Premier Services

Premier Services

The task of Softline Premier services is to proactively support the it infrastructure.

Secure Windows Infrastructure

  • «Active Directory Backup and Restore Strategy Design» (5 days)

    • Data collection using customized toolset (infrastructure configuration, performance, SLA/OLA requirements)
    • Deployment of simulation test environment
    • Disaster recovery drills for key disaster scenarios (object corruption, data loss, etc.)
    • Development of recommended backup and restore strategy (backup types and schedules based on business requirements and infrastructure capabilities)
    • Preparing disaster recovery document (service passport, step-by-step recovery instructions for each scenario)

    «Windows Security Assessment» (5 days)

    • Data collection using customized toolset from Domain Controllers, Active Directory Database and some important servers and workstations (OS configuration, Active Directory and OS permissions and privileges, privileged account hygiene, checking for common misconfigurations, event logs, operational survey)
    • Automated analysis of collected data for deviations from industry and vendor best practices in information security
    • Deep operational survey to identify existing administration practices in organization
    • Data review and extensive analysis by the engineer
    • Prepare and conduct Executive Summary presentation, provide the detailed technical report remediation plan
    • Knowledge transfer session during the engagement
  • «Modern Authentication» (5 days)

    • Knowledge transfer session on modern information security solutions in Windows environments
    • Preparing the action plan and pilot deployment of following technical measures and administrative practices:
      • Identifying privileged accounts
      • Protection of privileged credentials
      • Multifactor authentication
      • Restriction and audit of weak authentication protocols
    • Pilot Windows Hello for Business deployment on a limited set of workstations
    • Hybrid authentication with Azure AD
    • Using Azure AD joined and Azure AD Hybrid joined devices in a corporate environment

    «Modern Administrative Approach» (5 days)

    • Knowledge transfer session on Windows authentication subsystem weaknesses and modern attack vectors exploiting those weaknesses
    • Three-tier administration approach adoption
    • Pilot deployment of protected administrative workstations with a choice
      • A simpler and affordable approach which does require small processes changes
      • More strict and complete approach, requiring changes in multiple processes and administrative approaches
    • Dedicated administrative forest in a test environment
  • «Restricted runspaces» (5 days)

    • A set of Ransomware counteraction measures and restriction of unwanted applications
    • Lateral movement attack counteractions to mitigate the risk of easy compromise of an entire workstation group
    • Development of quick reconfiguration process for protected workstations for a quick response to software updates
    • Deployment of Local Administrator Password Solution (LAPS) and LAPS extension which resolves main limitations of LAPS

Unified Communications

  • «Exchange Backup and Recovery Strategy Design » (5 дней)

    • Data collection using customized toolset (infrastructure configuration, performance, SLA/OLA requirements
    • Alignment of Backup Strategy, Restore Strategy and SLA
    • Deployment of the simulation test environment
    • Disaster recovery drills for key disaster scenarios (object corruption, data loss, etc.)
    • Development of recommended backup and restore strategy (backup types and schedules based on business requirements and infrastructure capabilities)
    • Development of disaster recovery document (service passport, step-by-step recovery instructions for each scenario)
    • Customer documentation review (specifics of 3rd party backup software, IT administrator’s backup/restore instructions, etc.)
    • Measure and document backup and restore performance

    «Exchange Infrastructure Assessment» (5 days)

    • Data collection using the customized toolset (configuration, event logs, operational survey)
    • Automated analysis of collected data for deviations from industry and vendor best practices in information security
    • Deep operational survey to identify existing administration practices in the organization
    • Data review and extensive analysis by the engineer
    • Prepare and conduct Executive Summary presentation, provide the detailed technical report remediation plan
    • Knowledge transfer session during the engagement

Data Insights

  • «SQL Server Backup and Restore Strategy Design» (5 days)

    • Data collection using customized toolset (infrastructure configuration, performance, SLA/OLA requirements)
    • Alignment of Backup Strategy, Restore Strategy and SLA
    • Deployment of the simulation test environment
    • Disaster recovery drills for key disaster scenarios (object corruption, data loss, etc.)
    • Development of recommended backup and restore strategy (backup types and schedules based on business requirements and infrastructure capabilities)
    • Development of disaster recovery document (service passport, step-by-step recovery instructions for each scenario)
    • Customer documentation review (specifics of 3rd party backup software, IT administrator’s backup/restore instructions, etc.)
    • Measure and document backup and restore performance

    «SQL Infrastructure Assessment» (5 days)

    • Data collection using the customized toolset (configuration, event logs, XEvent traces, operational survey)
    • Automated analysis of collected data for deviations from industry and vendor best practices in information security
    • Deep operational survey to identify existing administration practices in the organization
    • Data review and extensive analysis by the engineer
    • Prepare and conduct Executive Summary presentation, provide the detailed technical report remediation plan
    • Knowledge transfer session during the engagement
  • «SQL Server Performance Review» (5 days)

    • Data collection using the customized toolset (configuration, event logs, XEvent traces, operational survey)
    • Review of collected data and extensive performance analysis (SQL/CPU/memory/IO/NUMA/Hyper-V/VMWare counters)
    • Storage stack validation (storport ETL, DSM, performance counters, etc.)
    • Collection and analysis of query traces to identify top queries, etc.
    • Prepare and conduct Executive Summary presentation, provide the detailed technical report remediation plan
    • Knowledge transfer session during the engagement

Extension packages

  • «Problem Remediation» Package (5+ days)

    Assistance in remediation of risks and problems identified earlier in an infrastructure Assessment. Includes development of a detailed problem remediation plan to minimize efforts, optimize required resources and minimize risks of a system downtime.

    Requires preliminary scoping based on the Assessment report.

    Outcomes:

    • Implementation of recommended improvements,
    • Change report,
    • Comparative Summary presentation of problems and risks before/after remediation.