Documentation: Best Practices
Document Anything New or Changed
When we set up anything that can be defined as “new” or “changed”, it must be documented. For example:
a customer that wasn’t using
Splashtop is now using it. That’s something new so we need to add a remote access flexible asset.
A user password is changed. The
change needs to be made under that org’s passwords in ITG.
A user ‘s personal email address changes.
Needs to be changed in their contact in Autotask.
We install a new firewall:
The LAN flexible asset needs to be
updated to link to the new device.
In the security asset the new
firewall needs to be referenced
In the security asset a new configuration
backup needs to be uploaded.
A backup asset may need to be
updated
Be aware of the related items when you update an item. Make sure any related items that need to be changed are edited as well.

Documenting anything new or
changed is the responsibility of the person who changed it.
When creating a how-to article, you may want to include screenshots. You must mask any personally identifiable information including customer names, end user names, email addresses and phone numbers. Here is an example:

It is absolutely mandatory that you mask PII when using screenshots in your documentation, whether the documentation is internal or is customer-facing.
Please read the following for more information on documentation practices:
Related Articles
Process to Add Customers as IT Glue Lite Users
Preliminary Steps If for a non-primary contact, primary contact must approves access before proceeding (in writing, via email or fax or postal mail Verify what other authorizations this user should have (if any - options are listed in IT Glue Site ...
Where to Put Information in IT Glue
Items That Are Manually Added to IT Glue Cybersecurity insurance Add to organization as a vendor flexible asset and link the vendor to the Security flexible asset as a related item. Authorization Contacts Under Site Summary Flex asset, we can tag ...
IT Glue Password Asset: Best Practices
Never use embedded passwords. Only use general passwords. This is best security practice. 1. Each password entry should have a title that is unique within the organization. If there is more than one of the same type of password, differentiate the ...
Reading the KB: Best Practices
There is a fundamental flaw in the Zoho KB. If you are logged in as an "agent" (for example, in order to edit a document), you cannot access articles via the permalinks. In order to see articles via permalinks, you need to have an end user account in ...
Intake and Troubleshooting Best Practices and Policies
General Troubleshooting Guidelines Intake: Defining the Issue Whether you are a technical or an administrative team member, when performing intake on a technical issue, it is imperative that you define and document the nature and scope of the problem ...