Elements and Performance Criteria
- Review network policies
- Review organisational policies for network use and administration arrangements
- Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisationalpolices
- Determine and document settings and parameters that should be used in order to meet policies and procedures
- Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools
- Create an interface with existing system
- Identify and document the current system and components and configuration through audits of hardware and software
- Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
- Examine existing applications and plan required upgrades/reconfigurations to new system or applications
- Test reconfiguration for successful interface with existing system
- Set up and manage the network file system
- Evaluate the network requirements of the user and design an appropriate file and folder structure
- Create the designed file and folder structure using appropriate administration and system tools
- Set the security, access and sharing of file system to meet user requirements
- Identify and implement the virus protection requirements for the network in line with organisational procedures
- Test the file system to ensure that appropriate access is available to the user groups
- Document the created file system in accordance with organisational standards
- Manage user services
- Evaluate the network requirements of the user and design an appropriate set of services that should be provided
- Implement the services required by using the appropriate administration and system tools
- Create users and groups as required to facilitate user security and network access in accordance with user authorisation
- Test successful access by users to authorised network data and resources and record outcomes
- Monitor user accounts
- Modify default user settings to ensure that they match security policies
- Modify existing user settings for non-compliant security according to security and access policies
- Check that appropriate legal notices at log on are displayed
- Use appropriate utilities to check strength of passwords
- Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
- Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software
- Provide and support backup security
- Scan and, if required, clean the network of viruses before back-up
- Review security requirements for users and data to be stored on network
- Determine risks to which data is exposed and provide appropriate prevention and recovery processes
- Implement systems to provide back-up and service restoration capability in the event of a disaster
- Document and disseminate the disaster recovery procedures