Since we have a whole slew of applications, some externally facing, our
termination process is quite convoluted.  In a nutshell:

 

1st day (day of termination)

1.      Disable and rename account, hide from address books, remove
dialin/VPN access
2.      remove from all distribution lists
3.      delete blackberry account, if applicable
4.      remove access to all externally facing applications that do not
use AD authentication, also remove access to any financial applications

3rd business day after termination

1.      grant supervisor access to home directory
2.      grant access to mailbox, if requested, for a period of 30 days
(no exceptions)
3.      remove access to any other internal applications

Final delete - 10 business days after termination, unless mailbox access
has been granted

1.      delete AD and postini account

 

We do not archive the mailbox to pst.  In addition, our field techs have
a process they follow to wipe and reimage the hard drive of the
terminated employee within 30 days of termination, and before
redeploying the computer to another employee.

 

We literally have a 30-page process document dealing with terminations.
Our market HR representatives are trained on requesting terminations,
and know that their requests are subject to audit.

 

James Winzenz

Infrastructure Engineer - Security

Pulte Homes Information Services

 

________________________________

From: Roger Wright [mailto:[EMAIL PROTECTED] 
Posted At: Tuesday, March 25, 2008 7:35 AM
Posted To: NTSysadmin
Conversation: Termination Process
Subject: Termination Process
  

Do any of you have a process you can share for IT responsibilities when
employees are terminated?  I.E., disabling the account, archiving  PST
and Document files, removing account from DLs, etc.?

 

Roger Wright

Network Administrator

727.572.7076  x388

____

The only problem with seeing too much is that it makes you insane.
--Phaedrus 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

<<image001.gif>>

Reply via email to