System Management Notes

Introduction to System Management

  • Purpose:

    • Ensures business application integrity

    • Enhances security and automation

    • Regulates system functions

  • Key Functions:

    • User administration

    • Security and performance monitoring

    • Backup and archiving

    • Licensing and quota management

    • Scheduling and reporting

    • Diagnostics and chargeback

Key Functions in Detail

1. User Administration
  • Managing user accounts and groups:

    • Setting permissions and controlling access levels.

    • Implementing role-based access control (RBAC).

    • Configuring authentication methods (passwords, biometrics, MFA).

2. Security and Performance Monitoring
  • Tracking system performance:

    • Tools: Task Manager, Performance Monitor.

    • Monitoring security logs for unauthorized attempts.

    • Implementing intrusion detection and prevention systems (IDPS).

3. Backup and Archiving
  • Setting automated backup policies for critical data:

    • Archiving old data based on retention policies.

    • Ensuring redundancy through cloud or offsite backups.

4. Licensing and Quota Management
  • Managing software licenses:

    • Ensure compliance with vendor agreements.

    • Allocating storage quotas to prevent excessive resource usage.

5. Scheduling and Reporting
  • Automating system tasks:

    • Tools: Windows Task Scheduler, cron jobs.

    • Generating reports on system performance, user activity, and security events.

6. Diagnostics and Chargeback
  • Identifying and troubleshooting system issues:

    • Logging system failures and recommending corrective actions.

    • Implementing chargeback systems for resource usage in enterprise environments.

Real-World Example: IT System Management

  • Scenario: Managing a Company’s IT Infrastructure

    • A company with 200 employees relies on IT for smooth operations, security, compliance.

1. User Administration
  • Unique accounts with role-based permissions for employees:

    • Account creation and termination linked to HR system.

2. Security and Performance Monitoring
  • Using Windows Event Viewer and Task Manager for monitoring:

    • Example: Detecting multiple failed logins and blocking the source IP.

3. Backup and Archiving
  • Nightly automatic backups:

    • Quick recovery of critical files.

4. Licensing and Quota Management
  • Monitoring licenses and storage quotas:

    • Block unauthorized software installations.

5. Scheduling and Reporting
  • Scheduling updates after hours:

    • Monthly performance and security reports.

6. Diagnostics and Chargeback
  • Tracking departmental usage of resources:

    • Recommendations for optimizing IT expenses.

Windows NT Built-in Utilities

  • Accessing management tools in Windows NT via:

    • Start > Programs > Administrative Tools

  • Key Tools:

    • Backup Utility

    • Disk Administrator

    • Event Viewer

Backup Utility (NTBackup)
  • Create, restore, schedule backups:

    • Supports full, incremental, and differential backups.

    • Importance: Prevents data loss and ensures disaster recovery.

Disk Administrator
  • Configuring, partitioning, formatting drives:

    • Supports FAT16 and NTFS file systems.

Event Viewer
  • Logging system events and security incidents:

    • Helps diagnose problems by reviewing logs for critical errors.

Ensuring System Availability

  • Key Practices:

    1. Regular updates and patching

    2. Service desk management

    3. Network performance monitoring

Key Strategies for Ensuring System Availability

  1. Fault Tolerance and Redundancy:

    • RAID configurations (RAID 1, RAID 5) to prevent data loss.

    • Redundant power supplies and network interfaces.

  2. Regular System Monitoring and Performance Tuning:

    • Using Event Viewer, Performance Monitor, and Task Manager.

  3. Load Balancing and Clustering:

    • Network Load Balancing (NLB) to distribute traffic.

Security Measures to Prevent System Downtime

  • Employing user access controls to restrict changes.

  • Using antivirus and firewalls for malware protection.

  • Keeping systems updated.

Disaster Recovery Planning (DRP)

  • Essential for business continuity:

    • Addresses failures like hardware malfunctions, security breaches.

Key Components of DRP
  1. Risk Assessment & Identifying Critical Systems:

    • File servers, database servers, and network infrastructure.

  2. Regular Data Backups & Storage Strategies:

    • Types: Full, incremental, differential backups.

  3. System State Recovery:

    • Backing up critical system files using ERD.

Creating a Disaster Recovery Team & Response Plan
  • Roles and responsibilities defined during outages.

  • Regular testing and updates to the plan necessary.

Choosing the Right System Management Tool

  • Factors to Consider: IT resources, business size, and system requirements.

  • Steps: Identify pain points and evaluate appropriate tools.

Conclusion

  • Understanding these tools and functions can significantly enhance the security, efficiency, and integrity of IT systems in any organization.