IT Assessment Checklist

The key to ensuring a smooth migration and phenomenal IT performance is following a detailed IT Assessment Checklist & having a solid transition strategy.  Boost IT starts strong by doing a in-depth assessment so that we can plan your migration to avoid surprises, stabilize your network to resolve issues, and lay a foundation for effective IT management. All of this is a part of our proven process.

IT Assessment Checklist Overview

In Boost IT’s IT Assessment, there are 2 main IT assessment modules and 2 optional add-on modules. We review the results after the assessment and can present the findings to your management team.

Included: Network Assessment & Security Assessment

Add-On: Exchange Assessment and/or SQL Assessment

Network Assessment

What reports are provided from our Network Assessment:

Asset Detail Report

Lists all computers, servers, virtual servers, printers, managed switches, and other network devices on your network. This is helpful so you know the name & age of systems, softwares installed, if storage is becoming full, the status of endpoint protection software, IP addresses, and much more.

Site Diagram

A site diagrams shows you the layout of your network and devices in graphical form. Very few companies have a site diagram when asked for one, but it can decrease troubleshooting time and be a valuable aid for strategizing and budgeting during

IT SWOT Analysis

The IT SWOT analysis is used to evaluate the Strengths, Weaknesses, Opportunities, and Threats affecting an IT network. The analysis involves identifying internal and external issues that are favorable and unfavorable to increasing the overall network health and security of the environment. After the SWOT analysis has been performed, a list of recommendations and suggestions will be developed based upon achievable goals and objectives of the organization.

Strengths and Weaknesses are internal to the organization and include issues the organization has direct control over. For example, deciding whether to replace old computer hardware, moving to a hosted mail service, allowing mobile device use or upgrading to a new operating system. Opportunities and Threats are external to the organization and therefore cannot be controlled directly. For example, evaluating carrier bandwidth, identifying security issues associated with wireless communications, recognizing risks of being located in geographically unstable areas prone to earthquake or hurricane.

Identification of SWOTs is important because they form the basis in planning to achieve realistic IT objectives.

Network Management Plan

This report will help prioritize issues based on the issues risk score. A list of all affected computers, users, or sub-systems are provided along with recommended actions.

Security Assessment

Client Risk Report

Identifies domain controllers and online status, enumerates FSMO roles at the site, lists the organizational units and security groups (with members), lists the users in Active Directory, status, and last login/use, identify computers with weak passwords that may pose a security risk, identifies computers missing security updates, lists the security holes and warnings from the External Vulnerability Scan.

We also do a visual evaluation of these items during an assessment:

  1. Network Diagram
  2. network hardware
  3. security configuration
  4. servers
  5. remote access/VPN
  6. domain names
  7. web sites
  8. web hosting provider
  9. internet provider
  10. e-mail provider
  11. phone system
  12. backup system
  13. tablets
  14. phones
  15. printers
  16. cabling
  17. power control devices
  18. all apps
  19. software applications
  20. technology vendors
  21. technology usage policies
  22. Generate reports
  23. Create recommendations
  24. IT Assessment reports review with management team