Академический Документы
Профессиональный Документы
Культура Документы
A B C C O M PA N Y
TECHNOLOGY AUDIT
Infrastructure 2
Improve quality of service ABC Companys current com- mized such as AntiVirus and
to customers by effec- puter network is positioned resource sharing.
tively using advanced well for future growth. Most of
functionality of available the workstations have been
technology upgraded recently to a stan-
Total Cost of Ownership dard Pentium III configuration.
This will provide a scalable
considers the following: hardware foundation to build
on, however; there are some
Initial sale price software configurations that
are missing and/or not opti-
Support costs
C U R R E N T H A R D WA R E S TAT U S
NETWORK INFRASTRUCTURE
With all the possibilities that Any new network compo- and outages. Most hardware
are available today such as e- nent purchases must vendors require a the use of a
mail, resource sharing, inter- have 100MBps capabil- UPS to guarantee warrantee
net, and server based com- ity. coverage. All UPS batteries
puting, it is safe to say that should be proactively re-
network infrastructure should
Use high quality Ethernet
placed every 3 years.
be mission critical to any or- switches instead of hubs
or switches. This will
ganization. The network must
improve network speed. Resource sharing
be made to meet the mini- Sharing resources drastically
mum standards that will in- Develop network dia-
reduces maintenance and
sure reliable and efficient gram
support costs, therefore we
use. We recommend the fol- NT Workstation Gateway recommend that whenever
lowing issues be addressed: at each location w/ proxy possible that resources be
Every computer must be con- and anti-virus distribu-
70% of all network nected to the network to in- tion.
centralized and shared. The
following should be consid-
problems can be traced sure proper backup, anti- ered for consolidation:
virus, e-mail, and resource AC power UPS FAX
to faulty wiring sharing.
All mission critical systems Printers (use print server
All wiring must be made and devices should be pro- devices)
to conform to standard tected with Uninterruptible
Category 5 requirements Backup to a central
(see http://www.levitontelcom.com/
Power Supplies (UPS), which server / HD
education/dodont.index.htm ) protect against power surges
SERVERS
After verifying software com- The location 2 Server is cur- and reliability.
patibility and a full backup, rently built as a Member
the location 1 server could be Server which does not vali-
rebuilt as a Windows 2000 date logins or utilize much of Both servers need to have
server. This will allow remote the security functionality of Anti-Virus software and Proxy
access via the Terminal Ser- the server software. This server software installed. See
vices feature that is now avail- could be rebuilt as a Domain software section of this re-
able in Windows 2000 server. Controller to increase security port.
WOR KSTATIONS
Since the workstations have use of a proxy server. Every printer can be shared
been upgraded recently, most and accessible to everyone
hardware needs have been on the network.
met. However, the following As much as possible, the con-
All networking components issues should be addressed: figuration of all workstations
should be standardized to Every workstation needs to
should be made capable of All non-critical modems have AntiVirus installed.
reduce support costs and al-
supporting 100 Mbps for should be removed or dis-
abled to reduce security and low for maximum flexibility.
faster network speeds. This standard should be up-
maintenance costs. The func- All data should be stored on a
tionality of those modems can dated regularly to include lat- centralized server to facilitate
be centralized through the est patches, updates. backup procedures.
A BC Co m p a n y Page 3
C U R R E N T S O F T WA R E S TAT U S
The current software at ABC mantec) have combined ef- All other data should be
Company provides basic func- forts this month to identify stored centrally on a file
tionality. Additional functional- and prosecute offenders in server that can be completely
ity including internet access this area. backed-up daily and tested
to every desktop, secure and on a regular basis with mini-
reliable Email access and re- mal human interaction.
Network protocols that are
mote access can be achieved
not being used should be re-
by adding software such as
moved to increase network A full backup should be
proxy server, e-mail server,
speed. Standard TCP/IP and stored offsite at all times to
and terminal services. How-
NetBEUI protocols should be protect against catastrophic
ever, before any of these are
installed everywhere. damage such as fire, theft or
utilized, there needs to be a
tornados. This offsite backup
mandatory implementation of
should be updated weekly.
a centralized, self-sustaining
AntiVirus system. This should
be implemented immediately The backup of Peachtree is
as one of the highest Backup currently causing an error.
priorities. Following are soft- This issue will need to be ad-
dressed in more detail to re- Avirts Gateway is a low
ware issues and descriptions: Backup of the central system cost proxy server software
appears to be in order. How- solve. If possible, this data solution.
ever, a procedure to verify the should be stored on the
Non-licensed installations are
backup actually occurred server.
illegal and can be punishable
up to $250,000.00 per in- should be implemented,
stance! Moreover, a consor- along with a procedure to per-
tium of software developers form a test restore.
(including Microsoft and Sy-
P ROX Y S ERV E R
INTERNET
The current number of phone A first-tier long distance pro- Qwests recent pricing.
lines appears to be sufficient vider (such as Qwest, MCI or
LD rates should be re-
to meet current needs. With At&T) should be considered to
viewed annually.
the use of a proxy server, one reduce costs and improve
phone line will need to be service quality. Since 1st tier Billing increments should
dedicated to internet connec- providers actually own the be minimized to reduce
tivity. This equipment they use, there is costs
may free up no middle man to slow A no cost toll free num-
other lines down service request, and
ber can be obtained and
that were mark-up the costs.
used to facilitate organiza-
previously A 30% reduction in long dis- tional objectives.
used to ac- tance costs can possibly be
cess the achieved by changing to a 1st
internet. tier provider based on
TECHNOLOGY
PROCEDURES AND POLICIES
To protect your technology Every person with an e- Federal standards.
investments and optimize the mail address must view Computers should re-
usage, a Acceptable Usage the e-mail daily, as they main powered on at night
of Technology should be de- will be held responsible (so that virus scans,
veloped, communicated and for the information con- backups and regular
enforced. Such a policy tained within. See Ap- maintenance can occur)
should define acceptable us- pendix. Work instructions should
age of all technology compo- All electronic data files be developed for stan-
nents and specifically the fol- must be stored on a cen- dard computer proce- It is critical that all computer users
lowing: tralized server to facili- dures and organized into agree to a Computer Policy
Computers tate efficient and effec- a Operating Manual
E-mail tive backup. These policies should be
Internet As the owner of the hard- clearly communicated
Phones ware and software, your and agreed to in writing
Fax organization has the right for all computer users
to read and act upon before granting access.
Confidential or Personal any information con- This will protect your or-
Information tained therein. ganization from legal
We strongly recommend that Computer usage is not to liability and help to avoid
be in violation of any or- uncomfortable situations
the following policies be ad- involving computer us-
dressed specifically: ganizational, State or
age.
ANTI-VIRUS
transmitting viruses, as
A mandatory implementation tions once and distribute
well as how to react to sus-
of a centralized, self- that copy to all the com-
pected virus activity.
sustaining AntiVirus system puters on the network.
should be implemented This conserves band- Protect every point of entry
immediately as one of the width since every com- including E-mails, Attach-
highest priorities. puter does not need to ments, Network shared
Just this week another virus contact the internet to files, Removable media,
hit the front pages of major get the same update. Downloaded files.
news media. Virus scans should occur
The most effective anti-virus frequently (daily) on
software implementations every computer Virus
have the following character- scanning is most effi-
istics: cient when performed
overnight when com-
Mandatory - for all com-
puters typically are not
puters connected to a used as much. However
secured local area net- this requires that users
work (LAN) this includes leave the computers
laptops and home com- powered on overnight.
puters that connect re-
motely. The scan log files should
be monitored or a regular
Self-Sustaining - Effective
basis (weekly).
anti-virus software must
have the ability to update A proactive response to
and distribute updates virus activity should be The latest virus definitions can be downloaded
automatically. defined prior to a inci- automatically at no cost over the internet.
dent.
A centralized copy of
anti-virus software be Users should receive ba-
configured to download sic training on how to
the latest virus defini- avoid receiving and
Attached is the Appendix which documents supplemental material
that could not be listed in the report. Included in the Appendix is
the following:
Sample Acceptable Usage Policy
Article from www.nwfusion.com about software piracy
Hardware Inventory
Software Inventory
Current Network diagram
Long Distance Savings Estimate
Palitto Consulting Services, Inc.
600 Weber Dr.
Wadsworth, OH 44281
Phone: 330-335-7271
Fax: 330-335-7275
Email: sales@palittoconsulting.com
I M P L E M E N TA T I O N P L A N
Remove IPX and add Web Page Resolve software issues with
NetBEUI software manufacturer
Anti Virus
Review Software Licensing
ABC Company
Local Area Network
May 2001
3Com 8 Port
T P800Hub
IBM4029
HPLJ6L HPLJ6L
LaserPrinte
r
Modem Modem Modem
Internet
ISP
Dial Up
Modem Modem
3Com 8 Port
Office
Connect
Hub
HPDJ880C HPLJ1100
CPU Speed MHz
Computer Name
Manufacturer
Location ID
MB of RAM
Mfg ID / SN
User Name
NIC Speed
AppleTalk
HD Notes
NetBEUI
IPX/SPX
Printers
HD Size
OS Rev
Modem
Model
Notes
PPTP
CPU
USB
UPS
OS
#
HP LASERJET 4; HP
PACKARD COMPUTE 34MB NE2000 LASERJET IIIP; OKIDATA
14 MARY 3 BELL WIN95 A PENTIUM 60 R1 16 1.28 FREE COMPATIBLE ML PACEMARK 3410 Replace machine
LOTUS FREELANCE
MS Outlook Express
LOTUS ORGANIZER
Netscape Navigator
LOTUS APPROACH
MS Media Player
MS Net Meeting
Acrobat Reader
Crystal Reports
MS Clip Gallery
MS PowerPoint
MS IntelliPoint
MS PROJECT
ARCSERVEIT
LOTUS 1-2-3
NET-IT NOW
Live Update
MS Outlook
Real Player
ANTIVIRUS
User Name
MS Office
MS Chat
Acrobat
OTHER
AOL IM
WinZip
AOL
RX+
#
REGISTERIT; CRAWL APPLICATION V 1; FISHBONE DESINGS; FONTFIX; TALKBACK; INTELLIQUEST; QUICKEN98; KIDIE2; LABELS
UNLIMTED; LOTUS FASTSITE; MS PLUS; MS FRONTPAGE; MS INTERNET SERVICES; MIR-DIALOGUE COLOR COLLISION; MIR-
DIALOGUE JEWEL CHASE; MIR-DIALOGUE LINEUP; MIR-DIALOGUE MUDDLE; MIR-DIALOGUE RAT POKER; MIR-DIALOGUE SPRING
WEEKEND; NULLSOFT - WINAMP V4.7; PAGENET PRO; SEAGATE SOFTWARE - BACKUP; LOTUS QUICKSTART; MGI PHOTOSUITE;
6 HERMAN Y Y 5 Y 6 Y Y Y Y Y Y V9 9.00 Y Y Y Y NAV 7.6 PCANYWHERE; LAPLINK; VORTON FINANCIAL TOOLS; VR-1 INCE - FIGHTER ACE 1.5 PRACTICE; WIRELESS MESSAGING WIZARD
NAV CORP. EDITION 7.6 APLAN APPLICATION; REGISTERIT; FISHBONE DESIGNS; FULL CIRCLE TALKBACK; ASTOUND; LABELS UNLIMITED; MS BACKUP;
(STAND ALONE) VIRUS DEF: MINPILOT; NULLSOFT - WINAMP; PERFECTWORKS; VIRDOX; TRIPMAKER TRIP PLANNER; REUTERS MONEY NETWORK; CRYSTAL
7 SALLY Y 4.3 5 Y 5.5 98 Y Y Y Y Y Y Y Y 8/7/02, LAST SCAN: 8/2/02 REPORTS FOR SOTA 5.0;
BANNER BLUE SOFTWARE; ORGANIZATION CHART; DATABASE CONVERSION ; BEST! FAS PRODUCTS; REGISTERIT; CURIOUS
GEORGE LEARNING GAMES; FISHBONE DESIGNS; TALKBACK V1; 2001 TURBOTAX DELUXE; UNINST V1; JUMPSTART PRESCHOOL
NAV CORP EDITION 7.6; MENU; LOTUS APPROACH; LOTUS MOBILE SCREEN; MATROX POWERDESK; MS BACKUP; MS EXCHANGE V 5; MS OFFICE BINDER;
VIRUS DEF - 7/31/02; LAST MS FINDFAST; MS SCHEDULE +; WINAMP V 2.5; TRIPMAKER 1998 EDTION; CRYSTAL REPORTS V 7; ACR 2000; MS NETWORK;
8 LARY 3 Y Y 7 Y 5.5 Y 8 Y Y Y Y Y Y Y Y Y SCAN - N/A TRIVIAL PURSUIT MILLENNIUM ED; VITALSIGNS SOFTWARE; VORTON FINANCIAL TOOLS APPLICATION; LAUNCHANYWHERE
NAV CORP EDITION 7.6 2000 ELECTRONIC FILING; 2000 TAX PREPARATION; 2001 ELECTRONIC FILING; 2001 INTERNET TAX NOTEBOOK; 2001 TAX
(STAND ALONE); VIRUS DEF PREPARATION; 97 TAX PREPARATION; 98 PREPARATION; 99 TAX PREPARATION; CCH CLIENTRELATE; APLAN APPLICATION;
9 JOE Y 2000 Y Y Y Y Y Y Y Y Y Y 8/7/02; LAST SCAN 8/5/02 REGISTERIT; DIRECTOR 8 SHOCKWAVE STUDIO; MS BACKUP; CRYSTAL REPORTS FOR SOTA 5.0; MS NETWORK; LAPLINK PRO;
ORGANIZATION CHART, REGISTERIT; FISHBONE DESIGNS; TALKBACK; IRIS ANTIVIRUS; KIDIE2 APPLICATION; LABELS UNLIMITED;
NAV CORP EDITION 7.6 MS PHOTO EDITOR; MS WORKS; MS PLUS!; MS FRONTPAGE; MS QUERY; MIR-DIALOGUE CHARMER; WINAMP; LOTUS FASTSITE;
(STAND ALONE); VIRUS DEF MGI PHOTOSUITE; MS MONEY; TRIPMAKER; SEAGATE BACKUP; SOFTWARE TRACKER; VORTON FINANCIAL TOOLS; FIGHTER ACE
10 JOHN Y Y Y 2000 Y Y Y Y Y Y Y Y Y Y Y Y 8/7/02; LAST SCAN 8/5/02 1.5 PRACTICE
REGISTERIT; LOTUS QUICKSTART; MATROX GRAPHICS; MS BACKUP; MS OPEN DATABASE CONNECTIVITY; MS PROJECT; MS
13 SAM 5 5.5 Y 98 2000 9 9 Y Y Y Y Y Y Y NO AV S/W LOADED; INTERNET SERVICES; CRYSTAL REPORTS FOR SOTA 5.0; PCANYWHERE 7.5, 8.0, 8.02; MS NETWORK
AUDIO CALENDAR; AUDIOSTATION; REGISTERIT; DOCSHELF; DR. BLACK JACK; JIGSAWED; LOTUS QUICKSTART; MS WORKS; MS
INTERNET SERVICES; MS POINTING DEVICE; RATTLER RACE; RODENT'S REVENGE; SAY IT!; SKIFREE; SPRY IMAGE VIEWING
14 PETE Y 5 Y 98 2000 Y Y Y Y Y NAV CORP. 7.6 STANDALONE UTILITY; MS NETWORK; WINDAT;