What Types Of Things Should Be Documented?

One of the keys to being able to efficiently manage, support and use your IT systems is standardized documentation.

At White Mountain, we utilize a secure, state of the art database for documentation and client SOP’s (Standard Operating Procedures).  As we implement, manage and support your systems we are continuously referencing and updating the documentation that outlines what we did and how we did it.

The goal is to empower the support team to be as efficient as possible and to avoid depending on a single individual for critical information or knowledge.  Ensuring a high level of efficiency and responsiveness on our end, allows us to keep your costs down, and productivity up.  Having a professional Managed Service Provider supporting your business provides exponentially more value than a single employee or very small IT provider.

Here are a few of the things that should be included in your IT documentation:

  • Network diagram and floor-plan
  • ISP and circuit info
  • Inventory of all software and hardware
  • Complete documentation of servers
  • Security profile of data, share and user group access
  • Data backup requirements and system configuration
  • User census and profile
  • Firewall configuration and security profile
  • Remote access configuration
  • Third-party vendor information
  • and much, much more!

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

How to Transition to or Establish a New Office Location

It’s always exciting when you can expand your business’ influence with a new location, but this excitement brings with it all kinds of complications. There’s always something, whether it’s the technology for the new location or the logistics surrounding the opening. Let’s look at how you can make sure that technology is not the thing that holds your business back from opening a new location. All ...

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...

Six Reasons Your Laptop?s Battery is Dead

Battery Capacity The obvious answer is that the capacity of the laptop battery plays a crucial role in determining how long it can power the device. A lot of times, smaller and thinner laptops often have batteries that aren?t big enough as they aim to maintain a lightweight and portable design. Power-Hungry Components Some laptops come equipped with power-hungry components, such as high-perform...

Why You Need a Custom IT Strategy for Your Business

Alignment with Your Business Objectives A custom IT strategy ensures that technology investments and initiatives are aligned with the organization's overall business objectives. It helps IT departments prioritize projects that directly contribute to the company's success. Many of these decisions are based around the acquisition and support of technology and how it aligns to help them achieve thei...