Solved

naming convention

Posted on 2008-10-28
4
527 Views
Last Modified: 2011-02-17
Looking for best practices on computer naming conventions for large organization
0
Comment
Question by:ssource
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Andres Perales earned 63 total points
Comment Utility
This varies from organization to organization and left to what is best for your enviroment, but I have used below format for years
Company Intials + Device Type + Department Name + sequence number
so a
Workstation at Microsoft in the IT dept would be

MSFTWKIT001
MSFTWKIT002
MSFTWKIT003
for a server we would use a role name instead

MSFTSRVWEB01
MSFTSRVSQL01

for a router

MSFTRTR01

something along those lines.
0
 
LVL 11

Assisted Solution

by:TreyH
TreyH earned 62 total points
Comment Utility
We use codes for each department combined with our own set of codes for network devices. The machine name is a combination of each.

Dept code examples:
EMS      Emergency Medical Services
E911      County 911 Center
FIRE      County Fire Dept
SHRF      Sheriff's Department
TD            Technology Dept
etc ...

Device code examples:
SV Servers
WS Workstations
NB Notebook (Laptops)
PR Printers
PS Print Servers
TS Terminal Servers
TC Thin Client
SW Switch
HB Hub
RT Router
PPC Pocket PC
TB  Tablet PC
WAP Wireless Access Point
WRT Wireless Router
NAT Network Address Translation Router
MF  Multifunction Devices (Printer/Scanner/Fax)
SCN      Network Scanners
NUSB Network USB Hubs
TS Temperature Sensors
HS Humidity Sensors
CAM Cameras
DVR Digital Video Recorder
NVR Network Video Recorder

So our two domain controllers are named:
TD-SV-DC01
TD-SV-DC02
A file server for the 911 Center would be:
E911-SV-FS01
Workstations at the Sheriff's Office would be:
SHRF-WS-RECPT01
SHRF-WS-RECPT02
SHRF-WS-WRNT01

The naming convention works nice when sorting through AD containers.
0
 
LVL 17

Expert Comment

by:Andres Perales
Comment Utility
Trey,
we have a long list as well, I just did not want to put it out there for security reasons, another reason I used examples not related to our organization....but you layout looks good!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Occasionally you run into the website or two that will not resolve properly using your own DNS servers.  Some people simply set up global forwarders for their DNS server.  I don’t recommend doing this because it can cause problems resolving addresse…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now