Solved

Tier level Support (Security Model)?

Posted on 2010-11-10
2
355 Views
Last Modified: 2012-05-10
The Business I work for has now hired several people we are trying to start a tier level support Tier one two and so on. I am trying to present to staff how to accomplish this and am having trouble figuring out what each tier's responsibilities are and am looking for any guidance in this area you can give. I know this is a very vague question but I just need ideas. I am thinking about even the training side of it and proposing that each person pursue certification according to there levels. This should provide individual growth and something for each IT individual to strive for. Problem is I am having troiuble putting my thoughts into words and showing what each individual would be able to access and so on. any help in this is much appreciated should be some easy points for you.
0
Comment
Question by:FCCAdmin
2 Comments
 
LVL 4

Assisted Solution

by:zgiuffria
zgiuffria earned 50 total points
ID: 34104588
Maybe use spice works and a good rule of thumb is for tier 1 to not spend more then 10 or so min on the call.  If it takes longer then send to tier 2.
0
 
LVL 57

Accepted Solution

by:
Mike Kline earned 450 total points
ID: 34105084
Start with the AD Delegation Whitepaper  
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=631747a3-79e1-48fa-9730-dae7c0a1d6d3
Tier 1 would be those that unlock accounts, reset passwords, add computers to the domain, lower level stufff
Tier 2 would be those that can fully manage groups, users, and computers (not admin groups though).  Maybe they are also local admins on the workstations in the organization too.
Tier 3 would be your domain admins - very few of them hopefully
In terms of Microsoft certs
Tier 1 - MCTS
Tier 2 - MCITP - Server Admin
Tier 3 MCITP - Enterprise Admin
....I really hate to tie certs to job functions though.  Certs are one small piece but can help people strive to want to learn more.
Thanks
Mike
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Security Solution 7 44
Suggestions on remote printing. 3 29
Run Secure WMI query from CentOS 5 26
Existing Office 365 implement on-premise AD 4 36
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question