0% found this document useful (0 votes)
35 views10 pages

System Administration Manual

Uploaded by

RajVatsayana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views10 pages

System Administration Manual

Uploaded by

RajVatsayana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

<PROJECT NAME>

SYSTEM ADMINISTRATION
MANUAL
Version: <Type V#>
Date: <XX/XX/XXXX>

Prepared by:

Project Manager
Approved by:

Project Sponsor
Approved by:

Agency CIO
Approved by:

Executive Sponsor
Table of Contents
1 GENERAL 4
1.1 INTRODUCTION AND PURPOSE 4
1.2 PROJECT REFERENCES 4
1.3 GLOSSARY 4
2 SYSTEM OVERVIEW 4
2.1 SYSTEM APPLICATION 4
2.2 SYSTEM ORGANIZATION 4
2.3 INFORMATION INVENTORY 4
2.4 RESOURCE INVENTORY 4
2.5 REPORT INVENTORY 4
2.6 PROCESSING OVERVIEW 4
2.7 COMMUNICATIONS OVERVIEW 4
2.8 SECURITY 5
3 SITE PROFILE(S) 5
3.1 SITE LOCATION(S) 5
3.2 PRIMARY SITE 5
4 SYSTEMS ADMINISTRATION 5
4.1 USER AND GROUP ACCOUNTS 5
4.2 SERVER ADMINISTRATION 5
4.3 SYSTEM BACKUP PROCEDURES 6
4.4 PRINTER SUPPORT 6
4.5 SYSTEM MAINTENANCE 6
4.6 SECURITY PROCEDURES 7
4.7 NETWORK MAINTENANCE 7
4.8 INVENTORY MANAGEMENT 7
4.9 TRAINING BACKUP ADMINISTRATOR 8
4.10 DOCUMENTATION 8
4.11 DATABASE MAINTENANCE 8
4.12 APPLICATION MAINTENANCE 9
Revision History
Date Version Description Author

11/08/2017 0.01 Template Release EPMO

12/06/2021 0.02 Template Updates EPMO

Template Overview and Instructions:

A System Administration Manual serves the purpose of an Operations Manual in distributed


(client/server) applications.
1 GENERAL

1.1 Introduction and Purpose


This section introduces and describes the purpose of the Systems Administration Manual, the
name of the system to which it applies, and the type of system operation(s)

1.2 Project References


This section lists, at a minimum, the User Manual, Maintenance Manual, and other pertinent
available systems documentation.

1.3 Glossary
This section lists all definitions or terms unique to this document or system operation(s) and are
subject to interpretation by the user of this document.

2 SYSTEM OVERVIEW

2.1 System Application


This section provides a brief description of the system, including its purpose and uses.

2.2 System Configuration


This section describes the configuration of the system using a diagram depicting the various
components and their interrelationships.

2.3 Information Inventory


This section provides information about accounts, data files, and the databases that are
produced or referenced by the system.

2.4 Resource Inventory


This section lists all permanent tiles and databases that are referenced, created, or updated by
the system.

2.5 Report Inventory


This section lists all reports produced by the system, including each report name and the
software that generates it.

2.6 Processing Overview


This section provides information that is applicable to the processing of the system. It includes
system restrictions, waivers of operational standards, and interfaces with other systems.
2.7 Communications Overview
This section describes the communications functions and process of the system.

2.8 Security
This section describes the security considerations associated with the system.

3 SITE PROFILE(S)
This section contains information pertaining to the site(s) where the application is running.
Please include the information contained in the subsequent sections.

3.1 Site Location(s)


This is the official addresses of the site(s).

3.2 Primary Site


For the site(s) designated as primary, this section describes the essential staff names and
phone numbers for the automated data processing site contacts.

4 SYSTEMS ADMINISTRATION
This section introduces the responsibilities of the System Administrator, as discussed in the
subsequent sections.

4.1 User and Group Accounts


This section introduces topics related to system users.

4.1.1 Adding/Deleting Users


This section describes procedures to create/delete user logins and password accounts.

4.1.2 Setting User Permissions


This section describes procedures to give users/restrict access to certain files.

4.1.3 Adding/Deleting User Groups


This section contains procedures to create/delete user groups.

4.1.4 Setting User Roles/Responsibilities


This section describes the roles that are granted to each group or individual user(s).

4.2 Server Administration


This section describes procedures to setup servers, including naming conventions and
standards.
4.2.1 Creating Directories
This section describes procedures to create server directories, and a complete description of
the existing directories.

4.2.2 Building Drive Mappings


This section describes procedures to create server drive mappings, and a complete description
of the existing drive mappings.

4.3 System Backup Procedures


This section describes procedures for regularly scheduled backups of the entire network,
including program and data storage, and the creation and storage of backup logs.

4.3.1 Maintenance Schedule (Daily, Weekly)


This section describes documented daily and weekly backup schedules and procedures. The
procedures should include tape labeling, tracking, and rotation instructions.

4.3.2 Off-Site Storage Procedures


This section describes the location, schedule, and procedures for off-site storage.

4.3.3 Maintaining Backup Log


This section describes procedures for creating and maintaining backup logs.

4.3.4 System Recovery


This section describes procedures for recovery of the system after a failure or loss.

4.4 Printer Support


This section discusses procedures for installing, operating, and maintaining printers.

4.4.1 Maintenance (Configurations, ‘loner, etc.)


This section describes maintenance contracts, procedures to include installation and
configuration of printer drivers, and equipment information.

4.4.2 Print Queue (Moving, Deleting, etc.)


This section describes procedures to monitor, delete, and prioritize print queues.

4.5 System Maintenance


This section discusses procedures for maintaining the file system.
4.5.1 Monitoring Performance and System Activity
This section contains procedures to monitor system usage, performance, and activity. This may
include descriptions of system monitoring tools, the hours of peak demand, a list of system
maintenance schedules, etc.

4.5.2 Installing Programs and Operating System Updates


This section includes procedures on how to install and test operating system updates. Once
tested, instructions are to be provided to move/install the operating system updates to the
operational environment

4.5.3 Maintaining Audit Records of System Operation


This section describes procedures for the setup and monitoring of the operating system and
application audit trails.

4.5.4 Maintenance Reports


This section includes procedures to create and update maintenance reports.

4.6 Security Procedures


This section describes the process for obtaining identifications (IDs) and passwords. It includes
information concerning network access and confidentiality requirements.

4.6.1 Issuing IDs and Passwords


This section describes procedures for issuing IDs and passwords for operating systems and
applications

4.6.2 License Agreements


This section describes licensing agreements and procedures for ensuring that all licenses are
current.

4.7 Network Maintenance


This section describes procedures to maintain and monitor the data communications network.

4.7.1 LAN Design


This section contains a layout of the network.

4.7.2 Communications Equipment


This section contains a layout of the telecommunications equipment.
4.8 Inventory Management
This section contains a complete hardware and software inventory to include make, model,
version numbers, and serial numbers.

4.8.1 Maintaining Hardware and Software Configurations


This section describes procedures for maintaining the configuration information for the hardware
and software installed.

4.8.2 Maintaining Floor Plans


This section describes procedures for maintaining floor plans showing the location of all
installed equipment and how to add/delete/modify the plans.

4.8.3 Installing Software/Hardware (New, Upgrades)


This section describes procedures for installing new or upgrading hardware and software.

4.8.4 Maintaining Lists of Serial Numbers


This section describes procedures for maintaining all serial number lists required at the site.

4.8.5 Maintain Property Inventory


This section describes procedures for maintaining a property inventory at the site.

4.9 Training Backup Administrator


This section describes how to train a backup administrator.

4.9.1 End-User Support - Procedures for Support and Contract Information


This section provides necessary end-user contract information and the procedures for providing
end-user support.

4.9.2 Escalation Procedures


This section describes the formal escalation procedures to be used by System Administrators in
response to priority user problem resolution requests.

4.10 Documentation
This section describes the documentation required of System Administrators as they perform
system administration.

4.10.1 Troubleshooting Issues


This section describes how to conduct and document troubleshooting activities.
4.11 Database Maintenance
This section introduces the responsibilities as they relate to the database and software
application maintenance.

4.11.1 Database User/Group Access


Describe who provides database access and the procedures for granting access.

4.11.2 Adding/Deleting Users to Database


Provide the responsible person who adds and deletes users to the database. Include the
procedures for adding/deleting users.

4.11.3 Setting User Permissions for Database


Provide the responsible person who sets the permissions for users on the database.

4.11.4 Adding/Deleting Groups for Database


Provide the procedures and responsible person for adding/deleting groups of individuals to the
database.

4.11.5 Re-indexing Database


Provide the procedures and responsible person for re-indexing the database after changes have
been made.

4.11.6 Packing/Compressing Database


Provide the procedures and responsible person for packing/compressing the database.

4.11.7 Data Entry/Modification/Deletion


Provide the responsible person(s) who can make changes to the database. Include procedures
for data entry, modifying, and deleting information from the database.

4.11.8 Database Reporting


Provide the responsible person(s) for database reporting. Include what reports are generated,
cadence, due dates, and storage of the reports.

4.11.9 Database Backup and Restore


Provide the person(s) responsible for performing database backup. This information should also
be included in the Contingency Plan. Include procedures to follow if the database needed to be
restored.
4.12 Application Maintenance

4.12.1 Application User/Group Access


Describe who provides application access and the procedures for granting access.

4.12.2 Adding/Deleting Application users


Provide the responsible person who adds and deletes users to the application. Include the
procedures for adding/deleting users.

4.12.3 Setting User Application Permissions


Provide the responsible person who sets the permissions for users of the application.

4.12.4 Adding/Deleting Application Groups


Provide the procedures and responsible person for adding/deleting application groups.

4.12.5 Procedures to Start and Stop the Application


Provide who has responsibility to start and stop the application. Include a rationale for stopping
the application, and the steps to take to restart after identified problems are corrected.

4.12.6 Application Diagram


Provide a diagram depicting how the information flows/moves from the application to the
database.

4.12.7 Description of Major Program or Sub-program Modules


Describe the processes within the application or module. If more than one module is operating
for this system, describe each module.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy