Use this template to document your end-user computing strategy in detail.
|
|
Use this template as a starting point for external communications regarding your end-user computing strategy.
|
|
An accurate and comprehensive record of the incident management process, including a description of the incident, any workarounds identified, the root cause (if...
|
|
The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.
|
|
Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...
|
|
Gain a better grasp on what end users expect from end-user computing.
|
|
Performing a user group analysis can save you thousands of dollars in licensing and hardware, as well as hours of work every time Microsoft releases an update.
|
|
Use this template to document the communication and collaboration tools that exist in your environment.
|
|
Use this template to document the requirements for your Enterprise Communication and Collaboration System.
|
|
The mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity.
|
|