Top Banner
Intellectual Property of Fujitsu Consulting Inc. All rights reserved. Reproduction, transmission or distribution of any part of this publication without prior written consent of Fujitsu Consulting Inc. is expressly prohibited. IT Welcome Kit FUJITSU CONSULTING A-27 ,Sector 63 Noida, UP Phone: +0120-45050500 Fax: + 0120-4610723/724 http://www.fujitsu.com/us
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IT welcome

Intellectual Property of Fujitsu Consulting Inc. All rights reserved. Reproduction, transmission or distribution of any part of this publication without prior written consent of Fujitsu Consulting Inc. is expressly prohibited.

IT Welcome Kit

FUJITSU CONSULTINGA-27 ,Sector 63Noida, UPPhone: +0120-45050500Fax: + 0120-4610723/724http://www.fujitsu.com/us

Page 2: IT welcome

PROPRIETARY NATURE OF DOCUMENT

Every Fujitsu Consulting document is prepared for the sole and exclusive use of the party or organization to which it is addressed. Therefore, Fujitsu Consulting considers its document to be proprietary, and they may not be made available to anyone other than the addressee or persons within the addressee’s organizations who are designated to evaluate or consider the document made available.

COPYRIGHT

© 2006, Fujitsu Consulting Inc. All rights reserved. Other than for the purposes of evaluating this document, no part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as may be permitted in writing by Fujitsu Consulting.

Macroscope is a registered trademark of Fujitsu Consulting (Canada) Inc. Productivity Centre, Architecture Lab, StrategyForum, ResultStation, Dynamic Process Model (DPM), Object Relationship Model (ORM), Object and Process Alignment (OPAL), Results Chain, Macroscope Workplace, ArchitectureLab Workbench, and ResultStation Modeler are trademarks of Fujitsu Consulting Inc.

Template revised: 06/19/2006 i

Page 3: IT welcome

TABL E O F CO NT E NT S

1 IT WELCOME KIT...................................................................................................................................1

1.1 WHY I NEED A RSA TOKEN?...............................................................................................................31.2 HOW I CAN ACCESS TO SSL VPN THROUGH RSA TOKEN?.................................................................31.3 WHO WILL GIVE ME AN RSA TOKEN?..................................................................................................31.4 HOW I CAN CREATE A NEW PIN FOR RSA TOKEN?.............................................................................41.5 HOW I CAN GET AN ACCESS CARD TO THE FACILITY?.........................................................................41.6 WHAT IS CORP ID, HOW I CAN CHECK MY ID IS WORKING?...............................................................41.7 HOW I CAN CONFIGURE MY OWN PRINTER?.........................................................................................51.8 WHAT IS WEBSENSE, WHAT IS ALLOWED / BLOCKED?.........................................................................51.9 WHAT IS LUMENTION SANCTUARY?.....................................................................................................51.10 WHERE I CAN STORE BUSINESS DATA?.................................................................................................6

1.10.1 Home folder..................................................................................................................................61.10.2 Data Repository:..........................................................................................................................6

1.11 WHAT IS THE EMAIL POLICY?...............................................................................................................61.12 HOW I CAN CONFIGURE THE OUTLOOK?...............................................................................................61.13 HOW I CAN ACCESS MY EMAILS WHEN I AM NOT IN THE OFFICE?.....................................................121.14 HOW I CAN MAKE THE CALL WITHIN THE CAMPUS AND OUTSIDE THE CAMPUS?.............................12

1.14.1 Telephone & VOIP.....................................................................................................................121.15 HOW I CAN AVAIL THE VIDEO CONFERENCING FACILITY?.................................................................12

1.15.1 Video Conference.......................................................................................................................121.16 HOW I CAN REQUEST ADDITIONAL HARDWARE?................................................................................13

1.16.1 IT Item Request...........................................................................................................................131.17 HOW CAN I REGISTER NEW CLIENT VPN DETAILS?...........................................................................131.18 WHERE I CAN FIND QUALITY POLICIES AND INFORMATION SECURITY POLICIES?..............................141.19 HOW I CAN REPORT THE VIRUS/INFORMATION SECURITY INCIDENT?...............................................141.20 HOW I CAN CHAT WITHIN THE ORGANIZATION?.................................................................................141.21 WHAT HARDWARE IS NOT ALLOWED IN THE CAMPUS?......................................................................151.22 PASSWORD POLICY.............................................................................................................................16

Unified Personal Communicator................................................................................................................161.23 10 Golden Rules for Information security at workplace....................................................................17

Confidential ii

Page 4: IT welcome

1 I T W E L C O M E K I T

Welcome you on board to Fujitsu Consulting India Private Ltd. The following document is response to the frequently asked questions by new Joined. Please read this document which will help us to support you timely fashion. Please do not print this document if it is not required.

If you have any have any further queries please write to us at:FC.IN. [email protected]

1.0 How to raise IT support request?

We have a centralized tool called Reqtrack via we can log the issue for IT support.

How to log a call through Reqtrack .for technical assistance.

1. Launch Internet explorer and type URL https://reqtrack.consulting- fujitsu.com/ in the address field to access the tool or go through favorites.

2. Go to –issue track and select the work location ,enter the tab “Post new issue”

Confidential 1

Page 5: IT welcome

3. Fill and include the exact text of the message including description of issue and contact information

Confidential 2

Page 6: IT welcome

4. Finally post the issue and Concern IT team will assit you for the support.

IT Support Working Hours:

Normal Supports Hours 9.00 A.M to 6.00 P.M on Weekdays

Extended Supports Hours 6.00 P.M to 9.00 A.M on Weekdays.( from 9.00 P.M to 9.00 A.M engineer will available on be either of the location)

Weekend Support / Company Holidays call 09765400248 or Pune reception

Weekend Support / Company Holidays support will be given remotely based on Issue Criticality

Onsite user have also to log a issue directly on Issue Track. In  cases where onsite user is not able to accesses Issue track then only they can call  Pune reception

1.1WHY I NEED A RSA TOKEN?

All the FCIPL users will be required to use SSL VPN via

https://sslvpn.consulting-fujitsu.com/IN 

To access the Knowledge management, Rapidtime applications, Oracle Time & expense, Outlook web access, unjunking the junk emails and Applications hosted on NA server Infrastructure.

1.2HOW I CAN ACCESS TO SSL VPN THROUGH RSA TOKEN?

Launch Internet Explorer and type in the URL https://sslvpn.consulting-fujitsu.com/IN/ in the address field to access Juniper VPN or Select from favorites as Fujitsu VPN from Internet explorer.

Enter your RSA token Username/Password when prompted for an authentication. Once connected to Juniper VPN, web page is displayed with the details of applications hosted. All your issues related to connectivity and RSA token will logged through Customer care and

eportal issues are forwarded to [email protected]

1.3WHO WILL GIVE ME AN RSA TOKEN?

Pune Users:

Please contact Sangeeta Deshpande the token will be allocated within 2 working days from the date of joining

Noida Users:

Please contact Suchitra Trackroo the token will be allocated within 2 working days from the date of joining.

Confidential 3

Page 7: IT welcome

Hyderabad / Bangalore Users:

Please contact Sangeeta Deshpande the token will be allocated within 3 to 5 working days from the date of joining.

1.4HOW I CAN CREATE A NEW PIN FOR RSA TOKEN? Launch Internet Explorer and type in the URL https://sslvpn.consulting-fujitsu.com/IN/ in the

address field to access Juniper VPN. Enter your RSA token Username/Password when prompted for an authentication this details

will be issued along with the RSA token. It will prompt for your user ID and password, enter the details provided in the documentation

along with RSA token You will be prompted to enter the 6-digits number displayed on your RSA token. It will ask you for the pin (that will be your password), it should be created as per the manual, It

should be number with minimum of 4 digits. Stay back till the pin gets accepted. Again will prompt for the password, there you will enter the pin first (password created) along

with the 6-digits displayed number displayed on the RSA token. Example your password 4321 + RSA displayed number is 987654 then enter the

Note: In case RSA Token is lost, there will be deduction of Rs. 2000/-

1.5HOW I CAN GET AN ACCESS CARD TO THE FACILITY?

Access card will be issued by IT Infrastructure team on the date of joining. Attendance timings are recorded as per the first and last swap of access card on any door. If

you do not bring your access card then your attendance will not be recorded All the doors have Anti pass back system. You have to make sure that you have to Swipe IN

and Swipe Out to avoid being struck

Note: In case Access card or Photo ID is lost, there will be deduction of Rs 350/-

1.6WHAT IS CORP ID, HOW I CAN CHECK MY ID IS WORKING?

CORP ID is login credential to access India Email, for all the applications hosted at NA data centre. Applications Such as Knowledge management, India white pages and many project data

The CORP ID will be provided to you on the date of joining. Corp ID password management is done through India webmail, you need to login in webmail

and can change the password.

Confidential 4

Page 8: IT welcome

1.7HOW I CAN CONFIGURE MY OWN PRINTER? Choose printer name according to the Floor location. e.g. for FF-A-2 for First Floor A wing etc.

(FF is the first floor, A is wing, each wing has two printers configured) For Pune Users Select Run from Command prompt and type \\FC-PUN01-PS For NOIDA Users Select Run from Command prompt and type \\Delhi-FCN-PS

1.8WHAT IS WEBSENSE, WHAT IS ALLOWED / BLOCKED?

Websense is Content Management software, which will allow only authorized business websites on Internet at FCIPL campus.

The purpose of WebSense Policy is to strengthen the security of the Internet facility at FCIPL. Websense records all the websites users browse at FCIPL.

All the users are allowed to browse their personal Email web sites between 12:00 pm to 1:00 pm, 6:00 to 7:00pm and 12:00 to 01:00 am.

For any blocked Business URL, VPN access or messenger access the request has to be approved from APRM and above of the respective practice.

Acquisition, storage, and dissemination of data which is illegal, pornographic, or which negatively depicts race, sex or creed is specifically prohibited. Necessarily disciplinary action will be taken if associates found accessing such websites.

Freeware /Pirated SW not allowed downloading without prior notification to IT.

1.9WHAT IS LUMENTION SANCTUARY?

Lumention Sanctuary is Information security software installed on all the systems which are owned by FCIPL.

This software will not allow you to connect any secondary media storage to any desktop and laptop at FCIPL.

IT protects against data leakage & Malware with Policy based endpoint security.

External media is not allowed in office campus e.g. Pen drive, digital camera, External hard drives, personal laptops etc.

1.10 WHERE I CAN STORE BUSINESS DATA?

1.10.1 Home folder

o Always keep important individual official data on a central server.

Confidential 5

Page 9: IT welcome

o Home folders have been created for all users in order to allow all individuals to store important user specific data.

o Data stored on this folder is workstation independent. o Storage limit for home drive is 200 MB.o Home Drive will show in all users system (My Computer (H): Drive)

1.10.2 Data Repository:

o Always keep important individual project data on a central server. o Rights on the folder will be granted by practice Coordinators.o Path of the folder will be provided by the practice manager Repository path… \\india\root

Note: Please make sure that all official data is stored on the below mentioned folders. Any personal life or media files of any type will be deleted without further notice.

1.11 WHAT IS THE EMAIL POLICY?

All the users are allocated with Fujitsu email ID and Mailbox with maximum capacity of 100 MB. Associates have to manage their own mailbox to move their emails to PST file. IT Infrastructure

will not take any responsibility of users PST files backup. Associates must use extreme caution when opening e-mail attachments received from unknown

senders, which may contain viruses Do not send excessively large electronic mail messages or attachments. (5 MB is the maximum

limit ) The E-Mail facility is NOT to be used for personal gain or commercial use by any employee. Please do not use chain emails, festive greetings to large groups, do not store unwanted mails. Please check the sender name before sending the emails. Please do not use the option of BCC.

1.12 HOW I CAN CONFIGURE THE OUTLOOK?

1. Go to Control Panel select Mail

2. In the Mail Setup window, click E-mail Accounts

Confidential 6

Page 10: IT welcome

3. On the E-mail Accounts window, Add a new e-mail account, click Next

4. Check on Microsoft exchange server

Confidential 7

Page 11: IT welcome

5.Type FC-PUN01-MAIL.ind.fc.local into the Microsoft exchange server and write your own user name press check name and click on more settings this step might take some time.

Confidential 8

Page 12: IT welcome

6. Navigate to connection

7. Select Connect to Exchange using HTTP and click over Exchange proxy settings

Confidential 9

Page 13: IT welcome

Click Exchange proxy Settings and fill the following details

8. Exchange: https:// Webmail.in.fai.fujitsu.com

Select: Mutually authenticate the session when connecting with SSL

Principal name for proxy server: msstd: Webmail.in.fai.fujitsu.com

Click and select check box On Slow Networks, connect using HTTP first, then connect using TCP/IP

In the proxy authentication settings area, select BASIC Authentication.

Click OK

Confidential 10

Page 14: IT welcome

9. System will prompt for the user name password, please use your current IND Domain (IND\ksrikant)

windows login in

10. Click OK on logon window.

11. Click and Select Use Cache Exchange Mode.

12. On the E-mail Accounts Exchange Server Settings window, click next and Finish.

13. Please make sure that your system is connected to internet and it is not protected with HTTPS firewall.

14. Start the Outlook.

You can add PST folder in Data file management option of Outlook

Confidential 11

Page 15: IT welcome

1.13 HOW I CAN ACCESS MY EMAILS WHEN I AM NOT IN THE OFFICE?

https://webmail.in.fai.fujitsu.com/owa through outlook web access It’ll first ask for RSA authentication and then will redirect page to

webmail

You can also access above link after connecting to SSL VPN and “India Exchange 2007 Webmail (New FAI IND Webmail environment)”

1.14 HOW I CAN MAKE THE CALL WITHIN THE CAMPUS AND OUTSIDE THE CAMPUS?

1.14.1 Telephone & VOIP

By default all desks at FCIPL have Local dial out access and VOIP facility for Pune and NA.

For long distance calling STD, ISD associates have to provide approved request from APRM and above for business use. IT infra team will provide the accesses code based on approved request.

In Noida office we are having above services incorporated in a single phone only. In Pune facility we have different handsets for PSTN and VOIP.

For calling Noida to Pune dial 8, followed by the Pune Extn. number

For calling Pune to Noida dial 9, followed by the Noida Extn. number

For all the calls to NA dial 8 followed by the number with country/area code.

For Voice mail ,Conference call kindly go through the Phone manual uploaded at

\\india\root\PublicData\Noida\\india\root\PublicData\Pune

Users shall abide by defined policies and procedures for Telephone/VOIP usage.

Contact customer care for queries related to VOIP/Telephone.

1.15 HOW I CAN AVAIL THE VIDEO CONFERENCING FACILITY?

1.15.1 Video Conference

Please send email request to customer care team request VC facility requirement for business use. VC is installed at Enterprise at Pune facility and in NOIDA VC is installed at board Room.

Confidential 12

Page 16: IT welcome

IP and ISDN number details are as below:

Noida LAN IP: 10.34.5.19 Used mostly from Pune to call Noida or from any other location which is

connected to Noida. WAN IP: 61.95.143.171 – This is a Public IP and can be dialed from anywhere in the world. ISDN Number: 0120-4214057. This option to be used when other site doesn’t have the IP

connectivity.

Pune LAN IP: 10.34.32.19 Used mostly from Noida to call Pune or from any other location which is

connected to Pune. WAN IP: 61.95.152.71– This is a Public IP and can be dialed from anywhere in the world. ISDN Number: 020- 27692868. This option to be used when other site doesn’t have the IP

connectivity.

1.16 HOW I CAN REQUEST ADDITIONAL HARDWARE?

1.16.1 IT Item Request

For any new hardware issuance e.g., laptop, blackberry, data card associates should raise a request through following URL https://reqtrack.consulting-fujitsu.com/reqtrack/index.asp

It is mandatory to get the requests approved by the respective managers and only the approved requests will be processed by the IT dept.

Gate pass can only be generated after the respective manager’s approvals. All the Temporary issued hardware should be returned to IT further delay. If the project is delayed/Extended then additional extension request for the same asset to be

raised separately. Any losses or damages to issued hardware will be charged to personal account. No Waivers will be provided by IT if any hardware is lost or damaged

1.17 HOW CAN I REGISTER NEW CLIENT VPN DETAILS?

For any new VPN installation, you have to submit a request in IT Item Request Tool with all the details. By default you can’t connect to any new VPN unless it is approved by IT.

Associates should raise a request through following URL https://reqtrack.consulting-fujitsu.com/reqtrack/index.asp If the project is delayed/Extended then additional extension request for the same asset to be

raised separately.

1.18 WHERE I CAN FIND QUALITY POLICIES AND INFORMATION SECURITY POLICIES?

Confidential 13

Page 17: IT welcome

Please refer to Policy Documents in Q PO_001_ISMS_1v5  - Primary Policies for Information Security Management Systems (ISMS) PM_030_ISMS_1v6 - Procedure for Information Security Management Systems (ISMS) PM_014_INFOSTR_1v5 - Info Structure Management Process (ISMS)

1.19 HOW I CAN REPORT THE VIRUS/INFORMATION SECURITY INCIDENT?

If you suspect presence of Virus in your PC, Disconnect your PC from the network immediately and do not switch off the machine.

Contact customer care and report the same. Please do not try to remove the Virus on your own. Please do not shutdown the system or run any application or data files

1.20 HOW I CAN CHAT WITHIN THE ORGANIZATION?

Cisco Unified Personal Communicator is organization internal messaging / chat software available to all the users to communicate with other users.

Step 1 On your desktop, click on “Start” Run

Step 2 Type in the following address:\\punedatastore\Softwares\Public\CiscoUnifiedPersonalCommunicatorSetupK9_ENU.msi

Step 3 Click on “Install” to start the installation.

Step 4 Hit the “Finish” button after the installation is complete.

Confidential 14

Page 18: IT welcome

Step 5 You will get a Cisco Unified Personal Communicator icon on your desktop and in Programs.

Step 6 Double click “Cisco Unified Personal Communicator” icon and you should now see a dialog box prompting for an Address (Login Name) and Password.

Step 7 In the “Username” field type your windows login ID

Step 8 In the “Password” enter your network password (India domain)

Step 9 In the “Login Server” field type FCIPUNPRE01 and click Log In.

Step 12 After log in you can now go ahead and add contacts in your contact list

Step 13 Go to “Contacts” menu and select the option “Add new Contact” or Search the required person in search tab and right click on person name to add in Contact group.

1.21 WHAT HARDWARE IS NOT ALLOWED IN THE CAMPUS?

Confidential 15

Page 19: IT welcome

1.22 PASSWORD POLICY

Do not reveal your account password to others.

All user-level and system-level passwords must conform to the company guidelines

All passwords (e.g., email, web, desktop computer, etc.) must be changed at least every 45 days.

The password must be minimum eight characters long having alphanumeric & both upper and lower case

Take advantage of a single intuitive interface for voice and video calls, voicemail playback, and integrated directories

Unified Personal Communicator

Cisco Unified Personal Communicator- This application will be installed on your desktops/laptops, this would carry the below mentioned features:

1. Presence—View real-time availability of other users.

2. Unified contact list—Search your corporate directory from one easy-to-use interface to locate contacts quickly. Simply click to call. . (this feature is limited to Pune office location)

Confidential 16

Page 20: IT welcome

3. Click-to-call—Dial from the contact list, using either the integrated soft phone or an associated Cisco Unified IP phone. . (this feature is limited to Pune office location)

4. Integrated voice and video calling—Exchange ideas face to face with a coordinated video display on the PC screen and audio conversation with the soft phone. Users can place Voice/video calls to others using Cisco Unified Personal Communicator. . (this feature is limited to Pune office location)

5. IP phone association—Use Cisco Unified Personal Communicator to control your desktop Cisco Unified IP phone and make or receive calls. (this feature is limited to Pune office location)

6. Voice messages—Access voicemail messages—view, playback, sort, and delete messages. (this feature is limited to Pune office location)

Instant Messaging – Text chat facility within the organization

1.23 10 GOLDEN RULES FOR INFORMATION SECURITY AT WORKPLACE

1. You are responsible for actions undertaken using your user ID and password

Your user IDs and passwords are strictly personal and must not be divulged to others.

Do not use a simple and obvious password.

Never write down your password.

If you share your password with IT support, for any reason, change it as soon as possible.

2. Protect your Computer and Information

Do not disable or remove any software installed on your PC for security purposes.

Use a password-protected screensaver on your PC to stop unauthorised access.

Regularly check that anti-virus software on your PC or laptop is up to date and operating.

Do not open “suspect” messages, not even if they are from a known sender.

Immediately notify the Customer care of a suspected computer virus or threat of one.

3. Ensure that you (and others) can be identified

Always ensure your Fujitsu Photo ID is visible.

Do not lend your Access card to others.

Accompany guests to your office/meeting room and to the exit when they are leaving.

Challenge any unaccompanied strangers without identification and if you are at all suspicious, report them to your manager.

Do not allow people you do not know to follow you through security barriers.

Confidential 17

Page 21: IT welcome

4. Classify information correctly against the following classifications

Confidential - information and material of an extremely confidential and sensitive nature, the disclosure of which could cause grave damage to the interests of the Company.

Restricted - Information whose unauthorised disclosure would cause significant harm to the interests of the organisation.

Internal – A privacy marking that applies to matters relating to staff and their services, where disclosure or unauthorised access could lead to commercial embarrassment or staff discontent. Information whose unauthorised disclosure could be detrimental to the interests of the Company, but which may be shared with third parties for business purposes.

Public - Information which can be made publicly available. This is either because it has no commercial value or its publication would enhance the reputation of the Company.

5. Protect confidential information

Never talk about confidential business if others might overhear you.

Company information must be managed according to its classification (see section 4). Even if unclassified it may only be provided to outsiders if necessary for business purposes and you have permission from your manager.

Ensure that the recipient of any information respects the applicable classification.

Before sending email, always check that the recipient’s address is correct.

Clear away confidential information so that it cannot be read, copied or removed by others.

Ensure, when absent, that your desk, cupboards and, if appropriate, your office are locked.

6. Dispose of confidential information properly

Follow your local processes for document and media disposal.

If a delay in printing occurs, delete print jobs containing confidential information from the print queue.

Do not dispose of documents and data outside Fujitsu premises.

7. Only use hardware and software that has been approved by Fujitsu Services

Do not install your own software or copy Fujitsu Services from one computer to another.

Downloading or copying software for personal purposes from the Internet is not permitted.

Do not use personal IT equipment for business purposes.

8. Use the Internet and email for business purposes only

The Internet and email may be used for personal purposes in accordance with the company standard.

Never publish any information belonging to, or concerning, Fujitsu on the Internet or intranet without permission.

Downloading, sending and/or storing offensive or inappropriate information is not permitted.

9. Take extra precautions when working offsite

Never leave your laptop unattended in a car.

Always carry a laptop as hand luggage.

Confidential 18

Page 22: IT welcome

Do not leave confidential documents unattended in a car or hotel room.

If storing documents or information at home ensures that they are adequately protected.

10 Always use your common sense and at least

Comply with the law, your employment contract, and the Fujitsu code of conduct.

Report incidents via the incident reporting process

Confidential 19