Focussed, high-value managed services engagements to proactively administer and secure your Microsoft 365 environment, file collaboration platforms, and network infrastructure (LAN and Wi-Fi).


This “Core Infrastructure & Security” tier delivers expert administration, monitoring, patching, and threat management without including end-user help desk or reactive user support.

This model is ideal for organizations that handle day-to-day user support internally and want predictable, expert oversight of critical systems.


Scope – Core Infrastructure & Security - Delivered in three (3) Tiers - MONITOR | MAINTAIN | MANAGE


MONITOR | MAINTAIN | MANAGE services will be delivered proactively for up to 300 users. See MONITOR | MAINTAIN | MANAGE - DEMYSTIFIED


1. Microsoft 365 Email & Tenant Administration

  • Full tenant administration and governance
  • User provisioning/de-provisioning, licensing optimization, and policy management
  • Email security configuration (anti-phishing, anti-malware, safe links/attachments, transport rules)
  • Mailbox and retention policy management
  • Integration with Defender for Office 365 where licensed

2. Files & Collaboration Management (OneDrive / SharePoint)

  • Governance, permission management, and external sharing controls
  • Sync health monitoring and policy enforcement
  • Data classification and retention configuration
  • Collaboration best-practice guidance and optimization

3. Network Security & Infrastructure Management (LAN & Wi-Fi)

  • Proactive monitoring and management of LAN and Wi-Fi infrastructure
  • Firewall rule management, configuration, and security posture reviews
  • Endpoint protection platform management and policy enforcement (including Microsoft Defender / Intune integration)
  • Network patching and firmware updates for supported devices
  • Wi-Fi security (encryption standards, guest isolation, rogue AP detection)
  • Threat detection, anomaly alerting, and basic incident response coordination for network-level events
  • Minor infrastructure changes (e.g., adding subnets to Active Directory Sites and Services, basic site link adjustments) included as part of standard management

Exclusions (Not Included)

  • End-user help desk, ticketing, or reactive troubleshooting for individual users
  • On-site hardware installation, cabling, or physical network upgrades
  • Purchase or replacement of network hardware (firewalls, switches, access points)
  • Microsoft 365 license subscriptions (billed separately or passed through)
  • Major projects, custom development, compliance audits, or vCIO/strategic consulting (available as add-ons or project work)


All services are delivered remotely unless on-site work is mutually agreed upon and scoped separately.

The table below breaks down each service delivered in each tier:


IT Support

No Plan

Monitor

Maintain

Manage

Hourly On-Site Rate for Services & Support
 Monday – Friday, 8:00 a.m. – 5:00 p.m.

$195 Per Hour 
 2-Hour Min.

$185 Per Hour

2-Hour Min.

$165 Per Hour

1-Hour Min.

$145 Per Hour

1-Hour Min.

Remote Help Desk Support

Monday – Friday, 8:00 a.m. – 5:00 p.m.

$40 Per 15 Min.

Included

Included

Included

After-Hours And Weekend Support

Monday – Friday, 5:01 p.m. - 10:00 p.m.

Saturday – Sunday, 8:00 a.m. – 7:00 p.m.

Not Available

$195 Per Hour
 2-Hour Min. Remote
 4-Hour Min. On-Site

$165 Per Hour
 1-Hour Min. Remote

2-Hour Min. On-Site

Included

Remote Emergency Response Time

As Available

3 Hours

1 Hour

30 Minutes or Less

On-Site Emergency Response Time

As Available

As Available

1 Day or Less

Same Day

Computers & Devices

Workstations, Servers, Mobile, BYODs

  • Physical, Virtual, Clouds, Portables
  • Network devices, IoT infrastructure  

 

Networks

Connections and traffic flows among:

  • ISP services, Network devices 
  • Ethernet, Wi-Fi, LANs and VLANs
  • Branch Trunks, Remote Access, VPNs

 

Applications & Services

Interactions & flows among:

 

Data & Storage

Identify, classify, securely handle storage

 

 

Backup, Retain and Dispose

 

 

 

AWS, O365, G-Suite

 

 

 

Cryptographic Protections

 

 

 

People & Organization

Managed Identities

 

 

Create, assign, manage, and revoke access

 

 

 

Acceptable use policies

 

 

 

Remote access policies and procedures

 

 

 

Great Start Security & Privacy

Firewall (Network & Web Security)

 

 

Intrusion Protect & Filter

 

 

Endpoint (Prevent & Detect) 

 

 

Advanced Email Security & SPAM Protection

 

 

 

Access Aligned

Managed Access

 

 

Remote access

 

 

Policies, roles, accounts, users, groups

 

 

 

Business Continuity & Disaster Recovery 

Response to Cybersecurity Incidents

 

 

Recover from Hardware Change/Failure

 

 

 

Recover from Cybersecurity Incident

 

 

 

Documentation, Asset Mgmt., Compliance, Governance

Executive Summary Reports

 

 

Network Documentation

 

 

Asset Tracking and Reporting

 

 

Vendor Management

 

 

AUP (Acceptable Use Policy)

 

 

 

Written Disaster Recovery Plan and Updates

 

 

 

Quarterly Planning and Readout

 

 

 

Technical Services & Line of Business Apps

Elevate Unified Communications

 

 

 

Add/Move/Remove Users, Mailboxes

 

 

 

App Licenses and Support

 

 

 

Mobile Device Management

 

 

 

Software Installation and Upgrades

 

 

 

Loaner Laptops/Workstations/Servers

 

 

 

Sourcing / Replacing Warranty Parts

 

 

 





Phone: 925-293-2222

Email: [email protected]

Client Portal: www.support.bizcare.com

Website: www.bizcare.com/contact-us