SlideShare a Scribd company logo
1 of 2
Download to read offline
STANDARD OPERATING
PROCEDURE
DEPARTMENT : " IT Department"
PROCEDURE NO: none REVISION : 1/2014
EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 2
TITLE : Creating Log-in ID to access the Server/Network Resources
PURPOSE/ SCOPE
To describe Create log-in id for Users at Laptop and Desktop to access the Server as well as Network Resources within Active
directory.
RESPONSIBILITY
1. IT Head is responsible to approve this Log-in id.
2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure.
MATERIALS AND EQUIPMENT
1. Desktop or Laptop and Server
FREQUENCY
1. When needed.
PROCEDURES
1. IT Requisition form from signed by Department Head and HR owner and submit to IT dept.
2. IT Head will check the form whether all necessary details are fill in the form or not.
3. Form will sent to data network IT Service Engineer/ Data center team / IT help desk team of
IT Dept.
4. IT Service Engineer/ Data center team / IT help desk team will create the login id in server and
respectively security right is given for central Data and network security purpose.
5. They will generate the login id and password.
6. IT Service Engineer/ Data center team / IT help desk team will intimate the IT Head as well as
respective department about the login id and password in turn responsible for configuration
of login id in system.
7. After the completion of job IT Requisition Form will be signed by user and submitted to IT
Dept.
PREPAID BY:
"IN CHARGE IT"
CHECKED BY:
"HEAD IT"
APPROVED BY:
"HEAD QA"
"Signature"

More Related Content

Similar to Creating log in id to access the server

Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document LJ PROJECTS
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Reinier Eiman
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYITLokesh Singrol
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010ShivanchalSingh
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT DepartmentAhmad Suhendro
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srsBek5042
 
Contents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxContents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxmercylittle80626
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemdharm18
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).docMadihaKhalid43
 
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxDocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxjacksnathalie
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IT Risk Assessment Tool
IT Risk Assessment ToolIT Risk Assessment Tool
IT Risk Assessment ToolKevinM48
 
System design document visa
System design document visaSystem design document visa
System design document visaShaily Dubey
 

Similar to Creating log in id to access the server (20)

Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 
Report final
Report finalReport final
Report final
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010
 
IT Documents for IT Department
IT Documents for IT DepartmentIT Documents for IT Department
IT Documents for IT Department
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srs
 
Contents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docxContents1Scenario. 12Requirements23Design an.docx
Contents1Scenario. 12Requirements23Design an.docx
 
IT Department
IT DepartmentIT Department
IT Department
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docxDocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
DocID HelpDesk SLA, Employees (10-SP08).doc Page 1 of 5 R.docx
 
Aditya_2015
Aditya_2015Aditya_2015
Aditya_2015
 
PDD Template.docx
PDD Template.docxPDD Template.docx
PDD Template.docx
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IT Risk Assessment Tool
IT Risk Assessment ToolIT Risk Assessment Tool
IT Risk Assessment Tool
 
Plan training session
Plan training sessionPlan training session
Plan training session
 
Online help desk
Online help deskOnline help desk
Online help desk
 
ServiceDesk Plus Employee Onboarding
ServiceDesk Plus Employee OnboardingServiceDesk Plus Employee Onboarding
ServiceDesk Plus Employee Onboarding
 
System design document visa
System design document visaSystem design document visa
System design document visa
 

More from Danai Thongsin

สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อDanai Thongsin
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgementDanai Thongsin
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedureDanai Thongsin
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284Danai Thongsin
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อDanai Thongsin
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านDanai Thongsin
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจDanai Thongsin
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยวDanai Thongsin
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์Danai Thongsin
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานDanai Thongsin
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance payDanai Thongsin
 

More from Danai Thongsin (20)

3CX Powerful APP
3CX Powerful APP3CX Powerful APP
3CX Powerful APP
 
3cx interface
3cx interface3cx interface
3cx interface
 
สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อ
 
DNSSystemServicesLTD
DNSSystemServicesLTDDNSSystemServicesLTD
DNSSystemServicesLTD
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgement
 
social media policy
social media policysocial media policy
social media policy
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedure
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284
 
Cctv
CctvCctv
Cctv
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อ
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจ
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยว
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
 
ระเบียบ
ระเบียบระเบียบ
ระเบียบ
 
It samui club letter
It samui club   letterIt samui club   letter
It samui club letter
 
Rights and duty
Rights and dutyRights and duty
Rights and duty
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงาน
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance pay
 
Internet system plan
Internet system planInternet system plan
Internet system plan
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Creating log in id to access the server

  • 1. STANDARD OPERATING PROCEDURE DEPARTMENT : " IT Department" PROCEDURE NO: none REVISION : 1/2014 EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 2 TITLE : Creating Log-in ID to access the Server/Network Resources PURPOSE/ SCOPE To describe Create log-in id for Users at Laptop and Desktop to access the Server as well as Network Resources within Active directory. RESPONSIBILITY 1. IT Head is responsible to approve this Log-in id. 2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure. MATERIALS AND EQUIPMENT 1. Desktop or Laptop and Server FREQUENCY 1. When needed. PROCEDURES 1. IT Requisition form from signed by Department Head and HR owner and submit to IT dept. 2. IT Head will check the form whether all necessary details are fill in the form or not. 3. Form will sent to data network IT Service Engineer/ Data center team / IT help desk team of IT Dept. 4. IT Service Engineer/ Data center team / IT help desk team will create the login id in server and respectively security right is given for central Data and network security purpose. 5. They will generate the login id and password. 6. IT Service Engineer/ Data center team / IT help desk team will intimate the IT Head as well as respective department about the login id and password in turn responsible for configuration of login id in system. 7. After the completion of job IT Requisition Form will be signed by user and submitted to IT Dept.
  • 2. PREPAID BY: "IN CHARGE IT" CHECKED BY: "HEAD IT" APPROVED BY: "HEAD QA" "Signature"