Preview

Policy Management

Powerful Essays
Open Document
Open Document
1325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Policy Management
Server Configuration Policy

Purpose

The purpose of this policy is to define standards, procedures, and restrictions for new servers being installed on [TT Tech High School]’s internal network(s) or related technology resources via any means. This can include, but is not limited to, the following:

• Internet servers (FTP servers, Web servers, Mail servers, Proxy servers, etc.).

• Application servers.

• Database servers.

• File servers.

• Print server.

• Third-party appliances that manage network resources.

This policy also covers any server device outsourced, co-located, or hosted at external/third-party service providers, if that equipment resides in the [ITT Tech High School].com" domain or appears to be owned by [ITT Tech High School].

The overriding goal of this policy is to reduce operating risk. The [ITT Tech High School] Server Configuration Security Policy will: • Eliminate configuration errors and reduce server outages. • Reduce undocumented server configuration changes that tend to open up security vulnerabilities. • Facilitate compliance with the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley which requires companies to institute IT controls and demonstrate that the controls are working. • Protect corporate data, networks, and databases from unauthorized use and/or malicious attack.
Therefore, all new server equipment that is owned and/or operated by [ITT Tech High School ] must be provisioned and operated in a manner that adheres to company-defined processes for doing so.

Scope

This policy applies to all [ITT Tech High School] company-owned, company-operated, or company-controlled server equipment. Addition of new servers within corporate facilities will be managed at the sole discretion of IT. Non-sanctioned server installations, or use of unauthorized equipment that manage networked resources within the organizational campus, is strictly

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NETW410 Week 2 Lab Report

    • 349 Words
    • 3 Pages

    The technical goals are to build a new IT section onto the admin building to make sure all the servers are centralized. Connect all buildings to the new IT section. Make sure to provide wireless access for all the students in classrooms. Provide high speed wired internet to all faculty offices. Make sure there is a centralized back up of all data. Replace the old phone system with VIOP.…

    • 349 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    The classroom network consists of Windows Server 2008 student servers and the ServerDC connected to a local area network. ServerDC, the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the same student server.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Orange Creek, Inc., a Fortune 500 company, has moved into Lexington and is requesting bids for…

    • 2372 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Adequate training has to be established for all staff members on how to use the system. Training could be done through the internet or done through IT support. To be able to have the adequate training for all staff members would need access to a PC, the new IT system and the internet. Training should take about two weeks. The…

    • 6284 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    Users will implement the recommended security software, hardware settings, patches, and protocols on end-user equipment used to access ITT’s wireless network.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources.…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Study Guide

    • 2626 Words
    • 11 Pages

    assigned you to set up a small server to provide basic file services to faculty, staff, and students in that…

    • 2626 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Leasing vs Purchasing

    • 5534 Words
    • 23 Pages

    The company needs to upgrade its computer equipment. There are two upgrade paths to consider. In this proposal, we demonstrate how equipment leases take advantage of the benefits of reduced depreciation and taxation, easy scalability, reduction of IT staff usage, reduced energy costs, and reduction of capital spending. The company can free up money overall and maintain better control of the IT budget by leasing. The cost of equipment is spread out over a 3-year period by leasing. There are no disposal fees because the leasing company will be responsible for the equipment leased. By replacing the current sever setup ( the company has over a dozen machines running 24 hours every day), with new leased IBM compact server, we will cut power costs by up to 50%.…

    • 5534 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Networks of computers are the model for business information infrastructures today. Gone are the days of a single mainframe machine with terminals attached to it. Today, a business' information infrastructure consists of one or more servers that communicate with tens, hundreds, and even thousands of clients, and the explosive growth of networks drives an increasing demand for network administrators. Exceptional growth in IT jobs, including network and system administration, is widely expected to continue for the foreseeable future. Reports from the Commerce Department cite a shortage of high tech workers. The White House has recently created training programs to address the shortage. While some organizations and researchers dispute the extent of a shortage, it is widely agreed even by critics of such studies that new IT jobs are being created very rapidly. As information technology becomes ubiquitous, and even very small companies rely on it for their daily operation, the skills of system and network administration become more in demand, and more vital. More…

    • 1732 Words
    • 7 Pages
    Good Essays
  • Good Essays

    This policy applies to all Corona District High School employees, contractors, vendors and agents with a Corona District High School-owned or personally-owned computer or workstation used to connect to the Corona District High School network. This policy applies to remote access connections used to do work on behalf of Corona District High School, including reading or sending email and viewing intranet web resources.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As many schools are using technology to help encourage their students to learn within their modern century of electronics by providing computers and devices, there are some schools who allows their students to bring their own device/technology to be able to utilize the information provided in the school as well as in their household. As there is an Acceptable Use Policy (AUP) in placed that standards are similar to each other school district within the United States, it is important for the student and parent to understand what is not tolerated when having access to bring their own device/technology to school.…

    • 332 Words
    • 2 Pages
    Good Essays