Articles

Information related to AIS Solution Capabilities

AIS SIEM Alerting

    Visualize the data to identify what conditions are meaningful and relevant to create alerts

    Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts

    Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?

AIS SIEM Challenges Addressed

    Security logs for different systems are all in different locations

    To address security concerns you have to take the time to look in different places, if you’re trying to identify pattern of behavior have to do it manuallyAbility to Detect Security Concerns that are not detected by a penetration test/Security threats are rapidly evolving

    This can find things a penetration test can’tPenetration test created before the cloud exists, there are new threats because of the cloud that a penetration test wasn’t designed forHackers are finding new ways of getting pastDark underside of the cloud- “As companies rely more upon different SaaS platforms instead of traditional servers in their business, it’s harder to keep track of security when your data is spread out all over the cloud.

AIS Acceptable Use Policy 2020 Docx
    AIS Acceptable Use Policy 2020.docx 85.34 KB
AIS VoIP Phone Number Porting Overview
    AIS will receive the port date from the carrier and notify the customerThis typically is provided by the carrier 1-2 weeks after the initial port request, although it can take up to 4 weeksThe port date provided is typically a few days to 1 week away from when notification is receivedOn port date, phones will not be available for a brief time while the port takes place. This is often between 8-10am.
SIEM Frequently Asked Questions

    Why do I need a SIEM?Visualize the data to identify what conditions are meaningful and relevant to create alerts

    Configure granular security permissions specifically for your companyAlert via: text, email or slackBe aware of what is going on so you can proactively make decisionsWhen there are alerts, dashboards save time in follow up and route cause analysis based on those alerts

    Does action need to be taken or notExample: Employee deletes 100 folders do they need to be restored or are they junk?

AIS NMS Overview
    When it comes to typical monitoring solutions, there seems to be a lack of visibility into the true state of the network. Nothing is worse than discovering the network is down. Too often, IT lacks the visibility they need to get ahead of performance issues, meaning you’re in the dark until something is wrong. Once an outage happens, the clock is ticking. The longer it takes to resolve, the more it costs you in staff time, lost productivity, and end-user satisfaction.
AV Solution Design Example Deliverable
    AIS School AV Drawing.pdf 150.86 KB
Professional Services – Assessments And Planning
    How healthy is your overall network? How old is your equipment? On a regular basis, we’ll generate reports on the state of your systems, letting you know of any potential problems that fall outside safe parameters of our managed IT services. With these comprehensive assessments, you’ll always have the best information for choosing your most effective options. We continually build intelligence into our remote monitoring software by documenting the resolution to thousands of issues and incorporating them back into our software.
Network Assessment Example Deliverables
    OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBDocumentationLayer 2-3 Detail Report.docx 153.11 KBAuditingFull Detail Report.docx 402.15 KBWindows Service Account Report.docx 154.53 KBRemediationNetwork Management Plan.docx 168.61 KBDataNetwork Detail Excel Export.xlsx 366.91 KBLayer 2-3 Detail Excel Export.xlsx 17.85 KB
Office365 ​Exchange Example Deliverables
    Overview - Office365-Exchange Risk Report.docx 1.05 MBSecurityOffice365-Exchange Shared Mailbox Permission Report by Mailbox.docx 139.72 KBOffice365-Exchange Shared Mailbox Permission Report by User.docx 127.86 KBPerformanceOffice365-Exchange Traffic and Use Report.docx 449.75 KBAuditingOffice365-Exchange Mailbox Detail Report.docx 1.2 MBOffice365-Exchange Mobile Device Report.docx 809.34 KBOffice365-Exchange Distribution Lists Report.docx 202.85 KB
Security Assessment Example Deliverables
    OverviewNetwork Assessment Executive Summary PowerPoint.pptx 602.28 KBSecurity Risk Report.docx 462.11 KBRisk DetailData Breach Liability Report.pdf 1.64 MBLogin Failures by Computer Report.docx 1.29 MBOutbound Security Report.docx 233.08 KBAuditing​​​Security Policy Assessment.docx 241.49 KBShare Permission Report by User.docx 257.6 KBShare Permission Report.docx 189.9 KBRemediationSecurity Management Plan.docx 120.52 KBDataShare Permission Report Excel.xlsx 64.73 KB
SQL Server Assessment Example Deliverables
    OverviewSQL Server Assessment Executive Summary PowerPoint.pptx 674.24 KBSQL Routine Health Report.docx 798.72 KBAuditingSQL Database Detail Report.docx 182.47 KBSQL Maintenance Tasks Report.docx 147.39 KBDocumentationSQL Server Agent Jobs Report.docx 150.85 KBSQL Server Detail Report.docx 728.76 KB
AIS Client Business Continuity Plan 2020 Docx
    AIS Client Business Continuity Plan 2020.docx 143.52 KB
AIS Client Disaster Recovery Plan 2020 Docx
    AIS Client Disaster Recovery Plan 2020.docx 196.13 KB
AIS Data Breach Response Policy 2020 Docx
    AIS Data Breach Response Policy 2020.docx 82.27 KB
AIS Data Security And Privacy Policy 2020 Docx
    AIS Data Security and Privacy Policy 2020.docx 84.79 KB
Connect Process Locking Down Your Firewall
Connect Process Setting Up Your Inbound Email
Connect Process Setting Up Your Outbound Emai
Environment Checklist
    Environment Checklist - TEMPLATE - 040721.docx 21.44 KB
Forticlient End User VPN Steps Centralized Deployment
    The FortiClient VPN is used for remote access to the office. AIS remotely installs and configures the FortiClient application on end-user desktops and laptops without end-user action needed. Please note that the automated remote installation and configuration may take up to a week to complete and the computer will need to be restarted at least once. After the FortiClient VPN is installed on a computer, the following icon will appear in the Start Menu and Desktop:
Migration Guide
Mimecast End User Manual Docx
    Mimecast-End-User-Manual.docx 562.19 KB
Server Configuration Best Practices For Dell PowerEdge Servers

    Standard VMware vHost with Local Storage

    • Operating System -gtVMware ESXi X.X Embedded Image on Flash Media (License Not Included)
    • IDSDM and VFlash Card Reader -gt ISDM and Combo Card Reader
    • Internal SD Module -gt 2x 16GB microSDHC/SDXC Card
    • Embedded Systems Management -gt iDracX, Enterprise
    • Additional Software -gt OpenManage Integration for VMware vCenter - 1 host increment, 5 year license digitally fulfilled
    • Dell Services: Extended Service -gt 3 Years -gt ProSupport and Next Business Day Onsite Service, 36 Month(s)
AIS Managed Firewall Routing Configuration
    AIS Managed Firewall Synopsis: How to unbox, set up, configure (multiple ways) and test The goal is to put together a document that explains how this works: image.png 20.28 KB WAN is interface 1, with dhcp as default and LAN is interface 2, 192.168.1.1 as default. Plug PC into port2, plug port 1 into upstream to start to configure. This example assumes you are at home or the office (you should have an initial internet connection to get a couple of packages)
Last modified September 13, 2021