SlideShare una empresa de Scribd logo
1 de 9
Introduction System
   Administration




  Tek-Systems
OUTLINE
●
    Infrastructure.
●
    System Physical Security
●
    Internet Usage Policy.
●
    Software Licensing Policy.
●
    Help Desk Service Request Flow.
●
    System Performance Tuning.
●
    Facilities & Safety
Introducing Infrastructure
●
    System Administration.
●
    Operating System.
●
     * Microsoft Windows
●
     * Unix
●
     * Mac
●
    Servers.
●
    Backup.
System Physical Security
●
    Always shut down or log off of any system when not in use.
●
    Using Personal data storage device and Mobile usb data cables
    in official PC's is prohibited.
●
    * Laptops
●
    * Pen-drives
●
    * Memory Cards
●
    * CD’s & DVD's.
●
    CD Roms, Diskettes and other storage media from outside are
    not to be used unless they have been checked and approved by
    System Administrators.
Internet Usage Policy
●
    Downloading/ Streaming of Games, Musics,Videos,
    Pornography etc are strictly prohibited.
●



●
    Downloading of shareware, freeware and evaluation
    copies of software from the internet is prohibited.


●
    Installations and/ or use of personal software from
    home on official computers is strictly prohibited.
Facilities : Safety
●
    To Protect yourself and Equipment, never temper with
    or remove any power codes or cable (including mouse
    and keyboards).
●
    Never attempt to restart or reset equipment without
    permission.
●
    Never hit a machine, smash a mouse or abuse a
    button or key.
●
    Current copy of Anti-virus is running on each
    computers, and it is not to be turn off or have its
    setting changed.
We Expect all users to be

●
    Responsible.
●
    Ethical.
●
    Rule abiding.
●
    Clean Workstation
Help Desk Contact Details
Ritu Raj : Senior Linux Administrator
●




Mobile : 9911987349 Mail ID : ritu.raj@tekritisoftware.com
●




Vikas Kumar Khatana : Senior Linux Administrator
●




Mobile : 9891723947 Mail ID : vikas.khatana@tekritisoftware.com
●




Govinda Sapkota : Senior Network Engineer
●




Mobile : 7838493985 Mail ID : govinda.sapkota@tekritisoftware.com
●




Sudhir Sehrawat : Network Engineer
●




Mobile : 9899396100 Mail ID : sudhir.sehrawat@tekritisoftware.com
●




Support Mail ID : systems@tekmedia.tekritisoftware.com
●
Thank You




Questions ?

Más contenido relacionado

La actualidad más candente

Final project
Final projectFinal project
Final projectrippea
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authenticationPaulo Martins
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever AloneOlga Kochetova
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...CODE BLUE
 
Undermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksUndermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksNiek Timmers
 
Necto 16 training 18 access security
Necto 16 training 18   access securityNecto 16 training 18   access security
Necto 16 training 18 access securityPanorama Software
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key loggerTamim1980
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 

La actualidad más candente (15)

Final project
Final projectFinal project
Final project
 
Firewall
FirewallFirewall
Firewall
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
Remote control
Remote controlRemote control
Remote control
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever Alone
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
DataPower as PCI
DataPower as PCIDataPower as PCI
DataPower as PCI
 
Undermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security ChecksUndermining Diagnostics Security: Bypassing UDS Security Checks
Undermining Diagnostics Security: Bypassing UDS Security Checks
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Necto 16 training 18 access security
Necto 16 training 18   access securityNecto 16 training 18   access security
Necto 16 training 18 access security
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key logger
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 

Destacado

Folheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª EdFolheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª Edjosecondesso
 
Los docentes...
Los docentes...Los docentes...
Los docentes...sharojja
 
Presentacion de casos de tabletas
Presentacion de casos de tabletasPresentacion de casos de tabletas
Presentacion de casos de tabletasRicardo Montaña
 
Dn12 u3 a2_azu
Dn12 u3 a2_azuDn12 u3 a2_azu
Dn12 u3 a2_azumrsporqui
 
Estamos en la primera clase de tics
Estamos en la primera clase de ticsEstamos en la primera clase de tics
Estamos en la primera clase de ticsrosalesFCCF
 
Diploma certified
Diploma certifiedDiploma certified
Diploma certifiedJohn Lockem
 

Destacado (8)

Folheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª EdFolheto Curso Liderança e Gestão de Equipas 6ª Ed
Folheto Curso Liderança e Gestão de Equipas 6ª Ed
 
Los docentes...
Los docentes...Los docentes...
Los docentes...
 
Anabel 2
Anabel 2Anabel 2
Anabel 2
 
Presentacion de casos de tabletas
Presentacion de casos de tabletasPresentacion de casos de tabletas
Presentacion de casos de tabletas
 
Castañeda 3
Castañeda 3Castañeda 3
Castañeda 3
 
Dn12 u3 a2_azu
Dn12 u3 a2_azuDn12 u3 a2_azu
Dn12 u3 a2_azu
 
Estamos en la primera clase de tics
Estamos en la primera clase de ticsEstamos en la primera clase de tics
Estamos en la primera clase de tics
 
Diploma certified
Diploma certifiedDiploma certified
Diploma certified
 

Similar a Tek systems it guidelines

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)Amani Lion
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraAnant Corporation
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmareSivaramakrishnan N MBA PMP
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoNCCOMMS
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMITamas K Lengyel
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
 
Security Policy
Security PolicySecurity Policy
Security PolicyHuda Seyam
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROMAnant Shrivastava
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)Ron Munitz
 
MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionHayato Abe
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptxAfendeyAthurJinir
 

Similar a Tek systems it guidelines (20)

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Operations Security
Operations SecurityOperations Security
Operations Security
 
Physical security
Physical securityPhysical security
Physical security
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or Nightmare
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
System Administration
System AdministrationSystem Administration
System Administration
 
2_16_2016_Resume
2_16_2016_Resume2_16_2016_Resume
2_16_2016_Resume
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
 
Security Policy
Security PolicySecurity Policy
Security Policy
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROM
 
Security Issues in Android Custom Rom
Security Issues in Android Custom RomSecurity Issues in Android Custom Rom
Security Issues in Android Custom Rom
 
Ch02
Ch02Ch02
Ch02
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
 
MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic Edition
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptx
 

Último

Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 

Último (20)

Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

Tek systems it guidelines

  • 1. Introduction System Administration Tek-Systems
  • 2. OUTLINE ● Infrastructure. ● System Physical Security ● Internet Usage Policy. ● Software Licensing Policy. ● Help Desk Service Request Flow. ● System Performance Tuning. ● Facilities & Safety
  • 3. Introducing Infrastructure ● System Administration. ● Operating System. ● * Microsoft Windows ● * Unix ● * Mac ● Servers. ● Backup.
  • 4. System Physical Security ● Always shut down or log off of any system when not in use. ● Using Personal data storage device and Mobile usb data cables in official PC's is prohibited. ● * Laptops ● * Pen-drives ● * Memory Cards ● * CD’s & DVD's. ● CD Roms, Diskettes and other storage media from outside are not to be used unless they have been checked and approved by System Administrators.
  • 5. Internet Usage Policy ● Downloading/ Streaming of Games, Musics,Videos, Pornography etc are strictly prohibited. ● ● Downloading of shareware, freeware and evaluation copies of software from the internet is prohibited. ● Installations and/ or use of personal software from home on official computers is strictly prohibited.
  • 6. Facilities : Safety ● To Protect yourself and Equipment, never temper with or remove any power codes or cable (including mouse and keyboards). ● Never attempt to restart or reset equipment without permission. ● Never hit a machine, smash a mouse or abuse a button or key. ● Current copy of Anti-virus is running on each computers, and it is not to be turn off or have its setting changed.
  • 7. We Expect all users to be ● Responsible. ● Ethical. ● Rule abiding. ● Clean Workstation
  • 8. Help Desk Contact Details Ritu Raj : Senior Linux Administrator ● Mobile : 9911987349 Mail ID : ritu.raj@tekritisoftware.com ● Vikas Kumar Khatana : Senior Linux Administrator ● Mobile : 9891723947 Mail ID : vikas.khatana@tekritisoftware.com ● Govinda Sapkota : Senior Network Engineer ● Mobile : 7838493985 Mail ID : govinda.sapkota@tekritisoftware.com ● Sudhir Sehrawat : Network Engineer ● Mobile : 9899396100 Mail ID : sudhir.sehrawat@tekritisoftware.com ● Support Mail ID : systems@tekmedia.tekritisoftware.com ●