SlideShare a Scribd company logo
Important & Confidential
QUARTERLY / MONTHLY / WEEKLY / DAILY (IT) AUDIT CHECK LIST
Date of Audit:-
Next Audit Date:-
SR. AUDIT ACTIVITY Check
1 Live Update Antivirus in all systems including server
2 Check Antivirus Connectivity With Server
3 Check All System Date & Time
4 Check Anti virus Policy Update With Tech Team
5 Login In Firewall, Managed router & Check for Errors (If Any Available)
6 Diagnose & Test network connection in firewall
7 CCTV Test View ( To be Done by Vendor )
8 Check Cctv Recording Systems For Call Recording (To be Done by Vendor)
9 Check Printer Working Status & print quality. If light, change cartridge
10 Check network switches/routers/firewall/IO lights
11 Create restore point of all systems ( Will be done by or under guidance of
expert )
12 Download attendance report from biomatrics device (To be Done by
respactive Vendor)
13 Change all user & device Password / credential every Quarter
14 Server Backup Schedule Last Backup Date ( Please Check in Folder  Drive Path )
15 Network Storage Login & Check for Error If Any
16 Check Snapshot it using for protecting data against ransomware attack.
17 Go to programm & feature menu of control panel & Remove Unwanted Software
18 Scan Pc Tuning From Antivirus in Your System. if not available, Contact Hem
Infotech for free access
Sign of Engineer Checked by Sign of Customer
Hem Infotech Customer Authorised Employees Customer Name

More Related Content

Similar to QUARTERLY MONTHLY WEEKLY DAILY (IT) AUDIT CHECK LIST

Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
ER Swapnil Raut
 
Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
ManageEngine, Zoho Corporation
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip compliance
Ivan Carmona
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
patemalabanan
 
Viavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptxViavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptx
mani723
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET Journal
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
PawanKesharwani
 
1_WTTx LTM Main Slide_Huawei_Presentation.pdf
1_WTTx LTM Main Slide_Huawei_Presentation.pdf1_WTTx LTM Main Slide_Huawei_Presentation.pdf
1_WTTx LTM Main Slide_Huawei_Presentation.pdf
rodrigopbarreto
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
YOU SHENG CHEN
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
SteelCentral NetSensor 3.0
SteelCentral NetSensor 3.0SteelCentral NetSensor 3.0
SteelCentral NetSensor 3.0
Riverbed Technology
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
fauscha
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
ManageEngine
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
nuttakorn nakkerd
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
ManageEngine, Zoho Corporation
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
Maksim Djackov
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_ResumeRanjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
ranjith nagisetty
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
juliankanarek
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insights
Akshay Tilak
 

Similar to QUARTERLY MONTHLY WEEKLY DAILY (IT) AUDIT CHECK LIST (20)

Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
 
Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip compliance
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
 
Viavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptxViavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptx
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
 
1_WTTx LTM Main Slide_Huawei_Presentation.pdf
1_WTTx LTM Main Slide_Huawei_Presentation.pdf1_WTTx LTM Main Slide_Huawei_Presentation.pdf
1_WTTx LTM Main Slide_Huawei_Presentation.pdf
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
SteelCentral NetSensor 3.0
SteelCentral NetSensor 3.0SteelCentral NetSensor 3.0
SteelCentral NetSensor 3.0
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_ResumeRanjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
Ranjith kumar Nagisetty(AndiordApp and PostSiliconTest Engineer)_Resume
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insights
 

More from Hem Infotech

Hem infotech - Ur IT Partner
Hem infotech - Ur IT PartnerHem infotech - Ur IT Partner
Hem infotech - Ur IT Partner
Hem Infotech
 
Hp z workstations designed for architechts, interiors & construction 2
Hp z workstations designed for architechts, interiors & construction   2Hp z workstations designed for architechts, interiors & construction   2
Hp z workstations designed for architechts, interiors & construction 2
Hem Infotech
 
Hp z workstations designed for architechts, interiors & construction 1
Hp z workstations designed for architechts, interiors & construction   1Hp z workstations designed for architechts, interiors & construction   1
Hp z workstations designed for architechts, interiors & construction 1
Hem Infotech
 
AEC Presentation
AEC PresentationAEC Presentation
AEC Presentation
Hem Infotech
 
Ops range brochure
Ops range brochureOps range brochure
Ops range brochure
Hem Infotech
 
Hem Infotech Company profile
Hem Infotech Company profileHem Infotech Company profile
Hem Infotech Company profile
Hem Infotech
 
BNI Connect Made Easy
BNI Connect Made EasyBNI Connect Made Easy
BNI Connect Made Easy
Hem Infotech
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
Hem Infotech
 
Hp printer September range brochure
Hp printer September range brochureHp printer September range brochure
Hp printer September range brochure
Hem Infotech
 
Wise paa s-sales_kit_and_roadmap_2017h1 (003)
Wise paa s-sales_kit_and_roadmap_2017h1 (003)Wise paa s-sales_kit_and_roadmap_2017h1 (003)
Wise paa s-sales_kit_and_roadmap_2017h1 (003)
Hem Infotech
 
HP Printers Best Offers - April
HP Printers Best Offers - AprilHP Printers Best Offers - April
HP Printers Best Offers - April
Hem Infotech
 
Hp Deskjet GT 5800 Ink-Tank Printers
Hp Deskjet GT 5800 Ink-Tank PrintersHp Deskjet GT 5800 Ink-Tank Printers
Hp Deskjet GT 5800 Ink-Tank Printers
Hem Infotech
 
Exchange offer process -HP Printer
Exchange offer process -HP PrinterExchange offer process -HP Printer
Exchange offer process -HP Printer
Hem Infotech
 
HP Printers - March Brochure
HP Printers - March BrochureHP Printers - March Brochure
HP Printers - March Brochure
Hem Infotech
 
Hem Infotech - Work Profile
Hem Infotech - Work ProfileHem Infotech - Work Profile
Hem Infotech - Work Profile
Hem Infotech
 
Hp Printer Brochure For Customer Reference
Hp Printer Brochure For Customer ReferenceHp Printer Brochure For Customer Reference
Hp Printer Brochure For Customer Reference
Hem Infotech
 

More from Hem Infotech (16)

Hem infotech - Ur IT Partner
Hem infotech - Ur IT PartnerHem infotech - Ur IT Partner
Hem infotech - Ur IT Partner
 
Hp z workstations designed for architechts, interiors & construction 2
Hp z workstations designed for architechts, interiors & construction   2Hp z workstations designed for architechts, interiors & construction   2
Hp z workstations designed for architechts, interiors & construction 2
 
Hp z workstations designed for architechts, interiors & construction 1
Hp z workstations designed for architechts, interiors & construction   1Hp z workstations designed for architechts, interiors & construction   1
Hp z workstations designed for architechts, interiors & construction 1
 
AEC Presentation
AEC PresentationAEC Presentation
AEC Presentation
 
Ops range brochure
Ops range brochureOps range brochure
Ops range brochure
 
Hem Infotech Company profile
Hem Infotech Company profileHem Infotech Company profile
Hem Infotech Company profile
 
BNI Connect Made Easy
BNI Connect Made EasyBNI Connect Made Easy
BNI Connect Made Easy
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Hp printer September range brochure
Hp printer September range brochureHp printer September range brochure
Hp printer September range brochure
 
Wise paa s-sales_kit_and_roadmap_2017h1 (003)
Wise paa s-sales_kit_and_roadmap_2017h1 (003)Wise paa s-sales_kit_and_roadmap_2017h1 (003)
Wise paa s-sales_kit_and_roadmap_2017h1 (003)
 
HP Printers Best Offers - April
HP Printers Best Offers - AprilHP Printers Best Offers - April
HP Printers Best Offers - April
 
Hp Deskjet GT 5800 Ink-Tank Printers
Hp Deskjet GT 5800 Ink-Tank PrintersHp Deskjet GT 5800 Ink-Tank Printers
Hp Deskjet GT 5800 Ink-Tank Printers
 
Exchange offer process -HP Printer
Exchange offer process -HP PrinterExchange offer process -HP Printer
Exchange offer process -HP Printer
 
HP Printers - March Brochure
HP Printers - March BrochureHP Printers - March Brochure
HP Printers - March Brochure
 
Hem Infotech - Work Profile
Hem Infotech - Work ProfileHem Infotech - Work Profile
Hem Infotech - Work Profile
 
Hp Printer Brochure For Customer Reference
Hp Printer Brochure For Customer ReferenceHp Printer Brochure For Customer Reference
Hp Printer Brochure For Customer Reference
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

QUARTERLY MONTHLY WEEKLY DAILY (IT) AUDIT CHECK LIST

  • 1. Important & Confidential QUARTERLY / MONTHLY / WEEKLY / DAILY (IT) AUDIT CHECK LIST Date of Audit:- Next Audit Date:- SR. AUDIT ACTIVITY Check 1 Live Update Antivirus in all systems including server 2 Check Antivirus Connectivity With Server 3 Check All System Date & Time 4 Check Anti virus Policy Update With Tech Team 5 Login In Firewall, Managed router & Check for Errors (If Any Available) 6 Diagnose & Test network connection in firewall 7 CCTV Test View ( To be Done by Vendor ) 8 Check Cctv Recording Systems For Call Recording (To be Done by Vendor) 9 Check Printer Working Status & print quality. If light, change cartridge 10 Check network switches/routers/firewall/IO lights 11 Create restore point of all systems ( Will be done by or under guidance of expert ) 12 Download attendance report from biomatrics device (To be Done by respactive Vendor) 13 Change all user & device Password / credential every Quarter 14 Server Backup Schedule Last Backup Date ( Please Check in Folder Drive Path ) 15 Network Storage Login & Check for Error If Any 16 Check Snapshot it using for protecting data against ransomware attack. 17 Go to programm & feature menu of control panel & Remove Unwanted Software 18 Scan Pc Tuning From Antivirus in Your System. if not available, Contact Hem Infotech for free access Sign of Engineer Checked by Sign of Customer Hem Infotech Customer Authorised Employees Customer Name