Unit 20 PART 2 (3)
Unit 20 PART 2 (3)
Contingency Plans:
In the event of technical failures or emergencies, contingency plans are in place. Each
system is connected to an Uninterruptible Power Supply (UPS) to protect against data loss
due to sudden power outages. Data backups are performed daily and stored securely on
both external hard drives and encrypted cloud services. Bi-weekly restore tests are carried
out to verify backup integrity and readiness.
Backup Procedures:
A backup process is in place to ensure data safety. All important server data is backed up
daily to an external hard drive and uploaded to a secure cloud storage location. Backups are
verified weekly, and a full recovery test is conducted every two weeks to confirm that the
backup system is reliable.
Additionally, a peer review suggested the inclusion of power loss precautions. Based on this,
Uninterruptible Power Supplies (UPS) were added to the contingency plan. This ensures
that, in the event of a power failure, users have time to save work, and the system can shut
down properly, avoiding data loss or corruption.
These feedback points significantly strengthened the plan, making it more practical and
tailored to real-world office needs.
- Management
In addition to folder setup, user desktops were configured. All computers display the
company logo as the background image. Shortcut icons were created for Word Processing
(Microsoft Word), Spreadsheet (Excel), Calculator, File Explorer, and Google Chrome. All
other icons were removed to simplify the interface.
Printers were set up on the network and made accessible to all users. IP addresses were
assigned statically to ensure consistent connections.
All planned tests passed without issue. Screenshots were taken to verify access levels and
desktop consistency.
These activities demonstrate the ability to support a managed IT system in accordance with
the organization’s needs.
Furthermore, to maintain the health of the system over time, regular maintenance tasks will
be scheduled. These include weekly disk cleanups, defragmentation (where applicable),
software patching, and reviewing the firewall logs. The IT support technician will also
ensure that antivirus and anti-malware tools are scanning the system on a scheduled basis
and that reports are reviewed for signs of malicious activity.
To manage network traffic effectively, quality of service (QoS) settings on the network
equipment will prioritize critical applications, such as access to shared folders, cloud
backups, and video conferencing tools. This prevents non-essential traffic, such as high-
definition streaming, from slowing down work-related tasks.
User education is another pillar of effective IT support. Occasional refresher sessions will be
conducted to update staff on new threats such as phishing emails or software
vulnerabilities. Users will be taught how to recognize suspicious activity and how to report
it. A “Report a Problem” shortcut will be added to all desktops to simplify the process of
submitting support tickets.
When updates are carried out, whether security patches or software upgrades, it is essential
to inform users in advance to minimize disruption. A notice will be sent by email at least 24
hours prior to scheduled updates, with instructions for users to save work and shut down
systems if required.
Furthermore, the support system includes periodic feedback collection. Every three months,
a short satisfaction survey will be sent to users asking about the performance of the IT
systems, the helpfulness of support staff, and suggestions for improvement. This feedback
loop not only ensures the system continues to meet users' evolving needs but also helps
justify future upgrades or additional staffing to management.
The IT technician will also review support tickets quarterly to identify patterns. If recurring
issues are detected, such as regular printer driver problems, root cause analysis will be
performed, and a permanent solution will be implemented. For example, ensuring driver
updates are automatically pushed from the server or changing the printer model if
hardware faults are common.
Finally, an end-of-year system audit will be conducted to review all elements of the
infrastructure, hardware condition, software licenses, backup performance, and support
metrics. This ensures accountability and provides an opportunity to plan improvements for
the next financial year.
The planning decisions made during the design of the IT infrastructure were deliberate and
based on real-world best practices to ensure efficiency, security, and user satisfaction.
These decisions not only addressed the current operational needs but also anticipated
potential issues that may arise as the business grows.
One of the most important planning decisions was the use of Active Directory user groups to
manage folder permissions. Instead of assigning permissions individually, which can lead to
inconsistencies and errors—group-based access control was implemented. Junior staff,
Managers, and Directors were each assigned to their respective groups. This ensures clarity
in access policies, simplifies administrative overhead, and improves scalability. For
example, if a new Manager is hired, assigning them to the “Manager” group grants them the
necessary folder access automatically.
Folder Permissions:
Specific folders were created: “General Folder,” “Policies and Procedures,” and
“Management Folder.” Permissions were granted based on job roles. This setup supports
data confidentiality and minimizes risk. Junior staff cannot access sensitive management
documents, while Managers and Directors have appropriate levels of access. The Policies
and Procedures folder is available as read-only to Junior and Manager groups to ensure
consistency across the organization.
Desktop Standardization:
Providing all users with a consistent desktop interface improves usability and reduces the
support burden. By configuring desktops with only essential shortcuts—Word, Excel,
Calculator, File Explorer, and Chrome, users are not distracted by unnecessary software.
The desktop wallpaper includes the company logo “Syed Tech,” enhancing brand
consistency and professionalism.
A basic SLA proposal was created to define support expectations. This included response
times for support tickets and resolution targets. Establishing these expectations early
ensures both users and IT support personnel are aligned, and it reduces the likelihood of
conflict. For instance, users are informed that most issues will be addressed within one
business day, which improves satisfaction and trust in the IT department.
Contingency Planning:
Incorporating UPS systems and routine backups into the planning ensured that the office
infrastructure could withstand short power interruptions and data loss scenarios. In
addition, a restore test procedure was added to verify the integrity of backups. This
proactive measure reduces the risk of downtime or permanent data loss.
To maintain a safe and efficient network, a firewall was planned to restrict access to non-
business-related websites. Antivirus software was installed and scheduled for weekly
updates. Group policies were created to enforce password strength requirements. These
planning decisions ensure long-term system stability and user protection from common
threats.
User Documentation:
Providing guides on how to use the new system empowers users to solve basic problems
themselves, reducing the volume of support requests. Documentation includes how to log
in, access shared folders, use network printers, and submit support requests. These
resources improve overall user experience and reduce dependency on IT staff for minor
issues.
Summary:
Each decision was designed with the goal of supporting users efficiently while ensuring that
the system remains secure, scalable, and manageable. The consistent structure, clear
permissions, and user-friendly interfaces reduce the learning curve for new employees and
minimize system misuse.
After the system was implemented, several improvements were made based on feedback
and performance monitoring.
Initial feedback revealed that some users were unsure how to use the printer or access
shared folders. In response, a visual quick-start guide was created and distributed to all
staff. This guide featured annotated screenshots and step-by-step instructions. It reduced
the number of support tickets related to basic navigation.
It was noted that print jobs were taking longer than expected during peak hours.
Investigation showed that all users were assigned to a single network printer. To resolve
this, the system was reconfigured so that each of the three printers served a subset of users.
Load balancing was applied based on department groupings. This reduced congestion and
improved print job turnaround.
Some users reported slow access to shared folders. After investigation, it was determined
that folder redirection settings were causing delays. Optimization included switching to
mapped drives and enabling offline files for critical folders. This significantly improved
access speed and user satisfaction.
Security Enhancements:
Following the initial setup, weekly system reviews were scheduled to check for unusual
activity. The firewall rules were tightened, blocking ports that were not in use. Regular
scans with updated antivirus definitions ensured that systems remained free of malware.
Additionally, automatic software updates were enabled to reduce vulnerabilities.
The backup system was optimized to include both incremental and full backups.
Incremental backups occur nightly, while full backups run weekly. This reduces storage
usage and backup time while maintaining data security. Quarterly restore drills confirmed
that backups could be recovered quickly in case of emergency.
Optimization also involved improving user engagement. Short training sessions were held
to educate staff on cybersecurity awareness, including how to identify phishing emails and
avoid suspicious downloads. This not only improved security but also empowered users to
take more responsibility for their digital safety.
Email filters were configured to block spam and flag potential phishing attempts. This
reduced the number of malicious emails reaching user inboxes and minimized risk
exposure. Logs of flagged messages were reviewed weekly by IT support.
Performance Summary:
Following these optimizations, system uptime improved, support tickets were reduced, and
user satisfaction increased. Monitoring tools confirmed that resource usage was balanced
across devices, and no major incidents occurred post-implementation. These improvements
demonstrate how optimization can transform a basic system into a highly efficient and
secure IT infrastructure.
The implemented system was evaluated against the organization's operational needs, and it
demonstrated strong alignment with the goals of reliability, efficiency, and user-centered
support. Below is a detailed evaluation of each key component of the system in relation to
how effectively it met the company's requirements.
The backup strategy was particularly effective. Data was backed up both locally and to the
cloud daily. The weekly verification and quarterly restore tests ensured data integrity. A
critical evaluation showed that recovery time during test scenarios was minimal (under 30
minutes), which supports business continuity. This exceeded the original expectations
outlined in the contingency plan and showed readiness for real-world failures.
The support structure featuring tiered response procedures and a documented SLA was
effective in addressing user concerns. Average ticket response time remained under 4
hours, well within the proposed 1-business-day SLA. Feedback collected through follow-up
emails and internal surveys showed that over 90% of users rated support as “helpful” or
“very helpful.” This level of satisfaction indicates that the SLA terms were realistic and well
implemented.
Evaluation of Security:
The system's security measures were evaluated based on user access control, antivirus
monitoring, firewall configurations, and user behavior. The introduction of strong password
policies and regular system updates resulted in no reported security breaches during the
operational period. This met the organization's security goals and protected sensitive
company data effectively.
Evaluation of Performance:
Using system monitoring tools, performance data was gathered over a one-month period.
CPU and RAM usage remained stable across all client PCs, and there were no major system
crashes or slowdowns. Load balancing of network printers significantly improved job
processing time. The system's responsiveness under typical office workload was
consistently within acceptable thresholds.
Evaluation Summary:
A personal Gantt chart was created at the start of the project, outlining major tasks such as
planning, system setup, testing, optimization, and evaluation. Each task was allocated
realistic deadlines, and progress was monitored weekly. This structured approach ensured
that the final product was delivered on time, even after incorporating feedback and
unexpected technical challenges.
Use of Feedback:
Feedback was actively sought from the tutor and classmates during peer review sessions.
After the initial setup, feedback highlighted a need for better documentation and folder
access testing. This feedback was taken seriously and used to adjust the test plan,
strengthen folder restrictions, and update user guides. Evidence of this feedback loop
includes meeting notes, marked-up drafts, and updated screenshots incorporated into the
final portfolio.
Professional Conduct:
Every key decision and action taken during the project was documented. This included
system settings, test results, folder permissions, and optimization steps. These documents
not only ensured transparency but also created a replicable procedure that could be
followed by others. This level of organization reflects maturity and responsibility in
handling technical projects.
After each phase of the project, short reflective notes were written to evaluate what worked
well and what could be improved. For example, during the desktop configuration phase, it
became clear that some shortcut icons were not needed and were subsequently removed.
This adaptability, recognizing inefficiencies and correcting them demonstrates critical
thinking and commitment to high-quality outcomes.
Communication Methods:
Conclusion:
The distinction-level criteria were achieved by not only implementing technically sound
infrastructure but also by demonstrating high levels of individual responsibility and
professional behavior. The work was carried out with planning, attention to detail, and
continuous improvement, all of which are essential for success in the real-world IT
environment. This assignment reflects not just technical competence but also the mindset
and habits of a self-managing IT professional.