Documenting Your Network – Part 3 of 5

Jan 27, 2012 | Networks

Moving right along… some of the other critical documents you should have and keep up to date for your network:

PC Setup Guide:

The PC Setup Guide is used to ensure a consistent setup and configuration of end user machines. This document allows for consistency within your infrastructure.  In other words, it helps you avoid the hodgepodge network scenario making it easier to support.

Administrator Password Change Guide:

The Administrative Password Change Procedure is a checklist and guide that ensures that all critical administrative and service accounts are identified, maintained, and updated during any system changes (personnel, threat defense, or maintenance) that would expose the system or its data to potential risk. All accounts that have elevated rights or access should be reviewed, documented, and changed if necessary.  This is most commonly used when an employee quits, or is terminated, so that the proper measures are taken to avoid a potential future security breach.

Security Review:

The Security Review is used as a guideline for hardening the IT network by asking questions about key security components such as business policies, systems management, and best practices for basic security components.


Recent Posts

Cloud Use Cases for Small and Growing Businesses

Cloud Use Cases for Small and Growing Businesses

As you may have heard, the cloud is a network of remote servers hosted on the Internet. But for businesses the world over, the cloud represents the next step in technological evolution. The cloud unlocks speed, flexibility, scale, and cost savings that businesses of...

2023 Cybersecurity Trends for Small Business

2023 Cybersecurity Trends for Small Business

The threat of cybercrime continues to grow each year, and small businesses are particularly vulnerable. The latest cybersecurity trends indicate that organizations of all sizes must remain vigilant in order to protect their valuable data.  In this article, we'll cover...

Security in a Co-Managed IT Environment

Security in a Co-Managed IT Environment

Security in a co-managed IT environment looks a little different than in a traditional environment. Don’t be alarmed. When leveraging a partner to co-manage your environment, you’ll actually have better, more robust security in most cases than if you were to manage...

Five Signs you Need Better IT Support

Five Signs you Need Better IT Support

IT systems can make or break any business. They provide an avenue for communication and collaboration, help with organizational efficiency, and drive improved customer service. Without proper IT support, businesses are often left in despair and experience hindering...

Co-Managed IT Services for Financial Services

Co-Managed IT Services for Financial Services

Financial services companies are faced with the challenge of keeping up with technology because they cannot sacrifice data security or compliance. As a result, more organizations are turning to co-managed IT services as an option that provides a balance between cost...

Co-Managed IT Services for Oil and Gas

Co-Managed IT Services for Oil and Gas

The Oil and Gas industry is an ever-evolving sector that operates in a highly competitive global market. Companies must stay ahead of the competition to remain profitable, which means keeping up with the latest technologies and trends. One way to do this is with...