Computer



Computer

And

Network

Information

Company Name

Prepared by

Nick Clements

[pic]

Phone: 123-456-7890

Email@

Binder Table of Contents

Last Updated: ____________

Binder Tab: Table of Contents

Binder Tab: Tech Notes

• Fix-It List Priorities

• Fix-It Request List

• Notes Sheet

• Tech Notes / Event Logs

• Backup Log

Binder Tab: Network Specifications

• Network Diagram

• Network Summary

• Shared Resources

• Exchange Specifications

• Server Software Specifications

• IP Address Allocation

• Router Configuration

• Firewall Configuration

Binder Tab: Machine Specifications

• Machine Specs

Binder Tab: Users / Products

• Product Info

• Users

• Internet Domain Registrations

Binder Tab: Forms

• Forms

• Backup Procedure

• Backup Log

• Backup Labels

• Fix-It Request List

• Machine Spec Sheet

• Monthly Maintenance Checklist

• Password Policy

• Notes Sheet

• Users Sheet

Fix-It Request List

For:

Priority Date Problem Comment/Completion Notes

Fix-It Priorities

Memo

You determine the priority of each task. You may wish to assign different priorities to the items on this list. Note that this is a 4-point scale. Here are some guidelines for assigning priorities. Most desktop issues are priority 3 or 4.

[pic]

Please use these criteria when assigning new tasks. Note that you will never “assign” a Priority One. Priority One tasks assign themselves when an emergency happens.

Backup Record

Company:Company Name

[pic]

Note: Date is the date the backup begins

Notes For:

Date Notes Tech

Network Summary

Company: Company Name

________________________________________________________________________

ISP: Name:

Tech Support Phone Number:

Circuit ID or Account #

Router IP Address:

Router User / Password:

Notes:

Firewall IP Address:

Firewall User /Password:

Notes:

LAN IP Address Range:

WAN/Public Address Range:

Notes:

Desktop Configuration:

-DNS 1 & 2:

-Default Gateway:

-WINS Server:

Domain Controller:

-Name:

-IP Address:

-Administrator Password

Network Printers:

-Name / Make / Model / IP Address / Physical Location

-Name / Make / Model / IP Address / Physical Location

-Name / Make / Model / IP Address / Physical Location

Notes:

Backup Software:

-Brand

-Version

Notes:

Shared Resources

Company:_Company Name__

Date:_______________

Data Shares and Shared Printers*

Description Server Physical Location Access Groups Permission

Example

Primary Public Folder Server1 d:\data Domain User Change

Domain Admins Full Control

*A “Shared Printer” is one that is physically attached to a computer (server or workstation) and shared on the domain/network. This is managed very much like a data share. This is different from a Network Printer, which is connected directly to the network. Generally speaking, users can print directly to Network Printers. If you have a large enough printer demand, you may manage a Network Printer through a server, in which case it appears to users as a Shared Printer. This is becoming less useful as printer memory and self-management increases.

Network Printers

Description PortType IP Address Access Groups Permission

Example

HP 4600 JetAdmin 192.168.1.10 N/A Print All

Exchange Specifications

Company:_Company Name___

Date:_______________

Organization Name:

Administrative Groups:

-First Administrative Group:

Servers:

-

-

Domain Name:

Administrative Password:

Active Directory Password:

Notes:

Server Software Summary

Company:_Company Name____

Server Machine Name:

Operating System:

Backup Software:

-Notes

Defragmentation Software:

-Notes

Anti-Virus Software:

-Notes

Other:

Description:

--Notes:

Other:

Description:

--Notes:

Other:

Description:

--Notes:

Other:

Description:

--Notes:

Notes:

IP Address Allocation

Company:__Company Name__

Date:_______________

This is an overview of how IP Addresses are allocated in the organization.

Network and Subnet: _______________ / _______________

|IP Address Range |Used For … |

|From To |Network Equipment |

| | |

| | |

| |Servers |

| | |

| | |

| |Printers |

| | |

| | |

| | |

| | |

| |DHCP Range – used by desktop machines |

| |These are allocated by the (Server)(Router)(Other:____________) |

| | |

| |RAS IPs (allocated by _____________) |

| | |

| | |

|Hosts file contains: |For Use by ______________________________ |

| | |

| | |

IPs: Hard-Coded IP Address Allocation

Company:_Company Name___

Date:_______________

The Following Devices have a dedicated IP Address:

Network and Subnet: _______________ / _______________

|IP Address |Used For … |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

| | |

Router Configuration

Company:_Company Name__

Date:_______________

Router:_______________________________

Serial Number:___________________

Firmware Version:________________

Username: ______________________ (case sensitive)

Password: ______________________ (case sensitive)

ISP:__________________________________

Contact:_________________________/______Ph:_________________________

Information needed for ISP Security:____________________________________

PPPOE or other username:____________________________________________

Password:_________________________________________________________

Telco Circuit Number:___________________

WAN gateway: ________________________/_______________255.555.255.________

Router WAN Address:__________________/________________255.255.255.________

Router LAN Address:__________________/_________________255.255.255.________

ISP-assigned DNS 1: ____________________ DNS 2: ______________________

Notes:

Firewall Configuration

Company:_Company Name__

Date:_______________

Firewall:_______________________________

Serial Number:___________________

Firmware Version:________________

Username: ______________________ (case sensitive)

Password: ______________________ (case sensitive)

Firewall Managed By:__________________________________

Contact:_________________________/______Ph:_________________________

Information needed to Contact Security:_________________________________

Firewall gateway: ____________________________/__________255.555.255.________

Firewall WAN/untrusted Address:_______________/___________255.255.255._______

Firewall LAN/trusted Address:__________________/___________255.255.255._______

Summary of Settings and Terminology: ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Open Ports:

Service Port# From (Public IP) To (Private IP)

Email 25 ________________ _____________

Email 110 ________________ _____________

HTTP 80 ________________ _____________

HTTPS 443 ________________ _____________

DNS 53 ________________ _____________

RDP 3389 ________________ _____________

Ping n/a ________________ _____________

PPTP 1723 ________________ _____________

RWW(https) 4125 ________________ _____________

Other_______ ____ ________________ _____________

Other_______ ____ ________________ _____________

Other_______ ____ ________________ _____________

Other_______ ____ ________________ _____________

Other_______ ____ ________________ _____________

Other_______ ____ ________________ _____________

Machine Specifications

Computer Configuration Specifications

Machine: _______________________________ Last Updated:_________________

User: ________________________________ Machine was New:_____________

Machine Description:

Serial Number:

CPU:

/Slot Type:

RAM:

RAM slots:

Operating Systems:

TCP/IP Address:

Hard Drive 0:

Hard Drive 1:

Hard Drive 2:

NIC 1:

NIC 2:

Video Notes:

Sound Notes:

Other:

Other:

Notes:

User Record

Company:_Company Name _

|User |User Name |Password |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

Internet Domain

Registration Information

Organization:____________________________________________

Domain Name:___________________________________________

Last Updated:__________________

Registrar (e.g., Network Solutions): ___________________________

Admin Account Number / Username: __________________________

Password: ____________________________

Admin Contact: ___________________________________________

Admin Email: _____________________________________________

Admin NIC Handle: ________________________________________

Tech Contact: _____________________________________________

Tech Email: _______________________________________________

Tech NIC Handle: __________________________________________

Billing Contact: ____________________________________________

Billing Email: ______________________________________________

Billing NIC Handle: _________________________________________

Primary Domain Name Server: _________________________ _____________________

Secondary Domain Name Server: _______________________ _____________________

Notes: ________________________________________________________________________________

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Backup Procedures

Backup Procedures for: ______________________

Morning Procedures

The backup should be compeleted when you arrive in the morning. If the tape drive has

an eject feature, the tape may be ejected.

1) Remove tape from tape machine. Put in new tape

2) Log: On the backup Log, note the tape number and related job information.

Tape Rotation

Tapes are not labeled “Monday”, “Tuesday”, “Wednesday”, etc. They are labeled by number. We begin the rotation with the lowest number and use the next-highest number each day. If you always keep 7-10 tapes in rotation, you will minimize the number of times each tape is used. This increases the probability that a backup will be successful.

The tape you remove on … Goes to … And is returned on . . .

Monday Offsite Thursday or later

Tuesday Offsite Friday or later

Wednesday Offsite Monday or later

Thursday Offsite Tuesday or later

Friday Offsite Wednesday or later

End of Month

For the lasat backup of each month, use the lowest-numbered available tape (if you used the tape in the last few days it is “not available” for this). When the last backup of the month is finished, label the tap “End of Month __________” (fill in the month). Take this tape offsite permanently and never use it again. Each month you will have one “end of month” tape. The December tape is also End of Year.

Be sure to put the administrator password on the End-of-Month tape as you will need it to restore in case of a disaster.

These end-of-month tapes become your ultimate safety cushion in a disaster. They are also a snapshot of your business and may be handy for financial records, legal records, etc.

Test Restore: At the beginning of each month, it is good practice to take your last backup tape and restore a few files to a temporary directory (you can delete them later). This keeps you familiar with the restore procedure and verifies that you have a working backup.

Weekly Maintenance Checklist

Date: ________________

Tech: _______

Date:_______

Client Info: __Company Name _____

Contact : _________________________________

Phone: _________________________________

A. Server 1: Check Logs, Settings NOTE: Record These actions in the Server Log!

• Check NT Logs: Application, Security, System, Directory, DNS, File Replication (copy extreme errors into Tech log with Event log #)

• Check Exchange Server Logs (C:\program files\exchsrvr\AUGUSTINE.log)

• Verify incoming, outgoing messages in the exchange SMTP queue

(C:\Program Files\Exchsrvr\Mailroot\vsi 1)

• Check Web Site Logs (C:\winnt.sbs\system32\logfiles\*.*)

• Verify that Virus Scanner is working as scheduled

- REED – Symantec System Center (See Antivirus Note in Binder if Any)

• Check Disc Space on Server

Free

➢ Spock C: = ______________ out of __________________Gb

➢ Augustine C: = _______________out of __________________Gb

➢ Reed C: = _______________out of __________________Gb

D: = _______________out of __________________Gb

• Diskeeper Analysis on C: _____________ D:________________

Changes to settings (if any): __________________________

NOTE: Record these actions in the Server Log!

B. Backup

• Check Backup Logs

• Verify Backup: Restore files from Backup

• Verify Backup: Restore mailbox from Backup

• Check Backup Procedure Memo and Follow Off Site Practices if Any

C. Updates NOTE: Record these actions in the Server Log!

• If important patches or updates have been released, apply them to:

Windows OS

ISA Server

Backup Server

Exchange Server

SQL Server

Other: ___________________

• Run HFNetCheck or Baseline security Analyzer and apply patches as suggested

• Run Windows Update

• Update Virus Signatures on Server

• Virus program Updates

D. Other

• Bandwidth Test or

Download Upload

* 1st = __________kb/s 1st = ___________kb/s

* 2nd = __________kb/s 2nd = ___________kb/s

• UPS Logs and Tests

Monthly Checks – Misc.

E. Troubleshooting, Fixes, Notes, and Recommendations

Note any problems reported by client. Check the “to do” list and verify that all items have been addressed. If there are any recommendations for client based on this monthly maintenance, please list them here.

__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Password Policy

Company: _Company Name _

Domain: _______________________________ Date:________________________

Your Policy Choices Recommendations

Passwords Expire in: _____________________ days 35

Minimum Password Length: _______________ 5-8

Remember: _____________________________Passwords 12

Lockout after: ___________________________attempts 5

Attempts within: _________________________minutes 30

Lockout is for:___________________________ minutes 30

Sample Policy Text:

We have adopted the following password security policy for our company.

User passwords will expire every ____ days. You will get several warnings prior to when your password expires, and you will be required to change your password. All passwords are must be at least ______ characters long, and can include any letters, numbers, and the following characters:

~ ‘ ! @ # $ % ^ & ( ) - _ { }

Please Note: Your Password is case sensitive.

The system will remember your last: _____ passwords so you will not be able to immediately reuse the same passwords. Should you attempt to log on ____ times with the/an incorrect password, you will be locked out of the network for ____ minutes. Should you forget your password, you will need to contact the system administrator to gain access to the network.

-----------------------

Priority 1: These items are of Critical Importance. Until this is fixed, a system is

down and the company is losing money. E.g., server will not boot up.

This is an emergency.

Priority 2: High Priority – Very Important. Until this is fixed, work is being

interrupted or not flowing the way it should. Some equipment or

sofware is unusable. Affects productivity.

Priority 3: Medium Priority – Important. A problem needs to be fixed but work

can continue.

Priority 4: Low Priority – Annoying. These are things that should be fixed while

doing other work or when everything else has been completed.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download