You are on page 1of 98

This Material is developed by Enhance Your Future Pty Ltd for Australian Institute of Science

and Technology (AIST)


ICTNWK536 - Plan,
implement and test enterprise
communication solutions
 Plan for enterprise communication solutions
 Implement enterprise communication solutions
 Test and monitor implementation of enterprise communication
solutions
TOPIC 1 – PLAN FOR ENTERPRISE
COMMUNICATION SOLUTIONS

 Welcome to the unit ICTNWK536 - Plan, implement and test enterprise communication solutions.
 This unit describes the skills and knowledge required to manage the deployment and administration
of enterprise communication solutions.
 It includes email and remote access email, web portal or content management solution, and enterprise
collaboration tools.
 It applies to individuals working as information and communications technology (ICT) professionals
who configure and deploy software to supply email, collaboration and messaging services to meet the
needs of enterprise users.
RESEARCH AND IDENTIFY ENTERPRISE
COMMUNICATION SOLUTIONS TO MEET
ORGANISATIONAL REQUIREMENTS

 When preparing to plan, implement and test enterprise communication solutions it will be necessary
to make sure that a series of communication solutions that may be used as a part of the overall
communications that need to be completed by the organisation are researched and identified.
 As a part of the research that is completed, it is important to make sure that all organisational
requirements are able to be met by the proposed solutions.
COMPLETING NECESSARY RESEARCH

 Research is a systematic investigation that will be conducted in order to find potential solutions to a
specific problem.
 The problem, in this case, is the need to find communication solutions that will meet the
organisational needs.
ENTERPRISE COMMUNICATION SOLUTIONS

 Enterprise communication solutions are systems of interconnected networking, infrastructure,


hardware and software that will enable the transfer of information between different organisational
stakeholders in a manner that meets organisational requirements.
 Common communication systems may include:
 Email servers and set up
 Collaboration tools
 Web portal or content management software
FEATURES AND PURPOSE OF AN EMAIL
SERVER APPLICATION

 An email server application is a software that will run on the mail server in order to receive and
forward incoming messages and to process and send outgoing messages.
 Common features of an email server application include:
 SMTP/ POP3 / IMAP / HTTP/ LDAP and Proxy services with SSL / TLS support
 Advanced Access and Security Controls
 Effective Anti-Spam which can be tailored to your business
 Extensive Groupware including email, calendars, contacts, tasks and journals
 Intuitive Webmail works with your browser, or use FTGate Desktop Client
 Mail Client auto-configure support (e.g. Outlook/Thunderbird)
 IOS auto-configure support
 Fast, powerful message processing
 Mail server may include:
 Axigen Mail Server
 Linux or Unix Sendmail
 Microsoft Exchange
 Open Xchange Server
 Postfix
FEATURES AND PURPOSE OF
ORGANISATIONAL COLLABORATION TOOLS

 Organisational or business collaboration tools are a range of software and hardware tools that can be
used to support collaboration and sharing between work teams in different environments.
 Collaboration tools enable:
 Direct messaging and communication
 Support of live documents
 Sharing and access to the same screen views and documents
 Integrated version control
 The sharing of work area setups
 These tools are designed to make sure that remote teams or even teams in the same environment
logging in from different computers are able to work together in real time.
 Preventing the need for laborious and complicated information and document sharing actions.
FEATURES AND PURPOSE OF WEB PORTAL
OR CONTENT MANAGEMENT SOFTWARE

 A web portal is a remote access area that enables personnel to log in and access content or other
applications such as email servers and collaboration tools.
  Features of a web portal include:
 Access and authentication requirements and security
 Access to specific work areas and documents
 Access to organisational applications as required
 Content management software is designed to create a space where personnel are able to log in and
create and manage the organisations content in order to enable advanced communications to take
place.
 Web portal or content-management software may include:
 IBM websphere
 JBoss
 Microsoft SharePoint
 Moodle or Equella
 Oracle
IDENTIFYING ENTERPRISE
COMMUNICATION SOLUTIONS TO MEET
ORGANISATIONAL REQUIREMENTS

 When completing research into each of the different communication solutions that will need to be
used to meet the organisational need, it is important to consider:
 Budget
 Purpose of communications within the organisation
 Requirements for functionality
 Security requirements
 User profiles
 Other organisational requirements
EVALUATE AND COMPARE ENTERPRISE
COMMUNICATION SOLUTIONS AGAINST
ORGANISATIONAL REQUIREMENTS

 Once a range of communication solution options has been identified, it will be necessary to evaluate
and compare the solutions against the organisational requirements.
IDENTIFY ORGANISATIONAL
REQUIREMENTS

 In order to complete appropriate evaluations and comparisons against organisational requirements, it


will be necessary to define the organisation's requirements in a clear and measurable manner.  
 Organisational requirements are all of the organisation's needs in relation to the communication
solutions that are to be implemented.  
 These may include:
 Functionality
 License type
 Cost
 The ability of the solution to comply with legislative requirements
 Ease of use
 The organisation's requirements in relation to the proposed communications solutions will need to be:
 Listed
 Quantified
 Defined in a clear and measurable manner
EVALUATE COMMUNICATIONS SOLUTIONS

 The process of evaluation will involve the collection of a range of specific information regarding the
features and functions of each solution.
 It will be necessary to consider:
 Features
 Functions
 Need for systems requirements
 Compatibility requirements
 Cost
 Licensing requirements
 Implementation requirements
COMPARE SOLUTION FEATURES AND
FUNCTIONS AGAINST THE
ORGANISATIONAL REQUIREMENTS

 The process of comparison involves the measurement of each feature and function against the
identified organisational requirements in order to identify any similarities or compatibilities and any
differences or incompatibilities.
SELECT ENTERPRISE COMMUNICATION
SOLUTIONS TO ADDRESS ORGANISATIONAL
REQUIREMENTS

 Once the evaluation and comparison of the communication solutions have been completed, it will be
necessary to make sure that appropriate selections are made according to the manner in which they
address organisational requirements.
DEVELOP A SELECTION PROCESS

 A clear and measurable selection process will need to be developed to make sure that the most
appropriate solution for the organisation is able to be selected.
 A suitable selection process may involve the completion of the following actions:
 Rank and prioritise organisational requirements
 Consult the outcomes of the evaluation and comparison that was completed
 Rank the solutions in terms of their ability to meet organisational requirements
 Conduct a cost benefit analysis
 Conduct a risk assessment
 Make and substantiate the selection
RANK AND PRIORITISE ORGANISATIONAL
REQUIREMENTS

 It will be necessary to rank and prioritise the organisational requirements that have been identified in
terms of:
 Importance
 Urgency
 The importance of the requirements will be based on its ability to assist the organisation in achieving
its goals and objectives.
 It is important that all organisational requirements are ranked and prioritised and then provided with a
weighted number so that they can be used to make non-biased decisions about which of the proposed
options will be most suitable.
CONSULT THE OUTCOMES OF THE
EVALUATION AND COMPARISON THAT WAS
COMPLETED

 The next step in the selection process will be to consult the outcomes of the evaluation and
comparison that was completed in order to identify which of the organisational requirements is met
by each of the options.
 This information should be assessed against the ranking and prioritisation of the organisational
requirements in order to make sure that the selection is based on the most important and urgent needs
of the organisation.
RANK THE SOLUTIONS IN TERMS OF THEIR
ABILITY TO MEET ORGANISATIONAL
REQUIREMENTS

 It will be necessary to rank the solutions in terms of their ability to meet organisational requirements
using the information collected during prioritisation and the outcomes of the evaluations and
comparisons that were completed.
CONDUCT A COST BENEFIT ANALYSIS

 A cost-benefit analysis is a financial decision-making tool that applies financial value to each of the
organisational requirements and the features and functions of the solutions in order to make
mathematical calculations against the cost of each solution to determine which of the options will
provide the most benefit to the organisation for the least amount of cost.
 This process should be completed for each of the communication solution options that have been
proposed so that this information is able to be used as a part of the decision-making process.
CONDUCT A RISK ASSESSMENT

 A risk assessment should be completed for each of the options in order to make sure that any risk
exposure that the solutions result in for the organisation is able to be identified.
 Suitable controls will need to be evaluated for each of the identified risks, and then the options should
be ranked in terms of risk so that this can be considered as a part of the final selection process.
MAKE AND SUBSTANTIATE THE SELECTION

 All of the information that has been collected and assessed during the investigations process should
be used to determine which of the solutions will:
 Best meet organisational requirements
 Has the best cost-benefit ratio
 Can be controlled appropriately in terms of risk
 A final selection should be made, and evidence from the completed assessments should be used to
substantiate the decision.
ACQUIRE ENTERPRISE COMMUNICATION
SOLUTIONS IN ACCORDANCE WITH
ORGANISATIONAL REQUIREMENTS

 Once the communication solution options have been identified, selected and approved, it will be
necessary to acquire the enterprise communication solutions in accordance with organisational
requirements.
ACQUIRE ENTERPRISE COMMUNICATION
SOLUTIONS

 The process of acquiring enterprise communication solutions will involve the actions required to
make the selected items available to the organisation.
 Organisational requirements for the acquisition process may include:
 Methods for obtaining the items
 Approvals processes
PROCUREMENT METHOD AND PROCESSES

 Procurement is the process of purchasing or obtaining the necessary resources for an organisation so
that they are available to be used.
 Organisations will have a procurement policy that will outline a range of factors that need to be
complied with, such as:
 Purchase or subscription preferences
 Licensing preferences
 Approvals processes
 Preferred vendors
 Methods for selecting vendors and obtaining the items required
LICENSING AND REGISTRATION METHOD

 When preparing to procure and acquire ICT communications solutions, it is important to consider the
licensing and registration requirements that apply to the solution, and this will vary designing on the
product and the vendor.  
 Options should be collected and then assessed against the procurement policies of the organisation so
that suitable selections can be made.
FORMAT FOR TOOLS

 Different communication solutions may be acquired in different formats, and these will determine the
necessary method of implementation; it is important to consider:
 Cloud-based tools
 Locally installed applications
 Server installed applications
ENSURE ACQUISITION IS COMPLETED
WITHIN REQUIRED TIMELINES

 It will be necessary to ensure that all necessary acquisitions are completed within the required
timelines that apply to the project so that all tools and applications will be available for
implementation as required.
CONSULT WITH STAKEHOLDERS TO DEVELOP
IMPLEMENTATION PLAN ADDRESSING THE
ORGANISATIONAL REQUIREMENTS

 It will be necessary to consult with stakeholders in order to develop an implementation plan that
addresses organisational requirements.
ORGANISATIONAL REQUIREMENTS FOR ICT
IMPLEMENTATION

 The organisational requirements for ICT implementation are all of the needs that should be fulfilled
by the implementation in order for the implementation to be considered a success.
CONSULT WITH STAKEHOLDERS

 A stakeholder analysis will need to be completed in order to identify the stakeholders that need to be
consulted in order to make sure that appropriate information is able to be attained to ensure that the
implementation plan that is created will meet the needs of the organisation.
 Stakeholders to be consulted could include:
 Users
 Department heads
 Management
 Personnel
KEY REQUIREMENTS OF AN ICT
IMPLEMENTATION PLAN

 When planning, implementing and testing enterprise communication solutions, it will be necessary to
understand the key requirements of an ICT implementation plan and these are:
 Align the plan with the needs of the organisation
 Assess licensing issues
 Ensure regulatory and legislative requirements are met
 Develop clear action plans
 Assess costs
 Prepare resources
 Manage security requirements
 Prepare system back up
 Develop deployment plans
 Prepare existing network
 Create a plan for testing and monitoring
ALIGN THE PLAN WITH THE NEEDS OF THE
ORGANISATION

 In order for the implementation of a new communication solution to be effective, it is important to


make sure that the needs of the organisation are aligned with the plan.
 The organisational analysis will need to be completed to identify:
 Organisational needs
 Organisational goals
 Deficiencies of the current plan
 New features and set up requirements that apply to the solution
ASSESS LICENSING ISSUES

 As a part of the ICT system implementation, it is important to make sure that any relevant licensing
issues are able to be managed, and this will require:
 Assessment of software and hardware to be installed
 Creation of licencing management register
 Completion of all payment and registration requirements
ENSURE REGULATORY AND LEGISLATIVE
REQUIREMENTS ARE MET

 It is important to assess the implementation actions in order to identify any regulatory and legislative
requirements that may apply.
 It is important to consider:
 Privacy
 Confidentiality
 Effective security of private information
 Management of the organisations legal and regulatory obligations
DEVELOP CLEAR ACTION PLANS

 Clear and specific action plans will need to be created for each of the steps and stages of the
implementation plan to make sure that the following organisational needs will be managed:
 Continuity of business operations
 Security and management of data
 Protection of organisational assets
ASSESS COSTS

 All expected costs for the implementation process will need to be considered and assessed in order to
make sure that appropriate cost benefits are able to be achieved and that the implementation that is
completed is aligned with the requirements of the organisation.
PREPARE RESOURCES

 All resources that will be required as a part of the plan will need to be:
 Identified
 Costed
 Obtained
 Prepared
MANAGE SECURITY REQUIREMENTS

 Security plans for each stage of the implementation will need to be created and managed to ensure
that the security policies of the organisation are suitably complied with at all times.
PREPARE SYSTEM BACK UP

 During implementation activities, it is important to make sure that the system is protected from
unexpected loss during the implementation process.
 It is important to make sure that the backup plans developed for:
 Data
 Settings
 Configuration
 Security
DEVELOP DEPLOYMENT PLANS

 A deployment plan is a plan that will set out all of the steps that need to be taken to deploy new
software or hardware into the organisation to make sure that system continuity is able to be ensured.
PREPARE EXISTING NETWORK

 It is important as a part of the implementation process that the network is prepared for any changes
that are to be made to the communication solutions that are to be used.
 Prepare existing network may include:
 Checking for incompatibilities with existing systems
 Configuring domain names system (DNS) to support mail server
 Installing any prerequisites
 Reconfiguring other network services to support mail
 Removing unsupported legacy components
 Updating server operating systems to the latest version
 Using vendor tools to check the network for readiness to install a mail server
CREATE A PLAN FOR TESTING AND
MONITORING

 It is important to make sure that a suitable plan for testing and monitoring of the network is created
and implemented as a part of the overall implementation activities to make sure that the success of the
implementation is able to be ensured.
TOPIC 2 – IMPLEMENT ENTERPRISE
COMMUNICATION SOLUTIONS

 IMPLEMENT AND CONFIGURE ENTERPRISE COMMUNICATION SOLUTIONS IN


ACCORDANCE WITH IMPLEMENTATION PLAN
 It is essential that the enterprise communication solutions are implemented and configured in
accordance with the implementation plan that has been prepared.
ASSESS THE IMPLEMENTATION PLAN FOR
IMPLEMENTATION AND CONFIGURATION
REQUIREMENTS

 The implementation plan that has been developed for the organisation will need to be assessed in
order to make sure that all implementation and configuration requirements that apply to each of the
solutions are able to be identified.
IMPLEMENTATION REQUIREMENTS

 The implementation requirements for each of the communication solutions that are to be put into
place within the organisation will refer to all actions and standards that apply to the installation and
deployment of the items.
 Implementation requirements may include:
 Data protection requirements
 Installation procedures and timelines to enable continuity of business operations
 Testing and assessment procedures to make sure the implementation is completed as planned
 Schedules and resources that will be used for the process
CONFIGURATION REQUIREMENTS

 Once the items are installed, they will need to be set up so that they can be used safely and efficiently
within the system, and this is the process of configuration.
 The configuration requirements will need to be identified based on:
 Current system requirements
 Vendor specifications for the communication solution
 Compliance with security requirements that apply within the organisation
 Compatibility with the current system
 Usability requirements
 Licensing requirements
 Configuration requirements may include:
 Install updates and patches
 Set up firewalls and access
 Create user accounts to manage access and authentication
 Set up workspaces and interfaces
 Adjust settings to meet the needs of the organisation
INSTALL UPDATES AND PATCHES

 Once the communication applications have been installed, it will be necessary to install any necessary
updates and or patches to make sure that the most current and secure version of the item is installed.
 All updates and patches installed will need to be recorded as a part of the configuration
documentation.
SET UP FIREWALLS AND ACCESS

 Firewall permissions and restrictions will need to be set up to make sure that the permissions of the
communication solutions meet the security policies that apply to the organisation.
CREATE USER ACCOUNTS TO MANAGE
ACCESS AND AUTHENTICATION

 User accounts for the different user groups within the organisation will need to be created, and
suitable permissions and restrictions will need to be applied to them, based on need and compliance
with the security requirements of the organisation.
SET UP WORKSPACES AND INTERFACES

 All workspaces and graphic user interfaces will need to be set up to meet the needs of the
organisation, and this may include:
 Appearance
 Application short cuts
 Default settings
 Permissions and access requirements
ADJUST SETTINGS TO MEET THE NEEDS OF
THE ORGANISATION

 Any settings that define the manner in which the communication solution will behave or can be used
will need to be manipulated to make sure that the solution meets:
 User requirements
 Security requirements
 Organisational requirements
DETERMINE IF IMPLEMENTATION OF ENTERPRISE
COMMUNICATION SOLUTIONS MEETS IMPLEMENTATION
PLAN AND ORGANISATIONAL REQUIREMENTS AND
MODIFY IMPLEMENTATION TO ADDRESS VARIANCE

 It will be necessary to determine if the implementation of enterprise communication solutions meets


the implementation plan and the organisational requirements.
 If there is any variance between implementation outcomes and the implementation plan and identified
organisational requirements, it will be necessary to modify the implementation to achieve
compatibility.
DETERMINE IF THE IMPLEMENTATION OF ENTERPRISE
COMMUNICATION SOLUTIONS MEETS THE IMPLEMENTATION
PLAN AND ORGANISATIONAL REQUIREMENTS

 Detailed investigation measurement and comparison will need to be completed on the installed and
configured communication solutions against the planned implementation in order to determine if the
implementation meets to plan and organisational requirements.
 An implementation assessment will involve a systematic assessment of each of the implementation
plan and organisational plan requirements against the outcomes that have been achieved during the
process of implementation.
MODIFY THE IMPLEMENTATION AS
REQUIRED TO ADDRESS ANY VARIANCE

 Once suitable assessments have been made, it will be necessary to ensure that changes are made to
the implementation to address any variance.
 Variance is any differences between the planned outcomes and the outcomes that were achieved.
 Any modifications that are made to the implementation of the communication solutions will need to
be recorded and then re-assessed against the plan in order to ensure that suitable compliance has been
achieved.
TOPIC 3 – TEST AND MONITOR
IMPLEMENTATION OF ENTERPRISE
COMMUNICATION SOLUTIONS
 TEST ENTERPRISE COMMUNICATION SOLUTIONS TO DETERMINE IF ENTERPRISE
COMMUNICATION SOLUTIONS ARE OPERATING CORRECTLY ACCORDING TO
SYSTEM SPECIFICATIONS
 Once the implementation is complete, and all implementation steps and actions have been confirmed
as compliant with developed implementation plans and organisational requirements, it will be
necessary to complete necessary testing.
 Testing will need to be completed to determine if the enterprise communication solutions are
operating correctly and according to system specifications.
TESTING PROCESSES

 Testing processes are actions that are used to confirm operation and levels of performance in order to
make sure that operational and organisational needs have been met.
 Different communication solutions will have different testing needs, and it is important to make sure
that these are considered and that suitable test plans are developed for each solution.
 A suitable testing plan will be one that tests for all necessary requirements using appropriate solutions
and tools to confirm compliance with set requirements.
 Testing processes may include:
 Functional testing
 Firewall and security testing
 Utility testing
FUNCTIONAL TESTING

 Functional testing will be completed by performing a range of test actions to ensure that the full
functionality and compatibility of the communication solution with the current network and ICT
system is able to be confirmed.
 All actions that can be completed with the communication solutions should be tested to make sure
that functionality can be confirmed.
FIREWALL AND SECURITY TESTING

 Firewall and security testing should be completed to make sure that appropriate firewall activity has
been achieved by the installation.
 Firewall and security testing should include:
 Penetration testing
 Auditing
 Complete network scanning
 Scan for vulnerabilities
 Ethically hack the system
 Attempt to crack passwords
 It is important to make sure that the following components are also assessed during the testing
process:
 Access and authentication
 Port access and open ports
 Rules and permission lists
 Vendor-specific security requirements
 Compliance with the organisation's security policy
UTILITY TESTING

 A range of utility testing should be completed to make sure that access and operation of the solutions
can be confirmed and these should include ping tests and other tests to confirm operations.
MONITOR AND ANALYSE PERFORMANCE AND LOGS OF
ENTERPRISE COMMUNICATION SOLUTIONS TO
DETERMINE IF ORGANISATIONAL REQUIREMENTS ARE
MET

 It is important to make sure that appropriate monitoring and analysis of system performance and logs
is completed regarding the implemented enterprise communication solutions so that compliance with
organisational requirements is able to be confirmed.
MONITOR PERFORMANCE OF
COMMUNICATION SOLUTIONS

 The performance of communications solutions can be monitored using a range of utilities and tests.
 Performance may be monitored using:
 Statistical computations
 Error logs
 Event logs
 Alarm logs
 Speed tests
 Bandwidth usage measurements
 Detailed traffic or security reports
MONITOR LOGS OF COMMUNICATION
SOLUTIONS

 A range of logs should be compiled and assessed in order to identify any security or performance issues
that may apply to the solution.
 Logs are registers of events that have occurred within the system and can be used to assess:
 Access
 Traffic
 Authentications
 Errors
 Lost packets
 Speed
 Routing
MODIFY ENTERPRISE COMMUNICATION SOLUTIONS TO
ADDRESS INSTANCES WHERE ORGANISATIONAL
REQUIREMENTS ARE NOT MET

 Once the testing and performance assessments using logs and a range of performance analysis and log
information has been completed, it will be necessary to modify enterprise communication solutions
where organisational requirements are not met.
 The following actions will need to be completed:
 Compare outcomes of testing and analysis to organisational requirements
 Consider the causes of non-compliance
 Develop solutions
 Make necessary modifications
 Record all changes to configurations and settings
 Re-test and confirm compliance
COMPARE OUTCOMES OF TESTING AND
ANALYSIS TO ORGANISATIONAL
REQUIREMENTS

 It will be necessary to compare the outcomes of the testing and analysis to organisational
requirements in order to identify any variance between the two items.
CONSIDER THE CAUSES OF NON-
COMPLIANCE

 Where variance between desired outcomes and test results has been identified, it will be necessary to
consider what is causing the non-compliance, further testing and assessment may be required to
achieve this.
DEVELOP SOLUTIONS

 Once the cause of the non-compliance has been confirmed, it will be necessary to develop suitable
solutions that can be used to rectify the communication solutions so that organisational requirements
are able to be met.
MAKE NECESSARY MODIFICATIONS

 Necessary modifications to achieve compliance with organisational requirements will need to be made,
the modifications that will be required will vary depending on:
 Communication solution installed
 Current system installed
 Results of testing and analysis
 Specific organisational requirements
 Types of common modifications that need to be completed include:
 Changes to security settings
 Changes to configurations of system or solution
 Changes to permissions
RECORD ALL CHANGES TO
CONFIGURATIONS AND SETTINGS

 Any changes that are made will need to be recorded as a part of the configuration register for the
communication solution to make sure that all changes can be tracked and confirmed if required.
RE-TEST AND CONFIRM COMPLIANCE

 Once any modifications have been made to the system, it will be necessary to make sure that re-
testing and confirmation of compliance with operational and implementation requirements will need
to be made.
TOPIC 4- REQUIRED KNOWLEDGE

 PLAN, IMPLEMENT AND TEST ENTERPRISE COMMUNICATION SOLUTIONS


 Key principles of data protection, including:
 Throughout the planning, implementing, and testing of communication solutions it will necessarily
make sure that the data assets that are owned by the organisation are able to be suitably protected.
 The key principles of data protection include:
 Backup and restoration
 Firewall configuration
 Security and authentication practices
BACKUP AND RESTORATION

 Back up is the process of making another copy of data and information assets in order to make
sure that there is another copy in the event of accidental data corruption or failure. 
 There are a range of different types of back up procedures that may be used depending on the
data type that is being protected, and these include:
 Complete backups
 Partial backups
 Incremental backups
 Daily backups
 Restoration of data
COMPLETE BACKUPS

 All files that have been selected are backed up, regardless of the setting of the attribute.
 When a file is backed up, the attribute is cleared.
 If the file is later modified, this attribute is set, which indicates that the file needs to be backed up.
 Full backups take the longest to execute and use the most storage space of all types of backups.
PARTIAL BACKUPS

 This is a type of backup that includes only certain files or directories.


INCREMENTAL BACKUPS

 All files that have been altered since the last normal backup are copied.
 When the files were modified after the last backup, they received an attribute, only files with this
attribute are backed up.
 When a file is backed up, the archive attribute is cleared.
 If the file is later modified, this attribute is reset, which indicates that the file needs to be backed up.
DAILY BACKUPS

 All files created or modified on the same day as the backup will be copied.
 This technique doesn't change the attributes of files.
RESTORATION OF DATA

 Restoration of data involves the re-instating of data from a back up that has been created; specific
restoration points should be developed to make sure that data is able to be restored if it becomes
corrupt or lost.
FIREWALL CONFIGURATION

 The configuration of firewalls involves the setting up of firewalls in a manner to make sure that the
security policies and functional requirements of the organisation are able to be met.
 Firewall configuration should involve:
 Access control list (ACL) development and implementation
 IP port pass-through settings
ACCESS CONTROL LIST (ACL)
DEVELOPMENT AND IMPLEMENTATION

 An access control list or ACL is a file or database that the firewall will use to configure the security
permissions and access requirements that apply to the different components within the network
depending on the user or object that seeks to access the components.
 Within the ACL, all permissions that are attached to the objects that will be managed and sorted by
the firewall will need to be configured.
 Permissions will determine what actions can be taken by the system processes and user accounts
within the system.
 The firewall will either allow or deny these aspects based on the information contained within the
ACL.
IP PORT PASS-THROUGH SETTINGS

 It will be necessary to set the firewalls to allow the IP port security filters to be applied according to
the needs of the security plan and policies that apply.
 These permissions and settings that control IP port traffic pass through are known as IP port pass-
through.
 The following configurations will need to be made:
 Port rules and permissions
 Port allocations
 Port forwarding and addressing rules
 Port range
 Protocol settings
SECURITY AND AUTHENTICATION
PRACTICES

 Security and authentication practices are the actions that are taken to make sure that access to the
communication solutions will only be granted to those that are authorised and approved to receive it
and the range of actions that will be taken to ensure this.
 Security and authentication practices may include:
 Developing user accounts
 Maintaining security using encryption
 Blocking unauthorised access
DEVELOPING USER ACCOUNTS

 It will be necessary to develop user accounts to meet the permission and access needs of the
communication solutions and then to set suitable permissions for each user account group.
MAINTAINING SECURITY USING
ENCRYPTION

 Suitable communication encryption and keys will need to be used to make sure that communication is
protected during sending.
BLOCKING UNAUTHORISED ACCESS

 Authentication processes that suit the level of security required for each of the communication
solutions will need to be developed, and these may include:
 Encrypted passwords
 Two-step authentications
 Tokens
 It is important to make sure that only authorised, and authenticated accounts are able to gain access to
the system and can complete approved actions once they have gained access.
IMPORTANT FEATURES OF NETWORK
ADMINISTRATION, INCLUDING:

 When planning, implementing and testing enterprise communication solutions, it will be necessary to
be aware of a range of important network administration features including:
 Load balancing for applications
 Server and directory administration
 Infrastructure
 Web server administration
LOAD BALANCING FOR APPLICATIONS

 Load balancing involves resource allocation and traffic management actions in order to make sure
that the pressure of a load of network traffic is balanced in a manner that will result in effective and
efficient operations.
SERVER AND DIRECTORY ADMINISTRATION

 Server or directory administration is the process of setting up servers and directories using a range of
file structures and systems and network protocols to ensure that all information and resources that are
stored as a part of the network to support applications are able to be effectively managed.
 Server and directory administration will require:
 Setting security permissions
 Setting access lists
 Closing unneeded open ports
 Monitoring and managing logs and performance
INFRASTRUCTURE

 The administration of the network infrastructure involves the configuration of all hardware and
software components of the network in order to support the applications and functions that are
required of the system.
 Infrastructure should be administered through:
 Monitoring
 Management
 Adjustments
WEB SERVER ADMINISTRATION

 Web server administration involves the setting up and configuration and the management and
monitoring of a web server in order to make sure that it has appropriate:
 File systems
 Naming conventions
 Traffic routes
 Access and security
 Functionality
 Operation
SUMMARY

 Now that you have completed this unit, you should have the skills and knowledge to manage the
deployment and administration of enterprise communication solutions.

You might also like