top of page
html-css-collage-concept-with-person (1).jpg

Ad Hoc Maintenance Services

In an ad hoc maintenance service, maintenance tasks and repairs are conducted in response to specific issues, failures, or urgent situations that require immediate attention

(File Sharing & Data backup and redundancy)

Manage folders access rights & Policy

Managing folders access rights and policies in a Network Attached Storage (NAS) system involves controlling and configuring the permissions and security settings for individual folders or shared directories within the NAS. Here's a closer look at the key components of managing folder access rights and policies in a NAS

  • User and Group Permissions

    • NAS systems typically support user and group-based access control. Administrators can create user accounts and assign them to specific groups, then set access permissions for these groups or individual users. This simplifies the management of access rights by controlling access based on predefined user roles.​

  • Read, Write, Execute Permissions​

    • The most common access rights are Read, Write, and Execute (or Read, Write, and Modify) permissions. Read allows users to view and copy files, Write enables them to add or modify files, and execute grants the ability to run scripts or execute programs stored in the folder.

  • Share-level and Folder-level Access

    • NAS systems allow access control at both the share level and folder level. Share-level access controls apply to all folders within a shared directory, while folder-level access controls provide more granular control over specific folders​

  • Access Control Lists (ACLs)​

    • NAS devices support Access Control Lists, which offer more fine-grained control over permissions. ACLs allow administrators to set individual access rights for multiple users or groups on a single folder​

Manage User Policy

Managing user policy in a Network Attached Storage (NAS) involves defining and controlling the permissions and access rights of individual users or groups to access the NAS resources. Here are the key aspects involved in managing user policy in a NAS

  • User Authentication

    • The first step is to establish a user authentication mechanism, such as username and password or integrating with an existing directory service like Active Directory or LDAP. This ensures that only authorized users can access the NAS resources.

  • User Account Creation

    • Administrators create user accounts on the NAS, assigning a unique username and password to each user. Alternatively, the NAS can be integrated with an existing user management system for seamless user account creation.

  • Share-level and Folder-level Access

    • Administrators can define access control at both the share level and folder level. Sharelevel access controls apply to all folders within a shared directory, while folder-level access controls provide more specific access control over individual folders

  • Read, Write, Execute Permissions

    • Administrators can assign read, write, and execute (or modify) permissions to users and groups to determine their actions on files and folders within the NAS.

Onboarding of New Staff

Onboarding new staff in a Network Attached Storage (NAS) system refers to the process of introducing and integrating new employees into the organization's NAS environment. This process ensures that the new staff members have the necessary access and permission to use the NAS resources and perform their job responsibilities effectively.

Onboarding typically involves the following steps

  • User Account Creation

    • Create user accounts for the new staff members on the NAS. This involves setting up unique usernames and passwords for each user.

  • Access Permissions

    • Based on the roles and responsibilities of the new employees, access permissions are configured on the NAS. Administrators define what folders, files, and shared resources each user should be able to access.

  • Group Membership

    • Users may be assigned to specific groups based on their job functions. Group membership allows for easier management of permissions by applying access controls

Offboarding of Employees

It is a crucial step in maintaining data security and preventing unauthorized access to sensitive information after an employee leaves the company.

Offboarding typically involves the following steps

  • User Account Deactivation

    • When an employee leaves the organization, their user account on the NAS is deactivated. This means that the account is no longer active, and the employee cannot log in or access the NAS resources.

  • Data Transfer or Archiving

    • Depending on the organization's policies, the departing employee's data stored on the NAS may be transferred to another employee or archived for future reference.

  • Data Deletion

    • The departing employee's data may need to be deleted from the NAS, especially if the data is no longer required or if it contains sensitive information

  • Backup

    • It is essential to retain data backups for a certain period after offboarding an employee. This ensures that data can be recovered if needed for business purposes or compliance reasons.

Troubleshoot NAS Issues

  • Review System Logs

    • Look for any error messages or warnings that may indicate the source of the issue.

  • Check Storage Health

    • Look for any failed or degraded drives

  • Verify RAID Status

    • Check the RAID status to ensure that the array is operating correctly, and data redundancy is maintained.

  • Perform Disk Check

    • Run a disk check (File System Check) on the NAS drives to identify and repair file system issues.

  • Check Firewall Settings

    • Ensure that the NAS firewall settings are not blocking necessary services or connections.

  • Check User Permissions

    • Review user permissions and access rights to ensure proper access to shared folders and files.

bottom of page