Documenting Your Network – Part 3 of 5

Jan 27, 2012 | Networks

Moving right along… some of the other critical documents you should have and keep up to date for your network:

PC Setup Guide:

The PC Setup Guide is used to ensure a consistent setup and configuration of end user machines. This document allows for consistency within your infrastructure.  In other words, it helps you avoid the hodgepodge network scenario making it easier to support.

Administrator Password Change Guide:

The Administrative Password Change Procedure is a checklist and guide that ensures that all critical administrative and service accounts are identified, maintained, and updated during any system changes (personnel, threat defense, or maintenance) that would expose the system or its data to potential risk. All accounts that have elevated rights or access should be reviewed, documented, and changed if necessary.  This is most commonly used when an employee quits, or is terminated, so that the proper measures are taken to avoid a potential future security breach.

Security Review:

The Security Review is used as a guideline for hardening the IT network by asking questions about key security components such as business policies, systems management, and best practices for basic security components.


Recent Posts

The Tempo of Cybersecurity

The Tempo of Cybersecurity

You are probably thinking to yourself, “oh great, another cybersecurity article”. I feel the same way sometimes, that I’ve become numb to the statistics, and I just want to go back to a time when we didn’t have to consider unscrupulous threat actors trying to take...

Co-Managed IT is NOT the Same as Managed IT

Co-Managed IT is NOT the Same as Managed IT

All too often, small business owners try to decide about IT investments without a complete understanding of the options available. One place where this confusion often shows up is when trying to understand the difference between co-managed IT services and managed IT...

The Role of IT Security for Small and Midsized Business

The Role of IT Security for Small and Midsized Business

Everyone knows that securing their business is important. This includes an understanding that securing private data, machines, and the network itself are of paramount importance. So why do so many companies neglect security or treat it as a distant afterthought during...