Wsus
By Erik Eckel Introduction
Version 1.0 February 4, 2010
Tracking client systems, software, security, backups, and network configurations is a complex process; worse, the process is fraught with error. It's very easy to overlook simple but important issues when first meeting a client and reviewing the client's technology infrastructure. Determiningand logging technology weaknesses and vulnerabilities that require attention, as well as tracking which recommendations have been provided to clients (in writing, no less), are difficult tasks. This simple checklist can help.
Customize the template
The Word document is easily edited to meet any special needs your clients or office may have. Further, sample notes are included within theWorkstation 1, Notes and Recommendations pages to help you understand how to use it (just cut-and-paste the network, workstation, and server entries into as many pages as there are networks, workstations, and servers).
Major benefit of using the template
One of the most significant benefits of using the checklist is it will help you gauge the client's willingness to properly invest in the systemsnecessary to achieve the client's stated business needs and objectives. My office has been burnt more than once by clients who talk a big game but, when it comes to crunch time, balk like rookies seeing their first major league curveball. We've invested numerous hours in understanding a client's specific business needs and security requirements, only to be told at the eleventh hour that the $9,000project the client said they wanted to complete really needs to be completed for just $4,000. By completing this checklist upfront, you can learn what's required to close technology gaps and implement appropriate security controls, properly license software, and meet best industry practices. In other words, the checklist provides you with a barometer to learn just how professional and serious a clientreally is.
Page 1
Copyright ©2010 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/
Network, PC, and server audit checklist
CLIENT INITIAL MEETING
Contact Title Company Name Street Address City, State, Zip Telephone Mobile Email
NETWORK (Location 1) ITEM
ISP 1 Modem / Integrator ISP 2 Modem /Integrator Hardware-Based Firewall Network Switch Battery Backup Cabling Grade Wireless Security Data Circuit Sustained Ping Test Bandwidth Test DHCP Authority DNS Authority WAN IP Other 1 Other 2
DESCRIPTION
RECOMMENDATION
Page 2
Copyright ©2010 CBS Interactive. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/
Network,PC, and server audit checklist
WORKSTATION 1 (Computer 1 Name) ITEM
Make Model Computer Name Workgroup/Domain OS CPU
DESCRIPTION
Dell Dimension 2200 Receptionist ACMECORP Windows XP Professional SP3 Pentium 4 2.8GHz
RECOMMENDATION
NA NA NA NA NA Our clients report much better performance running Outlook, other Microsoft applications, and QuickBooks when using dual-core powered CPUs;this machine's CPU predates the introduction of Intel's dual-core CPUs. Recommend minimum of 1 GB for Windows systems that run QuickBooks. C reports 64% free D reports 92% free NA Chkdsk operation revealed master file table and allocated free space issues; recommend verifying full backup and then performing chkdsk with /f repair operation. 5%; defragmentation of C not required. 192.168.1.1 range,serviced by network router. Version 8.0 is installed; our office recommends upgrading to version 9 to better secure Windows systems. No action required; no reported unresolved security threats. Recommend downloading and installing security patches and performance updates. Recommend upgrade to Microsoft Office Professional 2007. Recommend upgrading to Outlook 2007 and QuickBooks Professional 2010...
Regístrate para leer el documento completo.