Elements and Performance Criteria
- Assess network features
- Determine organisational policies and administration arrangements used to administer the network
- Determine the type of network operating system (NOS) and interfaces used by the existing network and potential compatibility issues caused by integration of other networks
- Identify the risks associated with administration of a network to minimise the loss of data or service during operations
- Determine network administration tools that can be used with the NOS to manage network performance and enforce organisational policies
- Administer and support the system using administration interfaces
- Use interfaces to format hard drives, set up security restrictions and establish user log-in information to administer a basic network
- Use administration tools to develop a map of system interaction to determine the data required by particular users and how often the data is accessed
- Examine existing applications and software, and plan required upgrades or reconfigurations to new system or applications
- Test reconfiguration for successful interface with existing system to ensure compatibility
- Set up and manage the network file system
- Create a required file and folder structure using appropriate administration and system tools
- Set the security, access and sharing of file system to meet user requirements
- Identify and implement the virus protection requirements for the network in line with organisational procedures
- Test and document the file system to ensure that appropriate access is available to the user groups according to organisational standards
- Administer user services and user accounts
- Determine the user services required, and implement using the appropriate administration and system tools
- Create users and groups as required to facilitate user security and network access according to user authorisation
- Verify successful access by users to authorised network data and resources, and record outcomes
- Set or modify user settings to ensure compliance with security and access policies
- Review procedures and take action to ensure that users who are no longer part of the organisation have their accounts disabled, deleted or modified
- Provide and support backup security
- Scan and clean the network of viruses before performing backup of the network
- Determine security risks to which data is exposed and provide appropriate prevention methods and recovery processes
- Report identified security risks to appropriate person
- Implement systems to provide backup and service restoration capability in the event of a disaster, according to organisational policies
- Document and disseminate the disaster recovery procedures