Articles



AIS NMS Frequently Asked Questions
    Sections on this page Related Solutions (1) Related Solutions AIS Managed NMS Network Monitoring System that tracks performance, reliability, and configuration metrics for on-premise and cloud devices and applications. Included tools for Central Administration, Remote Management, Network Typology Insights, In-Depth Monitoring, and Faster Troubleshooting and Root Cause Analysis.
AIS VoIP Phone Number Porting Overview
    AIS will receive the port date from the carrier and notify the customerThis typically is provided by the carrier 1-2 weeks after the initial port request, although it can take up to 4 weeksThe port date provided is typically a few days to 1 week away from when notification is receivedOn port date, phones will not be available for a brief time while the port takes place. This is often between 8-10am.
AIS Managed SIEM Overview
    When it comes to cyber-attacks and data threats, it’s not a matter of “if” but “when.” There is only so much anyone can do to prevent a successful attack, but hackers have become more resourceful and will continue to find innovative new ways to penetrate security defenses. Malware and web-based cyber-attacks are the most popular forms that are growing in their complexity and method of delivery. And just because you currently have an AV solution doesn’t mean you’re covered.
SIEM Frequently Asked Questions

    Why do I need a SIEM?Visualize the data to identify what conditions are meaningful and relevant to create alerts

    Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts

    Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?

AIS NMS Overview
    When it comes to typical monitoring solutions, there seems to be a lack of visibility into the true state of the network. Nothing is worse than discovering the network is down. Too often, IT lacks the visibility they need to get ahead of performance issues, meaning you’re in the dark until something is wrong. Once an outage happens, the clock is ticking. The longer it takes to resolve, the more it costs you in staff time, lost productivity, and end-user satisfaction.
AV Solution Design Example Deliverable
    AIS School AV Drawing.pdf 150.86 KB Sections on this page Related Solutions (1) Related Solutions AV Solution Design Architecture/Solution Design/Build turns the service strategy into a plan for delivering the business objectives and provides good-practice guidance on the design of IT services, processes, and other aspects of the service management effort. Design also addresses how a planned service solution interacts with the larger business and technical environments, service management systems required to support the service, processes which interact with the service, technology, and architecture required to support the service, and the supply chain required to support the planned service.
Professional Services – Assessments And Planning
    How healthy is your overall network? How old is your equipment? On a regular basis, we’ll generate reports on the state of your systems, letting you know of any potential problems that fall outside safe parameters of our managed IT services. With these comprehensive assessments, you’ll always have the best information for choosing your most effective options. We continually build intelligence into our remote monitoring software by documenting the resolution to thousands of issues and incorporating them back into our software.
Network Assessment Example Deliverables
    OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBDocumentationLayer 2-3 Detail Report.docx 153.11 KBAuditingFull Detail Report.docx 402.15 KBWindows Service Account Report.docx 154.53 KBRemediationNetwork Management Plan.docx 168.61 KBDataNetwork Detail Excel Export.xlsx 366.91 KBLayer 2-3 Detail Excel Export.xlsx 17.85 KB Sections on this page Related Solutions (1) Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
Office365 ​Exchange Example Deliverables
    Overview - Office365-Exchange Risk Report.docx 1.05 MBSecurityOffice365-Exchange Shared Mailbox Permission Report by Mailbox.docx 139.72 KBOffice365-Exchange Shared Mailbox Permission Report by User.docx 127.86 KBPerformanceOffice365-Exchange Traffic and Use Report.docx 449.75 KBAuditingOffice365-Exchange Mailbox Detail Report.docx 1.2 MBOffice365-Exchange Mobile Device Report.docx 809.34 KBOffice365-Exchange Distribution Lists Report.docx 202.85 KB Sections on this page Related Solutions (1) Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
Security Assessment Example Deliverables
    OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBSecurity Risk Report.docx 462.11 KBRisk DetailData Breach Liability Report.pdf 1.64 MBLogin Failures by Computer Report.docx 1.29 MBOutbound Security Report.docx 233.08 KBAuditing​​​Security Policy Assessment.docx 241.49 KBShare Permission Report by User.docx 257.6 KBShare Permission Report.docx 189.9 KBRemediationSecurity Management Plan.docx 120.52 KBDataShare Permission Report Excel.xlsx 64.73 KB Sections on this page Related Solutions (1) Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
SQL Server Assessment Example Deliverables
    OverviewSQL Server Assessment Executive Summary PowerPoint.pptx 674.24 KBSQL Routine Health Report.docx 798.72 KBAuditingSQL Database Detail Report.docx 182.47 KBSQL Maintenance Tasks Report.docx 147.39 KBDocumentationSQL Server Agent Jobs Report.docx 150.85 KBSQL Server Detail Report.docx 728.76 KB Sections on this page Related Solutions (1) Related Solutions IT Assessment Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy
AIS Acceptable Use Policy 2020 Docx
    AIS Acceptable Use Policy 2020.docx 85.34 KB Sections on this page Related Tasks (1) Related Tasks Review-and-Update Acceptable Use Policy
AIS Client Business Continuity Plan 2020 Docx
    AIS Client Business Continuity Plan 2020.docx 143.52 KB Sections on this page Related Tasks (1) Related Tasks AIS Client Business Continuity Plan
AIS Client Disaster Recovery Plan 2020 Docx
    AIS Client Disaster Recovery Plan 2020.docx 196.13 KB Sections on this page Related Tasks (1) Related Tasks AIS Client Disaster Recovery Plan
AIS Data Breach Response Policy 2020 Docx
    AIS Data Breach Response Policy 2020.docx 82.27 KB Sections on this page Related Tasks (1) Related Tasks AIS Data Breach Response Policy
AIS Data Security And Privacy Policy 2020 Docx
    AIS Data Security and Privacy Policy 2020.docx 84.79 KB Sections on this page Related Tasks (1) Related Tasks AIS Data Security And Privacy Policy
Connect Process Locking Down Your Firewall
Connect Process Setting Up Your Inbound Email
Connect Process Setting Up Your Outbound Emai
Environment Checklist
    Environment Checklist - TEMPLATE - 040721.docx 21.44 KB Sections on this page Related Tasks (1) Related Tasks Onsite Survey
Forticlient End User VPN Steps Centralized Deployment
    The FortiClient VPN is used for remote access to the office. AIS remotely installs and configures the FortiClient application on end-user desktops and laptops without end-user action needed. Please note that the automated remote installation and configuration may take up to a week to complete and the computer will need to be restarted at least once. After the FortiClient VPN is installed on a computer, the following icon will appear in the Start Menu and Desktop:
Migration Guide
Mimecast End User Manual Docx
    Mimecast-End-User-Manual.docx 562.19 KB Sections on this page Related Solutions (1) Related Tasks (1) Related Solutions Mimecast Baseline Implementation Related Tasks Communicate Cutover Expectations To End Users
Server Configuration Best Practices For Dell PowerEdge Servers

    Standard VMware vHost with Local Storage

    • Operating System -gtVMware ESXi X.X Embedded Image on Flash Media (License Not Included)
    • IDSDM and VFlash Card Reader -gt ISDM and Combo Card Reader
    • Internal SD Module -gt 2x 16GB microSDHC/SDXC Card
    • Embedded Systems Management -gt iDracX, Enterprise
    • Additional Software -gt OpenManage Integration for VMware vCenter - 1 host increment, 5 year license digitally fulfilled
    • Dell Services: Extended Service -gt 3 Years -gt ProSupport and Next Business Day Onsite Service, 36 Month(s)
AIS Managed Firewall Routing Configuration
    AIS Managed Firewall Synopsis: How to unbox, set up, configure (multiple ways) and test The goal is to put together a document that explains how this works: image.png 20.28 KB WAN is interface 1, with dhcp as default and LAN is interface 2, 192.168.1.1 as default. Plug PC into port2, plug port 1 into upstream to start to configure. This example assumes you are at home or the office (you should have an initial internet connection to get a couple of packages)
Last modified June 4, 2021