03.07.2019 Views

BITS Induction Manual_Final

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cont ext<br />

"Get t ing t he Induct ion Process Right for new joinees help t hem<br />

becom e<br />

Product ive fast er and im prove overall Em ployee Ret ent ion ?<br />

In order to help the new joinees in the role of A<strong>BITS</strong> to know about the company,<br />

process, Applications, hardware used and also to implement induction in a<br />

Structured manner we have developed a induction manual with Questionners for<br />

new A<strong>BITS</strong>.


CTO's Message


Mahindra & Mahindra Financial Services Lt d (MMFSL)<br />

- Mahindra Finance is subsidiary company<br />

of Mahindra & Mahindra Group, two<br />

decades ago, Mahindra and Mahindra<br />

Financial Services Limited (MMFSL)<br />

commenced its journey in the rural<br />

non-banking finance industry. And with<br />

that was born a vision to transform rural<br />

and semi-urban India into a self-reliant,<br />

flourishing landscape. Since then, we have<br />

come a long way, empowering millions of<br />

ambitious individuals with personalized<br />

finance for a wide range of vehicles, home<br />

development requirements and many<br />

other diverse endeavors - all to help them<br />

live their dreams and Rise in life.<br />

- At Mahindra Finance, we are guided by a<br />

firm belief in people, their dreams, and<br />

their potential to achieve those dreams.<br />

Hence, our socially inclusive business<br />

model facilitates loans to customers based<br />

not on their current financial status,<br />

but their future earning capacity.<br />

semi-urban India ? a confidence that allows<br />

them to believe that no dream is too big.<br />

Today, as one of the leading non-banking<br />

finance companies, we are proud to have<br />

touched over 4 million lives.<br />

- During the course of our journey, apart<br />

from emerging as the top tractor financer<br />

in India, we have constantly strived<br />

towards developing skill sets of the local<br />

population. Which is why, we provide<br />

employment to over 20,000 people in over<br />

1200 branches across India. This not only<br />

ensures equal growth opportunity for all,<br />

but also enables us to serve our customers<br />

better through local understanding and<br />

expertise. So it will be a humble farmer or<br />

a budding entrepreneur ? we are<br />

committed to empower every individual<br />

with resources to help their dreams see<br />

the light of day.<br />

This philosophy has instilled a<br />

confidence in the minds of rural<br />

sense of<br />

and


Mahindra Rural Housing<br />

Finance Lim it ed (MRHFL)<br />

- The Mahindra Rural Housing Finance is<br />

subsidiary company of Mahindra &<br />

Mahindra Financial Services Ltd. We are<br />

the largest housing Finance company<br />

serving rural India. Housing is a basic<br />

human need. We started Mahindra Rural<br />

Housing Finance Limited (MRHFL) back in<br />

2007 to provide convenient and low-cost<br />

housing loans for Indians living in rural<br />

areas. We are in 13 states across India<br />

providing employment over 440 branches.<br />

- Mahindra is many companies united by a<br />

common purpose to enable people to<br />

Rise. Our goal is Transforming Rural Lives<br />

Together. We aspire to set the highest<br />

standard for housing finance in rural India<br />

in terms of profitability, growth, employee<br />

engagement, trust, and awareness. We<br />

aim to increase home ownership and<br />

resources in the housing finance sector of<br />

rural India. As we have shown, by our<br />

initial success in this market as well as our<br />

Mahindra Insurance<br />

Brokers Lim it ed (MIBL)<br />

- The Mahindra Insurance Brokers Ltd is<br />

subsidiary company of Mahindra &<br />

Mahindra Financial Services Ltd. MIBL was<br />

granted a Direct Broker's License by the<br />

Insurance Regulatory and Development<br />

Authority (IRDA) in May 2004, for<br />

undertaking direct insurance broking in<br />

Life and Non-Life businesses. MIBL has<br />

empanelled itself with various public and<br />

private insurance companies to offer<br />

customized solutions to customers. In<br />

September 2011, MIBL was granted a<br />

Composite Broker license by the IRDA,<br />

thus foraying into Reinsurance Broking<br />

business along with Direct Broking. As a<br />

Total Insurance Risk Solutions provider,<br />

MIBL plays an integral role in the Risk<br />

Management portfolio of customers.<br />

- MIBL is one of the few insurance broking<br />

companies in India to have been awarded<br />

the prestigious ISO 90012008 Certification<br />

for Quality Management Systems. MIBL is<br />

constant growth and profits, we have laid<br />

committed to providing<br />

value to its<br />

the foundations for our future.<br />

customers by understanding their


insurance needs and risk profile, and<br />

providing innovative, cost effective,<br />

customized solutions to ensure total<br />

customer satisfaction. Our role, in short,<br />

encompasses various activities right from<br />

risk profiling to claims administration for<br />

customers. Our aim is to play a<br />

predominant role in the insurance<br />

broking industry in India with a focus on<br />

giving more value to customers,<br />

innovative solutions, superior services, a<br />

professional team, and corporate social<br />

responsibility.<br />

Mahindra Asset Managem ent<br />

Com pany Privat e Lim it ed<br />

(MAMCPL)<br />

- The Mahindra Asset Management<br />

Company Private Limited, a company<br />

incorporated under the Companies Act,<br />

- Mahindra Mutual Fund has been<br />

constituted as a trust in accordance with<br />

the provisions of the Indian Trusts Act,<br />

1882, as per the terms of the trust deed<br />

dated September 29, 2015 between the<br />

Mahindra and Mahindra Financial Services<br />

Limited as the Sponsor and Mahindra<br />

Trustee Company Private Limited, as the<br />

Trustee. The Trust Deed has been<br />

registered under the Indian Registration<br />

Act, 1908. Mahindra Mutual Fund has been<br />

registered with SEBI, under registration<br />

code MF/069/16/01.<br />

- Mahindra Mutual Fund endeavors to offer<br />

a variety of mutual fund schemes<br />

pan-India, with special focus in rural and<br />

semi-urban areas.<br />

1956, is the Investment Manager for<br />

Mahindra Mutual Fund. It is a wholly<br />

owned subsidiary of Mahindra and<br />

Mahindra Financial Services Limited<br />

(MMFSL).


Vert icals & Depart m ent s in MMFSL


Business Inform at ion Technology Solut ions (<strong>BITS</strong>)<br />

- <strong>BITS</strong> support whenever whatever& wherever<br />

we need in our remote branch offices we<br />

need dependable <strong>BITS</strong> support. A<strong>BITS</strong> is<br />

really a friend in need and we have<br />

strengthened by adding a direct quality <strong>BITS</strong><br />

support for our every five locations, which<br />

enable you to have more time for our<br />

business and family. A qualified <strong>BITS</strong> person<br />

is committed to deliver beyond just <strong>BITS</strong><br />

service & solutions, to enable our services<br />

commitment to serve our external<br />

customers through our internal users<br />

better.<br />

- Web culture services have totally changed<br />

the way we do business today. Our<br />

connectivity reach at our locations will surely<br />

provide you further more strategic<br />

advantage.<br />

- Fast technological changes with internet<br />

revolution, everyone wants to use<br />

connectivity effectively. We would want to<br />

leverage the usage of <strong>BITS</strong> and ensure our<br />

return on investments used and utilized<br />

effectively 100% usage. The Business<br />

Information Technology wing of Mahindra &<br />

Mahindra Financial Services Sector (MMFSS)<br />

manages the entire IT operations<br />

(viz. infrastructure management,<br />

Network & Connectivity<br />

management, Backup, recovery<br />

management and Audit & quality) to<br />

guarantee highest availability to its<br />

users, <strong>BITS</strong> ensures delivery of<br />

secured, competitive software<br />

products development and<br />

management with providing<br />

appropriate awareness among users.<br />

<strong>BITS</strong> Support (A<strong>BITS</strong>)<br />

- A complete portfolio of customized<br />

services and <strong>BITS</strong> expertise, from<br />

planning & Design to installation,<br />

integration, migration assistance, from<br />

onsite hardware networking and<br />

software fixes at our branch/regional<br />

offices to Operations & Management in<br />

sink at HO data center or Network<br />

Operation Center to use our systems<br />

99.99 up time without fail.<br />

- A<strong>BITS</strong> is stationed for every five<br />

locations to cover less than 200 km<br />

radius, so that he can visit per day 1<br />

branch and address the system issues<br />

for which he has assigned for the week.


He has to ensure & monitor all the <strong>BITS</strong> IT<br />

used assets to keep 99.99 uptime. He has to<br />

rest assure the databank on technical<br />

queries and solutions for that five locations.<br />

Co-ordination between all <strong>BITS</strong> related<br />

Vendors and maintains the committed<br />

relation on service deliverables between the<br />

vendors and the users.<br />

- A<strong>BITS</strong> as the ability & trained to address our<br />

system needs in the shortest time. He<br />

have to enable to optimize our<br />

investments through efficient utilization<br />

of our IT infrastructure with minimum<br />

downtime to maximize our (return on<br />

Investment) ROI. Well defined deliverables<br />

for his service delivery as per our<br />

requirements at our locations.<br />

IT Vision<br />

- 3C= 3S --> Corporate Customer Care =<br />

Solution Support Service<br />

- Provide high quality deliverables at<br />

affordable time that aims to ?enhance the<br />

competitiveness?.<br />

- Technology is another key differentiator at<br />

MMFSL. Our alliances with best-of-breed<br />

technology partners ensure<br />

proactive, on demand support to<br />

meet our growth in Rural, Environmental<br />

challenge as well as the continuous<br />

development of our <strong>BITS</strong> infrastructure<br />

and delivery channels to achieve superior<br />

standards of customer service.<br />

Scope act ivit ies<br />

- The IT service Management System of<br />

Mahindra & Mahindra Financial Services<br />

Ltd (<strong>BITS</strong> ? Division) supporting the<br />

provision of IT Helpdesk, IT support<br />

services, IT application development and<br />

support in accordance with the service<br />

catalogue to the employees of Mahindra<br />

Finance and its subsidiaries Mahindra<br />

Insurance Brokers Ltd, Mahindra Rural<br />

Housing Finance Ltd and Mahindra Asset<br />

Management company Private Limited<br />

from the Head office located in Mumbai.<br />

- Mahindra Finance ? <strong>BITS</strong> (Business<br />

Information Technology Solutions)<br />

journey started way back in 1997. Today,<br />

Information Technology is an ingrained<br />

component of the overall business<br />

structure at Mahindra Finance.


<strong>BITS</strong> Team St ruct ure


Support Team Organogram<br />

- This diagram shows the organizational structure and relationship between the different people,<br />

departments and jobs at different levels within that organization.


Acer India Pvt Lt d<br />

- A) ACER TRAVELMATE P246-M ---> RAM ?<br />

4 GB, HDD ? 500 GB, Processor -<br />

Call Logging form at - Through<br />

m ail<br />

INTEL(R) CORE(TM) I3-4005U CPU @<br />

1.70GHZ, Windows 7, Windows 10<br />

Operating System.<br />

- B) ACER TRAVELMATE P249-M ---> RAM ?<br />

4 GB, HDD ? 500 GB, Processor -<br />

INTEL(R) CORE(TM) I3-4005U CPU @<br />

1.70GHZ, Windows 7, Windows 10<br />

Operating System.<br />

- C) ACER GATEWAY NE46R ---> RAM ? 4<br />

GB, HDD ? 500 GB, Processor -<br />

INTEL(R) CORE(TM) I3-3110M CPU @<br />

2.40GHZ, Windows 7, Windows 10<br />

Operating System.<br />

- All above mentioned Acer laptop<br />

models are in warranty/AMC. <strong>BITS</strong> has<br />

to log complaint over mail using<br />

template or call toll free number to<br />

Toll free Number for Notebooks : 1800 11 6677<br />

Toll free Number for PCs support: 1800 11 4100<br />

Web call Logging URL :<br />

https://www.acer.com/ac/en/IN/content/<br />

home%20--%3e%20Support%20--%3e%20Repairs<br />

log complaint for service and support<br />

from Acer.


DELL India Pvt Lt d<br />

Lenovo India Pvt Lt d<br />

- A) DELL VOSTRO 3468---> RAM ?<br />

4GB, HDD ? 500GB, Processor<br />

-INTEL(R) CORE(TM) I3-6006U CPU @<br />

2.00GHZ, Windows 10 64Bit<br />

Operating System.<br />

- B) DELL LATITUDE 3460 ---> RAM ?<br />

4GB, HDD ? 500GB, Processor -<br />

INTEL(R) CORE(TM) I3-5005U CPU @<br />

2.00GHZ, Windows 10 64Bit<br />

Operating System.<br />

- Above mentioned dell laptop models<br />

are in warranty/AMC. <strong>BITS</strong> has to log<br />

complaint over mail using call to toll<br />

free number to log complaint for<br />

service and support from Dell.<br />

Email id: india_ple_com@dell.com<br />

Toll free no: 1800-425-8045 or 080-2510-8037<br />

Technical Support - Email Channel<br />

http://www.dell.com/support/incidents/<br />

in/en/indhs1/Email/Welcome?ServiceTag%20<br />

- A) LENOVO THINKPAD L450 ---> RAM<br />

? 4GB, HDD ? 500GB, Processor<br />

-INTEL(R) CORE(TM) I3-5005U CPU @<br />

2.00GHZ, Windows 7/10 64Bit<br />

Operating System.<br />

- B) LENOVO V310 ---> RAM ? 4GB,<br />

HDD ? 1TB, Processor -INTEL CORE<br />

I3-6100H @ 2.70GHZ, Windows 10<br />

64Bit Operating System.<br />

- Above mentioned Lenovo laptop<br />

models are in warranty/AMC. <strong>BITS</strong><br />

has to log complaint over mail using<br />

call to toll free number to log<br />

complaint for service and support<br />

from Lenovo.<br />

Email ID: commercialts@lenovo.com<br />

Toll free no: 1800-3000-5366


MFD (Mult i-funct ion Device)<br />

Canon IR 2520/ W<br />

- Which running at 20ppm, the image<br />

RUNNER 2520 offers a compact suite of<br />

work group functionalities. From<br />

Speed 35ppm,Copy / Print / Colour Scan<br />

/ Send / Fax, ID Card Copy, Department<br />

ID, Searchable / Compact PDF .<br />

network printing to built-in duplex,<br />

network scan, send multi-functional<br />

device.<br />

Ricoh MP2001SP<br />

- The MP 2001SP get through work fast.<br />

With a print speed of up to 20ppm,<br />

Color scanning through network,<br />

Send and one-touch access to MFP<br />

Canon IR 2520/ W<br />

functions .<br />

- The A4 monochrome image RUNNER<br />

1435iF is designed with efficiency and<br />

usability, print speed of 35ppm, the<br />

device also comes with a wide range<br />

of functions designed to provide an<br />

enhanced experience.


Kyocera Ecosys M2040DN<br />

- A4 copy/print up to 40 ppm (Mono),<br />

scanning up to 40/23 ipm Mono/Color.<br />

Standard high productive 50-sheet<br />

capacity one-path duplex scanning<br />

document processor.<br />

Dot Mat rix print ers<br />

- This printer is been using to take online<br />

delivery orders and online receipts across<br />

branches. Currently Epson LX-310, 300<br />

models are using in all branches, which is<br />

having 9 Pin SIDM, USB and Serial parallel<br />

port printer.<br />

Note All above model MFDs will cover under<br />

4C AMC and Yearly AMC renewal will be taken<br />

care by RIT and for any service support, has to<br />

raise complaint to respective OEM.<br />

Hand held device (HHD)<br />

- HHD is a type of electronic Point of Sale<br />

device (mini mobile computing device)<br />

which is capable of processing any<br />

transaction at customers door step and<br />

updates the same instantly to the<br />

centralized server using Data SIM card this<br />

was a complete mobile office solution<br />

deployment.


Key Highlight s<br />

confidence for the customer who<br />

- Enables Automation of entire field force<br />

makes cash dealing at field.<br />

and no messy manual documents.<br />

- Complete data digitization happens in<br />

the field by the feet on the field team.<br />

- All customer facing transactions<br />

(Receipting, Minutes of meeting, Visit<br />

reports, climate update, etc) are done at<br />

filed office.<br />

- Complete details about the customer<br />

available in HHD to enable best<br />

customer service by field force at<br />

customer?s door step.<br />

- Instant Issuance of receipt/<br />

acknowledgement at field.<br />

- Centralized minute by minute<br />

monitoring of field force on customer<br />

meetings, collections, etc.<br />

- Integrated with local conveyance claim<br />

module based on the movement<br />

recording in HHD.<br />

- Also used for any Dynamic survey<br />

capturing, Lead Generation, Messaging<br />

?Chat, Customer Predications for day<br />

for the customer through their Zodiac<br />

based on their DOB.<br />

- Integrated with automated IVR for<br />

transactional voice messages.<br />

- Data entry error was reduced<br />

drastically, avoiding duplications of<br />

work and errors due to wrong punching<br />

of data into system from manual<br />

records leading to data quality.<br />

In Mahindra finance and Housing<br />

finance the handheld device being used<br />

since a decade for receipting and<br />

business cases processing. We have<br />

various models in which currently we are<br />

using following GL 11 and GL14models.<br />

- Instant SMS messages to customers on<br />

transactions that create more


GL11 EPOS Term inal<br />

- The GL11 POS terminal is multi utility<br />

touch screen device, where user can<br />

issue monthly installment receipts ,<br />

punching business files from<br />

customer place, take customer<br />

GL14 EPOS Term inal<br />

- The GL14 POS terminal is using only<br />

to issue receipts for customer<br />

monthly installment. This is working<br />

in linux kernal and with static image.<br />

photos, Voice and finger printer of<br />

customer. Also this device using field<br />

executives for filed conveyance claim.<br />

This device works with Linux kernal<br />

and we are using MMFSL dynamic<br />

image in this device.


Tablet<br />

- In Mahindra finance we are using<br />

Tablets for receipting and CRM<br />

application usage, which comes<br />

under mobility project. We have<br />

android and windows OS based<br />

tables in MMFSL.<br />

- The following model tabs are being<br />

used in business and collections<br />

verticals. Notion Ink model 10 inch<br />

tab is using by SME retail business<br />

team. Android tab being managed<br />

through MDM application which<br />

keeps device secure, monitoring and<br />

preventing unwanted applications<br />

installation, usage.<br />

- Tablet which works in real-time<br />

syncing with server to<br />

upload/download data to server<br />

background applications sync.<br />

- Tablet is using Receipting, Lead<br />

Generation, CRM application and<br />

corporate web page access by field<br />

- Data syncing with server can<br />

uploading using GPRS SIM card or<br />

Wi-Fi.<br />

- Field force is issuing receipts in field<br />

by syncing Tablet with Bluetooth<br />

Printer.<br />

- Which works in cloud technology, any<br />

time can track the device location<br />

using GPS.<br />

- Erase data and Lock the device if<br />

device has lost or user inappropriate<br />

usage.<br />

- Tablets are managed with IBM<br />

provided Maas 360 Mobile Device<br />

Management application.<br />

- For applications security we are using<br />

Trend micro mobile security Mobile<br />

Threat Management (MTM). The<br />

device can be controlled remotely for<br />

maintenance purpose in filed itself<br />

from head office to troubleshoot the<br />

device issues.<br />

force at customers door step.


UPS & Bat t ery<br />

- An uninterrupted power supply (UPS) is an<br />

electrical apparatus that provides<br />

emergency power to a load when the input<br />

power source or mains power fails. A UPS<br />

differs from an auxiliary or emergency<br />

power system in that it will provide<br />

near-instantaneous protection from input<br />

power interruptions, by supplying energy<br />

In a standby ("off-line") system the load is<br />

powered directly by the input power and<br />

the backup power circuitry is only<br />

invoked when the utility power fails.<br />

Most UPS below 1 kVA are of the<br />

line-interactive or standby varieties<br />

which are usually less expensive.<br />

stored in batteries. The on-battery run-time<br />

of most uninterrupted power sources is<br />

relatively short (only a few minutes) but<br />

sufficient to start a standby power source or<br />

properly shut down the protected<br />

equipment.<br />

- The three general categories of modern UPS<br />

systems are on-line, line-interactive and<br />

standby. An on-line UPS uses a "double<br />

UPS Bat t eries<br />

conversion" method of accepting AC input,<br />

rectifying to DC for passing through the<br />

rechargeable battery (or battery strings),<br />

then inverting back to 120 V/230 V AC for<br />

powering the protected equipment. A<br />

line-interactive UPS maintains the inverter<br />

in line and redirects the battery's DC current<br />

path from the normal charging mode to<br />

- The battery is the heart of your UPS<br />

system. Should your facility experience<br />

a utility power failure, your mission<br />

critical equipment will depend on your<br />

UPS?s battery system to support the<br />

loads.<br />

supplying current when power is lost.


UPS Bat t eries<br />

- The run-time for a battery-operated UPS<br />

depends on the type and size of batteries<br />

and rate of discharge, and the efficiency of<br />

the UPS.<br />

- UPS battery systems have at least one string<br />

of batteries. The number of batteries<br />

required within the string varies by the D/C<br />

buss voltage of the UPS.<br />

- Batteries within the string are connected in<br />

series. Therefore, if a single battery fails or<br />

opens, the entire string fails. Additional<br />

battery strings are often added to the UPS<br />

to provide for additional runtime and/or<br />

redundancy of the battery system. Good<br />

system design calls for multiple strings of<br />

batteries versus a single string of batteries.<br />

- Batteries do age and eventually wear out. A<br />

- Think of a battery as a loaf of bread.<br />

Each time you take a slice there is less<br />

for the next time. It?s the same with a<br />

battery ? each time it is called upon to<br />

cycle, there is less available battery for<br />

the next outage. each time it is called<br />

upon to cycle, there is less<br />

available battery for the next outage.<br />

- It is vital to the health of your UPS<br />

battery system (and your critical loads)<br />

to inspect the batteries on a regular<br />

basis. Semi-annual or even quarterly<br />

inspections are warranted. TYPE of UPS<br />

Batteries<br />

typical valve regulated lead acid (VRLA) UPS<br />

battery has a life expectancy of four to six<br />

years (some sooner depending on the<br />

quality of the battery). Each time the battery<br />

cycles it ages.


Sealed m aint enance Free<br />

Tubular Bat t ery Wet Cell<br />

- This is, by far, the most common type of<br />

lead acid battery utilized in UPS systems.<br />

The term sealed is somewhat misleading, as<br />

it means that the battery vents only if the<br />

cell is abused by overcharging or high<br />

temperature operation. The vents open only<br />

- This is the most basic lead acid<br />

battery. This type of battery vents<br />

gases during charging and<br />

discharging and requires periodic<br />

addition of water to the electrolyte.<br />

under excessive internal pressure. By<br />

nature of the design a valve regulated<br />

battery effectively controls generation of<br />

gases and allows gas recombination within<br />

the battery of over 99% of the gases<br />

generated in normal usage. The batteries<br />

are provided with a safe low pressure<br />

venting system designed to release excess<br />

gas and reseal automatically. Normally this<br />

sealing technique should ensure that no<br />

electrolyte leakage can occur from the<br />

terminals / posts or case of the battery.


List of Applicat ions Used Across MMFSL


List of Applicat ions Used Across MMFSL


List of Soft w are Used across<br />

MMFSL<br />

What are t he Type Syst em<br />

Users<br />

I. Licensed Soft w are?s used - Operating<br />

System Windows 7, 8, 10 Professional.<br />

II. Microsoft package used across<br />

group - Microsoft office 2003, 2007 and<br />

2010<br />

III. Open source soft w are?s used - 7Zip,<br />

Mozilla Thunderbird mail client,<br />

Libreoffice<br />

IV. Freew are soft w are?s - Adobe PFD<br />

reader, Flash player, Foxit Reader<br />

V. Brow sers - Internet explorer 11, Google<br />

Chrome, Mozilla Firefox<br />

Field Force<br />

- Collection<br />

- Business<br />

- DIV<br />

- ACM<br />

- ABM LEGAL<br />

Back office<br />

- Accounts<br />

- SME<br />

- Dealer Point Executives<br />

- Legal I & S<br />

Ext ernal users<br />

- Dealer<br />

- Customer<br />

What are t he Product ion<br />

Applicat ions of t he Com pany<br />

I. MMFSL - (DRONA,EFFORTS,YARD,<br />

Me-CONNECT,EMLAP APPROVAL,CRM)<br />

II. MRHFL - (COLLECTION )<br />

III. MIBL<br />

IV. AMC


- Following Internet service providers were<br />

currently connected across pan India<br />

locations in MMFSS.<br />

a. Sify Technology.<br />

b. Bharthi Airtel<br />

c. Vodafone India<br />

d. Tikona<br />

e. Tata communications BSNL<br />

(Broadband)<br />

- Details on all IP?s in host file which need to<br />

replace in etc folder for laptop/desktop<br />

user.<br />

172.30.0.3 dctwo-mmfsldctwo-mmfsl.mmfsl.com<br />

172.30.0.2 adc-mmfsladc-mmfsl.mmfsl.cdom<br />

172.30.2.2 MMFSS-PDC MMFSS-PDC.mmfsl.com<br />

172.30.2.3 MMFSS-ADC MMFSS-ADC.mmfsl.com<br />

172.30.0.143 bessrvr<br />

172.30.0.12 ofas.mmfsl.com ofas<br />

10.2.203.18 onemahindra<br />

172.30.1.32 clientlocator.mfeatsmobileapps.in<br />

172.30.0.187 mfeka.com<br />

172.30.9.241 mmfss-ms-ssrs<br />

172.30.1.91 mfdms.com<br />

172.30.30.6 uat.mfdms.com<br />

23.97.78.62 sts.mahindra.com<br />

172.30.0.14 ofas.mmfsl.com<br />

172.30.9.76 mmfss-ctxweb1.mmfsl.com<br />

172.30.50.38 ekyc.mahindrafs.com<br />

172.30.50.37 uatekyc.mahindrafs.com<br />

172.30.0.248 MFSS-ALTRIS.mmfsl.com<br />

172.30.0.8 BKPDC-MMFSL<br />

172.30.0.27 mfappsap.mmfsl.com<br />

172.30.0.36 CITRIX 1<br />

172.30.0.59 finnone.mmfsl.com<br />

172.30.0.56 mmfsl-sp-2k7


Do's and Don't s of IT Usage<br />

1. Don?t share your password with others<br />

2. Don?t write your password anywhere<br />

3. Don?t leave your PC unattended<br />

4. Don?t try and fix technical issues yourself<br />

5. Don?t put your legs on CPU<br />

6. Don?t misuse internet for music, visiting an entertainment sites or downloading materials<br />

not related to your work<br />

7. Don?t install anything on the PC without involvement of local helpdesk<br />

8. Don?t use cell phone while on calls as it may interface with other live customer calls<br />

9. Don?t download mails frequently as it chokes internet bandwidth<br />

10.Don?t indulge mass mailing as it affects network performance<br />

11.Don?t use chat for unofficial purposes. It is one of the easier medium for spreading viruses<br />

12.Don?t move any IT assets without proper approval and involvement a local helpdesk<br />

13.Don?t use Floppy/Pen drive/CD-ROMs without <strong>BITS</strong> approval<br />

14.Don?t remain in menu or application when you do not use it for more than 15 minutes.<br />

15.Don?t share the any of the folder or files in your PC/laptop<br />

16.Don?t stop anti-virus scanning<br />

17.Don?t carry company data in pen drive/CD-ROM<br />

18.Don?t leave your printouts unattended


General Com put ing Do?s and Don?t s<br />

Do?s<br />

- Use of Mahindra Finance IT assets must<br />

be solely for business purpose only.<br />

Reasonable personal use may be<br />

permitted at the sole discretion of the<br />

company.<br />

- User is responsible for all actions<br />

undertaken with their user credentials<br />

(Username, Password) and devices.<br />

- User must use strong password and<br />

must change them regularly.<br />

- User must ensure physical safety and<br />

upkeep of all Mahindra Finance<br />

Hardware entrusted to them. The<br />

screen on the laptop or desktop should<br />

kept locked (Ctrl +Alt + Del) while the<br />

user is away.<br />

- All external storage media exclusively<br />

permitted for use with Mahindra<br />

Finance IT assets shall be encrypted, so<br />

as to safeguard Mahindra finance<br />

Intellectual property<br />

Don't s<br />

- Copying / Storing / Transmitting any<br />

personal data in any form through<br />

Mahindra Finance IT Assets is<br />

prohibited.<br />

- User shall not access / download / copy /<br />

store / transmit in any form of any obscene,<br />

vulgar, inappropriate material, jokes, picture,<br />

chain letter or any other non-work related<br />

material using Mahindra Finance IT assets.<br />

- Movies / Games / Music files / Photos/<br />

Unauthorized software should not run /<br />

stored on the Mahindra Finance IT assets and<br />

will be summarily deleted.<br />

- The user shall not share the Username and<br />

Password with anyone, if it is shared with IT<br />

helpdesk the password should be changed at<br />

the earliest.<br />

- User should not use User ID?s and passwords<br />

are not allotted to them.<br />

- Deletion, Examination, copying or<br />

modification of files and/or data belonging to<br />

other user without their prior consent is<br />

prohibited, unless authorized by the IT risk<br />

committee.<br />

- Software, patch installations, modifications<br />

and removal on Mahindra Finance IT assets<br />

must be done only by or advised by the <strong>BITS</strong>.<br />

- User must not stop / halt / delete any<br />

process, services, software from Mahindra<br />

Finance IT assets set up by the <strong>BITS</strong>.


E-m ail Do's and Don't s<br />

Do's<br />

- User should execute utmost care while<br />

handling Mahindra Finance?s email from<br />

non Mahindra Finance IT assets, to avoid<br />

loss/misuse of confidential information.<br />

- Use of Mahindra Finance E-mail services<br />

should be for sending official mails only.<br />

- Only User(s) authorized by steering<br />

committee members are entitled to send<br />

emails to all users in Mahindra Finance.<br />

Dont 's<br />

- The user is solely responsible for all<br />

e-mails originating from his/her ID.<br />

Sending of e-mail(s) that could be<br />

considered as harassing, obscene,<br />

libelous, threatening, inappropriate or of<br />

any nature that could be against the<br />

Mahindra finance is prohibited. Sending<br />

or attempt of sending junk mail,<br />

?for-profit? messages or chain letters is<br />

prohibited.<br />

- The user is prohibited from deleting,<br />

copying or modifying the email of the<br />

other users.<br />

- The user may be allowed to access to the<br />

email of another user, if circumstances<br />

warrant so and if authorized in writing by the<br />

respective steering committee members.<br />

- The user must not send any computer<br />

program as attachments. User who receives<br />

executable attachments such as .exe, .com,<br />

should not execute such attachments but<br />

should immediately notify the <strong>BITS</strong><br />

User should not use the email service for<br />

spamming, Spamming includes the following<br />

1. Bulk sending of unsolicited messages or<br />

sending of unsolicited emails.<br />

2. Use of distribution lists to send<br />

unsolicited or inappropriate emails<br />

3. Pasting any kind of content/ Message on<br />

any news groups or email groups such as<br />

yahoo groups / flip board, etc.<br />

- User shall not use any third-party email<br />

service for official purpose unless approved<br />

by the CISO/National Head (<strong>BITS</strong>) / CIO.<br />

- User should not access other user mail /<br />

Mailbox unless specifically allowed in writing<br />

by the CISO, representing the IT risk<br />

committee.


File Usage Do's and Don'<br />

t s<br />

Do's<br />

- User can access their files from various<br />

servers only through User ID allotted to<br />

them by the <strong>BITS</strong>.<br />

- User shall keep all work related files on<br />

the designated server(s). If the user is<br />

working on the laptop provided by the<br />

Mahindra finance while traveling, the<br />

user should copy the updated files on to<br />

the server when they are back in office.<br />

Don't s<br />

- Don?t use other?s passwords, IP addresses<br />

and usage of any other means to<br />

block/thwart the access of other user<br />

rights, through stealing of the password<br />

or hacking or reverse engineering. All<br />

such activities are strictly prohibited and<br />

are considered as violation of the policy.<br />

- Servers are housed in secure and<br />

restricted areas, and unauthorized users<br />

are not allowed to enter such restricted<br />

areas.<br />

Net w ork Do's and Don't s<br />

Do's<br />

- Report any weakness in computer<br />

network and any incidents of possible<br />

misuse or violation of this policy to the<br />

business head, CISO who represents the<br />

IT risk committee.<br />

Don't s<br />

- Perform any actions, which damages or<br />

disrupts the Mahindra Finance IT assets,<br />

alter its normal performance or causes it<br />

to malfunction<br />

- Attempt to gain unauthorized access to<br />

remote systems.<br />

- Attempt to copy, modify, decrypt of system<br />

files or the registry is prohibited.<br />

- Copy and copyrighted materials, such as<br />

third-party software, without the express<br />

written permission of the owner or<br />

without proper license.<br />

- Attempt to ?Crash? network systems,<br />

application or software<br />

- Attempt to attain any higher level of<br />

privilege than ordinary available to you as<br />

an user.<br />

- Willfully attempt to introduce ?Viruses /<br />

malwares? or other disruptive/destructive<br />

program into the Mahindra Finance IT<br />

assets or into external networks.


File<br />

Int<br />

Usage<br />

ernal Usage<br />

Do's and<br />

Do's<br />

Don't<br />

and<br />

s<br />

Don<br />

't s<br />

Do's<br />

- Internet access should be restricted to<br />

work related purpose only.<br />

Don't s<br />

- Accessing sites for personal commercial<br />

gain/recreation (such as trading, chatting,<br />

gaming and sports) or download<br />

software/pornography/large files include<br />

audio-video files are prohibited.<br />

- Indulge in inappropriate unprofessional<br />

behavior on-line while using internet<br />

through Mahindra finance is prohibited.<br />

- Personal computing devices used for<br />

accessing internet, should not be used for<br />

accessing information not permitted<br />

inside enterprise network, irrespective<br />

access network or mode of access.<br />

Com put ing Device Do's and<br />

Don't s<br />

Do's<br />

- User requiring privilege access to Wi-Fi,<br />

USB, Bluetooth, media access ports or<br />

administrative access must obtain<br />

approval with proper justification from the<br />

relevant steering committee member and<br />

the CISO. These privileged accesses, if<br />

provided must be used solely for the<br />

purpose for which it was granted.<br />

- User have to take due care of the computing<br />

device(s) allotted to him/her and is<br />

personally liable to reimburse Mahindra<br />

Finance of any damage to or loss of the<br />

device caused by improper care or<br />

non-return of device after cessation of<br />

service.<br />

- In addition user has to agree to the<br />

installation of the security software on<br />

his/her device and/or remote erasure/<br />

encryption of the data in case loss is<br />

reported.<br />

- It is the responsibility of user to manage and<br />

maintain the PDA allotted to him/her.<br />

- User?s using computing device(s) and<br />

related software to connect Mahindra<br />

Finance?s technology infrastructure remotely<br />

shall, without exception, follow the<br />

secure-remote- access mechanism.<br />

Adherence to the mechanism is enforced<br />

through Citrix/VPN access to Mahindra<br />

Finance?s application/portals.<br />

- Users shall safeguards passwords from<br />

disclosure to anyone, including his/her<br />

family members.<br />

- Computing device(s) that are used for<br />

Mahindra Finance?s business interest,


must display a reasonable level of<br />

physical security measures. Users<br />

are expected to secure their<br />

handhelds and related devices,<br />

irrespective of whether the computing<br />

device(s) is in active use or not.<br />

- Any computing devise(s) that is<br />

configured to access the Mahindra<br />

Finance?s IT assets via wireless or wired<br />

connectivity adhere to the authentication<br />

requirements as specified by the <strong>BITS</strong>.<br />

- In addition to this, all hardware security<br />

configurations on Mahindra Finance<br />

owned or hired computing device(s),<br />

secure platform and software must be<br />

approved by the <strong>BITS</strong> before it is installed<br />

on the device.<br />

- Personal computing devices used for<br />

accessing confidential corporate<br />

information should be safeguarded<br />

against theft/misuse/loss. Loss/theft<br />

should be duly reported to IT risk<br />

committee through CISO. Employee<br />

should ensure erasure of data upon exit<br />

to ensure confidentially and integrity of<br />

Mahindra Finance?s information.<br />

Don't s<br />

- User should not modify, install or<br />

uninstall application, software or<br />

updating patches by their own. Users<br />

shall not modify any configurations<br />

including OS, network access,<br />

administration rights etc.<br />

- Password or other confidential<br />

information should not be stored on<br />

computing device(s) or their associated<br />

storage device (such as SD and CF cards<br />

as well as memory sticks and related<br />

flash based supplementary storage<br />

media)<br />

- Users shall not make any notifications to<br />

Mahindra finance owned / hired<br />

computing device(s) and installed<br />

hardware or software. This includes but<br />

not limited to installation of software,<br />

connection of sync cables and cradles<br />

and use of Mahindra finance-owned<br />

wireless/wired network via these devices.<br />

Wireless Usage Don't s<br />

- Wireless access to internet is restricted by<br />

corporate policy. Therefore the user<br />

should not modify the<br />

configuration/setting of the wireless<br />

devices/data cards.


Syst em Policies<br />

Hom e Com put er Policies<br />

- All employees L7O & Above/Territory<br />

level executives and employees<br />

specifically approved by departmental<br />

head, may be provided with laptops<br />

- Those employees reaching the eligibility<br />

level will qualify for laptops. Only if HR<br />

systems states the change in the role<br />

- All other employees may be provided<br />

with a desktop tagged to their<br />

workspace and employee ID<br />

- All eligible employees will be provided<br />

with mobility devices depending upon<br />

the performance and business<br />

approval.<br />

- Tablets or other form factors (including<br />

mobility devices) may be provided lieu<br />

of laptops at the sole description of the<br />

<strong>BITS</strong>.<br />

- Outsourced vendor personnel shall be<br />

provided computer based on the need<br />

as may be determined by their<br />

department head in consultation with<br />

- This computer is MMFSL property and is<br />

returnable to the company, upon<br />

cessation of employment.<br />

- Replacement of the computer will be<br />

considered post an assessment done by<br />

a computer specialist post three years<br />

- The computer is subject to AMC post the<br />

three year period<br />

- User shall be eligible for replacement of<br />

the device post four year period, subject<br />

to assessment by computer specialist.<br />

Loss / Theft & Dam age<br />

- The information technology<br />

representative of the area to which the<br />

user belong, should also be informed<br />

immediately.<br />

- Loss/ Damage related to computing<br />

device will be subjected to insurance<br />

assessment<br />

<strong>BITS</strong>.


- The user will be responsible to bear the<br />

cost of damage incurred due to act of<br />

negligence as per actual. INR 10,000 will<br />

be deducted from the salary of the user<br />

on immediate basis, part or full will be<br />

reimbursed later based on insurance<br />

claim amount, as well as justification<br />

evaluation of the incident report<br />

- The caution deposit of INR 10,000 will be<br />

kept as security.<br />

cies<br />

IT Poli<br />

- Software installation / Management on<br />

User Policies<br />

- Home computing device provided<br />

for home shall access corporate<br />

resources , from home through<br />

virtual private network (VPN) only,<br />

and at office, only through data card<br />

- Resident computing device shall be<br />

serviced only by authorized service<br />

center.<br />

the official computer will be handled<br />

only by IT helpdesk<br />

- Report use of non official computer or<br />

any misuse to the IT risk committee<br />

- Maintain a central database of<br />

computers, irrespective of whether it is a<br />

pool resource/shared or assigned to<br />

individuals for tracking purpose


Applicat ion support


Applicat ion Support


Net w ork Support


1. SSO Portal Latest - https://mfeka.com/LdapSSO/login.action<br />

2. Satkaarya through Internet - http://203.123.140.221:9070/eplogin/<br />

3. Satkaarya - http://172.30.0.222:9070/eplogin/default.aspx<br />

4. Customer Portal - http://172.30.0.222:9070/CustomerPortal/Login1.aspx<br />

5. Dealerportal-Login - http://203.123.140.221:9070/Dealerportal/LoginPage.aspx<br />

6. EMLAP - http://172.30.0.14:2018/Emlap/Statewise.jsp<br />

7. CRM - https://crmng.mahindrafs.com/main.aspx#716015364<br />

8. MAHINDRA FINANCE OFAS LIVE -http://172.30.0.14:7778/forms/frmservlet?config=ofaslive<br />

9. MRHFL OFAS LIVE - http://172.30.0.14:7778/forms/frmservlet?config=ofasmrhfl<br />

10.New OWA outlook- https://mfowa.mfeka.com/owa/auth/<br />

ogon.aspx?replaceCurrent=1&url=https%3a%2f%2fmfowa.mfeka.com%2fowa%2f<br />

11.Webmail Welcome to Webmail - http://172.30.0.117/webmail/?_task=logout<br />

12.Mahfin Mail Internet - http://mail.mahfin.com/mh/index.php/mailbox/login<br />

13.MMFSL WEB - http://172.30.0.81/mmfsl/<br />

14.MRHFL WEB - http://172.30.0.76/mrhfl/<br />

15.BPM - https://bpm.mahindrafs.com/ProcessPortal/login.jsp<br />

16.CITRIX NEW - http://mmfss-ctxweb2.mmfsl.com/Citrix/XenApp/auth/login.aspx<br />

17.Success Factors - https://performancemanager4.successfactors.com/<br />

sf/home?bplte_company=mahindrama#/login<br />

18.SME - http://mahindrafs.sme.com:9081/ARXAL/<br />

19.GEM - http://www.mfstar.in/login<br />

20.SAP - https://ep.mahindra.com/irj/portal<br />

21.MAHINDRA FACEBOOK - https://mahindra.facebook.com/<br />

22.GST Registration - http://mmfslweb.mfeka.com:9070/GSTReg/GST/GST_Registration.aspx<br />

23.V A H A N - https://vahan.nic.in/nrservices/<br />

24.DocOnline - https://app.doconline.com/user#/settings<br />

25.AP TRANSPORT DEPARTMENT - http://www.aptransport.org/


General Com put ing Policy<br />

- <strong>BITS</strong> shall provide users with appropriate<br />

computer as per the ?Official Computer<br />

policy?.<br />

- Procurement, installation, movement<br />

de-commissioning and disposal of<br />

Mahindra finance?s hardware decided and<br />

approved by the CISO, National head<br />

(BITs) and IT coordinator and subsidiaries.<br />

In their absence the sector CISO shall<br />

substitute.<br />

- Provisioning, modification and<br />

de-provisioning of access rights and level<br />

of access is decided and approved by user<br />

department head (DH and level) with<br />

recorded justification.<br />

- Users are responsible for their work<br />

related data and store all of them on<br />

designated application/file servers<br />

- User shall cooperate with <strong>BITS</strong> for<br />

software updates, patch management,<br />

anti-virus scanning and/or for any other<br />

activity required to be performed for<br />

operation and maintenance purpose.<br />

- Mahindra Finance may record, monitor<br />

and review user activities including but<br />

not limited to emails, attachments,<br />

internet access, chat, access card records<br />

etc. The sole purpose of this recording,<br />

monitoring and review by the <strong>BITS</strong> is to<br />

safeguards the interest of Mahindra<br />

Finance. Any data gathered during the<br />

process of monitoring may be used for<br />

gathering intelligence and evidence on<br />

any policy violation.<br />

provided for the purpose. User?s official<br />

computer is not backed up and recovery<br />

of data from local storage cannot be<br />

guaranteed.


Com put ing Device Usage<br />

policy<br />

- User should note that the PDA is not a<br />

secure computing device<br />

- User should follow the following security<br />

controls<br />

1. The computing device(s) should be<br />

password protected and encrypted.<br />

2. Use of power on password/BIOS<br />

password is highly recommended<br />

3.User should not store the password on<br />

the device itself.<br />

Wireless Usage Policy<br />

- Users should ensure that wireless<br />

service is carefully and appropriately<br />

used, to avoid misuse and excessive<br />

charges. Users should be aware that<br />

excessive charges will be recovered<br />

- Users are the responsible for the safety<br />

and security of the wireless devices and<br />

are responsible for any damage done to<br />

the device(s) during their possession/use.<br />

- Copyrights, licenses, Attributions - User<br />

at Mahindra finance must respect<br />

copyright and license (including open<br />

source license) to software,<br />

entertainment material, published and<br />

unpublished documents and any other<br />

legally protected digital information.<br />

User should not copy or distribute<br />

copyrighted material. Mahindra finance<br />

owns all electronic documents, reports,<br />

and worksheets, email messages that are<br />

generated on Mahindra Finance IT assets<br />

or as part of Mahindra Finance Activities.<br />

from them, unless justified/has the<br />

approval of the head of the department.


Law Policy<br />

- Social Media policy ? User responsible for risk<br />

associated with social-media and<br />

- Shall not disclose any confidential<br />

information, trade secrets or any other<br />

Mahindra Finance material<br />

- Shall not harm of tarnish the image,<br />

reputation and/or the goodwill of Mahindra<br />

Finance and/or any of its employee.<br />

Employees also prohibited from making any<br />

discriminatory, disparaging, defamatory or<br />

harassing comments when blogging or<br />

otherwise engaging in any conduct prohibited<br />

under Mahindra Finance policies.<br />

- Shall not enable circulation of<br />

unauthenticated news, rumors or unverified<br />

information<br />

- Must not attribute personal statements,<br />

opinion or beliefs to Mahindra Finance<br />

- Shall not use Mahindra Finance?s trademarks<br />

normally be for limited usage and time<br />

period under controlled<br />

conditions.<br />

- Violation of the policy and applicable<br />

laws ? We could dismiss employees<br />

from service after due disciplinary<br />

proceedings, we may act against<br />

employer of vendor and others and<br />

remove access to Mahindra Finance<br />

premises. If any user violation<br />

provisions of the Information<br />

Technology act of India, 2000, it?s<br />

amended in 2008, rule 11 as amended<br />

in 2011 and other applicable laws in<br />

India or abroad, Mahindra Finance shall<br />

be entitled to take necessary action<br />

under the legislation or under any other<br />

law, mad may also if required, notify the<br />

law enforcements authorities.<br />

logos and any other Mahindra finance<br />

intellectual property in connection with any<br />

social media activity<br />

- Exceptions- Exceptions to any sections of this<br />

policy can be approved only by CISO/National<br />

head (<strong>BITS</strong>)/ CIO. These exceptions would


sit<br />

Reason for Vi<br />

- Proactive visit<br />

- Project Implementation<br />

- HHD-RMS & PMS<br />

- Breakdown Call<br />

- Visit on request<br />

- User training<br />

- Installation Vendor Meeting / Site visit<br />

Ident ifying Training<br />

Requirem ent<br />

- Proactive visit<br />

Checklist<br />

- Record Asset details<br />

- Check printer function<br />

- Check resource sharing Check UPS<br />

functions<br />

Conclusion<br />

- The above listed knowledge details<br />

should be acquired by the person in <strong>BITS</strong><br />

department.<br />

- Project Implementation<br />

- HHD-RMS & PMS<br />

- Breakdown Call<br />

- Visit on request<br />

- User training<br />

- Installation Vendor Meeting / Site visit<br />

Ensure Ot her Act ivit ies<br />

- Delete temporary & unwanted files<br />

- Update BAMS Asset register<br />

- Record Branch requirement<br />

- Logged call for malfunctioning assets<br />

- Update anti-virus definitions Update OS<br />

& Application patches.


END


Cont ent Cont ribut ion<br />

1. Mr. Venkatesh Sekar<br />

(Deputy Manager - IT)<br />

2. Mr. Sibaram Gouda<br />

(Assistant Manager - IT<br />

3. Mr. Chirag Kumar patel<br />

(Deputy Manager - IT)<br />

4. Mr. Ranjith Kumar<br />

(Deputy Manager - IT)<br />

5. Mr. Dushmanta Kumar Sahu<br />

(Deputy Manager - IT)<br />

6. Mr. Arun Diwan<br />

(Manager - IT)<br />

7. Mr. Sivakumar .KS<br />

(Deputy General Manager- IT)<br />

8. Mr. Nithyanandam.R<br />

(Manager - IT)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!