Articles
Vulnerability Assessment Example Deliverables
- AIS Example Vulnerability Assessment.pdf 1.53 MB
AIS SIEM Alerting
Visualize the data to identify what conditions are meaningful and relevant to create alerts
Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts
Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?
AIS SIEM Challenges Addressed
Security logs for different systems are all in different locations
To address security concerns you have to take the time to look in different places, if you’re trying to identify pattern of behavior have to do it manuallyAbility to Detect Security Concerns that are not detected by a penetration test/Security threats are rapidly evolving
This can find things a penetration test can’tPenetration test created before the cloud exists, there are new threats because of the cloud that a penetration test wasn’t designed forHackers are finding new ways of getting pastDark underside of the cloud- “As companies rely more upon different SaaS platforms instead of traditional servers in their business, it’s harder to keep track of security when your data is spread out all over the cloud.
AIS Acceptable Use Policy 2020 Docx
- AIS Acceptable Use Policy 2020.docx 85.34 KB
AIS VoIP Phone Number Porting Overview
- AIS will receive the port date from the carrier and notify the customerThis typically is provided by the carrier 1-2 weeks after the initial port request, although it can take up to 4 weeksThe port date provided is typically a few days to 1 week away from when notification is receivedOn port date, phones will not be available for a brief time while the port takes place. This is often between 8-10am.
SIEM Frequently Asked Questions
Why do I need a SIEM?Visualize the data to identify what conditions are meaningful and relevant to create alerts
Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts
Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?
AIS NMS Overview
- When it comes to typical monitoring solutions, there seems to be a lack of visibility into the true state of the network. Nothing is worse than discovering the network is down. Too often, IT lacks the visibility they need to get ahead of performance issues, meaning you’re in the dark until something is wrong. Once an outage happens, the clock is ticking. The longer it takes to resolve, the more it costs you in staff time, lost productivity, and end-user satisfaction.
AV Solution Design Example Deliverable
- AIS School AV Drawing.pdf 150.86 KB
Professional Services – Assessments And Planning
- How healthy is your overall network? How old is your equipment? On a regular basis, we’ll generate reports on the state of your systems, letting you know of any potential problems that fall outside safe parameters of our managed IT services. With these comprehensive assessments, you’ll always have the best information for choosing your most effective options.
We continually build intelligence into our remote monitoring software by documenting the resolution to thousands of issues and incorporating them back into our software.
Network Assessment Example Deliverables
- OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBDocumentationLayer 2-3 Detail Report.docx 153.11 KBAuditingFull Detail Report.docx 402.15 KBWindows Service Account Report.docx 154.53 KBRemediationNetwork Management Plan.docx 168.61 KBDataNetwork Detail Excel Export.xlsx 366.91 KBLayer 2-3 Detail Excel Export.xlsx 17.85 KB
Office365 Exchange Example Deliverables
- Overview - Office365-Exchange Risk Report.docx 1.05 MBSecurityOffice365-Exchange Shared Mailbox Permission Report by Mailbox.docx 139.72 KBOffice365-Exchange Shared Mailbox Permission Report by User.docx 127.86 KBPerformanceOffice365-Exchange Traffic and Use Report.docx 449.75 KBAuditingOffice365-Exchange Mailbox Detail Report.docx 1.2 MBOffice365-Exchange Mobile Device Report.docx 809.34 KBOffice365-Exchange Distribution Lists Report.docx 202.85 KB
Security Assessment Example Deliverables
- OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBSecurity Risk Report.docx 462.11 KBRisk DetailData Breach Liability Report.pdf 1.64 MBLogin Failures by Computer Report.docx 1.29 MBOutbound Security Report.docx 233.08 KBAuditingSecurity Policy Assessment.docx 241.49 KBShare Permission Report by User.docx 257.6 KBShare Permission Report.docx 189.9 KBRemediationSecurity Management Plan.docx 120.52 KBDataShare Permission Report Excel.xlsx 64.73 KB
SQL Server Assessment Example Deliverables
- OverviewSQL Server Assessment Executive Summary PowerPoint.pptx 674.24 KBSQL Routine Health Report.docx 798.72 KBAuditingSQL Database Detail Report.docx 182.47 KBSQL Maintenance Tasks Report.docx 147.39 KBDocumentationSQL Server Agent Jobs Report.docx 150.85 KBSQL Server Detail Report.docx 728.76 KB
AIS Client Business Continuity Plan 2020 Docx
- AIS Client Business Continuity Plan 2020.docx 143.52 KB
AIS Client Disaster Recovery Plan 2020 Docx
- AIS Client Disaster Recovery Plan 2020.docx 196.13 KB
AIS Data Breach Response Policy 2020 Docx
- AIS Data Breach Response Policy 2020.docx 82.27 KB
AIS Data Security And Privacy Policy 2020 Docx
- AIS Data Security and Privacy Policy 2020.docx 84.79 KB
Environment Checklist
- Environment Checklist - TEMPLATE - 040721.docx 21.44 KB
Forticlient End User VPN Steps Centralized Deployment
- The FortiClient VPN is used for remote access to the office.
AIS remotely installs and configures the FortiClient application on end-user desktops and laptops without end-user action needed. Please note that the automated remote installation and configuration may take up to a week to complete and the computer will need to be restarted at least once.
After the FortiClient VPN is installed on a computer, the following icon will appear in the Start Menu and Desktop:
Mimecast End User Manual Docx
- Mimecast-End-User-Manual.docx 562.19 KB
Server Configuration Best Practices For Dell PowerEdge Servers
- Operating System -gtVMware ESXi X.X Embedded Image on Flash Media (License Not Included)
- IDSDM and VFlash Card Reader -gt ISDM and Combo Card Reader
- Internal SD Module -gt 2x 16GB microSDHC/SDXC Card
- Embedded Systems Management -gt iDracX, Enterprise
- Additional Software -gt OpenManage Integration for VMware vCenter - 1 host increment, 5 year license digitally fulfilled
- Dell Services: Extended Service -gt 3 Years -gt ProSupport and Next Business Day Onsite Service, 36 Month(s)
Standard VMware vHost with Local Storage
AIS Managed Firewall Routing Configuration
- AIS Managed Firewall
Synopsis: How to unbox, set up, configure (multiple ways) and test
The goal is to put together a document that explains how this works:
image.png 20.28 KB
WAN is interface 1, with dhcp as default and LAN is interface 2, 192.168.1.1 as default. Plug PC into port2, plug port 1 into upstream to start to configure. This example assumes you are at home or the office (you should have an initial internet connection to get a couple of packages)