Complete System Administrator Checklist
Complete System Administrator Checklist
Daily
Area Tasks Status
Review Audit logs Check application log for warning and error messages for
service startup errors, application or database errors and
unauthorized application installs
Check security log for warning and error messages for invalid
logons, unauthorized user creating, opening or deleting files
Check free hard-drive Check all drives for adequate free space
space
Physical checks of Visually check the equipment for amber lights, alarms, etc.
system
Take appropriate action as specified by site's Standard
Operating
Weekly
Archive Audit logs Archive audit logs to a media device with one year retention
Perform/verify weekly Run or verify that a successful backup of system and data files
backup has been completed
Update Anti-Virus Download and install current Anti-Virus signature files
signature file
Run Anti-Virus scan on Scan all hard-drives using current Anti-Virus signature files
all hard-drives
Check Vendor Websites Check vendor websites such as Microsoft, Sun, HP, Oracle,
for Patch Information etc for new vulnerability information including patches and
hotfixes
Verify Retina Verify system scanned by IAO or NSO using Retina tool to
Vulnerability Scan detect for vulnerabilities
Performed (SCCVI)
Remediate with Citadel Verify Hercules remediation tool is used on system to correct
Hercules remediation vulnerabilities
Tool (SCRI)
Check for Password Perform file search on system checking for documents
Files containing words such as 'password', 'passwd', 'pwd', etc
Perform Wireless Check Check system for wireless devices and access
Check for Unnecessary Check system services for any unnecessary services running
Services
Monthly
Perform Self- Review technology checklist for any changes
Assessment Security
Review
Run current security review tool
Perform/verify monthly Run or verify that a successful backup of system and data files
backup has been completed
Verify User Account Run DumpSec tool to verify user account configuration
Configuration
Annually
Change Service- Work with appropriate application administrator to ensure
Account passwords password changes for service accounts such as database
accounts, application accounts and other service accounts are
implemented
Review appropriate Review appropriate STIGs which are updated annually
Security Technical
Implementation Guides
(STIG)
Participate in STIG Participate in TIMs to exchange information about updated
Technical Interchange STIGs, etc.
Meetings (TIM), when
possible
Review training Review training requirements according to DoD Directive
requirements 8570.1
Windows Backup
Tool
Veritas Backup
Software
Microsoft www.Microsoft.com -
Management Monitoring Server
Console performance
Performance Log
and Alerts
Task Manager
System Monitor
Microsoft Operations
Manager
Disk Quotas
Windows Backup
Tool
Veritas Backup
Software
www.cert.mil
http://iase.disa.mil - DoD
Patch Repository
www.cert.mil
Unix Tripwire
http://iase.disa.mil -
Security Technical
Implementation Guides
(STIGs)
Windows Time www.Microsoft.com -
Service Windows Time Service
Tools - Unix
/Windows
NTP
John-the-Ripper
L0phtCrack
Tools - UNIX
Crack
Tools available on
DISA FSO Gold
Disk (Windows) and
Windows Backup
and Recovery Tool
Veritas Backup
Software
http://iase.disa.mil - IA
Subject Matter Areas:
Policy and Guidance