IDC Recommended Practices for Infrastructure Optimization Management (IOM) If Implemented, will help take you to: Optimized PC Infrastructure Centrally Managed PC Settings and Configurations No or limited administrative rights assigned to end users Group Policies are used to prevent users from changing system settings that jeopardize PC reliability and security. Standard Desktop Strategy Enforcing PC procurement policies for standardized hardware, software and system configurations.
IDC Recommended Practices for Infrastructure Optimization Management (IOM) If Implemented, will help take you to: Optimized PC Infrastructure Centrally Managed PC Settings and Configurations No or limited administrative rights assigned to end users Group Policies are used to prevent users from changing system settings that jeopardize PC reliability and security. Standard Desktop Strategy Enforcing PC procurement policies for standardized hardware, software and system configurations.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online from Scribd
IDC Recommended Practices for Infrastructure Optimization Management (IOM) If Implemented, will help take you to: Optimized PC Infrastructure Centrally Managed PC Settings and Configurations No or limited administrative rights assigned to end users Group Policies are used to prevent users from changing system settings that jeopardize PC reliability and security. Standard Desktop Strategy Enforcing PC procurement policies for standardized hardware, software and system configurations.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online from Scribd
IDC Recommended Practices for Infrastructure Optimization Management (IOM)
IDC Recommended Practices If
Implemented, will help take you to: Optimized PC Infrastructure Centrally Managed PC Settings and Configurations No or limited administrative rights assigned to end users Basic Group Policies are used to prevent users from changing system settings that jeopardize PC Rationalized reliability and security Group Policies are used to ensure that users only install IT sanctioned software Rationalized Push/pull automated software distribution and / or virtualized dynamic application delivery Rationalized (streaming) Standard Desktop Strategy Enforcing PC procurement policies for standardized hardware, software and system Standardized configurations Standardization upon the latest Windows operating system within 18 months of release Rationalized (Vista / Vista Enterprise) Use of a minimal number of corporate images Rationalized Comprehensive PC Security Notebooks and desktops are equipped with antivirus utilities Standardized Notebooks and desktops are equipped with anti-spyware/malware utilities Standardized Notebooks are protected by centrally managed PC firewalls Standardized Network Access Control (NAC) is used for PCs entering the network Dynamic Automated patch distribution system is in place for all notebooks and desktops Standardized Data Protection & Recovery Backup/restore solution on all desktops, with an SLA Dynamic
Optimized Identity and Access Management with Active Directory
PCs Managed by Group Policy Objects Users are prevented from editing the registry Rationalized Approved applications are published in the directory Rationalized Operating system settings are configured by Group Policy Objects (GPOs) Rationalized Start menu is configured and icons are limited / optimized Rationalized Start-up and log-in scripts are pushed to PCs Rationalized Internet settings are configured by GPOs Rationalized Security settings are configured by GPOs Rationalized Application settings are configured by GPOs Rationalized Comprehensive Directory Solution Standardizing on a single directory for authentication Standardized Simplified sign-on by synchronizing directories with meta directory service Dynamic Automated password reset Rationalized Reduction of Third-Party Application Directories Reducing the number of third party application directories Standardized Automated User Provisioning Automate user provisioning to automate creation, deletions or changes to user access Dynamic rights
Improved Server System Management
Use of packaging tools with automated software distribution Rationalized Standardizing on a single systems management infrastructure Rationalized Centrally managed PC applications Rationalized Rationalized Server Operating System and Workload Server Standardization
Upgrade to Windows Server 2003 R2 Standardized Upgrade to and standardize on Exchange 2003 for messaging servers Standardized Automated and consistent Windows Server Operating system deployment Rationalized
Improving Server Management Capabilities
Standardized and consolidated directory services / active directory Standardized Implement a comprehensive and standardized Systems Management Tool Standardized Implement a comprehensive and standardized System Monitoring Software Standardized Implement effective and efficient E-mail storage archiving Dynamic Implement an asset management and lifecycle management program Rationalized Implement operational best practices for IT staff (service orientation, training and Rationalized retention)
Server and Storage Consolidation
Implement Server Consolidation using Server Virtualization Rationalized Implement Server Consolidation / Virtualization to include Workload Management Dynamic Implement Storage Consolidation from DAS to networked storage (NAS/SAN) Rationalized
Securing the Server
Stay current with security patches Standardized Implement policy-based administration and management process Rationalized Implement and automate a comprehensive backup and recovery / data protection / Rationalized disaster recovery plan for servers and storage Implement security software to ensure that all unnecessary ports are disabled Rationalized Implement comprehensive / multiple anti-virus solution(s) for Servers Standardized Implement comprehensive / multiple anti-spam solution(s) for Servers Standardized