Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 103
ID Title Type Of Article
1024 
Setup Access to Compliance File Manager on SI Portal How To
993 
5 things customers want from their salesperson Sales and Marketing
778 
TPM Installed on Cheetah requires correct BIOS Version How To
730 
Parallels Connection Mode Change How To
728 
Cell Phone Policy for Conference Rooms and Meetings Company Policy
723 
Office 365 Appointment Feature Meeting Poll How To
722 
Managed Services Program Descriptions - Elite, Live, Guard How To
712 
Windows 10 multiple display - windows are moved and resized on display power cycle or sleep Support
694 
QuickBooks Stop from retaining Last Logged-In User on Startup of QuickBooks How To
687 
Fix for Error Call to GetCustomUI() for RibbonID "Microsoft.Excel.Workbook in Engage OLE" Support
675 
Browser Emulation Settings in the Registry allows IE version for specific applications How To
671 
Use Eversign with Engage for Digital Signatures on Quotes, Work Orders, Invoices and More How To
660 
3CX Client How to setup Auto Status Change on Workstation Idle How To
649 
Engage Online Portal Export Reports to Excel How To
643 
How To Find PC Name How To
599 
Consumption Marketing a function Consumption Economics: The New Rules of Marketing Case Study
598 
Dynamic Resource Allocation Strategy Workforce Management Case Study
597 
Hyper-Converged Threat Initiative IT Security Strategy Case Study
596 
Cyber Security and My Cloud Applications: Am I safe? Case Study
595 
What value does Data-Tech bring to a Cloud Provider Partnership? Case Study
594 
The solution was extremely reliable and the process couldn’t be simpler. Case Study
593 
Emergency Services Turn to 3CX Voice Over IP Phone System after Hurricane Strikes Case Study
592 
Kaseya VSA Over Other Tools What it Means for Our Clients Case Study
591 
Data-Tech Chooses Kaseya Over Major Competitor After Three Month Evaluation Case Study
590 
Tew and Associates Migration to Managed Services and Cloud Solution Case Study
Add New  Records per page  2 of 5   
Engage Knowledge Base Web View         New Client          Print
Title Offboarding Checklist      
Resolution
Critical Information you should verify you have before an IT Transition, Recommendations, and Steps to take after transition.
 
Usernames and Passwords
Domain Administrator Accounts and Passwords
Local Administrator Accounts and Passwords
Peripheral (Firewall, Wireless Access Point, etc.) administrator accounts and passwords
List of any Premise based Appliances and/or Backup Devices and usernames and/or passwords
Website domain credentials
ISP agreement information
 
Network documentation
Hardware warranty paperwork
Hardware inventory list
Software license keys
Software packages deployed
Infrastructure diagrams
Third-Party Vendor Information
Credentials for any third party service
      • Camera Systems
      • Domain Registrar (Domain Registration)
      • Telephone Vendor
      • Any additional digital system credentials (you mentioned a lighting control system)
      • Contact information & account numbers
 
Recommendations:
1.  Document and Change any Online Portal Username and Passwords IT may have had access to
2.  Change your Security System Access Code
3.  Notify your Vendors of a pending IT Change
 
Immediately after:
1. Notify all employees of the transition so Previous can't call for access
2. Change your WiFi Security Code
 
Expectations during and after an Emergency IT Transition:
      • Potential Temporary Limited of loss of Remote Access
No Data or Email will be lost however access to email may be interrupted while lockdown occurs.
Vendor *
Web Link
Date Entered
You Tube Link
Type Of Article New Client
Article ID 273


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.