I Servers:
❖ Creating requirements for server hardware. Configuration negotiation between vendors and the client;
❖ Server hardware installation and incoming testing;
❖ Installation of the operating system, installation of updates, basic security settings;
❖ Upgrading a server to a domain controller, creating and setting up a domain, introduction to a domain;
❖ User administration: creating accounts, assigning access rights to file resources;
❖ Network drive connectivity configuration;
❖ Security policies configuration;
❖ Data backup configuration;
❖ Configuring access in remote desktop protocol (RDP);
❖ Installation and configuration of non-standard software;
❖ Recovery of disk arrays;
❖ Recovery of data from backups;
❖ Server provisioning, fault management of server software.
II Computer and workplace maintenance:
❖ Formation of requirements for a computer;
❖ Installation and configuration of the operating system and the basic software package (BS);
❖ User training: basic computer skills;
❖ Solving a user`s problem (while working on a computer);
❖ Optimization of the operating system, removing unauthorized software;
❖ Virus treatment, removal of root- kit, blockers, and other malware;
❖ Mail clients setting;
❖ Installation and configuration of non-standard software;
III Antivirus system:
❖ Installation of the antivirus system administration console on the server;
❖ Setting operating policies and antivirus software updates;
❖ Installation of anti-virus software on workstations and servers.
IV Mail systems:
❖ Installation of a mail server. Configuring incoming and outgoing connectors;
❖ Configuring DNS, MX, SPF servers;
❖ Setting up access to the mail system from the outside through the web interface or through IMAP, SMTP / POP3;
❖ Creating mailboxes for users and distribution groups;
❖ Installation and configuration of anti-spam software.
V Database:
❖ Installation and initial configuration of MS SQL DBMS;
❖ Creation of databases. Transfer of databases. Setting up a DBMS for connection;
❖ Configuring database backup;
❖ Configuring database maintenance procedures: database defragmentation, index optimization;
❖ Restoring databases from a backup.
VI Active network equipment:
❖ Formation of requirements for a computer;
❖ Installation and configuration of network equipment;
❖ Configuring packet filtering rules, routing rules, port forwarding;
❖ Configuring the built-in dial-in of VPN server;
❖ Configuring VPN connections using the IPSEC Protocol;
❖ Configuring virtual local area networks (VLAN).
VII Network Attached Storage (NAS):
❖ NAS installation, network connection;
❖ Setting up NAS operation parameters, creation of disk arrays;
❖ Setting up interaction with Active Directory (AD);
❖ Setting up access rights to network data.
VIII Routine activities:
❖ NAS installation, network connection;
❖ Setting up NAS operation parameters, creation of disk arrays;
❖ Setting up interaction with Active Directory (AD);
❖ Setting up access rights to network data.