Maintenance & Support Services

Remote System Management (RSM) OpenVMS (also for Tru64)

RSM consists of two components, System Audit and Assessment, and then, Remote System Management. RSM is ideal for companies that have limited OpenVMS expertise and resources, are under staffed, overworked, or simply have other priorities that need to be managed differently. Once a client has shown an interest in RSM, MIT schedules a complimentary conference call, whereby we will review the types and numbers of systems you have, and what types of layered products you are using. During that conference call, we’ll also gain an understanding of what types of issues are important to you, and to discuss other System Management issues for your consideration including the potential relevance and significance. From that conference call, we’ll be able to determine your costs for both the System Audit and Assessment, and for the ongoing tasks associated with Remote System Management.

 System Audit and Assessment

Once MIT is engaged for RSM, the following outline is somewhat typical of what MIT performs for the customer as part of the initial setup. In doing this analysis, MIT will write up and make appropriate recommendations on each subject and notify the client of any “red flags” that need attention immediately. RSM includes a total system audit with specific performance and security recommendations in a formal Evaluation Report.

While the following outline is representative of a System Audit and Assessment, your actual System Audit and Assessment may differ based upon the complexity and what was learned during our initial Conference Call discussions. These System Audits and Assessments are comprehensive, interactive, and a typical one might take 10 hours to produce.

  1. System Configuration
    1. Hardware
    2. Storage
    3. Cluster
    4. Shadowing or controller-based

  2. Startup and Shutdown Procedure
    1. Review of startup command procedures
      1. Sysconfig
      2. Sylogicals
      3. Satellite
      4. Sypagswpfile
      5. Sysecurity
      6. Systartup_vms
    2. Review of shutdown procedures
    3. Review of startup through SYSMAN

  3. OpenVMS
    1. Version
    2. Patch levels
    3. Dumpfile

  4. Product Review
    1. Licensed products
    2. Utilization of license products
    3. Patch level

  5. Backup
    1. Backup procedures
    2. Type of backup being performed
    3. Rotation of tapes
    4. Recovery procedure
    5. Offsite procedure

  6. Security
    1. Account setup
      1. Privileges
      2. Open accounts
      3. Password expiration
      4. UIC
    2. ACL utilization
    3. System disk protection
    4. Accounting logfile
    5. Security audit logfile

  7. Other
    1. Monitoring utilities
    2. Training recommendations
    3. Performance analysis recommendations

Remote System Management

This scheduled proactive, consistent, and persistent System Management plan allows MIT to manage your systems from our offices in London. Performance, security, and day-to-day operations can be easily managed using VPN or secure remote access.

This service is provided by senior-level consultants with an unsurpassed average of 24 years of real-world experience with OpenVMS systems. Your monthly cost for Remote System Management will be determined from our initial conference call and will be based upon the sum total of hours spent performing the various tasks in your Remote System Management plan. In the course of a given month, should you want MIT to assume some additional responsibilities, those will be billed separately.

The tasks shown are only representative. Your actual tasks may vary based upon what’s important to you and what was learned from our initial conference call.


  • Check intrusion list
  • Check device errors
  • Check batch queue status
  • Check print queue status
  • Check for expected (regularly occurring) batch jobs
  • Check log files for system manager batch jobs
  • Check volume utilization
  • Check process status
  • Check for unexpected unboots
  • Summarize errorlog for previous week
  • Summarize audit log for previous week
  • Other: ___________________________


  • Check for current patches
  • Execute autogen and review reports
  • Summarize accounting log
  • Other: ___________________________


  • Check software versions
  • Check firmware version
  • Perform security check on sysuaf
  • Accounting
  • Autogen
  • Other: ___________________________


Examples of additional tasks customers have requested

  • Apply patches
  • Update software
  • Set up print queues
  • Clean up and manage files
  • Manage user accounts
  • Crash Dump Analysis
  • Backup/restore
  • New user account creation
  • Real-time alert management
  • Network monitoring / management
  • T4 performance audits (trending)
ISO 9001 IBM Digital HP Products at MIT Limited Cisco Networking Products at MIT Limited NetApp Storage Products at MIT Limited ISO9001

Copyright © 2007-2013 MIT Limited, UK. All rights reserved.