As a business expands, it needs a standard set of criteria for helping customers and its managers to see the best approach for managing their networks. To this end we have created a list of questions that we use to establish future goals, identify current weaknesses and make sure a core set of tasks are being carried out every day. We have developed this list of questions over time and we add to it here and there as we encounter new things. Recently we have thought it may benefit others if we share this list of questions as well as potential answers so we now collaborate on line with a number of computer based sites to develop these ideas. As you read through this document, the purpose is to get you thinking about strengths and weaknesses of your network and to expose you to various solutions for solving problems you may discover as you go.
The only prerequisite for this document is that you have a network of some size well any size really and you have the desire to improve, shape and mold it over time.
Q & A
How many locations do we want to connect with a Cloud? [Either now or down the road]
It’s important to ask this question because we need to know how many end-points there are in our Cloud. This will determine how many licenses we need to buy in order to create our Cloud infrastructure. It also is the first indicator of how we will manage the connection into the Cloud.
What do we want to do with our Cloud application?
It’s important here to establish what we want to put in the Cloud. That could be everything that you run from Microsoft Office to your back office systems, it could be all of your documents in a full Document Management System or it could be to use the Cloud as part of your DR policy. What ever it is you should establish what you want to achieve and in some cases this will limit your ambition as you explore some of the options and in others it will facilitate a conversation about how you work with that bit of paper.
How many servers will we be responsible for in the Cloud?
If you are outsourcing network support, you need to understand immediately the number of servers they will be responsible for and the products, which will be running on them. To be clear, when we say server we do not mean a Windows Workstations. we mean a piece of hardware that most likely has a hardware disc array of SATA, SCSI or SAS drives, one or more network cards and thanks to virtualization one or more server grade operating systems which may include Linux and/or Windows Server configurations. This is important information as these pieces of equipment can cost thousands of pounds, need special software licenses and may mandate battery backup UPS devices to guarantee uptime to the internal/external base of customers. You want to identify server appliances immediately and establish management plans early on.
Are you running Microsoft Small Business Server?
If you are running Microsoft Small Business Server this is both good and bad. You need to be aware that several versions of this product exist and that various requirements may exist depending upon which version you have. Be aware that CALs (Client Access Licenses) are required in every case but may not be compatible across some Small Business platforms. Know up front your licensing needs and make sure you have addressed this early on. 50 CALs for a Windows 2003 Small Business Server can cost you in excess of £2000 – £3000 so make sure your licensing needs are understood up front. Additionally the various products within this family may include SQL Server 2000 or 2005, Microsoft Exchange Back Office, 5.5, etc. Find out immediately if you are dealing with SBS 2000/2003/2003 R2 and be aware of the premium editions for each product family. Any oversight here can be very expensive.
How do people log into your network?
If you are familiar with the term Domain Controller (DC) then what is you strategy regarding a secondary DC (SDC) and your DR plan. If you are running SBS then a Windows SDC is not a recommended option and how does all of this fit with your MS Licencing model. With the advent of Samba you maybe able to provide SDC for SBS or reduce your CAL’s in a standard network configuration saving money. If you do not know what this means then maybe you should talk to someone who does.
Do you host your own email and website on your own server? [Do you want to?]
You need to understand if you host your own mail and Web server. In many cases a company may choose to host its email but want to host its website on a server farm somewhere else. Depending on the situation you have you will need to make some decisions about security and server isolation. Additionally backing up Exchange introduces some unique challenges. There are products which will image your entire server and there are products which will only backup your email. There are merits for each product. Be sure you understand which is best for your particular situation. Costs will almost certainly be a factor.
What is your data backup strategy? Does it provision for a fire burning down your location?
Many customers do not understand the ramifications of a catastrophic data loss. With the wide spread use of computerised accounting, a total destruction of data may in fact mean total destruction of a company. Many companies have abandoned paper processes and dual entry accounting systems altogether. Critical customer, financial and enterprise data is stored on a disc somewhere. In the event of a catastrophe companies should have a recovery plan. Companies that don’t will most likely not survive the financial burdens that such an event will place upon them. In addition more and more companies are caught by an increasing statutory compliance net and loss of data can often cause a breach of any number of regulatory frameworks.
Is each computer on your site running on a battery backup?
This is perhaps the most overlooked aspect of any business environment. Without exception every business class workstation with the exception of laptops should be plugged into some type of battery backup solution designed to gracefully shut the machine down in the event of a power loss. When your PC suddenly shuts off in a blackout and you just lost 3 hours of data you were entering and you multiply that by 30 people in your office that was a very expensive power outage. Be smart, get UPS devices in place right away.
Is each computer saving sensitive/critical data to a server where it’s being backed up?
If users on your networks are saving critical data to their local drives then they are a liability and they are putting you at risk. There are many problems with this arrangement. Among the most dangerous are the data will most likely not get backed up. It makes it very easy for someone to steal the laptop, PC or hard drive and walk out. If data is saved to a server stored behind lock and key, then regular backups ensure redundancy and prevent your data from walking out the door. Get your data off of local drives and keep it off.
Pick any two random people, explain to us what impact it would have if their PC crashed completely and was unrecoverable.
This is one of our favourite questions to ask. Because people think they have a handle on their data until they hit this question. Most often it’s like they swallowed their tongue. If your users choke on this question then the odds are their data/recovery methods need a lot of work. You need to identify which machines on their network need a full image provided by products like Acronis True image and which of their systems can get by just by saving their files on a network share. This is a very important decision and it must be made on a case by case basis for every machine on the network.
Do you want employees to be able to access their work PC from anywhere that has an INTERNET connection? Do you want this for everyone?
This is a new and popular option for many businesses. They had no idea this was even an option and thanks to Cloud based solutions it’s a very simple thing to do and much easier to use than any other technology in the same product family. It may be a consideration as part of your DR Plan to ask could people work from home in the event of a critical event and could you facilitate that through using a Cloud solution for your network.
How many laptops exist? Does each laptop user also have a desktop and do they want to synch data?
This question is important for networks that are not running Small Business Server and the answer may or may not provide justification for bumping a network up to a Cloud based solution. Are there other much less expensive means of doing this? Yes there easily are but none of them are as “set it and forget it because it just works” as what is offered by Cloud solutions.
Who is currently “hosting” your website and email?
A very important question to ask as there may be limitations imposed by a companies ISP on whether or not they can run *any* public servers on their networks. This includes mail and Web. You need to know up front if the ISP allows servers and what type of bandwidth cap limits exist in the network plan your client has.
Who is your domain registered with?
Most clients have no idea what the answer to this question is and nothing will get you panicked more than when your domain name registration expires affecting your email and website. You would really like to go renew the domain but have no idea at all where to go or how much it’s going to cost. Get this information up front and try to convince your clients to register their domains in 5 year blocks at the minimum.
Who is your INTERNET service provider and what INTERNET package do you have (512Kb Upload / 1.5 Mb Download) etc.?
This question is similar to who your ISP is. ISPs will impose restrictions on bandwidth, server hosting and other technologies. Some ISPs won’t even issue static IPs making it much harder (not impossible) but harder to run email and Web servers. You want to know exactly the service package you have and you also need to know what the choices are when it comes to the INTERNET service. It maybe more expensive to upgrade your connection however the impact on your business could be dramatic.
How many computers/laptops/servers do you plan to add this year?
A very important question in many ways. This is a critical question and the answer must be accurate. You may license software that you can only get once a year cheaply. If you need more licenses outside the licensing window, your costs may double or triple. You can also negotiate pricing in advance with certain companies where you can get firm pricing throughout the year on systems as long as you commit to buying X number of systems or more. This piece of knowledge can make or break just about any IT budget. Insist on a firm.
How many employees or locations do you plan to add this year?
This question is just as important as the one right before it. Some software is licensed per person or per machine. Know your licensing models. If you plan on adding locations or equipment you need to make sure they allocate funds for all aspects of this growth. It’s amazing how adding even one person can have a company writing checks in excess of £1000’s in licences.
Who is my primary contact for IT related issues including support needs and expenses?
Identify up front who the decision maker is and do not get wrapped up in power struggles. Once the decision maker is identified you need to establish that no work is performed or purchases made without the decision makers signature, cost control on a project to update your network in paramount!
Has your network ever been hacked by spyware, malware or virus? Have any of your current machines had an infection?
Before we take over work on any network we ask this question. If a machine has been compromised it could mean hours of work to clean the entire organization. Find this information up front and find out what type of impact it had on the network and make sure you know what methods were used to correct the problem and how thorough those methods were. Your time and your money may hang on this information.
Have you ever had a problem with pornography or INTERNET abuse in your office(s)?
If the answer to this question is yes, then you may have problems in the form of the question above this one and not even know it. Most of the very severe spyware and malware originates from pornographic sites. Knowledge is power in this case, make sure you know before you commit to a support agreement. Always exclude this type of work from your agreements. I charge by the hour to clean a network of any trouble caused by INTERNET abuse. We have a zero tolerance policy on this and we won’t budge.
In the last 2 years what are the names, usernames of employees that have left your company?
A no-brainer here. This is just good house-keeping. You don’t want orphan usernames and passwords hanging out on your domains. It could have very serious ramifications. Clean it up immediately when you come across it.
For employees that have left, were all their related IT accounts disabled/deactivated?
In the same spirit as the question above, it makes sure you understand what access each employee has to what resources. Pursue each user account with prejudice and lock it down. You are responsible and you will be liable for any oversight on your part. Don’t take chances.
Do you feel like someone or some person would be motivated to break in and steal your intellectual property or ideas?
Most companies are very surprised by this question and its answer. If the answer is yes, then make sure all IT/IP is behind lock and key. All servers and sensitive drives, devices and data should be kept behind a closed and locked cabinet or office door.
Do you feel like an employee might be persuaded to copy your data and sell it to a competitor?
If this is possible establish rules on your networks regarding USB drives, cameras and phones. Make sure people understand they can be fined or terminated for bringing them onto the premises.
What are your feelings towards having an employee or visitor “walk-off” with a hard drive or a computer?
Is your work environment casual enough where employees can take their work home? Make sure you are not at jeopardy of losing sensitive data. Make sure you have good security measures in place when your technology leaves the premises. If people do need to work from home does a Cloud based solution offer both DR and Security advantages.
How often are passwords changed in your office and do you feel like you have a good security policy in place?
Do you have password length, complexity and expiration limits in place? Do you need them? Make sure you are doing as much as you need to in order to protect your data. If screen savers need to lock workstations after 1 minute of inactivity, then you need to change it from the default of 15 minutes. Think about these things and act on them.
Do you want everyone to have access to all your data or do you want to control access on a per-user/per-group basis?
How sensitive is your data? Do you need user, group and role based security? Should you establish regular audits of user permissions? Do you want to have optimistic (Default allow) or pessimistic (Default deny) security in place? Make your decisions based upon what’s at risk.
Will you be having trainees or temporary staff work with you or outside agencies that need user accounts?
A great question and a huge liability in any environment. If your environment needs to adjust to these situations, have strict security policies and procedures in place ahead of time. Make sure logging, sniffing and monitoring is configured and tested before your first trainee arrives. Products like 1st Security Agent can save your company. Make sure you buy the right tools for your security job.
Are you operating a wireless network or do you plan on operating one in the next year?
Do not for any reason use wireless networks unless there is a business reason to do so. If there is, invest in very expensive wireless equipment that has threat measures and counter-measures built in. Make sure you understand the risks involved with a wireless network.
With regards to wireless, do you want it secured and isolated off of your local network shared by the desktops?
If you must use wireless networks, then isolate them. Keep them on separate subnets from your regular network and require strong encryption VPN clients to negotiate access. Make sure your access point can detect rogue access points and wireless sniffing technologies and shut them down.
What sort of anti-virus are you using on site?
If it’s by Norton or Symantec then you might as well save your money and just hand out copies of your data on CD to total strangers. Do your research and select a good anti-virus product that meets your needs. Understand that anti-virus must take place at the INTERNET gateway or firewall, the email server and the users desktop. Fail to enforce anti-virus in any one of these areas and you assume all risks.
Are you using the same anti-virus on laptops?
You should make sure you have a multi-threat anti-virus, spyware and malware client on your laptops. This might mean using a combination of products. Laptops face a totally different set of risks than desktops. Your desktops may be sitting behind thousand pound firewalls that detect and eliminate 99% of security threats. Your user out in the Travel Lodge may not be behind any firewall and his laptop just got hosed because you didn’t have a good multi-threat client installed and running.
Are people allowed to bring their own computers/laptops to work?
No! End of story.
Does anyone receive their email on a cell phone?
Make sure you understand who, where and why. If that person leaves the company make sure you take the appropriate steps to disable this feature immediately. This could be a security risk and you need to make that decision on a case by case basis.
Have you thought about a yearly budget for IT related hardware/software/service expenses?
You absolutely must have an IT budget and goals. Establish yearly cycles for product replacement. Ideally hardware should be replaced every 3 to 4 years and software should be evaluated and updated every 1 to 2 years. Make sure your budgets allow for this. It’s your data that is at risk so make good choices here.
What is your replacement plan for old equipment? (Replace every 2/3/4/5 years? or Replace as it fails?)
If you choose to replace equipment as it fails your data is at a much higher risk. Make sure your backup strategy takes this into account and always make sure backups are verified and that you run fire-drills twice a year where you attempt full-fledged restores to make sure your backup process is effective and your restore process is understood. Front to back awareness will make your life easier and save you money.
Do you use any special or in-house 3rd party software not bundled by Microsoft?
Make sure you have proper support agreements in place. Make sure you understand hardware and operating system compatibility. Make sure you understand licensing costs and how hardware will affect those costs. Some products have a per-processor cost. It pays to know these things up front.
If your entire network were to come crashing down how long could you survive without it? (1/2/3/.. days? A month?)
Use the answer to this question to determine how much money you put into your backup process. The higher your required uptime availability, the more money should be spent on your backup processes. Don’t go cheap. It’s your data. You may cease to exist or burn bridges with valuable customers without it.
Do you want to maintain a low-end, low-performance server that could be swapped in during a major failure?
This may be a good idea. Keep a dog-eared server in the mix and use him if the world ends tomorrow. Having gimpy, the 4 year old server as a stand-by could be the difference between profit and loss. Make this decision on a business by business, and in some cases a department by department basis. Never assume that your Kajillion Dollar server will run forever. That’s about when it will crash throwing you in front of the high speed train.
How much is your data worth? Develop a number and keep it in mind as we discuss current systems and improvements.
If your data is worth more than your mother then make sure you have good processes, procedures and equipment protecting it. If you cut corners, you are taking big risks and you may be liable for fines, penalties and imprisonment from HMG if you screw up. Know your responsibilities and make sure you have your contingency well laid out and a good reaction plan in place.
So now you have your client’s responses but what do you do? How do you quantify all of this and put it into something usable? Just as important is how do you establish a rate for charges and establish priorities for improving the network in all spaces? These are great questions and you really must sit back and look over the data you have received. Try to categorize responses into what we call “network space”. Any time I refer to “email” or “storage” we’re referring to a “space” within the existing or planned network. By creating a notion of spaces, you can establish layers for your network that will help you to establish tasks and rank them by cost and priority. You should always be aware of every aspect of your network space and get used to thinking of the various spaces you can divide your network into. Spaces will save you time, multiply your efforts and result in a proper and well thought out plan for managing your infrastructure now and into the future.
Now that we’ve established spaces and discussed the idea of creating spaces and dividing the answers to these questions into individual spaces, let’s talk about what we do with this information and how we prioritize it. In a perfect world your client or manager will say, “Fix it all and spare no expense.” but that never happens and for good reason. No company would survive if that kind of shoot from the hip philosophy prevailed when it came to spending. So what matters most? You have limited resources and need to implement changes over time. How do you determine what should be done first and what should have first dibs on the available budgets? This is easier than you might think. You just need to step back and get some perspective. Above all the data is the most important aspect of any network whether that data is email, databases, documents, etc… data is king. Your first priority is to protect the data in two ways. Those two ways are security and redundancy. If you have a weak network perimeter that is open to various attacks then you need to resolve that immediately. If you have no backup/recovery plan and no resources to implement one, then get it done and do it today.
Once we have protected the data at the perimeter and at the disc level we can begin to prioritize other tasks on a departmental, individual or company strategy. From the data we have collected, let’s try and define some spaces. In no particular order we have:
- Perimeter Security Hardware
- Server Hardware – Bare Metal
- Server Software – Tools
- Logical Network Segmentation – Email / Web / Data
- Disaster Planning – Storage / Recovery
- Power Protection Schemes – UPS / Surge / Cleansing
- Data Management Methodology – Accessibility / Security / Organization
- System State Management – Disk Imaging Vs. File Selection
- Remote Accessibility – Outlook Web Access (OWA) / VPN / Remote Desktop
- Data Replication – Desktop-to-Laptop / Server-to-Server
- ISP Provision – Bandwidth Maximums / Public Servers / Limitations
- Domain Management & Registration
- Projected Growth – Systems / Servers / Infrastructure / Staff
- Key Decision Makers – CFOs / CEOs / IT
- Acceptable Use Policies & Provisions
- Turnover Management Systems
- Physical Access Control – Security Systems / Locks / Cabinets
- Security Policy & Procedure
- Connectivity – Wired / Wireless / VPN / SSL
- Data Threat Sentry – Anti-Virus / Anti-Spyware
- Portable Data Assistants – PDA / Laptops / Cell Phones
Start to rank what your priorities are. Each individual department or business entity has a basic understanding for where money needs to be spent in the short-term. What is lacking is a vision for how to manage current assets to prevent them from becoming liabilities and how to plan for and predict future needs to grow and scale with changing business models. If you haven’t surrounded yourself with people who can comfortably help you establish this then you may need to consider staffing changes or hiring a consultant. This stuff comes naturally for some and others really have to work at it. So start by breaking all this information up into large problems that can easily be broken up into smaller sub-problems that can be easily solved with minimum time and money.
Now historically we’ve observed that on any network, each system should undergo 2 hours of maintenance for every month it’s in service. That 2 hour chunk of time should be divided up in system updates, tuning and optimization and cleaning and purging. More casually each system should visit Windows Update once a month. Each disc on the system should be defragmented with special attention given to the page file. Empty recycle bins and perform other purges of logs and collected data assuming you have harvested the information you need beforehand. Lastly you want to check your anti-virus and anti-spyware scans to make sure they are working and to see what kind of threats have been encountered and if they were resolved. We’ve found that on healthy networks, you will spend about 2 hours a month per machine on these activities. Certain tools do exist to shorten this window of time but 2 hours is your rule of thumb.
Now we’ve established 2 hours on desktops for each server it’s more like 10 hours and in some cases 20 to 30 hours depending on server load and what is being done there. You may need to check IIS logs and gather Web metrics, purge archive tables in SQL server and run maintenance queries. You will also want to check for and approve updates, verify threat systems and perform other tasks that may be specialized to each server. Our rule of thumb is 10 hours. If you have a special case server then you evaluate what is being done with it. We can generally get a “rule-of-thumb” by spending about 15 minutes in the Event Viewer and by viewing IIS and SMTP logs. No matter what method you use, you need to establish your averages and those numbers will be what you use to determine your basis for costing. When it comes to printers, scanners, faxes and other attached devices, we assign .25 hours per month of operation for every 5 devices. Please note that we do not include photocopiers in this estimate but they should be covered by the manufacturer or dealer maintenance agreement. We would never recommend operating these devices our of contract as they can be very expensive to fix. Also in todays environment these devices are often and integral part of the workflow and used as an entry point into the data storage schema.
To round out your support you need to plan on 2 to 5 hours per month per business location or department to talk with decision makers and provide basic telephone based support to common everyday problems.
To obtain more information click here
This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL) click here