Current location - Training Enrollment Network - Books and materials - Documents of IT project operation and maintenance management?
Documents of IT project operation and maintenance management?
Here is only the document of system operation and maintenance resident service for your reference.

On-site technical service content

In order to ensure that Party A's related equipment is in good condition and running normally, on-site technical services include routine maintenance of specifications, emergency response to failures, and solution of equipment problems. The specific work contents are as follows:

I. Equipment application

1. Be responsible for the application and operation of all equipment (see attachment 1 for details), submit quarterly reports on the configuration and storage of each equipment, network topology report and IP allocation report, and be responsible for training the relevant staff of Maritime Book Printing Center of Shanghai Maritime Safety Administration;

2. For the equipment requirements of the new application, the field staff should submit the equipment configuration status and equipment planning report in time, so that the application can be implemented in time;

3, master the operation of the equipment, warranty period, storage space, etc. Timely reminder;

4. Establish recovery processes and emergency measures for various failures of related system software;

5. Assist the printing center in computer room renovation, equipment relocation and network renovation.

Second, the environment and equipment

1, assign special personnel to regularly check and record the power supply and distribution, air conditioning, temperature and humidity control facilities of the computer room;

2. Designate a special person to record the entry and exit of the computer room personnel and the startup or shutdown of the server;

3. According to the list of assets attached to the contract, establish files of servers and network equipment, form eye-catching signs that are not easy to destroy, and update relevant contents regularly;

4. Check and maintain all kinds of equipment and circuits listed in the asset list, report any faults in time, arrange service contact or maintenance, and submit a written maintenance report;

5. According to the importance, make regular written reports on the operation and maintenance records of various equipment and lines listed in the asset list;

6. Form a daily patrol system to record the actual status of alarm display, air conditioning, UPS and other related equipment in the computer room.

Three. Monitoring and security

1, through the IT resource monitoring system, monitor and alarm the running status, network traffic and user behavior of communication lines, hosts, network equipment and application software, form records, properly keep them, and report them in writing regularly according to their importance;

2. Assign a special person to analyze and review the monitoring and alarm records, find suspicious behaviors, form an analysis report, and take necessary countermeasures;

3. Assign a special person to be responsible for the daily maintenance of network operation logs and network monitoring records and the analysis and processing of alarm information, and put forward optimization suggestions and schemes;

4. Update the network equipment according to the software upgrade version provided by the manufacturer, and back up the existing important files before updating;

5. Scan network system vulnerabilities regularly, and repair network system security vulnerabilities found in time; (Implemented after Party A configures relevant hardware equipment)

6. Regularly back up the service configuration files of key network equipment offline;

7, regularly check violations of Internet regulations or other violations of network security policies, and submit a written report; (Implemented after Party A configures relevant hardware equipment)

8. Assign a special person to monitor the working pressure of the core server, regularly generate a report on the working pressure of the main server according to the business growth, predict the impact of business growth on the server pressure and put forward reasonable suggestions;

9. Designate a special person to monitor the working pressure of the core database, generate reports regularly, and put forward reasonable improvement suggestions.

Fourth, the operating system is secure.

1. Determine the access control strategy of the system according to Party A's business requirements and system security analysis results;

2. Scan vulnerabilities regularly and fix the discovered system security vulnerabilities in time;

3. Safely strengthen the minicomputer to improve the security of the operating system. On the premise of not affecting the working performance of the database, turn on the security option for security reinforcement.

4. Install the latest patch of the system in time. Report for approval before installation, and pass the test in the test environment, and then install the system patch after backing up important files;

5. For all maintenance of the system, the operation log must be recorded in detail, including important daily operations, operation and maintenance records, parameter setting and modification, etc. Unauthorized operation is strictly prohibited;

6. Regularly analyze the operation logs and audit data, so as to find abnormal behaviors in time;

7. Seriously study the role requirements of the system administrator, and make clear the authority, responsibility and risk.

Verb (abbreviation for verb) backup and recovery

1. Make a detailed system data backup plan and determine a reasonable system backup strategy according to the actual application situation of the printing center, the connection relationship of production-related data, the business characteristics of the application and the software and hardware resources. Regularly back up important business information, system data and software systems;

2. According to the importance of data and its influence on system operation, make data backup, submit data backup report every month, and implement data recovery when necessary;

3. Record the backup process according to the Data Backup and Recovery Process Control Procedure, and properly keep all files and records;

4, according to the requirements, regularly implement the recovery plan, check and test the effectiveness of backup media, to ensure that the recovery of backup can be completed within the time specified in the recovery plan;

5. Maintain, update, replace and rotate backup media regularly to ensure the reliability and effectiveness of backup media, and rotate important backup media in different places in two computer rooms;

6. Make a test flow manual for backup and recovery to maximize work efficiency.

Six, safety accident treatment

1. Report the discovered security vulnerabilities and suspicious events in time, but don't try to verify the vulnerabilities under any circumstances;

2. In the process of reporting and responding to security incidents, analyze and determine the causes of incidents, collect evidence, record the handling process, sum up experiences and lessons, and provide remedial measures to prevent recurrence. All documents and records formed in the process shall be properly kept.

Seven. Service report and workflow arrangement

1. In addition to the written report required by the above work contents, the reports provided by the field personnel also include:

Serial number report report mode frequency 1 incident handling report format document (mail) When an incident occurs, 2 patrol report format document (mail) daily March work report format document (mail) monthly fourth quarter service report format document (mail) quarterly.

2. For the above work contents, the field personnel shall timely sort out and summarize relevant operation procedures, form operation guidance documents and submit them regularly.