Documenting Your Network – Part 2 of 5

Jan 9, 2012 | Networks

So besides a network diagram what are the other critical pieces of documentation to keep for your computer network? The Network Information File- It’s like your Facebook page if your Facebook page accurately told everything about you. Ok, maybe it’s nothing like your Facebook page, but it was fun see what it could look like.

A Network Information File (usually an Excel workbook with many tabs) provides extensive details on the entire IT system and documents the following:

    • Key contacts within the organization
    • Site particulars (codes to locked doors, security contact info, etc.)
    • End user matrix identifying personnel, departments and rights the users have to applications and data
    • Remote access information
    • Third party vendor list (phone system, telco, ISP, etc.)
    • IP Schemes
    • Email/Website information
    • Virus scan information
    • Microsoft and other licensing information
    • Printer information
    • Application information
    • Server information and specifications
    • Firewall information
    • Router and switching information
    • Back up information

More critical pieces of documentation to come next time so stay tuned…


Recent Posts

The Tempo of Cybersecurity

The Tempo of Cybersecurity

You are probably thinking to yourself, “oh great, another cybersecurity article”. I feel the same way sometimes, that I’ve become numb to the statistics, and I just want to go back to a time when we didn’t have to consider unscrupulous threat actors trying to take...

Co-Managed IT is NOT the Same as Managed IT

Co-Managed IT is NOT the Same as Managed IT

All too often, small business owners try to decide about IT investments without a complete understanding of the options available. One place where this confusion often shows up is when trying to understand the difference between co-managed IT services and managed IT...

The Role of IT Security for Small and Midsized Business

The Role of IT Security for Small and Midsized Business

Everyone knows that securing their business is important. This includes an understanding that securing private data, machines, and the network itself are of paramount importance. So why do so many companies neglect security or treat it as a distant afterthought during...