System Management Notes
Introduction to System Management
Purpose:
Ensures business application integrity
Enhances security and automation
Regulates system functions
Key Functions:
User administration
Security and performance monitoring
Backup and archiving
Licensing and quota management
Scheduling and reporting
Diagnostics and chargeback
Key Functions in Detail
1. User Administration
Managing user accounts and groups:
Setting permissions and controlling access levels.
Implementing role-based access control (RBAC).
Configuring authentication methods (passwords, biometrics, MFA).
2. Security and Performance Monitoring
Tracking system performance:
Tools: Task Manager, Performance Monitor.
Monitoring security logs for unauthorized attempts.
Implementing intrusion detection and prevention systems (IDPS).
3. Backup and Archiving
Setting automated backup policies for critical data:
Archiving old data based on retention policies.
Ensuring redundancy through cloud or offsite backups.
4. Licensing and Quota Management
Managing software licenses:
Ensure compliance with vendor agreements.
Allocating storage quotas to prevent excessive resource usage.
5. Scheduling and Reporting
Automating system tasks:
Tools: Windows Task Scheduler, cron jobs.
Generating reports on system performance, user activity, and security events.
6. Diagnostics and Chargeback
Identifying and troubleshooting system issues:
Logging system failures and recommending corrective actions.
Implementing chargeback systems for resource usage in enterprise environments.
Real-World Example: IT System Management
Scenario: Managing a Company’s IT Infrastructure
A company with 200 employees relies on IT for smooth operations, security, compliance.
1. User Administration
Unique accounts with role-based permissions for employees:
Account creation and termination linked to HR system.
2. Security and Performance Monitoring
Using Windows Event Viewer and Task Manager for monitoring:
Example: Detecting multiple failed logins and blocking the source IP.
3. Backup and Archiving
Nightly automatic backups:
Quick recovery of critical files.
4. Licensing and Quota Management
Monitoring licenses and storage quotas:
Block unauthorized software installations.
5. Scheduling and Reporting
Scheduling updates after hours:
Monthly performance and security reports.
6. Diagnostics and Chargeback
Tracking departmental usage of resources:
Recommendations for optimizing IT expenses.
Windows NT Built-in Utilities
Accessing management tools in Windows NT via:
Start > Programs > Administrative Tools
Key Tools:
Backup Utility
Disk Administrator
Event Viewer
Backup Utility (NTBackup)
Create, restore, schedule backups:
Supports full, incremental, and differential backups.
Importance: Prevents data loss and ensures disaster recovery.
Disk Administrator
Configuring, partitioning, formatting drives:
Supports FAT16 and NTFS file systems.
Event Viewer
Logging system events and security incidents:
Helps diagnose problems by reviewing logs for critical errors.
Ensuring System Availability
Key Practices:
Regular updates and patching
Service desk management
Network performance monitoring
Key Strategies for Ensuring System Availability
Fault Tolerance and Redundancy:
RAID configurations (RAID 1, RAID 5) to prevent data loss.
Redundant power supplies and network interfaces.
Regular System Monitoring and Performance Tuning:
Using Event Viewer, Performance Monitor, and Task Manager.
Load Balancing and Clustering:
Network Load Balancing (NLB) to distribute traffic.
Security Measures to Prevent System Downtime
Employing user access controls to restrict changes.
Using antivirus and firewalls for malware protection.
Keeping systems updated.
Disaster Recovery Planning (DRP)
Essential for business continuity:
Addresses failures like hardware malfunctions, security breaches.
Key Components of DRP
Risk Assessment & Identifying Critical Systems:
File servers, database servers, and network infrastructure.
Regular Data Backups & Storage Strategies:
Types: Full, incremental, differential backups.
System State Recovery:
Backing up critical system files using ERD.
Creating a Disaster Recovery Team & Response Plan
Roles and responsibilities defined during outages.
Regular testing and updates to the plan necessary.
Choosing the Right System Management Tool
Factors to Consider: IT resources, business size, and system requirements.
Steps: Identify pain points and evaluate appropriate tools.
Conclusion
Understanding these tools and functions can significantly enhance the security, efficiency, and integrity of IT systems in any organization.