Specifications include, but are not limited to: Managed IT Services Requirements: 1. The following services for all servers, PCs, laptops, and tablets, as appropriate based on device type: i. Consulting 1. Standard design services 2. Budgetary planning 3. Quarterly status meetings 4. Quarterly security services consultation ii. Reporting 1. Endpoint Protection reporting 2. Network health reporting 3. Basic system & network documentation 4. IT asset reporting 5. Patch health reporting iii. Monitoring 24/7/365 1. Monitor Internet connectivity 2. Monitor Endpoint Protection agent 3. Monitor drive health 4. Monitor drive space availability 5. Monitor server uptime 6. Monitor network devices 7. Backup monitoring (w/integrated system) 8. Backup alerting (w/integrated system) iv. Security Services (all workstations and servers) 1. Endpoint Protection 2. Microsoft patch management 3. 3 rd Party Patch management on workstations 4. DNS filtering 5. Virus/malware removal v. Security Services (all servers and firewalls, as appropriate based on device type) 1. Monitor processes for security issues 2. Monitor services for security issues 3. Monitor software installations 4. Monitor Active Directory for security issues 5. Monitor firewalls 6. Suspicious activity monitoring 7. Policy document library 8. Adaptive threat protection 9. Alert analysis 10. Behavioral analysis 11. Archive Server and Firewall logs for at least one year 12. Review logs 13. DNS traffic inspection 14. Network traffic monitoring 15. Packet analysis 16. Port scan detection 17. Protocol analysis 18. Suspicious pattern detection 19. Threat hunting 20. Correlate security events 21. On-demand security and compliance reports vi. Enhanced Security Services (CJIS workstations and all servers) 1. Endpoint isolation vii. Microsoft 365 Licensing 1. Licensing for the stated number of G3 accounts