MSP best practices: PC deployment checklist

msp-best-practices:-pc-deployment-checklist
  • Provided by
    TechRepublic Premium
  • Published
    June 30, 2020
  • Topic
    TechRepublic Premium
  • Format
    Other Download

For managed services providers (MSPs), deploying new PCs and performing desktop and laptop migrations are common but dangerous tasks. The adage “you’re only as good as your last performance” certainly applies. An MSP and its technicians can bat a thousand, getting everything right completing a client’s complex cloud migrations, remote work initiatives, and proprietary business application upgrades. But make mistakes deploying a single new workstation and, regardless whether it’s fair, those PC errors are the experience the client remembers.

One reasons new PC deployments and system migrations commonly cause trouble is that there’s so much to remember. Typically the new system must be properly connected to a Windows domain, proprietary business and industry-specific applications must be installed, as must utilities and management and monitoring agents. Local data must be migrated, when applicable, and don’t forget printers. I remember reversing course and returning to a client when I once remembered forgetting that step. Using a checklist will help you reduce or eliminate client complaints and remote follow ups or return visits.

As with any checklist, MSPs may need customized versions for specific clients. That’s OK. Simply adjust the checklist as necessary the first time you deploy a new system for a client possessing unique requirements or a custom environment, then use that revised checklist as a template for that client’s future deployments. Technicians will thank you when they, too, find the MSP receiving less callbacks, and the client will appreciate the attention to detail.

People Also Downloaded

Compliance Practices in a Digital-First World On-Demand Webinar

compliance-practices-in-a-digital-first-world-on-demand-webinar

Businesses have come to realise all data is security relevant and defending against threats involves every department in a company. The need for a pragmatic way to manage risk and meet compliance standards calls for Splunk’s best-in-breed Compliance Analytics App designed to support:

  • Any format, any source, any time scale
  • Real time visibility and reporting
  • Enhanced review efficiency and scope; from traditional manual sampling review to full automated, analytics driven review
  • Simple, easy to use dashboards, investigative search forms
  • Ability to centralize infrastructure, system and application logs

Watch the complimentary Splunk Compliance On-Demand Webinar which showcases curated compliance use cases that offers more comprehensive visibility of your security posture, starting with:

  • User Account monitoring
  • Privilege Accounts assignment control and approval process
  • Shared / Privileged account owners accountability and traceability
  • Disabling and removal of Privileged accounts

Compliance Practices in a Digital-First World On-Demand Webinar

compliance-practices-in-a-digital-first-world-on-demand-webinar

Businesses have come to realise all data is security relevant and defending against threats involves every department in a company. The need for a pragmatic way to manage risk and meet compliance standards calls for Splunk’s best-in-breed Compliance Analytics App designed to support:

  • Any format, any source, any time scale
  • Real time visibility and reporting
  • Enhanced review efficiency and scope; from traditional manual sampling review to full automated, analytics driven review
  • Simple, easy to use dashboards, investigative search forms
  • Ability to centralize infrastructure, system and application logs

Watch the complimentary Splunk Compliance On-Demand Webinar which showcases curated compliance use cases that offers more comprehensive visibility of your security posture, starting with:

  • User Account monitoring
  • Privilege Accounts assignment control and approval process
  • Shared / Privileged account owners accountability and traceability
  • Disabling and removal of Privileged accounts

SSL certificate best practices policy

ssl-certificate-best-practices-policy
  • Provided by
    TechRepublic Premium
  • Published
    June 18, 2020
  • Topic
    TechRepublic Premium
  • Format
    PDF

SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications, which communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. Because of their criticality in protecting businesses and customers, a clear set of guidelines for implementing and managing SSL certificates is imperative for businesses to follow.

The purpose of this SSL certificate best practices policy is to establish a set of best practices for the issuance, management, renewal/replacement, and revocation and/or retirement of certificates.

This policy can be customized as needed to fit the needs of your organization.

People Also Downloaded