o F ault o C onfiguration o A ccounting/ A dministration o P erformance o S ecurity.

Slides:



Advertisements
Similar presentations
Pat Marmo & John Robinson. In 2004, Hanford saw a great deal of budget apprehension and uncertainty Increase use of staff augmentation contracting Need.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Targeted Case Management
Software Quality Assurance Plan
FootPrints End User Interface
Chapter 19: Network Management Business Data Communications, 5e.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
For MIP Fund Accounting Software
Mr C Johnston ICT Teacher
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Governance Auditing Advanced authorization, Security at one place Ability to share the BizTalk environment Non-BizTalk people can support your applications.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
StorCast Enterprise Storage Resource Management. What is Enterprise Storage Resource Management?
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Duties of a system administrator. A system administrator's responsibilities typically include:
Configuring the Wireless on Your Configurator Computer.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Dodi Smith C.P.A., C.I.S.A Information Security Manager Michigan Office of the Auditor General Information Security & The Auditor.
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
Overview Managing a DHCP Database Monitoring DHCP
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Management Platforms. SMFA In TMN the intent is to define a realitivly common set of what can be supported by CMISE network elements and managed via a.
Management of IT Auditing John Schultz. Define IT – What areas should be considered for inclusion in an IT audit plan? Evaluate IT-related Risk – Doing.
FEE COLLECTION When a tour is approved, the Accounting Office will set up the tour on the computer. The trip manager (or secretary) will enter on the computer.
Evaluating Network Monitoring Solutions Nathan Freeman
M ONITOR & C ONTROL Focus is on Integrated Change Control 1.
NETWORK MANAGEMENT FCAPS.
Understand Audit Policies LESSON Security Fundamentals.
Configuring WebTMA’s Form Attributes for Greater Efficiency Tammy Hilmer TMA Systems.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Text TCS Internal September 29, 2014 Introduction to TMN Layer.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Statement of Condition – During my audit I noted expenditures to the Child Nutrition Federal Program which were allowable but the District.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 11 Network Management Functions.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
FCAPS The Seventh Meeting. TMN (Telecommunication Management Network) Reference Model & FCAPS.
Group policy.
Chapter 19: Network Management
Information and documentation media systems.
P802.1CF Information Model Structure
Identity and Access Management
Relation between information modeling and network operation
Network Management Functions
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Information and documentation media systems.
P802.1CF Information Model Structure
Network management system
Cisco Prime LMS: Getting Started
Keeping Member Data Safe
P802.1CF Information Model Structure
راهنمای مدیریت شکایات در بیمارستان ها
CT 1306 Communication Networks Management Lab
DEPLOYING SECURITY CONFIGURATION
Day 1: Introduction to Ramp Tools
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
EFF Factor Training Program
Access Control and Site Security
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
NM Department of Homeland Security and Emergency Management
Presentation transcript:

o F ault o C onfiguration o A ccounting/ A dministration o P erformance o S ecurity

o F ault– recognize, isolate, correct and/or log faults that occur in the network.

o C onfiguration – Collect system configurations and monitor consistency.

o A ccounting/ A dministration – For “billable” networks, the ability to track individual user, department, or business unit utilization so they may be charged accordingly. For “non-billable” networks, Administration is used for to manage and monitor access to the network systems.

o P erformance – Ensure that the network is operating efficiently and at acceptable levels. Also allows for and assists with planning future improvements.

o S ecurity – Allows for management user authorization and auditing. In a “non-billable” network, this is almost interchangeable with Administration.

So what can I drop in to my network that does all of this?

It’s up to you. It depends on your needs and requirements and your budget.

Fault – Solarwinds, Zenoss, Observium, Nagios/Icinga, Syslog-ng, Nfsen/Nfdump Configuration – Rancid Accounting – Observium, Nagios/Icinga, Intermapper Performance – Observium, Nagios/Icinga Security – Freeradius