Documentation: Best Practices

Documentation: Best Practices

Document Anything New or Changed


When we set up anything that can be defined as “new” or “changed”, it must be documented. For example:

 

  • a customer that wasn’t using Splashtop is now using it. That’s something new so we need to add a remote access flexible asset.
  • A user password is changed. The change needs to be made under that org’s passwords in ITG.
  • A user ‘s personal email address changes. Needs to be changed in their contact in Autotask.
  • We install a new firewall:
    • The LAN flexible asset needs to be updated to link to the new device.
    • In the security asset the new firewall needs to be referenced
    • In the security asset a new configuration backup needs to be uploaded.
    • A backup asset may need to be updated

 

Be aware of the related items when you update an item. Make sure any related items that need to be changed are edited as well.  

Documenting anything new or changed is the responsibility of the person who changed it. 


Hide Personally Identifiable Information (PII)

When creating a how-to article, you may want to include screenshots. You must mask any personally identifiable information including customer names, end user names, email addresses and phone numbers. Here is an example: 






It is absolutely mandatory that you mask PII when using screenshots in your documentation, whether the documentation is internal or is customer-facing. 


Please read the following for more information on documentation practices: 






    • Related Articles

    • Process to Add Customers as IT Glue Lite Users

      Preliminary Steps If for a non-primary contact, primary contact must approves access before proceeding (in writing, via email or fax or postal mail Verify what other authorizations this user should have (if any - options are listed in IT Glue Site ...
    • Where to Put Information in IT Glue

      Items That Are Manually Added to IT Glue Cybersecurity insurance Add to organization as a vendor flexible asset and link the vendor to the Security flexible asset as a related item. Authorization Contacts Under Site Summary Flex asset, we can tag ...
    • IT Glue Password Asset: Best Practices

      Never use embedded passwords. Only use general passwords. This is best security practice. 1. Each password entry should have a title that is unique within the organization. If there is more than one of the same type of password, differentiate the ...
    • Reading the KB: Best Practices

      There is a fundamental flaw in the Zoho KB. If you are logged in as an "agent" (for example, in order to edit a document), you cannot access articles via the permalinks. In order to see articles via permalinks, you need to have an end user account in ...
    • Intake and Troubleshooting Best Practices and Policies

      General Troubleshooting Guidelines Intake: Defining the Issue Whether you are a technical or an administrative team member, when performing intake on a technical issue, it is imperative that you define and document the nature and scope of the problem ...