Role Description :
Windows Hyper-V Management :
- 3- 8 years of Windows Admins Knowledge on resource management framework on Virtualization like creation of resource pools, adding the VMs into resource pools, MS Load balancing and Performance tuning on the infrastructure.
- Resource Creation, Modification & upgradations of VMs in Hyper-V management
- Hyper V / Windows Cluster Configuration, troubleshooting &Management
- Hyper V replication configuration troubleshooting and management
- Hyper V storage migrations and Storage knowledge ISCSI & FC
- Experience on Migration / Upgradation of Hyper V and AD 2012 to 2106 / 2019 Windows OS Platforms
- Windows NLB Configuration and NIC Teaming configuration, troubleshooting &Management
- Projects Scope design, Deployment, Migration and Transition to operations teams.
- Perform
- performance reports to plan for proper Capacity Planning on the infrastructure growth
- Monitoring servers for Security and Virus threats and prompt remediation
- Escalating cross functional issues to Microsoft / Dell / HP and coordinating with them to resolve the issues
- Resolving Priority 1 / 2 / 3 issues and ensures 100% SLA
- Analysing Event, Incident, Change & Problem tickets and providing status on daily and weekly status call
- Good problem-solving skills and work towards resolution and identify the Root-Cause
Active Directory Management :
Domain Administrators have to perform the duties associated with Schema and Enterprise administrators as identified below.
Schema Administrator
Maintains security and integrity of schemaEnterprise Administrator
Creation and management of the forestOverall security and reliability of the forestCreation and removal of domainsDomain Administrator
Creation and management of directory infrastructureIncludes FSMO roles, trusts, Kerberos KDCs, replication topology, etc.Creation of all top-level OU hierarchies with standard sub- s, groups, and appropriate security permissions. This includes adding the OU Admins to the Add Computers group, Group Policy Creator Owners group, and OU Admins mail list. It also includes setting appropriate permissions on the created objects and linking of default GPOs.Monitoring and reporting associated with the reliability and security of the domainUse the domain admin account only for actions that require the privilege level of this accountMonitoring changes to domain root and domain controllers OU to ensure unauthorized changes do not occurDay-to-day management of the domain controllersMonitoring connectivity, synchronization, replication, netlogon, time services, FSMO roles, schema, NTDS database partitions, DNS settings, SRV records, and trust relationshipsReview DC event and security logs and take corrective actionsMonitor and resolve security situations at all levels of the domain to ensure a stable and secure domainDomain Controller ManagementPhysical security of the domain controllers in IT Division space and oversite for all domain controllersBackups and restores on domain controllersFull disaster recovery plan and practice recovery of DCs and core Directory objectsPolicy monitoring and complianceApply and enforce standard naming conventions for objects in the domainComply with AD policies and standards as defined on the AD Web SiteMonitor compliance with AD policies and standards as defined on the AD Web Site, including Change Management,Communication and CoordinationArbitrate disputes between OU AdminsProvide OU Admins with assistance when requestedCoordination with the Cyber Security group to ensure the domain is secureComply with all Cyber Security group orders regarding emergency conditionsWork collectively with the OU administratorsSecure remote administration of the DCs and member servers managed by the Infrastructure GroupManage group policy at root of domain and for Domain Controllers OUManage the root Users and the root Computers OUsInstall and manage security reporting tools used to monitor changes to the Active DirectoryCoordinate and configure alarm distribution to OU Admins for OU-related eventsPlan and manage all migrations and upgrades related to the AD or the DCsOU Administrators :
Ensure overall security and integrity of their managed OU hierarchyUse the OU admin account only for actions that require the privilege level of this accountMonitoring changes to OU hierarchy to ensure unauthorized changes do not occurDelegation of authority to others for appropriate object administration in their OU hierarchyAccount managementCreation / deletion / management of objects, i.e. local user accounts, groups, workstations, servers, printers, etc. in their OU hierarchyRegularly perform housekeeping duties to keep their OU hierarchy clear of stale, unused, expired, and other no longer needed objectsProcess requests for access control authorized by data ownerProcess requests for group drive mappings via login scriptCreate new computer accounts and join to directory servicesThe OU administrator will designate which administrators have "account operator" access to the Windows user accounts for users in their department.These account operators will have privileges that let them make changes to a subset of attributes for the accounts in their OUThis subset of attributes includes Windows-centric information like home directory location, profile location, terminal server settings and other kinds of user data that isn’t replicated from the root of the domainGroup Policy Object (GPO) creation, troubleshooting, and managementPublishing resource objects from their OU hierarchy in the Active Directory as applicableManage Group Policy Object (GPO) links within their OU hierarchyCoordinate activities of Member Server ownersWork with server and / or data owners to set up permissions