Who is the person providing answers to the questionairre?
Is the contact a technical contact, billing contact, decision maker?
Complete Form for each Location or office. May also list remote or field devices/users
If they are interested in a network assessment and discovery, we will send a technician on site to gather information about the environment take photos and if permitted, we can install a tool that will scan their network with Admin access.
Needed for network assessment scan
Get information for at least 3 workstations if not domained. If domained, we can run network assessment to to get information from all workstations. Install Control on server or one workstation if allowed. Take Photos of hardware.
If customer does not have guest network, mobile and personal devices can infect network and it's best to segregrate with guest wifi.
Google/Gmail, Office 365, CenturyLink, etc.
RPO: How much data can customer can tolerate to lose? RTO: time between loss and recovery. How long can customer be down without significant loss of business and how often do backups need to run to be effective?
If so, What do they use VPN, RDP, Team Viewer, GoToMeeting, etc.
Complete form for each Location
Check workstations and network rooms for APC, CyberPower or other hardware offering power failure protection. If there is a cabinet with hardware are their available power outlets in equipment/PDU's?
Are all jacks properly terminated and labelled, ports in all locations? Are their multiple switches in building?
Firewall is first line of defense for any building to prevent outside intrusions. Typically they would be of brand Cisco or Sonicwall and be plugged into the ISP modem. Note make, model and take photos.
You may ask, but also check if antivirus is indeed installed on devices and server and note results. If they do use protection, find out if it's managed or monitored or if anyone is notified if it's not updated.
Is it on paper, on the computer, is it encrypted or in a secure password manager solution?
Requires a server typically to ensure passwords are reset, require special characters and have lockout policy.
Requires a mobile device app or text message or phone call for user to verify authentication.
Is all network and server hardware or any sensitive data physically stored in a locked room with only authorized access permitted? Are they logging who accesses the equipment room?
What are the problems? Who is doing support? Are they managed or paying for break-fix? Do they have unlimited support, does provider work with their vendors perform software upgrades? Do they have monitoring, are they proactive?
Are they happy with their website?
May request a copy if they have one.
Who is the provider, Make/Model, Warrranty/Support Info/ Licensing/Hosted or On-Prem. Are they happy with current provider?
Complete any software used on server or for business like
This file format is not supported by your browser for preview.
That CAPTCHA was incorrect.
Email Link to
Please enter a valid email address to configure Zoho Sign settings.