Defining help-desk categories in the osTicket ticketing system.
Lansweeper inventory management software.
A Standard Operating Procedure (SOP)
is a detailed, step-by-step instruction set designed to ensure tasks are performed consistently and in alignment with organizational policy, helping employees work securely, efficiently, and with accountability—especially in areas like software installation, user onboarding, and offboarding.
Ticketing systems
streamline IT support by creating and tracking unique support cases—each ticket includes user and device details, issue descriptions, urgency assessments, and potential troubleshooting steps, with escalation protocols if initial efforts don’t resolve the problem.
Ticket categories
—like Requests, Incidents, and Problems—help organize support issues for efficient handling and reporting, though simplified user-facing options (e.g., “Help” or “New Device”) and flexible keyword tagging can improve usability and technician workflow.
CRM (Customer Relationship Management)
is a centralized system that manages all interactions between a company and its customers.
Asset ID
is a unique identifier, often a string of characters, assigned to a specific asset for tracking and management purposes.
Ticket categories
help organize and route support requests efficiently by classifying them as Requests, Incidents, or Problems, but for end-user clarity, systems often use simplified labels (like Help or Onboarding) and may supplement with technician-assigned subcategories or keyword tags to improve tracking and reporting.
Severity levels classify
support tickets by impact, typically as critical, major, or minor, to prioritize responses and escalate issues appropriately.
Effective ticket management relies
on clearly tracking ownership and status throughout the troubleshooting process, using consistent documentation and escalation paths to ensure timely resolution and accountability.
Escalation levels define how unresolved tickets move through support tiers
—from self-service (Tier 0) to frontline agents (Tier 1), then senior/internal or external experts (Tier 2), and finally engineering or leadership (Tier 3)—with ownership tracked at every stage to ensure progress and clear communication.
Clear written communication in ticketing systems ensures
that all stages—problem description, progress notes, and problem resolution—are accurately documented using plain, concise language, enabling effective troubleshooting, collaboration, and transparency throughout the ticket’s lifecycle.
Incident reports—also known as after-action reports or lessons learned—are
detailed reviews of major or critical incidents that gather input from all stakeholders to uncover root causes and propose solutions or preventive measures to reduce the likelihood of recurrence.
Effective asset identification and inventory management ensures
organizations maintain a comprehensive catalog of both tangible assets (like deployed and backup hardware) and intangible assets (such as software licenses and intellectual property), supporting consistent provisioning, upkeep, and decommissioning throughout the IT service lifecycle.
An asset-management database system centralizes
information like hardware specs, asset IDs, locations, assigned users, and service history. Tools like Lansweeper enhance this by scanning networks to automatically gather and update inventory data, streamlining both asset visibility and lifecycle tracking.
Asset tags—like
barcodes and RFID stickers—provide unique IDs for each asset, enabling easy identification, tracking, and real-time location updates within inventory systems, which enhances asset management and helps deter theft.
Network topology diagrams visually represent how
networked assets connect—both physically (e.g., cabling, switches, patch panels) and logically (e.g., VLANs, security zones, IP subnets). These diagrams can be manually created with tools like Microsoft Visio or automatically generated via network mapping software, helping teams plan, troubleshoot, and secure IT infrastructure.
Asset documentation tracks t
he asset procurement life cycle, which includes: approving changes, budgeting and selecting vendors, securely deploying the asset, maintaining it during use, and safely disposing of it by removing sensitive data before decommissioning.
Each asset record should include
procurement documentation like invoices, warranty or support contracts, and contact details, while software entries must also track licensing information, including allocated devices or users and any usage limits.
Assigning assets to users or security groups ensures
clear accountability and management responsibility, avoiding the risks of anonymous or shared access.
Linking inventory records to product documentation and knowledge base articles enhances
support by enabling self-service, providing context for recurring issues, and streamlining diagnostics through asset history and verified resources.
knowledge base (KB)
is a centralized repository of information used to store, manage, and share knowledge within an organization or for its customers.
Change management encompasses
structured policies and procedures designed to minimize disruption from configuration changes, ensuring that updates to systems or services are planned, tested, approved, and documented—closely aligning with configuration management to maintain system integrity and operational stability.
The ITIL Configuration Management Model outlines
best practices for managing IT services by defining service assets, configuration items (CIs), and their secure configuration and performance baselines, with the main challenge being how much detail to document and maintain—especially during system changes.