SlideShare una empresa de Scribd logo
1 de 9
Introduction System
   Administration




  Tek-Systems
OUTLINE
●
    Infrastructure.
●
    System Physical Security
●
    Internet Usage Policy.
●
    Software Licensing Policy.
●
    Help Desk Service Request Flow.
●
    System Performance Tuning.
●
    Facilities & Safety
Introducing Infrastructure
●
    System Administration.
●
    Operating System.
●
     * Microsoft Windows
●
     * Unix
●
     * Mac
●
    Servers.
●
    Backup.
System Physical Security
●
    Always shut down or log off of any system when not in use.
●
    Using Personal data storage device and Mobile usb data cables
    in official PC's is prohibited.
●
    * Laptops
●
    * Pen-drives
●
    * Memory Cards
●
    * CD’s & DVD's.
●
    CD Roms, Diskettes and other storage media from outside are
    not to be used unless they have been checked and approved by
    System Administrators.
Internet Usage Policy
●
    Downloading/ Streaming of Games, Musics,Videos,
    Pornography etc are strictly prohibited.
●



●
    Downloading of shareware, freeware and evaluation
    copies of software from the internet is prohibited.


●
    Installations and/ or use of personal software from
    home on official computers is strictly prohibited.
Facilities : Safety
●
    To Protect yourself and Equipment, never temper with
    or remove any power codes or cable (including mouse
    and keyboards).
●
    Never attempt to restart or reset equipment without
    permission.
●
    Never hit a machine, smash a mouse or abuse a
    button or key.
●
    Current copy of Anti-virus is running on each
    computers, and it is not to be turn off or have its
    setting changed.
We Expect all users to be

●
    Responsible.
●
    Ethical.
●
    Rule abiding.
●
    Clean Workstation
Help Desk Contact Details
Ritu Raj : Senior Linux Administrator
●




Mobile : 9911987349 Mail ID : ritu.raj@tekritisoftware.com
●




Vikas Kumar Khatana : Senior Linux Administrator
●




Mobile : 9891723947 Mail ID : vikas.khatana@tekritisoftware.com
●




Govinda Sapkota : Senior Network Engineer
●




Mobile : 7838493985 Mail ID : govinda.sapkota@tekritisoftware.com
●




Sudhir Sehrawat : Network Engineer
●




Mobile : 9899396100 Mail ID : sudhir.sehrawat@tekritisoftware.com
●




Support Mail ID : systems@tekmedia.tekritisoftware.com
●
Thank You




Questions ?

Más contenido relacionado

La actualidad más candente

Final project
Final projectFinal project
Final projectrippea
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authenticationPaulo Martins
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever AloneOlga Kochetova
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...CODE BLUE
 
Undermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksUndermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksNiek Timmers
 
Necto 16 training 18 access security
Necto 16 training 18   access securityNecto 16 training 18   access security
Necto 16 training 18 access securityPanorama Software
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key loggerTamim1980
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 

La actualidad más candente (15)

Final project
Final projectFinal project
Final project
 
Firewall
FirewallFirewall
Firewall
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
Remote control
Remote controlRemote control
Remote control
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever Alone
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
DataPower as PCI
DataPower as PCIDataPower as PCI
DataPower as PCI
 
Undermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksUndermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security Checks
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Necto 16 training 18 access security
Necto 16 training 18   access securityNecto 16 training 18   access security
Necto 16 training 18 access security
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key logger
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 

Destacado

Folheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª EdFolheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª Edjosecondesso
 
Los docentes...
Los docentes...Los docentes...
Los docentes...sharojja
 
Presentacion de casos de tabletas
Presentacion de casos de tabletasPresentacion de casos de tabletas
Presentacion de casos de tabletasRicardo Montaña
 
Dn12 u3 a2_azu
Dn12 u3 a2_azuDn12 u3 a2_azu
Dn12 u3 a2_azumrsporqui
 
Estamos en la primera clase de tics
Estamos en la primera clase de ticsEstamos en la primera clase de tics
Estamos en la primera clase de ticsrosalesFCCF
 
Diploma certified
Diploma certifiedDiploma certified
Diploma certifiedJohn Lockem
 

Destacado (8)

Folheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª EdFolheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª Ed
 
Los docentes...
Los docentes...Los docentes...
Los docentes...
 
Anabel 2
Anabel 2Anabel 2
Anabel 2
 
Presentacion de casos de tabletas
Presentacion de casos de tabletasPresentacion de casos de tabletas
Presentacion de casos de tabletas
 
Castañeda 3
Castañeda 3Castañeda 3
Castañeda 3
 
Dn12 u3 a2_azu
Dn12 u3 a2_azuDn12 u3 a2_azu
Dn12 u3 a2_azu
 
Estamos en la primera clase de tics
Estamos en la primera clase de ticsEstamos en la primera clase de tics
Estamos en la primera clase de tics
 
Diploma certified
Diploma certifiedDiploma certified
Diploma certified
 

Similar a Tek systems it guidelines

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)Amani Lion
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraAnant Corporation
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmareSivaramakrishnan N MBA PMP
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoNCCOMMS
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMITamas K Lengyel
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
 
Security Policy
Security PolicySecurity Policy
Security PolicyHuda Seyam
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROMAnant Shrivastava
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)Ron Munitz
 
MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionHayato Abe
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptxAfendeyAthurJinir
 

Similar a Tek systems it guidelines (20)

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Operations Security
Operations SecurityOperations Security
Operations Security
 
Physical security
Physical securityPhysical security
Physical security
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or Nightmare
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
System Administration
System AdministrationSystem Administration
System Administration
 
2_16_2016_Resume
2_16_2016_Resume2_16_2016_Resume
2_16_2016_Resume
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
 
Security Policy
Security PolicySecurity Policy
Security Policy
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROM
 
Security Issues in Android Custom Rom
Security Issues in Android Custom RomSecurity Issues in Android Custom Rom
Security Issues in Android Custom Rom
 
Ch02
Ch02Ch02
Ch02
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
 
MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic Edition
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptx
 

Último

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 

Último (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 

Tek systems it guidelines

  • 1. Introduction System Administration Tek-Systems
  • 2. OUTLINE ● Infrastructure. ● System Physical Security ● Internet Usage Policy. ● Software Licensing Policy. ● Help Desk Service Request Flow. ● System Performance Tuning. ● Facilities & Safety
  • 3. Introducing Infrastructure ● System Administration. ● Operating System. ● * Microsoft Windows ● * Unix ● * Mac ● Servers. ● Backup.
  • 4. System Physical Security ● Always shut down or log off of any system when not in use. ● Using Personal data storage device and Mobile usb data cables in official PC's is prohibited. ● * Laptops ● * Pen-drives ● * Memory Cards ● * CD’s & DVD's. ● CD Roms, Diskettes and other storage media from outside are not to be used unless they have been checked and approved by System Administrators.
  • 5. Internet Usage Policy ● Downloading/ Streaming of Games, Musics,Videos, Pornography etc are strictly prohibited. ● ● Downloading of shareware, freeware and evaluation copies of software from the internet is prohibited. ● Installations and/ or use of personal software from home on official computers is strictly prohibited.
  • 6. Facilities : Safety ● To Protect yourself and Equipment, never temper with or remove any power codes or cable (including mouse and keyboards). ● Never attempt to restart or reset equipment without permission. ● Never hit a machine, smash a mouse or abuse a button or key. ● Current copy of Anti-virus is running on each computers, and it is not to be turn off or have its setting changed.
  • 7. We Expect all users to be ● Responsible. ● Ethical. ● Rule abiding. ● Clean Workstation
  • 8. Help Desk Contact Details Ritu Raj : Senior Linux Administrator ● Mobile : 9911987349 Mail ID : ritu.raj@tekritisoftware.com ● Vikas Kumar Khatana : Senior Linux Administrator ● Mobile : 9891723947 Mail ID : vikas.khatana@tekritisoftware.com ● Govinda Sapkota : Senior Network Engineer ● Mobile : 7838493985 Mail ID : govinda.sapkota@tekritisoftware.com ● Sudhir Sehrawat : Network Engineer ● Mobile : 9899396100 Mail ID : sudhir.sehrawat@tekritisoftware.com ● Support Mail ID : systems@tekmedia.tekritisoftware.com ●