Articles

Information related to AIS Solution Capabilities

AIS SIEM Alerting

    Visualize the data to identify what conditions are meaningful and relevant to create alerts

    Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts

    Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?

AIS SIEM Challenges Addressed

    Security logs for different systems are all in different locations

    To address security concerns you have to take the time to look in different places, if you’re trying to identify pattern of behavior have to do it manuallyAbility to Detect Security Concerns that are not detected by a penetration test/Security threats are rapidly evolving

    This can find things a penetration test can’tPenetration test created before the cloud exists, there are new threats because of the cloud that a penetration test wasn’t designed forHackers are finding new ways of getting pastDark underside of the cloud- “As companies rely more upon different SaaS platforms instead of traditional servers in their business, it’s harder to keep track of security when your data is spread out all over the cloud.

AIS Acceptable Use Policy 2020 Docx
    AIS Acceptable Use Policy 2020.docx 85.34 KB Related Tasks Review/Update Acceptable Use Policy
Syncing A SharePoint Library To OneDrive Via GPO Or Intune For Drive Mapping
    Connecting To O365/Azure Customer Who Has MFA Turned On
      Using the Microsoft Partner Portal to gain access to clients that have MFA turned on for Administrators
    Connecting To AzureAD With A Service Principal To Bypass MFA For PowerShell Scripts
      This is a common need on projects that have an account that had MFA for the Global Admin. This will allow you to create a bypass that will only work on your machine during the date timeframe you choose.
    AIS VoIP Phone Number Porting Overview
      AIS will receive the port date from the carrier and notify the customerThis typically is provided by the carrier 1-2 weeks after the initial port request, although it can take up to 4 weeksThe port date provided is typically a few days to 1 week away from when notification is receivedOn port date, phones will not be available for a brief time while the port takes place. This is often between 8-10am.
    SIEM Frequently Asked Questions

      Why do I need a SIEM?Visualize the data to identify what conditions are meaningful and relevant to create alerts

      Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts

      Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?

    AIS NMS Overview
      When it comes to typical monitoring solutions, there seems to be a lack of visibility into the true state of the network. Nothing is worse than discovering the network is down. Too often, IT lacks the visibility they need to get ahead of performance issues, meaning you’re in the dark until something is wrong. Once an outage happens, the clock is ticking. The longer it takes to resolve, the more it costs you in staff time, lost productivity, and end-user satisfaction.
    AV Solution Design Example Deliverable
      AIS School AV Drawing.pdf 150.86 KB Related Solutions AV Solution Design Architecture/Solution Design/Build turns the service strategy into a plan for delivering the business objectives and provides good-practice guidance on the design of IT services, processes, and other aspects of the service management effort. Design also addresses how a planned service solution interacts with the larger business and technical environments, service management systems required to support the service, processes which interact with the service, technology, and architecture required to support the service, and the supply chain required to support the planned service.
    Professional Services – Assessments And Planning
      How healthy is your overall network? How old is your equipment? On a regular basis, we’ll generate reports on the state of your systems, letting you know of any potential problems that fall outside safe parameters of our managed IT services. With these comprehensive assessments, you’ll always have the best information for choosing your most effective options. We continually build intelligence into our remote monitoring software by documenting the resolution to thousands of issues and incorporating them back into our software.
    Network Assessment Example Deliverables
      OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBDocumentationLayer 2-3 Detail Report.docx 153.11 KBAuditingFull Detail Report.docx 402.15 KBWindows Service Account Report.docx 154.53 KBRemediationNetwork Management Plan.docx 168.61 KBDataNetwork Detail Excel Export.xlsx 366.91 KBLayer 2-3 Detail Excel Export.xlsx 17.85 KB Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
    Office365 ​Exchange Example Deliverables
      Overview - Office365-Exchange Risk Report.docx 1.05 MBSecurityOffice365-Exchange Shared Mailbox Permission Report by Mailbox.docx 139.72 KBOffice365-Exchange Shared Mailbox Permission Report by User.docx 127.86 KBPerformanceOffice365-Exchange Traffic and Use Report.docx 449.75 KBAuditingOffice365-Exchange Mailbox Detail Report.docx 1.2 MBOffice365-Exchange Mobile Device Report.docx 809.34 KBOffice365-Exchange Distribution Lists Report.docx 202.85 KB Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
    Security Assessment Example Deliverables
      OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBSecurity Risk Report.docx 462.11 KBRisk DetailData Breach Liability Report.pdf 1.64 MBLogin Failures by Computer Report.docx 1.29 MBOutbound Security Report.docx 233.08 KBAuditing​​​Security Policy Assessment.docx 241.49 KBShare Permission Report by User.docx 257.6 KBShare Permission Report.docx 189.9 KBRemediationSecurity Management Plan.docx 120.52 KBDataShare Permission Report Excel.xlsx 64.73 KB Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
    SQL Server Assessment Example Deliverables
      OverviewSQL Server Assessment Executive Summary PowerPoint.pptx 674.24 KBSQL Routine Health Report.docx 798.72 KBAuditingSQL Database Detail Report.docx 182.47 KBSQL Maintenance Tasks Report.docx 147.39 KBDocumentationSQL Server Agent Jobs Report.docx 150.85 KBSQL Server Detail Report.docx 728.76 KB Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
    AIS Client Business Continuity Plan 2020 Docx
      AIS Client Business Continuity Plan 2020.docx 143.52 KB Related Tasks AIS Client Business Continuity Plan
    AIS Client Disaster Recovery Plan 2020 Docx
      AIS Client Disaster Recovery Plan 2020.docx 196.13 KB Related Tasks AIS Client Disaster Recovery Plan
    AIS Data Breach Response Policy 2020 Docx
      AIS Data Breach Response Policy 2020.docx 82.27 KB Related Tasks AIS Data Breach Response Policy
    AIS Data Security And Privacy Policy 2020 Docx
      AIS Data Security and Privacy Policy 2020.docx 84.79 KB Related Tasks AIS Data Security And Privacy Policy
    Connect Process Locking Down Your Firewall
    Connect Process Setting Up Your Inbound Email
    Connect Process Setting Up Your Outbound Emai
    Environment Checklist
      Environment Checklist - TEMPLATE - 040721.docx 21.44 KB Related Tasks Onsite Survey
    Forticlient End User VPN Steps Centralized Deployment
      The FortiClient VPN is used for remote access to the office. AIS remotely installs and configures the FortiClient application on end-user desktops and laptops without end-user action needed. Please note that the automated remote installation and configuration may take up to a week to complete and the computer will need to be restarted at least once. After the FortiClient VPN is installed on a computer, the following icon will appear in the Start Menu and Desktop:
    Migration Guide
    Mimecast End User Manual Docx
      Mimecast-End-User-Manual.docx 562.19 KB Related Tasks Communicate Cutover Expectations To End Users
    Server Configuration Best Practices For Dell PowerEdge Servers

      Standard VMware vHost with Local Storage

      • Operating System -gtVMware ESXi X.X Embedded Image on Flash Media (License Not Included)
      • IDSDM and VFlash Card Reader -gt ISDM and Combo Card Reader
      • Internal SD Module -gt 2x 16GB microSDHC/SDXC Card
      • Embedded Systems Management -gt iDracX, Enterprise
      • Additional Software -gt OpenManage Integration for VMware vCenter - 1 host increment, 5 year license digitally fulfilled
      • Dell Services: Extended Service -gt 3 Years -gt ProSupport and Next Business Day Onsite Service, 36 Month(s)
    AIS Managed Firewall Routing Configuration
      AIS Managed Firewall Synopsis: How to unbox, set up, configure (multiple ways) and test The goal is to put together a document that explains how this works: image.png 20.28 KB WAN is interface 1, with dhcp as default and LAN is interface 2, 192.168.1.1 as default. Plug PC into port2, plug port 1 into upstream to start to configure. This example assumes you are at home or the office (you should have an initial internet connection to get a couple of packages)
    Last modified September 13, 2021