Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Document Your IT Infrastructure

Document Your IT Infrastructure

Quick, off the top of your head, how many network switches are in use at your office? How many wireless access points? How many routers are past their warranty or no longer getting support?

That’s not a question most business owners are asked on a regular basis, and we don’t really expect you to be able to rattle off the answers. You should have all of that information documented though.

Documenting your entire IT infrastructure saves you a ton of time and hassle later. It can help with insurance, it can help simply keep track of everything you are supposed to be keeping secure, and it can help prevent you from buying something you don’t need.

What Information Needs to be Documented?

While it’s going to depend a little bit from device to device, you’ll at least want to track some of the basics.

Device Name: Pretty straightforward—the name of the device on the network, if it has one, or give it a descriptor name if it doesn’t, such as “Conference Room Network Switch.”

Device Model and Serial Number: You’ll want this for support and warranty issues. It’s easier to have it written down than having to find the tiny label on the device after it is in place and hooked up.

Installation Date: When was the device purchased and installed?

Who Installed It: It never hurts to know—if a particular company or employee set it up, and it wasn’t set up properly, you’ll want to know who to reach out to.

Warranty Information: How long does the manufacturer’s warranty last? Did you purchase extended warranty? Does the device have an estimated end of life date?

Vendor Information: Is there a support number? Did you purchase the device directly from the vendor or a third party?

Location: Where is the device located in the office? Is it in the server room, or behind the reception desk? 

Service History: This one is huge, and the hardest information to keep up with. If work is done on the device, it should be documented. That includes the initial setup and ongoing administrative changes. If the device has a tendency to fail often, your documentation will show this as you audit your network.

Documenting your IT is a huge part of keeping your IT running smoothly. You don’t need to do this by yourself. At 415 IT, we document every piece of hardware and software we touch and keep a very clear historical record of the work we do so we can always adjust our processes and help business owners make informed IT-related decisions.

Want to learn more? Give us a call at (415) 295-4898.

Tip of the Week: Being Courteous and Professional ...
Five Cool Technologies You Can Give for Secret San...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Internet Software Data Recovery Email Managed IT Services Mobile Device Business Collaboration Phishing Small Business Malware Google User Tips Innovation Outsourced IT Cloud Computing Hackers Cybersecurity Hardware Smartphone Business Management Tech Term Upgrade Microsoft Managed Service Communication Mobile Devices Computer Android Windows 10 Business Continuity Workplace Tips VoIp Smartphones Covid-19 Quick Tips Backup Disaster Recovery Ransomware Managed Service Provider Paperless Office Remote Work Encryption Communications Network Server Office 365 Passwords Business Technology Wi-Fi Data Management Users Saving Money Browser BDR Artificial Intelligence Internet of Things Remote Monitoring Help Desk Managed IT Social Media Compliance Holiday Vulnerability Government Document Management Windows 7 Save Money Healthcare Data Security Miscellaneous Managed IT services Chrome Laptops Scam Automation Applications Blockchain Microsoft Office Facebook Windows Remote Employer-Employee Relationship Processor Information Project Management Tip of the week Two-factor Authentication Analytics Redundancy Bandwidth Vendor Management Office Gadgets Avoiding Downtime Mobile Office Antivirus Virtualization Health Wireless Software as a Service Net Neutrality Company Culture RMM IoT Regulations Proactive Hard Drive Data Loss Mobility Meetings Maintenance Information Technology Storage VPN Router IT Management OneDrive Managed Services Training Networking BYOD Customer Relationship Management Machine Learning Employee-Employer Relationship Files Access Control Virtual Private Network Website Infrastructure Apps Time Management Password Word Patch Management Data Breach Tablet Unified Threat Management Internet Exlporer Dark Web Augmented Reality File Management Management WiFi Smart Technology Monitoring Computing File Sharing Payment Cards Spam Alert Remote Worker Server Management Data Storage Financial Display Remote Monitoring and Management Operating System HIPAA Utility Computing Mobile Security Social Network Bring Your Own Device Flexibility Unified Communications Electronic Health Records Professional Services Assessment Employees Consulting Remote Computing Downtime Search Instant Messaging Network Management The Internet of Things Vendor Consultation Gmail Risk Management Managed Services Provider Recycling Cooperation Holidays Money Remote Workers Co-Managed IT Asset Tracking Backup and Disaster Recovery Connectivity Smart Devices Read Only Security Cameras SharePoint Break Fix Wasting Time Current Events Outsourcing Permissions CIO applications Heating/Cooling Peripheral Point of Sale Migration Mail Merge Tech Terms eWaste User Error Cyber Monday Staff IT MSP Finance Cookies Superfish Cables Microsoft Excel Windows Server Laptop Computing Infrastructure Employer/Employee Relationships Trending Apple Optimization Conferencing Vulnerabilities Video Conferencing Human Error Hard Disk Drives Statistics Sensors Banking Printing Managing Stress Downloads Database Google Calendar Fraud Servers PCI DSS E-Commerce Chatbots Address Theft Notes Business Telephone Authentication Nanotechnology Wires User Management Remote Working Mirgation Electronic Medical Records Alerts Proactive Maintenance Solid State Drive Virtual Machines Mobile Computing Biometric OneNote Wearable Technology Permission Star Wars Techology Travel Solid State Drives Bluetooth Reviews Enterprise Content Management Voice over Internet Protocol Recovery Virtual Reality Projects Value of Managed Services Features Identity Theft Enterprise Resource Planning Firewall PowerPoint IT Assessment Authorization App Teamwork Budget Cache Technology Laws Comparison Licensing Cybercrime Cyber security Credit Cards Politics Geography Gamification How To Outlook Test Disaster Resistance Technology Tips Options Telephone End of Support Social Networking Emergency Private Cloud Multi-Factor Security Data Warehousing Return on Investment Legislation Websites CRM Identity Procurement Printer Distributed Denial of Service Digitize WPA3 Screen Reader Shared resources Going Green Unified Threat Management Specifications Database Management Computers Modem High-Speed Internet Operations Personal Information Tech Support Shortcut Proactive IT Digital Payment Hotspot 5G Mobile VoIP Windows Server 2008 Gifts Bookmarks ROI G Suite Settings Zero-Day Threat Smart Tech Manufacturing SaaS Content Filtering Cyberattacks Social Mobile Managed IT Service Virtual Assistant Bitcoin Shadow IT Fleet Tracking Batteries Mobile Device Management Black Friday GDPR Customer Service Lenovo Development Transportation Active Directory Outsource IT IT Technicians Cost Management IT Consulting Mouse Touchscreen Language Wireless Internet Hacking Big Data Hacker Favorites Motherboard Samsung Chromebook Education Twitter CES Printers CEO Students Daniel Stevens Marketing Regulation

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...