IT Service Catalog for Year 2018-2019

A P P E N D I X F HowTo Section

Information Technology How to Section

How to Purchase Software Procedures continued : 4.6 Purchaser is responsible for obtaining licensing for correct number of client listed in section 3.0 4.7 Purchaser assigns work ticket to analyst once software is received

5.0 ADDITIONAL RESOURCES (SYSTEM REQUIREMENTS AND DOCUMENTATION) 5.1 For large software purchases, system requirements are required.

5.2 If the scope of the software purchase is deemed to be a project, Systems Administrators may be required 5.3 It is the responsibility of the Division Manager to involve the IT Projects Manager and assign subject matter experts to newly created project 6.0 DEFINITIONS USED 6.1 “Service Desk” & “Helpdesk” has been used interchangeably in relation to the application, which is currently called the Helpdesk application. 6.2 “Network Services”may be abbreviated as “NWS.”

6.3 “Information Technology” has been abbreviated as “I.T.” 6.4 “User,”“end-user” and “Customer” are interchangeable 6.5 “Analyst,”“technician” and “Staf” are used interchangeably How to Request a Network Account:

1. Submit a Service Desk request and be sure to include the employee’s name, Lawson ID (if applicable), date of termination (for interns), and any required folder permissions or groups (distribution list and security) that they should be placed within. 2. Have the new employee submit a signed Acceptable Use Policy, which can be found at Acceptable Use Policy - Print and Sign or here at Acceptable Use Policy - Agree Online. PLEASE NOTE: If this network account request is for an end user that is considered a third party, you will need to submit a Third Party Access Policy via interofce mail or email to Tasha Swann and Tifany Temple. Third Party Access Policy Instructions (steps on how to fll it out) can be found on the IT Security Homepage. How toWhitelist and Release Emails in Spam Quarantine: As part of enhancing email spam detection and controls, the City of Greensboro IT department is rolling out dedicated spam quarantines for each user. Items labeled as marketing, bulk, spam or suspicious will be placed in this folder. Each Monday morning you will receive a weekly digest of items sitting in your spam quarantine. These items will automatically be cleaned out of this folder every 30 days. You can browse to your spam folder at any time by going to https://sma.greensboronc.org .

1. Select the item in question. 2. Click the select action dropdown and select Release, Release and Add to Safelist or Delete and hit submit. Items added to Safelist will whitelist any future emails from the sending domain.

50

I T S E R V I C E C A T A L O G • F Y 2 0 1 8 - 2 0 1 9

Made with FlippingBook flipbook maker