[go: up one dir, main page]

0% found this document useful (0 votes)
29 views81 pages

Chapter 1 System Administration and Maintenance

The document provides an overview of system administration, detailing its definition, importance, roles, responsibilities, ethics, best practices, and tools used by system administrators. It emphasizes the need for regular maintenance to ensure system efficiency, security, and reliability while outlining the ethical principles that guide sysadmins in handling sensitive information. Additionally, it highlights the advantages and disadvantages of system administration, along with key best practices for effective management.

Uploaded by

Squall Lionheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views81 pages

Chapter 1 System Administration and Maintenance

The document provides an overview of system administration, detailing its definition, importance, roles, responsibilities, ethics, best practices, and tools used by system administrators. It emphasizes the need for regular maintenance to ensure system efficiency, security, and reliability while outlining the ethical principles that guide sysadmins in handling sensitive information. Additionally, it highlights the advantages and disadvantages of system administration, along with key best practices for effective management.

Uploaded by

Squall Lionheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

CHAPTER 1:

INTRODUCTION TO
SYSTEM
ADMINISTRATION
Topics

▪ What is System Administration and Maintenance?


▪ Role and Responsibilities of a System Administrator
▪ Ethics and Best Practices
▪ Tools and Documentation
1. WHAT IS SYSTEM
ADMINISTRATION AND
MAINTENANCE?
What is System Administration and Maintenance?

System administration refers to the management and maintenance of


computer systems and networks. It involves a range of tasks aimed at
ensuring that systems operate efficiently, securely, and reliably.

A system administrator (sysadmin) is an information technology


professional who supports a multiuser computing environment and
ensures continuous, optimal performance of IT services and support
systems.

System administrators—also known as sysadmins—are information


technology (IT) professionals who ensure an organization’s computer
systems function properly and meet business requirements.
Sysadmins support, troubleshoot, and maintain computer servers and
networks.
What is System Administration and Maintenance?

System Administration and Maintenance is the practice of managing,


configuring, and supporting computer systems, servers, and networks
to ensure they operate efficiently, securely, and reliably.
It involves installing and updating software, monitoring system
performance, troubleshooting issues, managing user accounts,
applying security patches, and performing regular backups.
Maintenance ensures systems remain up-to-date, protected from
vulnerabilities, and available for users.
Why is Maintenance Important?

Prevents Problems:
▪ Regular maintenance helps prevent major issues, system
slowdowns, and failures.

Improves Performance:
▪ It keeps systems running at their best, leading to higher efficiency
and productivity.

Ensures Security:
▪ Updates and patches address vulnerabilities, protecting systems
from threats and cyber-attacks.
Why is Maintenance Important?

Enhances Reliability:
▪ Systems become more dependable and stable, minimizing
downtime and disruptions.
Protects Data:
▪ Regular backups ensure that data can be recovered in the event
of a system failure or disaster.
What is System Administration and Maintenance?

Example:
A company’s IT administrator manages a web server that hosts the
company website. Their tasks include:

▪ Installing updates for the web server software (e.g., Apache or


Nginx).
▪ Monitoring server performance to ensure the site doesn’t crash
during high traffic.
▪ Applying security patches to protect against cyber-attacks.
▪ Backing up website data regularly so it can be restored in case of
failure.
This ensures the website stays online, secure, and efficient.
Advantages and Disadvantages

ADVANTAGES:
▪ Ensures System Reliability – Regular maintenance prevents
unexpected failures and keeps systems running smoothly.
Example: Scheduled server updates reduce downtime.

▪ Improved Security – Applying patches, updates, and monitoring


helps protect against malware, hackers, and vulnerabilities.

▪ Better Performance – Maintenance like clearing logs, optimizing


databases, or upgrading hardware/software improves speed and
efficiency.
Advantages and Disadvantages

ADVANTAGES:
▪ Data Protection – Backup and recovery plans prevent data loss
during system crashes or cyberattacks.

▪ Cost Efficiency – Proactive administration avoids expensive


emergency repairs and reduces downtime costs.

▪ User Support and Productivity – System administrators help users


resolve technical issues, allowing employees to work without
disruption.
Advantages and Disadvantages

DISADVANTAGES:
▪ High Cost of Resources – Requires skilled professionals, tools, and
sometimes expensive hardware/software upgrades.

▪ Time-Consuming – Regular monitoring, patching, and


troubleshooting take significant time and effort.

▪ Complexity – Large systems with many users and applications can


be difficult to manage and integrate.
Advantages and Disadvantages

DISADVANTAGES:
▪ Downtime During Maintenance – System updates or repairs may require
temporary shutdowns, affecting user access.

▪ Human Error Risk – Mistakes in configuration, updates, or backups can


cause major issues.

▪ Constant Need for Updates – Technology evolves quickly, requiring


continuous learning and adaptation by administrators.
2. ROLES AND RESPONSIBILITIES OF
A SYSTEM ADMINISTRATOR
System Administrator – Roles and Responsibilities

A system administrator plays a pivotal role in maintaining the health,


efficiency, and security of computer systems within an organization.
Their responsibilities are vast and varied, encompassing everything
from monitoring system performance to ensuring security measures
are up to date.
System Administrator – Roles and Responsibilities
Roles
1. Monitor System Performance
2. Perform Daily Security Backups and Restores
3. Security Audits and Monitoring
4. Technical Support
5. User Administration
6. Install and Configure Software and Hardware
7. Maintaining Networks and Network File Systems
8. Backup and Disaster Recovery
System Administrator – Roles and Responsibilities

Roles
9. Operating Systems
10. Create New Users
11. Database Administration
12. Monitoring Systems
13. Networking
14. Patching Firmware and Software
15. Secure Configuration
16. Security
System Administrator – Roles and Responsibilities

Roles
17. Troubleshoot Issues and Outages
18. Configure Internal Systems
19. Documentation
20. Maintain Internal Documentation Through Wiki
21. Maintaining System
22. Resetting User Passwords
23. Upgrading Systems
System Administrator – Roles and Responsibilities

Roles & Responsibilities


1. Monitor System Performance
▪ Regularly check system logs, CPU usage, memory usage, and
network performance to ensure optimal functioning.

▪ Identify potential issues before they escalate by analyzing


performance data and trends.

2. Perform Daily Security Backups and Restores


▪ Schedule and manage regular backups to prevent data loss.

▪ Ensure data integrity by periodically testing restore processes.


System Administrator – Roles and Responsibilities
Roles & Responsibilities
3. Security Audits and Monitoring
▪ Conduct regular security audits to identify vulnerabilities and
ensure compliance with security policies.

▪ Use monitoring tools to detect and respond to security breaches


and threats.

4. Technical Support
▪ Provide technical assistance to end-users for hardware, software,
and network-related issues.

▪ Troubleshoot and resolve system problems to minimize


downtime.
System Administrator – Roles and Responsibilities

Roles & Responsibilities


5. User Administration
▪ Manage user accounts, permissions, and access rights to ensure
appropriate access to resources.

▪ Create, modify, and delete user accounts as needed.

6. Install and Configure Software and Hardware


▪ Set up new hardware, including servers, workstations, and
peripheral devices.

▪ Install and configure operating systems, applications, and


software updates.
System Administrator – Roles and Responsibilities

Roles & Responsibilities


7. Maintaining Networks and Network File Systems
▪ Oversee the functionality of network components such as
routers, switches, and firewalls.

▪ Ensure network file systems are correctly configured and


accessible to authorized users.

8. Backup and Disaster Recovery


▪ Develop and implement backup strategies to safeguard critical
data.

▪ Create and maintain disaster recovery plans to ensure quick


recovery from data loss events.
System Administrator – Roles and Responsibilities
Roles & Responsibilities
9. Operating Systems
▪ Install, update, and maintain operating systems across all
devices.

▪ Optimize operating system performance and ensure compatibility


with applications.

10. Create New Users


▪ Onboard new employees by creating user accounts and assigning
necessary permissions.

▪ Ensure new users have access to the tools and resources


required for their roles.
System Administrator – Roles and Responsibilities
Roles & Responsibilities
11. Database Administration
▪ Manage database servers, ensuring data availability and security.

▪ Perform database backups, recovery, and regular maintenance


tasks.

12. Monitoring Systems


▪ Continuously monitor system health and performance using
automated tools.

▪ Address anomalies and performance bottlenecks promptly.


System Administrator – Roles and Responsibilities

Roles & Responsibilities


13. Networking
▪ Maintain network infrastructure to ensure reliable and secure
connectivity.
▪ Troubleshoot and resolve network issues to maintain uptime.

14. Patching Firmware and Software


▪ Regularly update firmware and software to protect against
vulnerabilities.
▪ Test and deploy patches to minimize disruption to users.
System Administrator – Roles and Responsibilities
Roles & Responsibilities
15. Secure Configuration
▪ Implement security best practices in system configurations to
protect against unauthorized access.
▪ Regularly review and update configurations to adapt to new
security threats.

16. Security
▪ Enforce security policies and procedures to safeguard information
assets.
▪ Use security tools and practices to detect, prevent, and respond
to security incidents.
System Administrator – Roles and Responsibilities
Roles & Responsibilities
17. Troubleshoot Issues and Outages
▪ Quickly diagnose and resolve system issues and outages to
minimize impact.
▪ Work with other IT professionals to address complex problems.

18. Configure Internal Systems


▪ Customize internal systems to meet organizational needs and
improve efficiency.
▪ Ensure systems are integrated and functioning cohesively.
System Administrator – Roles and Responsibilities

Roles & Responsibilities


19. Documentation
▪ Maintain comprehensive documentation of system configurations,
procedures, and changes.
▪ Use documentation to ensure continuity and facilitate
troubleshooting.

20. Maintain Internal Documentation Through Wiki


▪ Create and update internal wiki pages to document processes,
procedures, and best practices.
▪ Ensure documentation is accessible and useful for all team
members.
System Administrator – Roles and Responsibilities
Roles & Responsibilities
21. Maintaining System
▪ Perform regular maintenance tasks to keep systems running
smoothly.
▪ Update hardware and software as needed to prevent
obsolescence.

22. Resetting User Passwords


▪ Assist users with password resets to maintain access security.
▪ Implement password policies to enhance security.
System Administrator – Roles and Responsibilities

Roles & Responsibilities


23. Upgrading Systems
▪ Plan and execute system upgrades to improve performance and
functionality.

▪ Ensure compatibility and stability during and after upgrades.


ROLE RESPONSIBILITIES EXAMPLE
Install, configure, and maintain Installing Linux server updates
System
servers, operating systems, and and configuring Apache web
Management
applications server
Updating Windows Server
Security Apply patches, manage firewalls,
security patches to prevent
Management antivirus, and access controls
ransomware
Adding new employees to the
User Create, manage, and delete user
company’s Active Directory
Management accounts, set permissions
system
Network
Monitor and maintain LAN/WAN, Setting up a secure VPN for
Administratio
VPN, and internet connections remote employees
n
ROLE RESPONSIBILITIES EXAMPLE
Schedule regular data backups Restoring a database after
Backup and
and restore systems after accidental deletion of student
Recovery
crashes records

Fixing email server issues when


Diagnose and fix hardware,
Troubleshooting staff cannot send/receive
software, or network issues
emails

Checking server logs to identify


Performance Monitor CPU, memory, storage,
high CPU usage and optimizing
Monitoring and optimize resources
services

Record system configurations, Creating a guide for employees


Documentation
policies, and procedures on password reset policies
3. ETHICS AND BEST PRACTICES
Ethics in System Administration

Ethics means following moral and professional guidelines


while handling IT systems and user data. Since system
administrators have access to sensitive information, they
must act responsibly.

Ethics in system administration and maintenance involves a


system of moral principles and professional standards that
guide a sysadmin's actions, focusing on protecting user
privacy, respecting data confidentiality, ensuring system
security, acting with honesty and integrity, and acting for the
public good by not harming systems or users.
Key Ethical Principles:

1. Confidentiality – Protect user data from unauthorized access.


2. Integrity – Ensure systems and data are accurate and not
tampered with.
3. Accountability – Take responsibility for actions and changes made
in systems.
4. Transparency – Inform users and management about system
policies and changes.
5. Respect for Privacy – Do not spy on user activity without legitimate
reason.
Example:
A system administrator in a university has access to students’
grades, personal information, and faculty emails.

An ethical administrator will:


▪ Protect Privacy – They will not read or disclose private emails or
student records unless it is officially required.
▪ Use Access Responsibly – They will only use their admin rights for
system maintenance, not for personal gain or spying.
▪ Maintain Integrity – They will apply updates and patches fairly
across all users, without favoritism.
▪ Respect Policies – They will follow the institution’s IT policies and
legal requirements (like data privacy laws).
Example:

A system administrator has access to all employees’ emails,


files, and system activity logs. One day, the admin notices a personal
email from an employee discussing private family matters.

▪ Ethical Action: The system administrator respects the employee’s


privacy, does not read further, and only checks technical details (like
email delivery logs) relevant to their job.
▪ Unethical Action: The administrator reads the entire email out of
curiosity or shares its contents with others.
Best Practices in System Administration

Best practices are professional standards that ensure systems remain


secure, efficient, and reliable.

System administration best practices involve security through least


privilege and regular updates, operational efficiency with automation
and documentation, robustness with backups and monitoring, and
adaptability with continuous learning and clear communication. Key
practices include implementing change management, using password
managers, auditing accounts, keeping systems lean by removing
unnecessary services, and establishing a standard naming convention
for servers and users.
Key Best Practices:

1. Regular Backups – Always back up data to prevent loss.

2. Patch Management – Apply security updates to systems promptly.

3. Strong Authentication – Enforce strong passwords and multi-factor


authentication (MFA).

4. Access Control – Give users the minimum required permissions


(principle of least privilege).
Key Best Practices:

5. Monitoring and Auditing – Track system performance and log user


activities.

6. Disaster Recovery Planning – Have a plan for restoring services


after system failure.

7. Documentation – Keep clear records of system configurations and


policies.
Example:
An IT company performs weekly backups of its customer
database and stores a copy in the cloud. During a hardware failure,
they quickly restore services using the backup, minimizing downtime.

▪ Regular Backups: Netflix runs automated backups of its AWS cloud


infrastructure daily and uses Chaos Monkey to randomly shut down
services. This forces engineers to ensure that backups and recovery
processes always work.

▪ Patch and Update Management: In 2017, the WannaCry ransomware


spread worldwide because many organizations had not patched
Windows systems. In contrast, Microsoft’s own IT infrastructure
avoided the attack since all servers were patched immediately upon
release.
Example:

▪ Monitoring and Logging: Facebook’s system admins use real-time


monitoring tools (like Scuba and internal dashboards) to detect
anomalies. If a server cluster goes down, admins are alerted within
seconds and can reroute traffic to prevent downtime.

▪ User Account and Access Control: Google enforces the BeyondCorp


security model internally, meaning no user or device is trusted by
default. Employees authenticate with multi-factor authentication
(MFA) and access is role-based.

▪ Documentation: NASA maintains extremely detailed IT


documentation, including system setup procedures, troubleshooting
guides, and change logs. This ensures astronauts and ground staff
can restore or reconfigure systems even during space missions.
Example:

▪ Automation of Repetitive Tasks: At Spotify, system administrators


use configuration management tools like Puppet and Ansible to
automatically deploy and update thousands of servers, ensuring
consistency across global data centers.

▪ Security Hardening: U.S. federal agencies follow the NIST


Cybersecurity Framework, which includes disabling unused services,
enforcing strong password policies, and logging all privileged
actions. This reduced insider threats and improved compliance.

▪ Capacity Planning: Amazon (AWS) uses predictive analytics to


forecast resource usage during Black Friday and automatically
scales infrastructure to handle billions of transactions without
service interruption.
Example:

▪ Disaster Recovery Planning: After Hurricane Sandy (2012), some


New York data centers went offline. Companies with disaster
recovery plans (like Salesforce) quickly failed over to backup sites in
other regions, while those without DR suffered days of downtime.

▪ Continuous Learning and Testing: Microsoft IT admins test new


security patches in a staging environment before rolling them to
production systems. This reduces the risk of downtime while
ensuring systems stay secure.
Ethics & Best Practices

Ethics - doing the right thing with


access and data.

Best practices - following


professional standards to keep
systems safe and reliable.
4. TOOLS AND DOCUMENTATION
Tools

Tools are software, utilities, or platforms that system


administrators use to manage, monitor, secure, and
automate IT systems.

They help simplify complex tasks, reduce human


error, and improve efficiency.
System Administrator Tools List

1. Network Monitoring and Management


2. Server Management and Automation
3. Security and Compliance
4. Backup and Disaster Recovery
5. Scripting and Command Line Tools
6. Collaboration and Documentation
System Administrator Tools List

1. Network Monitoring and Management

Network monitoring and management tools are


essential for ensuring the health and performance
of a company's network infrastructure. They
provide real-time insights into network traffic,
detect anomalies, and help in troubleshooting
connectivity issues, which are crucial for
maintaining system uptime and reliability.
Popular Tools

Nagios

An open-source tool that offers


comprehensive monitoring capabilities,
alerting System Administrators to network
issues, application problems, and server
outages.
Popular Tools

Zabbix

A versatile network monitoring solution that


supports various monitoring options,
including SNMP, with strong visualization
features for data analysis.
Popular Tools

SolarWinds Network Performance


Monitor

Designed for large networks, this tool


simplifies detection, diagnosis, and resolution
of network performance issues with user-
friendly dashboards and analytics.
System Administrator Tools List

2. Server Management and Automation

Server management and automation tools are vital


for handling the day-to-day operations of servers,
whether on-premises or in the cloud. They enable
System Administrators to deploy, configure, and
manage server environments efficiently, often
automating repetitive tasks to reduce the potential
for human error.
Popular Tools

Puppet

An IT automation tool that allows System


Administrators to manage infrastructure
throughout its lifecycle, from provisioning and
configuration to orchestration and reporting.
Popular Tools

Ansible

A simple yet powerful server automation


platform that uses playbooks to enable
scalable deployment and configuration
across the network.
Popular Tools

Chef

Provides a robust set of automation tools for


defining infrastructure as code, making the
process of managing servers and applications
more efficient and error-free.
System Administrator Tools List

3. Security and Compliance

Security and compliance tools are indispensable


for protecting IT infrastructure from threats and
ensuring adherence to industry regulations. These
tools assist in vulnerability assessment, patch
management, and compliance auditing, which are
critical for safeguarding sensitive data and
maintaining trust.
Popular Tools

Qualys

A cloud-based security and compliance solution


that provides automated scanning for
vulnerabilities and compliance issues across
networks and devices.
Popular Tools

Tenable Nessus

Widely recognized for its comprehensive


vulnerability scanning capabilities, helping
System Administrators identify and fix
potential security risks.
Popular Tools

AlienVault USM

An all-in-one platform that combines asset


discovery, vulnerability assessment, intrusion
detection, behavioral monitoring, and SIEM for
effective security management.
System Administrator Tools List

4. Backup and Disaster Recovery

Backup and disaster recovery tools are crucial for


data protection and business continuity. They
enable System Administrators to create secure
backups of critical data and systems, and to
restore operations quickly in the event of data loss
or a catastrophic failure.
Popular Tools

Veeam

Offers backup, recovery, and replication


features for virtual, physical, and cloud-based
servers, ensuring data is recoverable in case
of an emergency.
Popular Tools

Acronis True Image

A flexible backup solution that provides disk


imaging and cloud backup options to protect
data from hardware failure, malware, and
disasters.
Popular Tools

Veritas Backup Exec

A backup and recovery solution designed for


mixed environments, providing powerful and
flexible ways to protect data across different
platforms.
System Administrator Tools List

5. Scripting and Command Line Tools

Scripting and command line tools empower


System Administrators to automate tasks,
manage systems, and troubleshoot issues
efficiently. Mastery of these tools is essential
for scripting repetitive tasks, batch
processing, and direct system manipulation.
Popular Tools

PowerShell

A task automation and configuration


management framework from Microsoft,
consisting of a command-line shell and
associated scripting language.
Popular Tools

Bash

The default command processor for


Unix/Linux systems, Bash allows for powerful
scripting and command execution to manage
systems and automate tasks.
Popular Tools

Python

An increasingly popular high-level


programming language that is used for
scripting automation tasks, data
manipulation, and system management due
to its readability and versatility.
System Administrator Tools List

6. Collaboration and Documentation

Collaboration and documentation tools are


key for maintaining effective communication
within IT teams and across departments.
They help in sharing knowledge, tracking
changes, and ensuring that all team members
have access to up-to-date information.
Popular Tools

Confluence

A collaboration tool that allows System


Administrators to create, share, and
collaborate on technical documentation,
project plans, and more.
Popular Tools

Slack

A messaging platform that integrates with a


wide range of IT tools, enabling real-time
communication and collaboration among
system administration teams.
Popular Tools

Git

A distributed version control system that is


essential for tracking changes in source code,
scripts, and configuration files, facilitating
collaboration among multiple contributors.
Examples of Tools in System Administration

▪ Monitoring Tools: Nagios, Zabbix, Prometheus (track server


uptime, performance, alerts)
▪ Automation Tools: Ansible, Puppet, PowerShell scripts
(automate repetitive tasks like user creation or patching)
▪ Backup Tools: Veeam, Bacula, rsync (create and restore
backups)
▪ Security Tools: Wireshark, Snort, Fail2ban (detect
intrusions, analyze traffic, secure systems)
▪ Documentation Tools: Confluence, Wiki, Notion, GitHub
(store and share IT documentation)
Category Tool Examples Purpose

Operating System Linux (command-line tools), Configure and manage


Management Windows Admin Center OS

Monitor system health,


Nagios, Zabbix, SolarWinds,
Monitoring Tools CPU, memory, network
Grafana
traffic

Firewalls, Snort (IDS), Protect systems, analyze


Security Tools
Wireshark traffic, detect intrusions

Backup & Perform regular backups


Veeam, Acronis, Bacula
Recovery and restore data
Category Tool Examples Purpose

Configuration Automate deployment and


Ansible, Puppet, Chef
Management system configuration

Remote SSH (Linux), RDP (Windows), Access and manage


Administration TeamViewer systems remotely

User Manage users, groups, and


Active Directory, LDAP
Management authentication

Documentation/
Confluence, Notion, Record configurations,
Knowledge
MediaWiki procedures, policies
Sharing
Documentation for a System Administration

Documentation is the record of procedures,


configurations, policies, and troubleshooting steps
that system administrators maintain.

It ensures consistency, helps in training new staff,


speeds up problem-solving, and supports disaster
recovery.

Documentation ensures that IT operations are


consistent, transparent, and recoverable in case of
problems.
Types of Documentation in System Administration

▪ System Configuration Docs – server setup details, IP


addresses, OS versions, installed software
▪ Security Policies & Procedures – password policies, backup
schedules, security rules, encryption and multi-factor
authentication.
▪ Troubleshooting Guides – step-by-step fixes for common
problems
▪ Change Logs – history of updates, patches, and changes
made to systems
▪ Disaster Recovery Docs – instructions for restoring
systems after failure
Types of Documentation in System Administration

▪ Network Diagrams – Map of LAN, WAN, firewalls, routers,


and servers.
▪ Access Control Policies – Who can access which systems
and with what permissions.
▪ Backup & Recovery Procedures – Steps to restore data if
systems crash.
▪ Incident Logs – Records of outages, issues, and how they
were resolved.
▪ Change Management Records – Documentation of
updates, patches, and system changes.
Tools and Documentation

Tools - what admins use to get the


job done.

Documentation - the written record


of how things are done, configured,
and fixed.
Tools and Documentation Example

If a company’s email server crashes, the


SysAdmin can follow the documented
disaster recovery procedure to restore the
system using the last backup, reducing
downtime.
Thank You!

You might also like