USER ACCESS CONTROL
The configuration and maintenance of Active Directory, Exchange, and other application user accounts to ensure ease of access, environment stability, and adherence to security guidelines.
What’s included:
User request process
Establishment of a process that the customer will use to submit requests for:
New user account creation
Existing user account changes
Mail forwarding
Request for mail litigation holds
Requests disabling of user accounts
Requests for deletion of user accounts
User request process will be outlined and delivered to customer, and stored in the Atera documents section, and internally within SA.
Create/change Active Directory account
Upon receiving a new user request:
Create new user account
Change existing user account
Disable existing user account
Delete existing user account
Assign access groups
Creation of access groups in Active Directory for one user or a group of users which could then be used to do the following:
Assign specific group policy actions
Startup scripts
Security permissions
Password permissions
Workstation configurations
Grant folder/file access to specific groups
Restrict folder/file access to specific groups
Deploy certain updates or patches based on group membership
Restrict patch or update deployment for specific users
Software administration
Creation or removal of users for windows and/or third party applications.
Configuration of specific user access roles for third party applications.
Assignment of database user permissions.
License provisioning, management, and harvesting
Recording of when licenses need to be refreshed.
Auto-refresh of any license per customer request.
Procurement of licenses for software.
Tracking of unused licenses and harvesting available ones for refund or redistribution.
Cloud application access
Granting of user access to cloud-specific applications.
Creation of new users.
Configuration of web applications to use Active Directory authentication, if available (depending upon complexity).
Email account creation
Creation of:
New user email accounts
Shared mailboxes
Distribution groups
Configuration of new email mailbox permissions.
Identification of unused groups and mailboxes.
Reporting
Quarterly reports for customer using the Network Detective reporting tool.
