Академический Документы
Профессиональный Документы
Культура Документы
Current as of:
Directory Infrastructure
125070_eng - TCP/IP
126380_eng - Implementing Active Directory Users and
Groups
126381_eng - Planning and Implementing Group Policy
125071_eng - IP Addressing and Routing
Ft. Hood Security+ Class: you must enroll in the Ft. Hood
Security+ class online and include a confirmation of enrollment
in your packet or a certificate if you have completed the course
already. Keep in mind, to attend this class, your packet must be
complete (minus the class itself and commercial certification)
and in the IAPM office. The class instructors will contact IAPM
prior to class starting to verify that all packets have been turned
in. Also, do not be a no show to this class (failing to attend
without cancelling or notifying the instructors policy states
that notification of cancellation must be received by the
instructors no later than the Tuesday prior to the start of the
course). Your commander will receive a notification letter and it
will be noted in your file. Any applicant who is a no-show twice
will have his/her packet destroyed and will forfeit all privileges.
STAND-BY ATTENDANCE: If you would like to attend this
class on a stand-by or walk-in basis, you STILL must turn your
completed packet into the IAPM office BEFORE the start of
class.
Ft. Hood Security+ Class: you must enroll in the Ft. Hood
Security+ class online and include a confirmation of enrollment
in your packet or a certificate if you have completed the course
already. Keep in mind, to attend this class, your packet must be
complete (minus the class itself and commercial certification)
and in the IAPM office. The class instructors will contact IAPM
prior to class starting to verify that all packets have been turned
in. Also, do not be a no show to this class (failing to attend
without cancelling or notifying the instructors policy states
that notification of cancellation must be received by the
instructors no later than the Tuesday prior to the start of the
course). Your commander will receive a notification letter and it
will be noted in your file. Any applicant who is a no-show twice
will have his/her packet destroyed and will forfeit all privileges.
STAND-BY ATTENDANCE: If you would like to attend this
class on a stand-by or walk-in basis, you STILL must turn your
completed packet into the IAPM office BEFORE the start of
class.
9. PACKET COMPLETION:
Submission:
o Upload your SA/IASO/NIPR/SIPR orders to ATC
o Upload your Ft. Hood Computer User Agreement to ATC
in the Acceptable Use Policy space.
o Submit a Remedy ticket and attach the following in 2
separate files:
Your JPAS report, Ft. Hood ownership, with US
Secret Access granted. Before you scan this form in,
COMPLETELY BLACK OUT YOUR SOCIAL
SECURITY NUMBER, BIRTHDATE AND PLACE OF
BIRTH.
The digitally-signable voucher request form and
CompTIA preassessment score reports.
you can request a VPN account for that user. Instructions for
requesting VPN accounts may be found at
http://www.hood.army.mil/doim/remote_access.aspx.
The helpdesk does NOT handle hardware issues. If you know
that you are having a hardware-related problem with your
computer, the correct answer is to call Tobyhanna at 288.5079
or 288.0905.
SIPR Helpdesk:
o Contacts: The SIPR Helpdesk telephone number is 287DOIM, select Option #2.
o Office Hours: The SIPR Helpdesk is located in Building
#2204, and is open from 0730- 1130 and 1230-1630
Monday Friday.
18. https://informationassurance.us.army.mil
This is an invaluable website that provides access to Best
Business Practices (BBPs), policies and other guidance,
information on the latest internet hoaxes/scams, links to
downloadable IA tools, current Two Way Email Device (TWEDs)
lists, and more.
19. TIPS, TRICKS & THINGS YOU SHOULD KNOW
CAC Enforcement: computers in your OU are CAC-enforced,
which means you CANNOT log in to your computers using your
SA/IASO userid and password without getting a one-time nonCAC login from the NEC helpdesk. To administer your
computers, you need to use the run-as command. Instructions
for using the run-as command are located on the NEC website.
Scanning: SAs are able to scan their own systems for
vulnerabilities using Retina software. To obtain a license for
Retina, SAs must complete the Retina training course at
https://iatraining.us.army.mil/ usermgmt/login.htm. Next, go to
the ACERT site at https://www.acert.1stiocmd.army.mil/index.jsp
and follow the instructions at Tools > Downloads> Retina. After
submitting a soft copy of your certificate and Retina license
application to the IAPM office, you will receive a license key and
will be able to complete Retina installation.
IAVM Reporting: IASOs and SAs have a shared responsibility in
making sure that all systems are IAVM (Information Assurance
Vulnerability Management) Compliant. IAVA Compliance
Spreadsheets (including system compliance and user training
compliance) will be emailed to the SA/IASO Distro each time
there is an update. IASOs are responsible for compliance
management, basically, making sure that each system is
scanned and patched as necessary and that each user has
received the appropriate training. SAs are responsible for
physically scanning, patching each system and reporting
completion to the IASO. IAVM reporting is a weekly
responsibility for both NIPR and SIPR systems.
Port Security: most buildings on Ft. Hood have port security
enabled, which basically means that one port works with one
specific MAC address. If a computer is unplugged from one port
and plugged into another port, that port will be disabled and no
computers will work in that port until it is re-enabled. This
means that you cannot move computers around in your
buildings without requesting that port security be lifted
temporarily until you get your equipment situated. This request
is initiated through a helpdesk ticket. Be sure to list as much
information as possible, including a good point of contact name,
number and email address.
Troubleshooting: SAs are expected to perform basic
troubleshooting on their computers before calling the helpdesk.
For example, if a user is having connectivity issues, check to see
if their link lights are lit, whether or not their cables are in
working order, whether the port is physically damaged or not,
whether the computer has been disabled (you can check for this
in Active Directory!). Can the user log in to the computer? If
the user can log in, can he/she access the internet and Outlook?
No matter what the problem, when you call the helpdesk, the
technicians will ask questions to help define the users problem,
so its best to have the answers from the beginning.