This document provides information on IT network security, including ACS policies and guidelines, virtualization software, organizational requirements, hardware, commercial and business requirements. It also includes firewall configuration and testing, setup of virtual machines, benefits of virtualization, virtual machines and virtualization, backup and restore of VM, and answers to related questions.