Network Credentials Sample Clauses

Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
AutoNDA by SimpleDocs
Network Credentials. Client will provide documentation of Network Credentials Xxxxx’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the AmplifyIT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following (if applicable): o Domain Administrator / Domain Server o Public Domain Record Information o Local Server o Local Workstations / Thin Client Administration o Active Directory o Azure/Azure AD o O365 Credentials o SSL Certificates o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o Antivirus Managed Console o Public DNS Portals o Portal Addresses o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this IdentifyIT Agreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. *This IdentifyIT Agreement is effective for services that begin on or after February 1, 2021. Any subsequent versions of this IdentifyIT Agreement will be made available at xxx.xxxxxxxx.xxx/xxxxx. SCHEDULE A - SCHEDULE OF PRODUCTS (To Be Delivered) SCHEDULE BINTENTIONALLY BLANK SCHEDULE C - INTENTIONALLY BLANK SCHEDULE D - PERFORMANCE SPECIFICATIONS PERFORMANCE SPECIFICATIONS FOR IDENTIFYIT PERFORMANCE SPECIFICATIONS FOR IDENTIFYIT Marco’s IdentifyIT Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology through quarterly assessments (“IdentifyIT Assessment”). The IdentifyIT Assessment includes Marco’s review of a limited set of risks in four areas to the extent described below and the provision of recommendations concerning those risks. Marco will gather information for the IdentifyIT Assessment as described in paragraphs 1 through 4, below, by conducting interviews with Client personnel and by deploying certain Software on Client’s Designated Equipment (as applicable). Client requests that Marco provide this Assessment and consents to the deployment of Software and Marco’s access to Client’s information technology and personnel, including Client Information and Access, needed to provide this Assessment. Marco will:
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Implementation. Network credentials include the following: • XXX Network Jacks with Internet Access • Outgoing Port 443 SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this CSAgreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. version: July 13, 2021 SCHEDULE A - SCHEDULE OF PRODUCTS (To Be Delivered) SCHEDULE BINTENTIONALLY BLANK SCHEDULE C - INTENTIONALLY BLANK SCHEDULE D - PERFORMANCE SPECIFICATIONS PERFORMANCE SPECIFICATIONS FOR CS Marco’s PSaaS Agreement consists of the Equipment and Installation Services, Subscription for Access Right to the Cloud Platform Services and Support Services described below.
Network Credentials. The City will provide Contractor with Network Credentials consisting of user IDs and passwords unique to each individual requiring Network access on behalf of the Contractor. Access rights will automatically expire one (1) year from the date of this Agreement. If this access is being granted for purposes of completing services for the City pursuant to a separate contract, then, this Agreement will expire at the completion of the contracted services, or upon termination of the contracted services, whichever occurs first. Services are being provided in accordance with City Secretary Contract No. _ . Services are being provided in accordance with City of Fort Worth Purchase Order No. _ . Services are being provided in accordance with the Agreement to which this Access Agreement is attached. No services are being provided pursuant to this Agreement.
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following: o Domain Administrator / Domain Server o Virtual Server—Vmware/VSphere o Azure/Azure AD o Firewall o Antivirus Managed Console SERVICES AND EQUIPMENT EXCLUSIONS Services required for the implementation beyond those described in this Threat Hunting Agreement, including any on- site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. Effective/version: Xxxxx 00, 0000 (Xx Xx Delivered) PERFORMANCE SPECIFICATIONS FOR THREAT HUNTING Marco’s Threat Hunting Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology environment through use of the Threat Hunting Tools described below. Marco will use the CrowdStrike Falcon Software and Perch Software and Equipment stated in the SOP (“Threat Hunting Tools”) to attempt to find evidence of the tactics, techniques, and procedures (TTP) commonly used by attackers to compromise information technology systems (“Threat Hunting” or “Services”). Following deployment of the Threat Hunting Tools as described below, Marco will notify Client of its findings and make recommendations about those findings. This Assessment is not designed or intended to replace a forensics investigation but may assist you in providing information to assist in such an investigation. Threat Hunting Tools CrowdStrike Falcon Software Marco will deploy CrowdStrike Falcon Software on servers and computers running Windows, MacOS, and Linux all of which must meet the Minimum Specifications described in paragraph 3 of the Threat Hunting Agreement. Perch Software and Sensor Marco will deploy Perch Sensor and Perch Security Information and Event Management Software on servers and computers running Windows, MacOS, and Linux all of which must meet the Minimum Specifications described in paragraph 3 of the Threat Hunting Agreement. The CrowdStrike Falcon Software and Perch Software and Sensor are referred to herein as “Threat Hunting Tools.” Threat Hunting Tools will be deployed remotely through automated methods. Perch sensor deployment may require onsite access for installation. Threat Hunting Tools remain in place for the period of the Subscription stated in the SOP. For Clients without an ac...
AutoNDA by SimpleDocs
Network Credentials. Client will provide documention of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers

Related to Network Credentials

  • Credentials The names and credentials of the individuals who: (1) designed the statistical sampling procedures and the review methodology utilized for the Claims Review and (2) performed the Claims Review.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition.

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent.

  • Training a. The employer, in consultation with the local, shall be responsible for developing and implementing an ongoing harassment and sexual harassment awareness program for all employees. Where a program currently exists and meets the criteria listed in this agreement, such a program shall be deemed to satisfy the provisions of this article. This awareness program shall initially be for all employees and shall be scheduled at least once annually for all new employees to attend.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Support Services HP’s support services will be described in the applicable Supporting Material, which will cover the description of HP’s offering, eligibility requirements, service limitations and Customer responsibilities, as well as the Customer systems supported.

  • Interoperability You may use your Transponder on any other California toll facility that allows payment of tolls via FasTrak. To make such use as seamless as possible, OCTA shares, among other things, Transponder identification numbers, account numbers, and the license plate numbers of vehicles listed on valid Accounts with the other toll facility operators in California. When you use your Transponder on another toll facility, the operator of that other toll facility will send us information about your transaction so that we can include the transaction on your Account statement. The information sent to us includes, but is not limited to, your Transponder identification number, your account number, your license plate number, the toll amount and/or other charges, and the date, time and location of the toll transaction. If you use your Transponder on another toll facility that accepts FasTrak as a method of payment, you agree that we may charge you for any tolls, fines and/or other charges arising from such use, and that you will be responsible to us or the other toll facility operator for such tolls and/or other charges. Tolls and other charges owed in this manner will be charged to your Account in accordance with rules, regulations and procedures of the facility on which the transaction was recorded. You agree that we may provide the other toll facility operator with any information contained in this Agreement or any other information associated with your Account for purposes of collecting tolls, fines and/or other charges, and that other toll facility operators may provide us with details of your usage of their facilities so that toll transactions can be included on your Account statement. If you fail to maintain your Account in good standing or to update your vehicle license plate(s) with us, you will be subject to toll evasion penalties and other charges as established by the other toll facilities you use.

  • Training Services Training Services may include pre-packaged training Products, and/or the development or customization of training programs as requested, including Live Training, Computer Based/Multi-Media Training which encompasses Internet-Delivered Training, and/or Video Based Training.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!