problem

7. Standardization & Budgeting Review IT Asset List Revised Proposal N Make Proposal Request GM Approval Approved N Y Request Managing Director Approval Approved Y Include to Next Year Budgeting

Why ? - Controlled Planned Well Budgeted Maintained

8. Server SOP Standard steps in Turning On / Off DLM servers & Network Peripherals. HP Procurve Switch (3) Peplink Domain Controller Gateway Tops1000 Planet Backup PC Anti Virus

Turning ON Turning Off HP Procurve Anti Virus Peplink Backup Data Domain Controller Planet Gateway Tops1000 Tops1000 Gateway Planet Domain Controller Backup Data Peplink Anti Virus HP Procurve

9. Audit Collect Info Revise IT Policy Analyze Improvement Plan Log Findings Improvement Plan Revise IT Policy

Purpose Improvement

10. Maintenance Physical Cleaning Virus Scanning Defrag Update Anti Virus Virus Scanning

Purpose Healthy & Hygienist working environment

11. Backup Data Files + Application Database

Data and system Reliability Purpose Data and system Reliability

11. External Data Storage why Prevent virus infection

What to do Scan at Isolated PC Re-Scan Format Clean Clean N N Y Y Allowed to be used

12. Virus Handling Prevent Spreading Basic First-Aid for User

Scan & Remove with Anti Virus Basic User Know-How Scan & Remove with Anti Virus Unplug from Network Inform IT Success N Y Restart

IT next action Try to remove in Save mode Confirm Virus attack Replace PC with Substitute Format Infected PC Success N Y Restart N Return PC to User Clean Re-Scan Y

Thank you