We often find that some equipment has to be upgraded, if possible, or even changed because of the end of its lifecycle. Old hardware usually causes a performance glitches and long-term headaches.
Step #2 Review OS & Other Software
While taking notes about hardware tech team will at the same time check software and operating system configuration and license management for all devices included in the network. OS and software need to be genuine, up to date on every laptop, workstation or server.
Checklist or template for server and workstations will have details about OS type (32 or 64 bit), and its version, Office version, drivers, windows update status, patch management, backup method, logs and registry files, etc. The server will have additional info about SQL status, Active directory status, Exchange status, error logs, file sharing option, etc.
Step #3 Network Design & Architecture Audit
This part of network survey will focus on network topology, design and current setup and configuration of servers, routers, firewalls, switches, and modems. Their brands, models, firmware and software versions, along with all the cabling (labeling, and organization) and WIFI infrastructure need to find its place in the template. We’ll also populate IPs for every piece of an equipment. Network connectivity check, VPN, and IP phones audits are also done in this step.
Now comes the part when we visualize your existing network and create a network diagram. Visualization
allows our team to have a chance to prepare changes in design before the final stage of network assessment.
Step #4 Network Security Assessment
We have already emphasized the importance of network security and prevention of data breach. What is the point having the fastest network around if it is not safe from cyber-attacks, viruses, spam and ransomware intrusions? Considering this we found this step the most important one.
Now get back to our network audit checklist. We’ll add even more info regarding your server and workstation anti-virus, anti-spam and anti-ransomware protection. Every device must have active, up to date and latest anti-virus business solution implemented. We’ll include in the template: name of antivirus application, virus database status, anti-virus log notes, last system scan and overall system health.
Along with anti-virus apps, we’ll pay attention to physical security like biometric locks and CCTV cameras.
In the last few years, we recommend BitDefender
to all our clients. It is the simple and lightweight solution for every security challenge. Since we are the official partner and premium seller contact us to see available plans for small and medium-sized businesses.
Step #5 Analysis & Report
The final step is to analyze and create a documented report in order to suggest improvements. This is the job for our senior network consultants. Once we have all data our tech team has collected on-site we’ll analyze everything from step 1 to step 4, break down your entire IT network infrastructure and let you know of the findings.
To achieve a network that runs smoothly, has potential and flexibility for further growth our recommendations can fall into three categories: a recommendation that needs your immediate attention, medium and long-term recommendations
Most important are those that need your instant attention and usually are in relation to security issues, outdated server model or any kind of problems that can cause downtime or data loss.