IT Solutions System Admin Outsourcing

Why Outsource your internal IT administration?

Multiple experts each one with their own specialty replaces one in-house person
Though the same cost
Outsourcing – No Absenteeism. No Bonus, No Training No Workspace Though the same cost
24/7 call center with SLA commitment to solve any problem on time Though the same
The tranquility of knowing your network, E-mail, PC and other are up & running at 99.5%
Though the same cost.
The assurance of security, for your most valuable data and its backup Though the same cost

What’s in it for you?


Cut costs. Leverage our skills and investments in infrastructure. Use InsourceAsia and say goodbye to expenditures. And, as your business grows, you won’t need to worry about constantly enhancing your team’s IT skills. You can rely on our experts and engineers with the latest training available to you 24/7.


INSOURCEASIA delivers the mix of services you need for a secure, redundant IT environment to support your business-critical systems and applications on a daily basis.


INSOURCE ASIA lets you focus on your core business functions while we keep your networks, e-mail, applications, security, back-up systems and website at the highest functioning level. We make it easy and economical to maintain, protect, and optimise your data and infrastructure for maximum security and efficiency.

INSOURCE ASIA Cost Effective High Quality Solutions


add Optimize your current IT infrastructure
add Minimize downtime or servers/work stations/applications
add Regular backup
add Centralize your user database
add Provide delegation of administration
add Provide a flexible mechanism for managing enterprise objects and accounts
add Provide ease of administration of access control list
add Provide replication of the active directory file trees
add Improve security by minimizing access to only authorized users
add Optimize Internet connectivity and reduce costs
add Improve system availibility
add Excellent 24/7 customer service
Service name Task Silver Gold Platinum
Service Support Hours
Regular hours Monday –
Friday, 9:00
A.M. to 6:00
Monday –
Friday, 9:00
A.M. to 8:00
Week-end & Holidays Charged 9:00AM to 24×7
Response Time Based on SLA
Management & maintenance add add add
Backup add add add
Passwords Management add add add
Client Management add add add
LAN diagram add add add
Static or Dynamic Public IP address, Gateway address, DNS servers ,DHCP add add
Internet Provider management add
Firewall Configuration & Maintenance add add add
Firmware Updates add add add
Correct password configuration (i.e., strong password scheme) add add
DHCP disabled if applicable add add
Is DYNDNS being used (i.e., necessary if dynamic public IP)? This should reside on the rewall and not the server(s) or local machine. add add
Note Local Users and verify all others are denied access as expected add add
Allow internet access for all machines where
applicable for maintenance and Deny when
add add
Note if Remote Management (e.g. port :8080) is
configuration and research further if warranted
Verify all categories are being logged add
Review Log and note or address any irregularities add
Switches 2. Number of ports in use add add
3. Latest hardware installed add add
4. Current configuration saved add
Wireless Access
1. Make, model, serial number add add add
2. Standard(s) in use (i.e. 802.11a/b/g/n) add add add
3. SSID add add
4. Channel configuration add
5. Security/Encryption in use add
6. Current configuration saved add
7. User Name/Password are noted in CRM software add
8. Latest hardware installed add
9. Complete a thorough site survey noting any
neighboring WLAN’s
Patch Panel 1. Wiring appearance appropriate add add add
2. Labeled as required (i.e. A, B, etc.) add add add
3. Patch cord lengths appropriate add add add
Wall jacks accurately labeled (i.e. corresponds with the port number on patch panel) add add add
All devices labeled (i.e. modem, rewall, switch, etc.) add add add
Note other networked devices (i.e. x-Ray machine, printer, scanner, camera, digitizing pad, etc.). Networked devices can be discovered using a program such as Angy IP Scanner (understand all IP’s used and what isusing them) add add
Power cycle all devices to verify all work correctly after a power outage add
1 Delete old .zip files add add add
2 Delete .chk les, and switch the swap file add add add
3 Check browser history and cache files add add add
4 Data Backup add add add
5 Note version of Anti-Virus/Anti-Spyware software installed, verify such is running in real-time, and is currently up-to-date add add add
6 Install the latest Microsoft Updates add add
7 Note remote access software installed and in use add add
8 Note currently Scheduled Tasks and determine their appropriateness add add
9 Review Add/Remove programs, note any
problematic software (i.e. software which is a potential security risk)
add add
10 Inspect software which require updates/patches add add
11 Review the System Conguration Utility “Startup” items, research vague items add add
12 Run Microsoft’s Malicious Software Removal Tool add add
13 Administrator password conforms to suggested “strong password” scheme add add
14 Screensaver wait time is set accordingly and
congured to password protect on resume
add add
15 Add a Description for each of the Client Computers in the Server Management Console add add
16 Is folder redirection being employed, if not data being placed at risk add add
17 Verify specic Power Management is turned o (i.e. monitor, Ethernet, USB root hub) add add
18 Verify fan(s) are working (i.e. CPU, Case, Power Supply, etc.) add add
19 Ensure server and monitor are powered through at minimum a UPS, ideally a Power Conditioner & UPS add add
20 Inventory machine add add
21 Verify Microsoft’s Baseline Security Analyzer add add
22 Do a regular IP scan add add
23 Review the Event Viewer logs add add
24 Verify Diskeeper (if used) is installed or other defragmentation add add
25 Note Hard Drive utilization add add
26 Verify Disk Quotas are disabled if applicable add add
27 Review Monitoring and Reporting, congure as required (e.g. send email when system is restarted, etc.) add add
28 Licensing add add
29 Verify UserID/Password are noted in CRM software add add
30 Note if the latest version of DynDNS Updater is installed if applicable (unnecessary if client has a static IP) verify client is listed in the “Hosts (A) Records” at add add
31 Review the system “hosts” le
add add
32 Verify DNS servers with tools such as and
add add
33 Email server such as Exchange, Lotus Notes etc (need a better understanding of this service and its issues) add add
34 Blackberry or other WiFi connected mobile device verication and security checks add add
35 Restart machine(s) add add


Download this document

Add Comment