Network Credentials Sample Clauses

Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
AutoNDA by SimpleDocs
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the AmplifyIT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers
Network Credentials. Client will provide documentation of Network Credentials Xxxxx’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following (if applicable): o Domain Administrator / Domain Server o Public Domain Record Information o Local Server o Local Workstations / Thin Client Administration o Active Directory o Azure/Azure AD o O365 Credentials o SSL Certificates o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o Antivirus Managed Console o Public DNS Portals o Portal Addresses o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this IdentifyIT Agreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. *This IdentifyIT Agreement is effective for services that begin on or after February 1, 2021. Any subsequent versions of this IdentifyIT Agreement will be made available at xxx.xxxxxxxx.xxx/xxxxx. SCHEDULE A - SCHEDULE OF PRODUCTS (To Be Delivered) SCHEDULE BINTENTIONALLY BLANK SCHEDULE C - INTENTIONALLY BLANK SCHEDULE D - PERFORMANCE SPECIFICATIONS PERFORMANCE SPECIFICATIONS FOR IDENTIFYIT PERFORMANCE SPECIFICATIONS FOR IDENTIFYIT Marco’s IdentifyIT Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology through quarterly assessments (“IdentifyIT Assessment”). The IdentifyIT Assessment includes Marco’s review of a limited set of risks in four areas to the extent described below and the provision of recommendations concerning those risks. Marco will gather information for the IdentifyIT Assessment as described in paragraphs 1 through 4, below, by conducting interviews with Client personnel and by deploying certain Software on Client’s Designated Equipment (as applicable). Client requests that Marco provide this Assessment and consents to the deployment of Software and Marco’s access to Client’s information technology and personnel, including Client Information and Access, needed to provide this Assessment. Marco will:
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Implementation. Network credentials include the following: • XXX Network Jacks with Internet Access • Outgoing Port 443 SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this CSAgreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. version: July 13, 2021 SCHEDULE A - SCHEDULE OF PRODUCTS (To Be Delivered) SCHEDULE BINTENTIONALLY BLANK SCHEDULE C - INTENTIONALLY BLANK SCHEDULE D - PERFORMANCE SPECIFICATIONS PERFORMANCE SPECIFICATIONS FOR CS Marco’s PSaaS Agreement consists of the Equipment and Installation Services, Subscription for Access Right to the Cloud Platform Services and Support Services described below.
Network Credentials. The City will provide Contractor with Network Credentials consisting of user IDs and passwords unique to each individual requiring Network access on behalf of the Contractor. Access rights will automatically expire one (1) year from the date of this Agreement. If this access is being granted for purposes of completing services for the City pursuant to a separate contract, then, this Agreement will expire at the completion of the contracted services, or upon termination of the contracted services, whichever occurs first. Services are being provided in accordance with City Secretary Contract No. _ . Services are being provided in accordance with City of Fort Worth Purchase Order No. _ . Services are being provided in accordance with the Agreement to which this Access Agreement is attached. No services are being provided pursuant to this Agreement.
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following: o Domain Administrator / Domain Server o Virtual Server—Vmware/VSphere o Azure/Azure AD o Firewall o Antivirus Managed Console SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this Threat Hunting Agreement, including any on- site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. Effective/version: Xxxxx 00, 0000 (Xx Xx Delivered) PERFORMANCE SPECIFICATIONS FOR THREAT HUNTING Marco’s Threat Hunting Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology environment through use of the Threat Hunting Tools described below. Marco will use the CrowdStrike Falcon Software and Perch Software and Equipment stated in the SOP (“Threat Hunting Tools”) to attempt to find evidence of the tactics, techniques, and procedures (TTP) commonly used by attackers to compromise information technology systems (“Threat Hunting” or “Services”). Following deployment of the Threat Hunting Tools as described below, Marco will notify Client of its findings and make recommendations about those findings. This Assessment is not designed or intended to replace a forensics investigation but may assist you in providing information to assist in such an investigation. Threat Hunting Tools CrowdStrike Falcon Software Marco will deploy CrowdStrike Falcon Software on servers and computers running Windows, MacOS, and Linux all of which must meet the Minimum Specifications described in paragraph 3 of the Threat Hunting Agreement. Perch Software and Sensor Marco will deploy Perch Sensor and Perch Security Information and Event Management Software on servers and computers running Windows, MacOS, and Linux all of which must meet the Minimum Specifications described in paragraph 3 of the Threat Hunting Agreement. The CrowdStrike Falcon Software and Perch Software and Sensor are referred to herein as “Threat Hunting Tools.” Threat Hunting Tools will be deployed remotely through automated methods. Perch sensor deployment may require onsite access for installation. Threat Hunting Tools remain in place for the period of the Subscription stated in the SOP. For Clients without an ac...
AutoNDA by SimpleDocs
Network Credentials. Client will provide documention of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers

Related to Network Credentials

  • Credentials The names and credentials of the individuals who: (1) designed the statistical sampling procedures and the review methodology utilized for the Claims Review and (2) performed the Claims Review.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition.

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Training a. The employer, in consultation with the local, shall be responsible for developing and implementing an ongoing harassment and sexual harassment awareness program for all employees. Where a program currently exists and meets the criteria listed in this agreement, such a program shall be deemed to satisfy the provisions of this article. This awareness program shall initially be for all employees and shall be scheduled at least once annually for all new employees to attend.

  • Credential One point for proper credential authorization to teach the subject.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Support Services HP’s support services will be described in the applicable Supporting Material, which will cover the description of HP’s offering, eligibility requirements, service limitations and Customer responsibilities, as well as the Customer systems supported.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Training Services Training Services may include pre-packaged training Products, and/or the development or customization of training programs as requested, including Live Training, Computer Based/Multi-Media Training which encompasses Internet-Delivered Training, and/or Video Based Training.

Time is Money Join Law Insider Premium to draft better contracts faster.