What Types Of Things Should Be Documented?

One of the keys to being able to efficiently manage, support and use your IT systems is standardized documentation.

At White Mountain, we utilize a secure, state of the art database for documentation and client SOP’s (Standard Operating Procedures).  As we implement, manage and support your systems we are continuously referencing and updating the documentation that outlines what we did and how we did it.

The goal is to empower the support team to be as efficient as possible and to avoid depending on a single individual for critical information or knowledge.  Ensuring a high level of efficiency and responsiveness on our end, allows us to keep your costs down, and productivity up.  Having a professional Managed Service Provider supporting your business provides exponentially more value than a single employee or very small IT provider.

Here are a few of the things that should be included in your IT documentation:

  • Network diagram and floor-plan
  • ISP and circuit info
  • Inventory of all software and hardware
  • Complete documentation of servers
  • Security profile of data, share and user group access
  • Data backup requirements and system configuration
  • User census and profile
  • Firewall configuration and security profile
  • Remote access configuration
  • Third-party vendor information
  • and much, much more!

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Strategies to Control Your Passwords

Passwords are the keys to digital access, but they're often not treated as keys; meaning they aren’t always protected by their users. Unfortunately, people don’t always do everything they can to protect their passwords and there are a lot more scammers out there than pickpockets. Effective password management is crucial for any business. It works to maintain the security of online accounts and se...

Is Your Organization Prepared to Invest What is Needed into Cybersecurity?

Safeguarding your business' infrastructure from various threats is a well-known imperative. In discussions about network security, the term "endpoint" frequently arises. Exploring the significance of securing all endpoints is the focus of today's article. Commencing with an elucidation of what constitutes an endpoint, we define it as "any device connected to a network capable of serving as a po...

Comprehensive Cybersecurity Starts With These Actions

The effectiveness of your business' IT security heavily relies on the functionality of your IT operations. Ensuring that your staff understands their role in safeguarding your business assets is imperative. Let’s delve into the essential priorities for establishing a robust security training platform—an indispensable element in fortifying your business' IT defenses. Evaluate and Improve Your Se...

You Need to Have a Business Continuity Plan for Your SMB

Business technology is known to be remarkably finicky, particularly if you do not have the requisite knowledge to manage and maintain it. After all, there is a reason why you hire an IT department or a managed service provider to handle this role. What happens if your technology fails, though? Do you have a plan in place? What does a plan like this even look like, anyway? Let’s dig into the detail...