SLD -- Managed Microsoft Azure Services
Service Level Description
1. PURPOSE
This Service Level Description (SLD) details the services provided by Navisite as well as client requirements for the Managed Azure product line. This document is not a legal or binding agreement; instead, it is intended to be an operational description of a Navisite Service.
(Access this SLD as PDF.)
Confidential Information Notice
The information contained herein is hereby marked NAVISITE CONFIDENTIAL, is intended only for the use of the individual or individuals to which it is addressed, and shall not be disclosed or made available to any other party except with the prior written consent of NAVISITE. This proprietary data may not be duplicated, distributed, or disclosed in whole or part.
2. INTRODUCTION
This service description details Navisite's Managed Azure services (Managed Azure). Managed Azure provides companies with a fully managed cloud environment where the network and operating systems are tailored and managed to meet the requirements of each Customer's application and/or infrastructure environment. This service allows for the union of the highly scalable and stable Microsoft Azure cloud with Navisite's comprehensive management services.
The Managed Azure service provides comprehensive 24x7 managed hosting services including:
-
VM provisioning and management.
-
VM backups.
-
Networking management including connectivity, load balancers, and
firewalls.
3. SUPPORTED AZURE SERVICES
Microsoft provides many different services under their Azure umbrella, some of which can be managed by Navisite in support of a fully managed solution. Specifically the services that are supported are:
Microsoft Azure Service |
Description |
Virtual Machines |
Provision Windows and Linux Virtual Machines and applications in minutes |
Storage |
Durable, highly available and massively scalable cloud storage |
Backup |
Simple and reliable server backupvia Navisite’s Unified Backup platform |
Virtual Network |
Provision private networks, optionally connect to on-premises datacenters |
Load Balancer |
Deliver high availability and network performance to your applications |
VPN Gateway |
Establish secure, cross-premises connectivity |
4. MICROSOFT AZURE ARCHITECTURE
Microsoft Azure Services are comprised of many, many components which are configured and managed by Navisite in an optimal manner to meet customer requirements. While these components have countless permutations for combination, Navisite has developed templates to ensure that all services can be delivered in a stable and secure manner while still allowing a sufficient amount of customization for each individual customer. The major components of a Navisite managed Azure environment are described below.
4.1 Virtual Machines
Azure Virtual Machines is one of several types of on-demand, scalable computing resources that Azure offers. An Azure virtual machine gives you the flexibility of virtualization without having to buy and maintain the physical hardware that runs the virtual machine. However, you still need to maintain the virtual machine -- configuring, patching, and maintaining the operating system and any other software that runs on the virtual machine.
Azure Virtual Machines lets you create and use virtual machines in the cloud. Providing what's known as Infrastructure as a Service (IaaS), virtual machine technology can be used in variety of ways. Like other virtual machines, a VM in Azure has an operating system, storage and networking capabilities and can run a wide variety of applications. Navisite provides pre-defined templates with all required management and monitoring components pre-installed.
Virtual machines use virtual hard disks (VHDs) to store their operating system (OS) and data. VHDs are also used for the images you can choose from to install an OS. The following figure shows this, as well as two of the tools Navisite may use for creating and managing your VMs.
Along with the OS, other configuration choices you have with VMs include:
-
The size, which determines factors such as how many disks you can attach
and the processing power. Azure offers a wide variety of sizes to support
many types of uses.
-
The Azure region where your new VM will be hosted, such as in the US,
Europe, or Asia.
4.2 Availability Sets
With the exception of specific VMs that use premium storage, individual VMs within Navisite do not have availability SLAs; instead SLAs are provided on multiple VMs that can then be configured at an application level for redundancy. A simple example would be that of identical web servers that are set behind a load balancer such that a web request could go to any of them and return he same result. These VMs would be placed in an availability group by Navisite to ensure that during the course of routine maintenance, only one VM in the groups is rebooted at a time. This ensures continuous service while retaining the ability of Navisite and Microsoft to perform maintenance in a timely fashion.
4.3 VM Storage
A standard storage account gives you access to Blob storage, Table storage, Queue storage, and File storage:
-
Blob Storage stores file data. A blob can be any type of text or binary
data, such as a document, media file, or application installer. Blob
Storage is sometimes referred to as Object storage.
-
Table Storage stores structured datasets. Table storage is a NoSQL
key-attribute data store, which allows for rapid development and fast
access to large quantities of data.
-
Queue Storage provides reliable messaging for workflow processing and for
communication between components of cloud services.
-
File Storage offers shared storage for legacy applications using the
standard SMB protocol. Azure virtual machines and cloud services can share
file data across application components via mounted shares, and on-premises
applications can access file data in a share via the File service REST
API.
An Azure VM supports attaching several Premium Storage disks so that your applications can have up to 64 TB of storage per VM. With Premium Storage, your applications can achieve 80,000 IOPS (input/output operations per second) per VM and 2000 MB per second disk throughput per VM with extremely low latencies for read operations.
When you provision a disk against a Premium Storage account, how much input/output operations per second (IOPS) and throughput (bandwidth) it can get depends on the size of the disk. Specific information about premium storage options can be found at https://azure.microsoft.com/en-us/services/storage/ .
At this time, Navisite is only supporting Blob Storage for the VHD files as well as Premium Storage for VMs. Other storage formats may be made available at a later time.
4.4 Standalone Storage
Azure Storage as a Service (Azure Storage) is the simple presentation of bulk storage across the Internet without the need for VPNs or other special connectivity, within Azure documentation it is referred to as blob storage. Rather than using storage protocols such as CIFS or NFS for transport, it uses HTTPS for dependable and secure data transfer. This means that it cannot be accessed natively by servers, but rather needs a specialized client to convert the storage protocol to HTTPS and back. More information can be found at: https://azure.microsoft.com/en-us/services/storage/blobs/ .
As a plentiful form of cheap storage, it is largely used for archiving or as a backup target. Many backup vendors (Commvault and Veritas) or storage providers (NetApp) can natively use Azure blobs as a target without the need for extra software. For those who just want a simple client for mapping a file share, a simple Google search will turn up a variety of free or low cost clients that may meet the specific needs of the customer.
Azure blobs provide a variety of configuration options:
- Location – This can be at any of the locations listed in Services link above where Navisite is permitted to sell Azure.
- Redundancy – Navisite encourages either the Locally Redundant Storage (three copies within one region) or Geo Redundant Storage (three copies within one region and three copies in another region generally in the same political border). GRS is roughly twice the price of LRS but provides an extra layer of redundancy at a relatively low cost.
- “Hot versus Cool” – These are differentiated by SLA; Hot has an 99.9% SLA while Cool is 99%, but Cool is cheaper. More information can be found at https://docs.microsoft.com/en-us/azure/storage/storage-blob-storage-tiers .
An Azure virtual network (VNet) is a representation of a physical network in the cloud; it is a logical isolation of the Azure cloud dedicated to an individual customer subscription. This allows for Navisite to define and control the IP address blocks, DNS settings, security policies, and route tables within this network. VNets can be further segmented into subnets and launch Azure IaaS virtual machines. Additionally, the virtual network can be connected to on-premises network using one of the connectivity options available in such as VPN or Express Route.
4.5 Networking
An Azure virtual network (VNet) is a representation of a physical network in the cloud; it is a logical isolation of the Azure cloud dedicated to an individual customer subscription. This allows for Navisite to define and control the IP address blocks, DNS settings, security policies, and route tables within this network. VNets can be further segmented into subnets and launch Azure IaaS virtual machines. Additionally, the virtual network can be connected to on-premises network using one of the connectivity options available in such as VPN or Express Route.
The Azure infrastructure takes on the role of the router, allowing access from the VNet to the public Internet without the need of any configuration. Firewalls can be substituted by Network Security Groups (NSGs) applied to each individual subnet. Traditional physical load balancers are substituted by internet facing and internal load balancers in Azure.
4.5.1 Virtual Network Benefits
-
VNets are completely isolated from one another. That allows you to create
disjoint networks for development, testing, and production that use the
same CIDR address blocks.
-
All IaaS VMs and PaaS role instances in a VNet can access the public
Internet by default. Navisite can control access by using Network Security
Groups (NSGs).
-
PaaS role instances and IaaS VMs can be launched in the same virtual
network and they can connect to each other using private IP addresses even
if they are in different subnets without the need to configure a gateway or
use public IP addresses.
-
Azure provides internal name resolution for IaaS VMs and PaaS role
instances deployed in your VNet. Navisite can also deploy DNS servers and
configure the VNet to use them.
-
Traffic entering and exiting the virtual machines and PaaS role instances
in a VNet can be controlled using Network Security groups.
-
VNets can be connected to each other, and even to your on-premises
datacenter, by using a site-to-site VPN connection, or ExpressRoute
connection.
4.5.2 Subnets
Subnet is a range of IP addresses in the VNet; Navisite can divide a VNet into multiple subnets for organization and security. VMs and PaaS role instances deployed to subnets (same or different) within a VNet can communicate with each other without any extra configuration. Navisite can also configure route tables and NSGs to a subnet.
4.5.3 IP addresses
There are two types of IP addresses assigned to resources in Azure: public and private. Public IP Addresses allow Azure resources to communicate with the Internet and other Azure public-facing services like Azure Redis Cache, Azure Event Hubs. Private IP Addresses allows communication between resources in a virtual network, along with those connected through a VPN, without using an Internet-routable IP addresses.
4.5.4 Azure load balancers
Virtual machines and cloud services in a Virtual network can be exposed to the Internet using Azure Load balancers. Line of Business applications that are internal facing only can be load balanced using internal load balancer.
-
An external load balancer can provide high availability for IaaS VMs and
PaaS role instances accessed from the public Internet.
-
An internal load balancer can to provide high availability for IaaS VMs and
PaaS role instances accessed from other services in a VNet.
4.5.5 Azure Traffice Manager
While basic load balancers provide sufficient functionality for distributing loads within a single location, there are frequently scenarios where the need exists to distribute loads between different geographies; for this Azure Traffic Manager can be used. Traffic Manager provides geographic load balancing by allowing requests to be distributed based on:
- Prioritized Routing – An algorithm primarily used in failover scenarios.
- Weighted Routing – An algorithm that allows for distribution to different hosts based on pre-defined priorities.
- Performance Routing – An algorithm that selects the best route based on latency between the source IP and the hosts.
- Geographic Routing – An algorithm that defines hosts based on the geographic region from whence the DNS query originates.
- Traffic Manager provides DNS resolution, not active routing, so once Traffic Manager determines the host to which a client should connect, that traffic goes straight from client to host without needing to re-enter the Azure environment.
- Traffic Manager can be used to distribute traffic between hosts both within and outside of Azure. This allows for load balancing between Azure and other environments during a migration or “cloud bursting” scenario.
4.5.6 Network Security Group (NSG)
Network security group (NSG) contains a list of Access control List (ACL) rules that allow\deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When a NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating a NSG directly to that VM.
4.5.7 Routing
With user defined routes, Navisite has complete control over the traffic flow in each virtual network. Virtual network by default provides system routes for traffic flow between virtual machines. Navisite can customize the routing table by defining routes allowing specific traffic through network appliances. Routes can be defined in a routing table and applied to subnets. Every VM within a subnet automatically inherits the routes from the routing table. A route within the routing table contains the network address space (destination prefix) and the IP address of the next hop. You can also choose to bring in routes using BGP when using ExpressRoute. Within the routing table, a route for a given destination will be selected based on Longest Prefix match (LPM).
4.5.8 VPN Gateways
VPN Gateways are used to send network traffic between virtual networks and on-premises locations. They are also used to send traffic between multiple virtual networks within Azure (VNet-to-VNet). There are 3 VPN Gateway SKUs (Basic/Standard/High Performance) and Navisite will select the most appropriate one based on client requirements.
4.5.9 Express Route
For those customers who require dedicated connectivity to an Azure environment, Express Route can be used. An Express Route connection has three major components:
- The circuit that connects the customer premise to a carrier hotel. Most major telco providers offer this service with connectivity to Azure (Express Route) and AWS (Direct Connect). Navisite cannot directly resell these circuits so they should be obtained by the customer or through Spectrum Enterprise.
- A carrier hotel is an aggregation point for connecting customer circuits into the Azure network. There are some telco providers who provide this service directly while others will partner through speciality providers such as Equinix.
- The actual Express Route connection is effectively a cross-connect within the carrier hotel and the customer Azure subscription. This is configured by Navisite using routing and other configuration information supplied by the customer and carrier hotel.
4.6 License Models
Microsoft provides three different models for the acquisition and payment of Azure services; Pay-as-you-go, Enterprise Agreements, and Cloud Service Providers.
Navisite can provide management services on top of all of these models, but there are slight differences in the approach.
- Pay-as-you-go is a model wherein a customer signs up for an account directly on the Microsoft portal and pays directly by credit card or invoice. This is most common among small companies or startups. Navisite can manage some or all of the Azure resources based on customer requirements.
- Enterprise Agreements for large Microsoft customers will frequently include some quantity of Azure credits in addition to the onsite Microsoft licenses. These are generally paid for in advance and this model is generally targeted to mid-to-large customers with a pre-existing Microsoft relationship. Navisite can manage some or all of the Azure resources based on customer requirements.
- The Cloud Service Provider program allows providers like Navisite to provide both the Azure resources and the Azure management in a single package. All Azure resources provided via this model must be managed by Navisite.
5. SERVICE DESCRIPTION
Navisite's Managed Azure is a comprehensive managed hosting service that provides the following service components:• Provisioning of VMs and networking components based on customer requirements
• Provisioning and management of backups for the Azure-hosted services
• Provisioning and management of Load Balancing services for the Azure-hosted services
• Availability Monitoring, Incident Management, System Administration, and Change Management Technical Support services for network connectivity and operating system.
• Access to Proximity customer portal.
5.1 Service Availability
Navisite's Managed Azure service is available at all Azure locations as listed at https://azure.microsoft.com/en-us/regions/ for Pay-as-you-go and Enterprise Agreement models; only a subset of those regions are available through CSP.
5.2 Design Document Creation
The initial step is the joint creation of an environment design document (Design) by the Navisite sales and engineering teams with final approval by the customer. This Design will be based on pre-defined Navisite templates to ensure that configurations meet minimum requirements for service and support. The final document will include:
-
Detailed description of network connectivity to the customer premise,
Navisite hosted services, or other locations
-
List of applications to be implemented with connectivity
requirements
-
List of Azure services to be used
-
Specifications for Availability groups
-
Geographic location for each availability group
5.3 Provisioning of Microsoft Azure account
Navisite will provision an account on Azure for the customer; if the customer already has an Azure subscription, a separate process will be used to grant Navisite access to the existing account. This will serve as the basic environment into which all services will be deployed.
5.4 Network implementation
Navisite will provision the software-based network structure in based on the customer-approved design. Connectivity to the customer premise or Navisite hosted services will be provisioned and tested based on the Design document. This will include the configuration of a VPN or Express Route connection depending on specific customer needs.
5.5 DNS Implementation
Navisite will provision Azure DNS services and maintain both forward and reverse name lookup records for servers hosted within the Azure or Navisite environments.
5.6 Availability Group/Virtual Machine implementation
Navisite will create the appropriate resource and availability groups to support the Design. Within those groups, Navisite will provision the individual VMs and harden the operating systems of the in accordance with the approved network design as well as best practices and industry standards. Navisite is responsible for:
-
Disabling unnecessary services as security measures.
-
Installing and configuring TCP wrappers on UNIX hosts.
-
Creating and configuring local user accounts
5.7 Blob Storage Implementation
Upon receipt of a sales order for Azure Storage, Navisite will:
- Create an Azure subscription for the customer.
- Create Resource Groups for tracking and management of the storage.
- Create Storage Accounts based on the geographies requested by the customer.
- Create Storage Blobs within the Storage Accounts based on the customer requirements.
- Share the credentials and access keys required for accessing the storage blobs with the customer.
5.8 Load Balancer Implementation
In order to provide a unified interface for VMs located within an availability group, Load Balancer services are configured to provide access to services on the VMs. The load balancing services will be configured in accordance with the Design with the follow parameters:
-
Backend pool of VMs to be protected
-
IP address for unified access
-
Health probe configurations to determine whether or not a VM is
live
-
Load balancer rules (port/protocol)
-
Inbound NAT rules (port mapping)
-
Session persistence
5.9 Backup Implementation
5.10 Azure Import/Export Service
5.11 Implementation of the Navisite Monitoring platform
Navisite will add all Azure components to the Navisite monitoring platform. Alerts and general information from the Azure environment will be displayed within the client account in Proximity.
6. MONTHLY SERVICE DESCRIPTION
6.1 Design Updates
As customer requirements change over time, the environment may need to change from the original design as well. The customer is able to request changes to any Azure components via the Change Request form within Proximity. These changes will be validated and executed in accordance with Navisite change control processes.
6.2 OS Monitoring Services
Navisite assumes responsibility for the monitoring of the Customer's operating systems. These operating systems are monitored 365 days a year, 24 hours a day to ensure that they are functioning as intended. Navisite initiates the notification process when a monitored threshold is reached or a fault is detected in the Customer infrastructure environment.
NOTE: Navisite reserves the right to change its monitoring tools, methods, monitored parameters, and polling intervals on an as needed basis.
6.2.1 Navisite Responsibilities / Activities
Network Monitoring
Navisite's Network Management Platform performs the following functions:
-
24x7 ping monitoring of Customer servers or virtual instances to determine
if they are in an Up or Down state.
-
The Network Management Platform sends all confirmed error events to the
Event Console in the Navisite Service Center (NSC) for further Event Management.
6.3 Network Management
Navisite will monitor and maintain the connectivity from the Azure environment to the customer or Navisite locations in accordance with the design or design changes. Modifications to Active Directory or DNS services will be requested via the Change Request form in Proximity and will be subject to Change Control processes.
6.4 OS Management Service
The Operating System (OS) Management Service consists of the following ongoing tasks:
-
Ongoing Operational Management.
-
Fault Management.
-
Patch Management.
-
Backup Services.
Navisite continues to maintain the same operating system until the OS vendor no longer supports that version of the OS or until Navisite, with 6 month advance notice, advises Customers that, as a result of operational and/or security deficiencies, Navisite is removing the version from the Navisite list of supported service elements. Customers may need to provide or pay for any required upgrade licenses from the OS vendor.
Navisite Systems Administrators provide the following functions:
-
Install/de-install OS packages, patches and service packs.
-
Install and configure SSH for secure access to UNIX/LINUX
servers.
-
Add/change/delete local user accounts.
-
Change/modify file permissions (read/write/execute commands and user
access).
-
Create file shares on Windows Servers.
-
Keep Anti-virus engine and data files up to date.
-
Modify system parameters in accordance with documented application
requirements.
-
Perform changes to TCP Wrappers to enable user access to UNIX
hosts.
- Keep current with the operating system vendors' latest releases of security maintenance code patches. Subject to Customer notification and approval, Navisite periodically integrates the vendors' latest security patches into production servers.
Navisite provides ongoing real-time monitoring of critical system parameters that are supported by proactive intervention by our System Administrators. We monitor and manage the Operating Systems as described above.
6.4.3 Windows Patch Management
Navisite is responsible for timely applications of vendor issued patches and service packs; these updates address performance and/or security issues. Navisite's processes regarding the identification, testing, and deployment of OS patches is as follows:
6.4.3.1 Emergency patch procedures for security related issues
-
Navisite monitors vendor alerts, trusted third party advisories,
vulnerability reports, and other sources to identify valid security
alerts/issues.
-
Navisite installs emergency security patches immediately onto a Customer's
server if the patch is deemed so important by the vendor, or by industry
experts, such that without it either the Customer or the Navisite network -
and other Customers' service elements - are exposed to attacks, which
threaten their operational integrity. Navisite makes a reasonable attempt
to notify affected Customers prior to patch installation (either via email
or by phone), but in some circumstances it may be deemed necessary to
install these patches before Customer notification occurs. Navisite also
makes a reasonable effort to perform this emergency maintenance in the
closest available regularly scheduled maintenance window, but in some cases
action may be needed immediately.
-
Navisite's back out plans for emergency patch applications include being
able to roll back to the current state of the OS prior to patch
application. Any additional restoration of OS functionality, application
information, or Customer data that may be necessary due to a security issue
is provided under the Unified Backup Service. Refer to the Unified Backup Service
SLD for further details.
6.4.3.2 Non-Emergency patch procedures for performance related issues
-
Using vendor alerts, third party advisories, vulnerabilities reports, and
other feedback, patches are collected as they become available, tested, and
validated against the Navisite baseline OS system build.
-
Periodically, but at least once a month, Navisite publishes a list of
recommended patches and bundles these patches together in preparation for
installation as a Mandatory System Patch Upgrade (MSPU). In addition, this
list will be available to our Customers (as either the actual patch or a
link to the patch) so that our Customers can review the patch list and
determine by their own testing that the patches don't affect their system
or application's operation.
-
Approximately once every quarter Navisite publishes all the patches (or
combined major Service Pack or service rollup) that are part of the next
MSPU.
-
Installation of each MSPU is implemented under a scheduled change control
with the Customer given 14-day advance notification of the schedule for the
change control and at least 28-day advance notification of the contents of
the MSPU.
6.4.4 Linux Patch Management
Due to the greater number of inter-dependencies between Linux software packages and the applications that run on top of the operating system, Linux hosts are not patched on a regular schedule in the same manner as a Windows server. Navisite will apply operating system patches to a Linux machine under the following circumstances:-
An advisory has been posted for a security flaw in a well-known software
module that places a server at undue risk of exploitation within the other
security controls placed on a Navisite environment.
-
There are specific requirements from an operating system or application
vendor to apply a patch to fix a problem being experienced on the machine.
This will be done after consultation with the client.
- A client specifically asks for patches to be applied.
-
Refrain from making any changes to the operating system or any other
element that is managed by Navisite. Navisite, in turn, will not make any
changes to any elements managed by Customer.
-
Notify the Navisite Service Center (NSC) prior to making any
changes that may cause any unnecessary monitoring alarms. Troubleshooting
and correcting any alarms caused by Customer's failure to notify Navisite
in advance will be billed against the monthly number of support
hours.
-
Ensure compatibility of Customer maintained applications with operating
system, server hardware, and architecture.
-
Request application of non-critical patches.
6.5 Blob Storage Management
If a customer has trouble with their connectivity to the storage blob, Navisite can confirm the accuracy of the access credentials and keys as well as resetting them as necessary.
6.6 Load Balancer Management
Navisite will monitor the load balancer services to ensure that it continues to function as intended. In the event of an issue that renders one of the VMs unavailable, Navisite will remediate as per the processes described in the preceding section. Errors will with the load balancing service itself will be similarly remediated.
In the event that the customer wishes to make changes to the overall Design in a manner that requires modification of the backend pool or other load balancer configurations, these changes will be communicated and executed via the Navisite Change Control process.
7. RACI's
7.1 Windows Systems Management
Task |
Notes |
Responsible |
Accountable |
Consulted |
Informed |
System Build Installation |
|||||
Initial Hardening |
Configure in accordance with Navisite's standards and approved Operating System deployment. |
Navisite |
Navisite |
Customer |
Customer |
Monitoring /Reporting |
Setup and verify monitoring to established Navisite backend devices. Verify graphs are being populated and backup of configuration is being sent to log server. |
Navisite |
Navisite |
Customer |
Customer |
Backup configuration/ Management |
Install and configure enterprise level backup software per customer requirements |
Navisite |
Navisite |
Customer |
Customer |
Compliance |
Harden operating system to meet industry requirements of the customer. |
Navisite |
Customer |
Navisite |
Customer |
Antivirus Management |
Install and configure antivirus in accordance with Navisite's approved applications. |
Navisite |
Navisite |
Customer |
Customer |
|
Real time, scheduled, and custom scanning. Remediate issues as necessary. |
Navisite |
Navisite |
Navisite |
Customer |
Patch Management |
Install and maintain operating system patch levels and service packs based on approved industry packages. |
Navisite |
Navisite |
Customer |
Customer |
Enhancements and Upgrades |
Configuring additional software components. |
Navisite |
Navisite |
Navisite/Customer |
Customer |
Documentation |
Documentation regarding all configuration items specific to customers design. |
Navisite |
Navisite |
Customer |
Customer |
User Account Management |
Navisite applies user accounts based on customer requires and server needs. |
Navisite |
Navisite |
Customer |
Customer |
Break/Fix |
Resolve customer issues based on testing and production. |
Navisite |
Navisite |
Navisite/Customer |
customer |
|
|
|
|
|
|
7.2 Linux Systems Management
Task |
Notes |
Responsible |
Accountable |
Consulted |
Informed |
Linux Systems Management |
|||||
Initial Hardening |
Configure in accordance with Navisite's standards and approved Operating System deployment. |
Navisite |
Navisite |
Customer |
Customer |
Monitoring /Reporting |
Setup and verify monitoring to established Navisite backend devices. Verify graphs are being populated and backup of configuration is being sent to log server. |
Navisite |
Navisite |
Customer |
Customer |
Backup configuration/ Management |
Install and configure enterprise level backup software per customer requirements. |
Navisite |
Navisite |
Customer |
Customer |
Compliance |
Harden operating system to meet industry requirements of the customer. |
Navisite |
Customer |
Navisite |
Customer |
Antivirus Management |
Install and configure antivirus in accordance with Navisite's approved applications (hypervisor based). |
Navisite |
Navisite |
Customer |
Customer |
|
Real time, scheduled, and custom scanning. Remediate issues as necessary. |
Navisite |
Navisite |
Navisite |
Customer |
Patch Management |
Provide OS patch reporting and installation support. |
Navisite |
Navisite |
Customer |
Customer |
Emergency Patching |
Application of required security patches. |
Navisite |
Navisite |
Navisite |
Customer |
Enhancements and Upgrades |
Configuring additional software components. |
Navisite |
Navisite |
Navisite/Customer |
Customer |
Documentation |
Documentation regarding all configuration items specific to customers design. |
Navisite |
Navisite |
Customer |
Customer |
User Account Management |
Creation and management of Navisite administrator account and one customer administrator account. |
Navisite |
Navisite |
Navisite |
Customer |
Break/Fix |
Resolve customer issues based on testing and production. |
Navisite |
Navisite |
Navisite/Customer |
Customer |