Introduction to Computer Administration

Effective computer management within the EmpowerID system is crucial for maintaining security, compliance, and operational efficiency. This guide provides detailed instructions for system administrators and IT professionals on managing the entire lifecycle of computers in the network.

Purpose of Computer Administration

Computer administration encompasses overseeing computers, from onboarding new machines to configuring access permissions and performing essential maintenance tasks. Proper management ensures that computers are:

  • Secure: Protected against unauthorized access and vulnerabilities.

  • Accessible: Available to authorized users when needed.

  • Compliant: Adherent to organizational policies and regulatory requirements.

Understanding and applying the concepts and procedures detailed here will help maintain a robust and secure computing environment that aligns with organizational needs.

Key Areas Covered

The content is organized to guide administrators through various aspects of computer management:

1. Access Management

  • Access Needed to Manage Computers: Outlines the necessary permissions and roles within EmpowerID.

  • Grant Access to Manage Specific Computers: Explains how to assign management rights to users or groups.

  • IAM Shop Permission Levels:

    • Understanding IAM Shop Permission Levels: Describes available permission levels.

    • Assign IAM Shop Permission Levels to Computers: Instructions on applying permission levels.

  • Configure Computers for Just-In-Time Access: Details setting up temporary elevated permissions.

  • Configure Eligibility for Computers: Defines criteria for user eligibility to access computers.

2. Computer Onboarding and Configuration

  • Onboard Computers: Step-by-step process for adding new computers to EmpowerID.

  • Assign Computers to Locations: Guidance on organizing computers by location.

3. Computer Management Actions

  • Move Computers: How to relocate computers within organizational units.

  • Reset Computer Passwords: Procedures to maintain security through password resets.

  • Enable and Disable Computers: Managing computer availability.

  • Delete Computers: Safely removing computers from the system.

  • Restore Deleted Computers: Recovering computers that need to be reinstated.

Importance of Computer Administration

Effective computer administration is essential for:

  • Enhancing Security: Protecting data and systems from unauthorized access.

  • Improving Operational Efficiency: Streamlining tasks to reduce overhead and errors.

  • Ensuring Regulatory Compliance: Adhering to industry standards and legal requirements.

  • Boosting User Productivity: Providing reliable access to necessary resources.

Applying the best practices and procedures outlined here contributes to a secure and efficient IT environment that supports organizational objectives.

Getting Started

Before proceeding:

  • Verify Permissions: Ensure your user account has the roles and permissions outlined in the Access Management section.

Starting with the Access Management topics helps establish the foundational permissions required for subsequent tasks. Each topic builds upon the previous ones, providing a comprehensive understanding of computer administration within EmpowerID.

Note: For additional information on related topics such as Privileged Access Management or Privileged Session Management, refer to the corresponding sections in this guide. Cross-references are provided to assist in navigating between interconnected subjects.

Â