Sei sulla pagina 1di 22

IT Welcome Kit

FUJITSU CONSULTING
A-27 ,Sector 63
Noida, UP
Phone: +0120-45050500
Fax: + 0120-4610723/724
http://www.fujitsu.com/us
Intellectual Property of Fujitsu Consulting Inc. All rights reserved. Reproduction, transmission
or distribution of any part of this publication without prior written consent of Fujitsu Consulting
Inc. is expressly prohibited.
PROPRIETARY NATURE OF DOCUMENT

Every Fujitsu Consulting document is prepared for the sole and exclusive use of the party or organization to
which it is addressed. Therefore, Fujitsu Consulting considers its document to be proprietary, and they may not
be made available to anyone other than the addressee or persons within the addressee’s organizations who are
designated to evaluate or consider the document made available.

COPYRIGHT

© 2006, Fujitsu Consulting Inc. All rights reserved. Other than for the purposes of evaluating this document, no
part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical,
including photocopying and recording, or by any information storage or retrieval system, except as may be
permitted in writing by Fujitsu Consulting.

Macroscopeis a registered trademark of Fujitsu Consulting (Canada) Inc. Productivity Centre , Architecture
Lab , StrategyForum , ResultStation , Dynamic Process Model (DPM ), Object Relationship Model
(ORM ), Object and Process Alignment (OPAL ), Results Chain , Macroscope Workplace,
ArchitectureLab Workbench, and ResultStation Modeler are trademarks of Fujitsu Consulting Inc.

Template revised: 06/19/2006 i


TABLE OF CONTENTS

1 IT WELCOME KIT.....................................................................................................................................1
1.1 WHY I NEED A RSA TOKEN?..........................................................................................................................3
1.2 HOW I CAN ACCESS TO SSL VPN THROUGH RSA TOKEN?.................................................................................3
1.3 WHO WILL GIVE ME AN RSA TOKEN?................................................................................................................3
1.4 HOW I CAN CREATE A NEW PIN FOR RSA TOKEN?............................................................................................4
1.5 HOW I CAN GET AN ACCESS CARD TO THE FACILITY?...........................................................................................4
1.6 WHAT IS CORP ID, HOW I CAN CHECK MY ID IS WORKING?...............................................................................4
1.7 HOW I CAN CONFIGURE MY OWN PRINTER? ........................................................................................................5
1.8 WHAT IS WEBSENSE, WHAT IS ALLOWED / BLOCKED? ..........................................................................................5
1.9 WHAT IS LUMENTION SANCTUARY?...................................................................................................................5
1.10 WHERE I CAN STORE BUSINESS DATA?.............................................................................................................6
Home folder..............................................................................................................................................6
Data Repository: ......................................................................................................................................6
1.11 WHAT IS THE EMAIL POLICY?..........................................................................................................................6
1.12 HOW I CAN CONFIGURE THE OUTLOOK? ..........................................................................................................6
1.13 HOW I CAN ACCESS MY EMAILS WHEN I AM NOT IN THE OFFICE?.......................................................................12
1.14 HOW I CAN MAKE THE CALL WITHIN THE CAMPUS AND OUTSIDE THE CAMPUS?...................................................12
1.14.1 Telephone & VOIP.......................................................................................................................12
1.15 HOW I CAN AVAIL THE VIDEO CONFERENCING FACILITY?..................................................................................12
1.15.1 Video Conference..........................................................................................................................12
1.16 HOW I CAN REQUEST ADDITIONAL HARDWARE?...............................................................................................13
1.16.1 IT Item Request.............................................................................................................................13
1.17 HOW CAN I REGISTER NEW CLIENT VPN DETAILS?........................................................................................13
1.18 WHERE I CAN FIND QUALITY POLICIES AND INFORMATION SECURITY POLICIES?.....................................................14
1.19 HOW I CAN REPORT THE VIRUS/INFORMATION SECURITY INCIDENT?...................................................................14
1.20 HOW I CAN CHAT WITHIN THE ORGANIZATION?...............................................................................................14
1.21 WHAT HARDWARE IS NOT ALLOWED IN THE CAMPUS?........................................................................................15
1.22 PASSWORD POLICY......................................................................................................................................16
Unified Personal Communicator............................................................................................................16
1.23 10 GOLDEN RULES FOR INFORMATION SECURITY AT WORKPLACE......................................................................17

Confidential ii
1 IT WELCOME KIT

Welcome you on board to Fujitsu Consulting India Private Ltd. The following document is response
to the frequently asked questions by new Joined.
Please read this document which will help us to support you timely fashion. Please do not print this
document if it is not required.

If you have any have any further queries please write to us at:
FC.IN.offshore-ITsupport@in.fujitsu.com
1.0 How to raise IT support request?
We have a centralized tool called Reqtrack via we can log the issue for IT support.
How to log a call through Reqtrack .for technical assistance.
1. Launch Internet explorer and type URL https://reqtrack.consulting-fujitsu.com/in the
address field to access the tool or go through favorites.

2. Go to –issue track and select the work location ,enter the tab “Post new issue”

Confidential 1
3. Fill and include the exact text of the message including description of issue and contact information

Confidential 2
4. Finally post the issue and Concern IT team will assit you for the support.

IT Support Working Hours:


 Normal Supports Hours 9.00 A.M to 6.00 P.M on Weekdays
 Extended Supports Hours 6.00 P.M to 9.00 A.M on Weekdays.( from 9.00 P.M to 9.00 A.M engineer
will available on be either of the location)
 Weekend Support / Company Holidays call 09765400248 or Pune reception
 Weekend Support / Company Holidays support will be given remotely based on Issue Criticality
 Onsite user have also to log a issue directly on Issue Track. In cases where onsite user is not able to
accesses Issue track then only they can call Pune reception

1.1 WHY I NEED A RSA TOKEN?

All the FCIPL users will be required to use SSL VPN via

https://sslvpn.consulting-fujitsu.com/IN

To access the Knowledge management, Rapidtime applications, Oracle Time & expense, Outlook
web access, unjunking the junk emails and Applications hosted on NA server Infrastructure.

1.2 HOW I CAN ACCESS TO SSL VPN THROUGH RSA


TOKEN?
• Launch Internet Explorer and type in the URL https://sslvpn.consulting-fujitsu.com/IN/ in the
address field to access Juniper VPN or Select from favorites as Fujitsu VPN from Internet
explorer.
• Enter your RSA token Username/Password when prompted for an authentication.
• Once connected to Juniper VPN, web page is displayed with the details of applications hosted.
• All your issues related to connectivity and RSA token will logged through Customer care and
eportal issues are forwarded to offshore-application@in.fujitsu.com

1.3 WHO WILL GIVE ME AN RSA TOKEN?

Pune Users:

Please contact Sangeeta Deshpande the token will be allocated within 2 working days from
the date of joining

Noida Users:

Confidential 3
Please contact Suchitra Trackroo the token will be allocated within 2 working days from the
date of joining.

Hyderabad / Bangalore Users:

Please contact Sangeeta Deshpande the token will be allocated within 3 to 5 working days
from the date of joining.

1.4 HOW I CAN CREATE A NEW PIN FOR RSA TOKEN?


• Launch Internet Explorer and type in the URL https://sslvpn.consulting-fujitsu.com/IN/ in the
address field to access Juniper VPN.
• Enter your RSA token Username/Password when prompted for an authentication this details
will be issued along with the RSA token.
• It will prompt for your user ID and password, enter the details provided in the documentation
along with RSA token
• You will be prompted to enter the 6-digits number displayed on your RSA token.
• It will ask you for the pin (that will be your password), it should be created as per the manual, It
should be number with minimum of 4 digits.
• Stay back till the pin gets accepted.
• Again will prompt for the password, there you will enter the pin first (password created) along
with the 6-digits displayed number displayed on the RSA token. Example your password 4321
+ RSA displayed number is 987654 then enter the

Note: In case RSA Token is lost, there will be deduction of Rs. 2000/-

1.5 HOW I CAN GET AN ACCESS CARD TO THE


FACILITY?
• Access card will be issued by IT Infrastructure team on the date of joining.
• Attendance timings are recorded as per the first and last swap of access card on any door. If
you do not bring your access card then your attendance will not be recorded
• All the doors have Anti pass back system. You have to make sure that you have to Swipe IN
and Swipe Out to avoid being struck

Note: In case Access card or Photo ID is lost, there will be deduction of Rs 350/-

1.6 WHAT IS CORP ID, HOW I CAN CHECK MY ID IS


WORKING?
• CORP ID is login credential to access India Email, for all the applications hosted at NA data
centre. Applications Such as Knowledge management, India white pages and many project data
• The CORP ID will be provided to you on the date of joining.

Confidential 4
• Corp ID password management is done through India webmail, you need to login in webmail
and can change the password.

1.7 HOW I CAN CONFIGURE MY OWN PRINTER?


• Choose printer name according to the Floor location. e.g. for FF-A-2 for First Floor A wing etc.
(FF is the first floor, A is wing, each wing has two printers configured)
• For Pune Users Select Run from Command prompt and type \\FC-PUN01-PS
• For NOIDA Users Select Run from Command prompt and type \\Delhi-FCN-PS

1.8 WHAT IS WEBSENSE, WHAT IS ALLOWED /


BLOCKED?

• Websense is Content Management software, which will allow only authorized business websites
on Internet at FCIPL campus.

• The purpose of WebSense Policy is to strengthen the security of the Internet facility at FCIPL.
Websense records all the websites users browse at FCIPL.

• All the users are allowed to browse their personal Email web sites between 12:00 pm to 1:00
pm, 6:00 to 7:00pm and 12:00 to 01:00 am.

• For any blocked Business URL, VPN access or messenger access the request has to be
approved from APRM and above of the respective practice.

• Acquisition, storage, and dissemination of data which is illegal, pornographic, or which


negatively depicts race, sex or creed is specifically prohibited. Necessarily disciplinary action
will be taken if associates found accessing such websites.

• Freeware /Pirated SW not allowed downloading without prior notification to IT.

1.9 WHAT IS LUMENTION SANCTUARY?

• Lumention Sanctuary is Information security software installed on all the systems which are
owned by FCIPL.

• This software will not allow you to connect any secondary media storage to any desktop and
laptop at FCIPL.

• IT protects against data leakage & Malware with Policy based endpoint security.

• External media is not allowed in office campus e.g. Pen drive, digital camera, External hard
drives, personal laptops etc.

Confidential 5
1.10 WHERE I CAN STORE BUSINESS DATA?

Home folder

o Always keep important individual official data on a central server.


o Home folders have been created for all users in order to allow all individuals to store
important user specific data.
o Data stored on this folder is workstation independent.
o Storage limit for home drive is 200 MB.
o Home Drive will show in all users system (My Computer (H): Drive)

Data Repository:

o Always keep important individual project data on a central server.


o Rights on the folder will be granted by practice Coordinators.
o Path of the folder will be provided by the practice manager
Repository path… \\india\root

Note: Please make sure that all official data is stored on the below mentioned folders. Any personal
life or media files of any type will be deleted without further notice.

1.11 WHAT IS THE EMAIL POLICY?

• All the users are allocated with Fujitsu email ID and Mailbox with maximum capacity of 100 MB.
• Associates have to manage their own mailbox to move their emails to PST file. IT Infrastructure
will not take any responsibility of users PST files backup.
• Associates must use extreme caution when opening e-mail attachments received from unknown
senders, which may contain viruses
• Do not send excessively large electronic mail messages or attachments. (5 MB is the maximum
limit )
• The E-Mail facility is NOT to be used for personal gain or commercial use by any employee.
• Please do not use chain emails, festive greetings to large groups, do not store unwanted mails.
• Please check the sender name before sending the emails. Please do not use the option of BCC.

1.12 HOW I CAN CONFIGURE THE OUTLOOK?


1. Go to Control Panel select Mail

2. In the Mail Setup window, click E-mail Accounts

Confidential 6
3. On the E-mail Accounts window, Add a new e-mail account, click Next

4. Check on Microsoft exchange server

Confidential 7
5.Type FC-PUN01-MAIL.ind.fc.local into the Microsoft exchange server and write your own user name
press check name and click on more settings this step might take some time.

Confidential 8
6. Navigate to connection

7. Select Connect to Exchange using HTTP and click over Exchange proxy settings

Confidential 9
Click Exchange proxy Settings and fill the following details

8. Exchange: https:// Webmail.in.fai.fujitsu.com

Select: Mutually authenticate the session when connecting with SSL

Principal name for proxy server: msstd: Webmail.in.fai.fujitsu.com

Click and select check box On Slow Networks, connect using HTTP first, then connect using
TCP/IP

In the proxy authentication settings area, select BASIC Authentication.

Click OK

Confidential 10
9. System will prompt for the user name password, please use your current IND Domain (IND\ksrikant)
windows login in

10. Click OK on logon window.

11. Click and Select Use Cache Exchange Mode.

12. On the E-mail Accounts Exchange Server Settings window, click next and Finish.

13. Please make sure that your system is connected to internet and it is not protected with HTTPS
firewall.

14. Start the Outlook.

• You can add PST folder in Data file management option of Outlook

Confidential 11
1.13 HOW I CAN ACCESS MY EMAILS WHEN I AM
NOT IN THE OFFICE?

• https://webmail.in.fai.fujitsu.com/owa through outlook web access


• It’ll first ask for RSA authentication and then will redirect page to
webmail

• You can also access above link after connecting to SSL VPN and “India Exchange
2007 Webmail (New FAI IND Webmail environment)”

1.14 HOW I CAN MAKE THE CALL WITHIN THE


CAMPUS AND OUTSIDE THE CAMPUS?

1.14.1 Telephone & VOIP

• By default all desks at FCIPL have Local dial out access and VOIP facility for Pune and NA.

• For long distance calling STD, ISD associates have to provide approved request from APRM
and above for business use. IT infra team will provide the accesses code based on approved
request.

• In Noida office we are having above services incorporated in a single phone only. In Pune
facility we have different handsets for PSTN and VOIP.

• For calling Noida to Pune dial 8, followed by the Pune Extn. number

• For calling Pune to Noida dial 9, followed by the Noida Extn. number

• For all the calls to NA dial 8 followed by the number with country/area code.

• For Voice mail ,Conference call kindly go through the Phone manual uploaded at

\\india\root\PublicData\Noida
\\india\root\PublicData\Pune

• Users shall abide by defined policies and procedures for Telephone/VOIP usage.

• Contact customer care for queries related to VOIP/Telephone.

1.15 HOW I CAN AVAIL THE VIDEO CONFERENCING


FACILITY?

1.15.1 Video Conference

Confidential 12
Please send email request to customer care team request VC facility requirement for business use.
VC is installed at Enterprise at Pune facility and in NOIDA VC is installed at board Room.

IP and ISDN number details are as below:

Noida
• LAN IP: 10.34.5.19 Used mostly from Pune to call Noida or from any other location which is
connected to Noida.
• WAN IP: 61.95.143.171 – This is a Public IP and can be dialed from anywhere in the world.
• ISDN Number: 0120-4214057. This option to be used when other site doesn’t have the IP
connectivity.

Pune
• LAN IP: 10.34.32.19 Used mostly from Noida to call Pune or from any other location which is
connected to Pune.
• WAN IP: 61.95.152.71– This is a Public IP and can be dialed from anywhere in the world.
• ISDN Number: 020- 27692868. This option to be used when other site doesn’t have the IP
connectivity.

1.16 HOW I CAN REQUEST ADDITIONAL HARDWARE?

1.16.1 IT Item Request

• For any new hardware issuance e.g., laptop, blackberry, data card associates should raise a
request through following URL
https://reqtrack.consulting-fujitsu.com/reqtrack/index.asp
• It is mandatory to get the requests approved by the respective managers and only the approved
requests will be processed by the IT dept.
• Gate pass can only be generated after the respective manager’s approvals.
• All the Temporary issued hardware should be returned to IT further delay.
• If the project is delayed/Extended then additional extension request for the same asset to be
raised separately.
• Any losses or damages to issued hardware will be charged to personal account.
• No Waivers will be provided by IT if any hardware is lost or damaged

1.17 HOW CAN I REGISTER NEW CLIENT VPN


DETAILS?

• For any new VPN installation, you have to submit a request in IT Item Request Tool with all the
details. By default you can’t connect to any new VPN unless it is approved by IT.
Associates should raise a request through following URL
https://reqtrack.consulting-fujitsu.com/reqtrack/index.asp
• If the project is delayed/Extended then additional extension request for the same asset to be
raised separately.

Confidential 13
1.18 WHERE I CAN FIND QUALITY POLICIES AND
INFORMATION SECURITY POLICIES?

• Please refer to Policy Documents in Q


• PO_001_ISMS_1v5 - Primary Policies for Information Security Management Systems (ISMS)
• PM_030_ISMS_1v6 - Procedure for Information Security Management Systems (ISMS)
• PM_014_INFOSTR_1v5 - Info Structure Management Process (ISMS)

1.19 HOW I CAN REPORT THE VIRUS/INFORMATION


SECURITY INCIDENT?

• If you suspect presence of Virus in your PC, Disconnect your PC from the network immediately
and do not switch off the machine.
• Contact customer care and report the same.
• Please do not try to remove the Virus on your own.
• Please do not shutdown the system or run any application or data files

1.20 HOW I CAN CHAT WITHIN THE


ORGANIZATION?
Cisco Unified Personal Communicator is organization internal messaging / chat software available
to all the users to communicate with other users.

Step 1 On your desktop, click on “Start”  Run

Step 2 Type in the following address:


\\punedatastore\Softwares\Public\CiscoUnifiedPersonalCommunicatorSetupK9_ENU.msi

Confidential 14
Step 3 Click on “Install” to start the installation.

Step 4 Hit the “Finish” button after the installation is complete.

Step 5 You will get a Cisco Unified Personal Communicator icon on your desktop and in Programs.

Step 6 Double click “Cisco Unified Personal Communicator” icon and you should now see a dialog
box prompting for an Address (Login Name) and Password.

Step 7 In the “Username” field type your windows login ID

Step 8 In the “Password” enter your network password (India domain)

Step 9 In the “Login Server” field type FCIPUNPRE01 and click Log In.

Step 12 After log in you can now go ahead and add contacts in your contact list

Step 13 Go to “Contacts” menu and select the option “Add new Contact” or Search the required
person in search tab and right click on person name to add in Contact group.

1.21 WHAT HARDWARE IS NOT ALLOWED IN THE


CAMPUS?

Confidential 15
1.22 PASSWORD POLICY

• Do not reveal your account password to others.

• All user-level and system-level passwords must conform to the company guidelines

• All passwords (e.g., email, web, desktop computer, etc.) must be changed at least every 45
days.

• The password must be minimum eight characters long having alphanumeric & both upper and
lower case

Take advantage of a single intuitive interface for voice and video calls, voicemail playback, and integrated
directories

Unified Personal Communicator

• Cisco Unified Personal Communicator- This application will be installed on your desktops/laptops,
this would carry the below mentioned features:

1. Presence—View real-time availability of other users.

2. Unified contact list—Search your corporate directory from one easy-to-use interface to locate
contacts quickly. Simply click to call. . (this feature is limited to Pune office location)

Confidential 16
3. Click-to-call—Dial from the contact list, using either the integrated soft phone or an associated
Cisco Unified IP phone. . (this feature is limited to Pune office location)

4. Integrated voice and video calling—Exchange ideas face to face with a coordinated video
display on the PC screen and audio conversation with the soft phone. Users can place
Voice/video calls to others using Cisco Unified Personal Communicator. . (this feature is limited
to Pune office location)

5. IP phone association—Use Cisco Unified Personal Communicator to control your desktop Cisco
Unified IP phone and make or receive calls. (this feature is limited to Pune office location)

6. Voice messages—Access voicemail messages—view, playback, sort, and delete messages. (this
feature is limited to Pune office location)

Instant Messaging – Text chat facility within the organization

1.23 10 GOLDEN RULES FOR INFORMATION


SECURITY AT WORKPLACE

1. You are responsible for actions undertaken using your user ID and
password
⇒ Your user IDs and passwords are strictly personal and must not be divulged to others.
⇒ Do not use a simple and obvious password.
⇒ Never write down your password.
⇒ If you share your password with IT support, for any reason, change it as soon as possible.
2. Protect your Computer and Information
⇒ Do not disable or remove any software installed on your PC for security purposes.
⇒ Use a password-protected screensaver on your PC to stop unauthorised access.
⇒ Regularly check that anti-virus software on your PC or laptop is up to date and operating.
⇒ Do not open “suspect” messages, not even if they are from a known sender.
⇒ Immediately notify the Customer care of a suspected computer virus or threat of one.
3. Ensure that you (and others) can be identified
⇒ Always ensure your Fujitsu Photo ID is visible.
⇒ Do not lend your Access card to others.
⇒ Accompany guests to your office/meeting room and to the exit when they are leaving.
⇒ Challenge any unaccompanied strangers without identification and if you are at all
suspicious, report them to your manager.

Confidential 17
⇒ Do not allow people you do not know to follow you through security barriers.
4. Classify information correctly against the following classifications
⇒ Confidential - information and material of an extremely confidential and sensitive nature, the
disclosure of which could cause grave damage to the interests of the Company.
⇒ Restricted - Information whose unauthorised disclosure would cause significant harm to the
interests of the organisation.
⇒ Internal – A privacy marking that applies to matters relating to staff and their services, where
disclosure or unauthorised access could lead to commercial embarrassment or staff
discontent. Information whose unauthorised disclosure could be detrimental to the interests
of the Company, but which may be shared with third parties for business purposes.
⇒ Public - Information which can be made publicly available. This is either because it has no
commercial value or its publication would enhance the reputation of the Company.
5. Protect confidential information
⇒ Never talk about confidential business if others might overhear you.
⇒ Company information must be managed according to its classification (see section 4). Even
if unclassified it may only be provided to outsiders if necessary for business purposes and
you have permission from your manager.
⇒ Ensure that the recipient of any information respects the applicable classification.
⇒ Before sending email, always check that the recipient’s address is correct.
⇒ Clear away confidential information so that it cannot be read, copied or removed by others.
⇒ Ensure, when absent, that your desk, cupboards and, if appropriate, your office are locked.
6. Dispose of confidential information properly
⇒ Follow your local processes for document and media disposal.
⇒ If a delay in printing occurs, delete print jobs containing confidential information from the
print queue.
⇒ Do not dispose of documents and data outside Fujitsu premises.
7. Only use hardware and software that has been approved by Fujitsu Services
⇒ Do not install your own software or copy Fujitsu Services from one computer to another.
⇒ Downloading or copying software for personal purposes from the Internet is not permitted.
⇒ Do not use personal IT equipment for business purposes.
8. Use the Internet and email for business purposes only
⇒ The Internet and email may be used for personal purposes in accordance with the company
standard.
⇒ Never publish any information belonging to, or concerning, Fujitsu on the Internet or intranet
without permission.
⇒ Downloading, sending and/or storing offensive or inappropriate information is not permitted.
9. Take extra precautions when working offsite

Confidential 18
⇒ Never leave your laptop unattended in a car.
⇒ Always carry a laptop as hand luggage.
⇒ Do not leave confidential documents unattended in a car or hotel room.
⇒ If storing documents or information at home ensures that they are adequately protected.
10 Always use your common sense and at least
⇒ Comply with the law, your employment contract, and the Fujitsu code of conduct.
⇒ Report incidents via the incident reporting process

Confidential 19

Potrebbero piacerti anche