System Administrator Guide
About 573 wordsAbout 2 min
I. Guide Overview
1.1 Applicable Audience
This guide applies to RiskGuard system administrators, including:
- Newly hired system administrators
- IT support personnel
- Enterprise information officers
- Security operations engineers
1.2 Core Responsibilities
Core responsibilities of system administrators include:
- Organizational Structure Management: Maintain enterprise organization tree
- User Permission Management: Control accounts and access permissions
- System Configuration Management: Customize system parameters
- Process Customization Management: Optimize business processes
1.3 Learning Path
Organizational Structure → User Management → Permission Control → System Configuration → Process Customization
II. Organizational Structure Management
2.1 Organization Configuration
| Function | Operation Guide | Key Role |
|---|---|---|
| Create Department | How to Create Department | Add department node |
| Add Subsidiary | How to Add Subsidiary | Set up branch organization |
| View Structure | How to View Organization Structure | Browse organization tree |
| Department Management | How to Manage Department | Maintain department information |
2.2 Best Practices
- Architecture Design Principles:
- Levels ≤5 (Group → Subsidiary → Department → Section → Team)
- Single-level nodes ≤50
- Set backup administrators for critical departments
- Naming Conventions:
- Department name ≤10 characters
- Coding rule: Region+Type+Sequence (e.g. BJ_SALES_01)
- Change Management:
- Major adjustments require approval
- Retain historical versions
- Notify relevant personnel after changes
III. User Account Management
3.1 User Management Operations
| Function | Operation Guide | Key Role |
|---|---|---|
| Add User | How to Add User | Create single user account |
| Batch Import | How to Batch Add Users | Excel import user data |
| Account Management | How to Manage Users | Maintain account information |
| Permission Management | How to Manage Roles | Configure role permissions |
3.2 Account Management Standards
- Account Creation:
- Username rule: Full name/Pinyin/Employee ID
- Initial password: Force change on first login
- Required information: Department/Position/Contact
- Permission Assignment:
- Principle of least privilege
- Role inheritance mechanism
- Regular permission review
- Security Policy:
- Password complexity requirements
- 90-day mandatory change
- Lock after consecutive failures
IV. System Configuration Management
4.1 System Customization
| Function | Operation Guide | Key Role |
|---|---|---|
| Enterprise Logo | How to Set Logo | Customize brand identity |
| Print Templates | How to Modify Print Templates | Customize report formats |
| System Parameters | How to Set System Configuration | Configure global parameters |
| Approval Workflows | How to Modify Approval Workflows | Customize business processes |
4.2 Configuration Standards
- Logo Settings:
- Dimensions: 200×60 pixels
- Format: PNG with transparent background
- Position: Top-left navigation bar
- Print Templates:
- Header/footer with enterprise information
- Standardized table styles
- QR code traceability function
- System Parameters:
- Password policy
- Session timeout duration
- Data retention period
V. Permission Management System
5.1 Role Permission Configuration
- Role Classification:
- System roles: Administrator/Auditor
- Business roles: Inspector/Reviewer
- Data roles: Department view/Company-wide view
- Permission Hierarchy: System Management → Business Management → Data Management → Basic Operations
- Permission Assignment:
- Functional permissions (menu access)
- Data permissions (data scope)
- Operational permissions (CRUD)
5.2 Permission Management Process
- Role Creation:
- Copy base role
- Adjust permission settings
- Test verification
- Permission Assignment:
- Associate users with roles
- Department role inheritance
- Special permission requests
- Permission Audit:
- Quarterly permission review
- Abnormal access monitoring
- Permission change records
VI. Daily Maintenance Process
6.1 Daily Work
- Account Management:
- Process account requests
- Reset forgotten passwords
- Review permission changes
- System Monitoring:
- Check system logs
- Monitor abnormal logins
- Backup critical data
6.2 Weekly Work
- Permission Audit:
- Review administrator permissions
- Check departed employee accounts
- Clean up test accounts
- Data Backup:
- Full data backup
- Verify backup integrity
- Offsite storage backup
6.3 Monthly Work
- System Maintenance:
- Check system updates
- Perform security scans
- Optimize system parameters
- Security Audit:
- Analyze audit logs
- Generate security reports
- Propose improvement suggestions
