LogOn Technologies 1 of 14 v1.02.050703 - draft http://www.logontek.com281-368-TECH (8324) Administrative Checklist The tasks listed here are basic steps that should be carried out on a periodic basis to maintain the network. By no means is this a complete or exhaustive list of all duties involved in maintaining a network! Although the majority of tasks described in this document are focused on Microsoft based networks, it’s possible to apply the basic principles to other platforms. Many of t he tasks within this document can be automated. Please refer to the vendor or contact LogOn Technologies to initiate a service visit to discuss such options. ************************************************************************ ************************************************************************ *************************** LEGAL NOTICE *************************** LogOn Technologies is not responsible for any omissions of data/information and/or adverse affects encountered by the use of information within this document nor the use ofany information contained within the LogOn Technologies web site at http://www.logontek.com. ************************************************************************ ************************************************************************
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
The tasks listed here are basic steps that should be carried out on a periodicbasis to maintain the network. By no means is this a complete or exhaustivelist of all duties involved in maintaining a network!
Although the majority of tasks described in this document are focused onMicrosoft based networks, it’s possible to apply the basic principles to otherplatforms. Many of the tasks within this document can be automated.Please refer to the vendor or contact LogOn Technologies to initiate a servicevisit to discuss such options.
***************************LogOn Technologies is not responsible for any omissions of data/information and/oradverse affects encountered by the use of information within this document nor the use of any information contained within the LogOn Technologies web site athttp://www.logontek.com.
Check Server Event Logs for Errors ............................................................................................ 3
Exchange Server Basic Information Store Size Limitation/Management........................ 3Weekly Administration Tasks (continued) .................................................................................... 3
This document is organized in the following manner:
- Frequency of task. This dictates how often the tasks within the corresponding sections are tobe carried out.
- Task title. This specifies the target task. - Task table. This table is used to manage and track progress for the corresponding task.
o Description of Task: Provides the reader with a brief description of the task and itssignificance.
o Responsible Party: Provides a Primary and Secondary designation for responsibleparties. If the Primary is absent or unable to perform the task it is the responsibility of the Secondary Party to ensure the task is done as scheduled.
- The final column is used as a checklist. Depending on the designated frequency for a particulartask you will see a number of blocks that can be used as a check list to ensure tasks are donewhen necessary. You may use this area to communicate when a task was done by placing yourinitials with the date in the appropriate box.
- Notes/Comments: This area is used as a placeholder for notes. You may write down notes asyou see fit.
The Network Administrator is not necessarily a person with extensive computer experience/knowledge. Many times
someone in the organization is assigned the secondary role of the Network Administrator or Coordinator. It’s the
responsibility of this individual to either outsource the maintenance of the network or educate themselves. Electronic
notification subscriptions have become a very useful way of keeping up with the latest issues for your network. Bysubscribing to mailing lists you can be notified automatically via e-mail of potential threats and/or issues relating to the
software/hardware on your network. Mailing lists are managed by vendors and provide end-users/clients with
notifications ranging from the release of a new driver for a specific device on your network to high profile virus alerts that
could potentially hinder or paralyze operations for your organization.
The following is a brief list of suggested mailing lists:
-
Operating System security and update alerts (i.e., Microsoft, Novell, Redhat, IBM, etc.)- Antivirus security and update alerts (i.e., Symantec/Norton, Computer Associates, Network Associates, Trend