Network Credentials Sample Clauses

The Network Credentials clause defines the rules and responsibilities regarding the provision, use, and protection of login information, passwords, or other access credentials for a network or system. Typically, this clause outlines who is authorized to receive such credentials, the security measures required to safeguard them, and the consequences of unauthorized sharing or misuse. Its core practical function is to ensure the security and integrity of networked systems by clearly allocating responsibility for credential management and reducing the risk of unauthorized access.
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials ▇▇▇▇▇’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the AmplifyIT Services implementation. Network Credentials include the following (if applicable):
Network Credentials. Client will provide documentation of network credentials ▇▇▇▇▇’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following: o Domain Administrator / Domain Server o Virtual Server—Vmware/VSphere o Azure/Azure AD o Firewall o Antivirus Managed Console Services required for the implementation beyond those described in this Threat Hunting Agreement, including any on-site work, ▇▇▇▇▇ Support Desk assistance, or other work is billed at ▇▇▇▇▇’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. Effective/version: March 12, 2021 (To Be Delivered) ▇▇▇▇▇’s Threat Hunting Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology environment through use of the Threat Hunting Tools described below. ▇▇▇▇▇ will use the CrowdStrike Falcon Software and Perch Software and Equipment stated in the SOP (“Threat Hunting Tools") to attempt to find evidence of the tactics, techniques, and procedures (TTP) commonly used by attackers to compromise information technology systems (“Threat Hunting” or “Services”). Following deployment of the Threat Hunting Tools as described below, ▇▇▇▇▇ will notify Client of its findings and make recommendations about those findings. This Assessment is not designed or intended to replace a forensics investigation but may assist you in providing information to assist in such an investigation . The CrowdStrike Falcon Software and Perch Software and Sensor are referred to herein as “Threat Hunting Tools.” Threat Hunting Tools will be deployed remotely through automated methods. Perch sensor deployment may require onsite access for installation. Threat Hunting Tools remain in place for the period of the Subscription stated in the SOP. For Clients without an active Marco Managed IT Agreement, ▇▇▇▇▇ will monitor the deployed Threat Hunting Tools for up to sixty (60) days and will notify Client of Marco findings during that period. See the Subscription terms for any additional services provided by CrowdStrike and/or Perch during the Subscription Term. If Client has an active Managed IT Agreement with ▇▇▇▇▇, ▇▇▇▇▇ alerts will follow ▇▇▇▇▇’s standard Service Level Targets and Priority Standards. ▇▇▇▇▇’s monitoring and notification Services will be performed during ▇▇▇▇▇’s regular business hours. Subscription Terms Client understands and agrees that its Subscription is governed by...
Network Credentials. Client will provide documention of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following (if applicable): o Domain Administrator / Domain Server o Public Domain Record Information o Local Server o Local Workstations / Thin Client Administration o Active Directory o Azure/Azure AD o O365 Credentials o SSL Certificates o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o Antivirus Managed Console o Public DNS Portals o Portal Addresses o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers Services required for the implementation beyond those described in this IdentifyIT Agreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. *This IdentifyIT Agreement is effective for services that begin on or after February 1, 2021. Any subsequent versions of this IdentifyIT Agreement will be made available at ▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇. (To Be Delivered) Marco’s IdentifyIT Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology through quarterly assessments (“IdentifyIT Assessment”). The IdentifyIT Assessment includes Marco’s review of a limited set of risks in four areas to the extent described below and the provision of recommendations concerning those risks. Marco will gather information for the IdentifyIT Assessment as described in paragraphs 1 through 4, below, by conducting interviews with Client personnel and by deploying certain Software on Client’s Designated Equipment (as applicable). Client requests that Marco provide this Assessment and consents to the deployment of Software and Marco’s access to Client’s information technology and personnel, including Client Information and Access, needed to provide this Assessment. Marco will: 1. Conduct an email phishing campaign designed to identify the security awareness maturity of Client’s active directory users;
Network Credentials. The City will provide Contractor with Network Credentials consisting of user IDs and passwords unique to each individual requiring Network access on behalf of the Contractor. Access rights will automatically expire one (1) year from the date of this Agreement. If this access is being granted for purposes of completing services for the City pursuant to a separate contract, then, this Agreement will expire at the completion of the contracted services, or upon termination of the contracted services, whichever occurs first. Services are being provided in accordance with City Secretary Contract No. _ . Services are being provided in accordance with City of Fort Worth Purchase Order No. _ . Services are being provided in accordance with the Agreement to which this Access Agreement is attached. No services are being provided pursuant to this Agreement.
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Implementation. Network credentials include the following: • ▇▇▇ Network Jacks with Internet Access • Outgoing Port 443 Services required for the implementation beyond those described in this CSAgreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. version: July 13, 2021 (To Be Delivered) Marco’s PSaaS Agreement consists of the Equipment and Installation Services, Subscription for Access Right to the Cloud Platform Services and Support Services described below.