IT Documentation Small Business Guide: What to Track & How

    IT Documentation Small Business Guide: What to Track & How

    Listen to this article

    Loading...
    0:00
    0:00
    IT Documentation
    Small Business IT
    Network Documentation
    Password Management
    Asset Inventory
    SaaS Management
    Vendor Management
    Onboarding Offboarding
    Disaster Recovery
    Managed IT
    Old Man Hemmings5/8/202612 min read

    Most small business IT messes aren’t caused by “advanced hackers” or cosmic rays. They’re caused by nobody writing anything down. Here’s what to document, how to store it, and how to keep it updated so outages don’t turn into week-long disasters.

    TL;DR: If your business IT lives in one person’s head, you don’t have “tribal knowledge.” You have a single point of failure wearing a polo shirt. This it documentation small business guide shows what to document (assets, network, SaaS, access, vendors, runbooks, backups/DR), where to store it securely, and how often to review it so outages stop turning into expensive soap operas.

    I see this exact problem three times a week. The internet goes down, the printer starts making that sad grinding noise, Microsoft 365 logins fail, and suddenly everyone’s asking, “Who set this up?” Nobody knows. Or worse, somebody knows but they’re on a cruise, and the only thing they left behind is a sticky note that says “Admin password is probably Fluffy123.”

    Back in my day, we had floppy disks and dial-up. When something broke, you could literally point at the beige box and say, “That’s the computer.” Now your “computer” is a mix of laptops, cloud apps, Wi-Fi, phones, printers, and subscriptions you forgot you’re paying for. Documentation is the owner’s manual. Not glamorous. Not trendy. But it keeps the engine from seizing.

    Why IT documentation matters (and why “tribal knowledge” is how outages get expensive)

    Here’s what actually happens when you ignore documentation:

    • Downtime gets longer because troubleshooting starts at zero.
    • Security incidents get worse because nobody knows what accounts exist, what has admin rights, or where the backups live.
    • Costs creep up because you keep paying for software no one uses and vendors no one remembers renewing.

    Computers should work quietly in the background, like a good refrigerator. If you notice them too much, something is probably wrong. Good documentation makes IT boring again. That’s a compliment.

    IT documentation small business: the “boring but works” master list

    Don’t try to document everything in one weekend like it’s a New Year’s resolution. Start with the stuff that prevents panic. Then build from there.

    1) Asset inventory (hardware) you can actually trust

    First, what not to do: don’t keep a dusty spreadsheet called “IT List FINAL v7.xlsx” on someone’s desktop. That’s not an asset inventory. That’s a cry for help.

    Your asset inventory should include:

    • Device type: laptop/desktop/server/NAS/printer/firewall/switch/AP
    • Make/model and serial number
    • Assigned user and department (or location)
    • OS version (Windows 10 or Windows 11, macOS Sequoia if applicable)
    • Purchase date, warranty/coverage, expected replacement year
    • Critical notes: encryption enabled, special software, static IP, etc.

    Why it matters: when something dies, you don’t want to guess what it was, what it ran, or whether it’s under warranty. This is how you avoid buying the same “emergency replacement” twice.

    2) SaaS inventory (software subscriptions) so you stop paying for ghosts

    Most small businesses don’t have a software problem. They have a subscription problem. Your saas inventory should list:

    • App name and purpose (accounting, CRM, scheduling, e-sign, etc.)
    • Owner: who approves changes and billing
    • Billing: monthly/annual cost, renewal date, payment method
    • Login method: local login vs SSO (Microsoft 365/Google)
    • Admin URL and support URL
    • User count and who is licensed

    Back in my day, software came in a box with a manual thick enough to stop a bullet. Now it arrives as a charge on your credit card. Document it, or you’ll keep paying for three project management tools because nobody wants to admit they forgot the password to the first one.

    3) Vendor management: contacts, contracts, and “who do we yell at?”

    Vendor management documentation is simple. It’s also missing at the exact moment you need it.

    • ISP (internet provider) account number, support number, circuit ID
    • Phone/VoIP provider details
    • Line-of-business software vendor contacts
    • Printer/copier lease contacts
    • Domain registrar and DNS host
    • SSL certificate provider (if applicable)

    Include what services they provide, who at your company is authorized to make changes, and where the bills go. This prevents the classic outage ritual: calling five numbers, getting transferred seven times, then being told, “We can’t talk to you because you’re not on the account.”

    Network documentation checklist: what to map so fixes don’t require mind-reading

    If you only document one technical thing, make it your network. Because when the network breaks, everything breaks. And no, “the Wi-Fi” is not a network diagram. That’s like calling your whole car “the vroom.”

    Core network diagram (keep it readable)

    Your diagram should show:

    • ISP modem/ONT and handoff type
    • Firewall/router model and management IP
    • Switches (with key ports labeled)
    • Wireless access points and SSIDs
    • Servers/NAS and key printers
    • VPN details (provider, endpoints, who uses it)

    Keep versions of the diagram. Networks change. People plug in “temporary” switches that become permanent (I’ve seen it become a family tree of switches, like a bad set of Christmas lights).

    IP plan, VLANs, and Wi-Fi details (the part everyone forgets)

    Add a simple table:

    • IP ranges, DHCP scope, reservations
    • Static IP list (printers, servers, cameras, APs)
    • VLAN names and purpose (staff, guest, phones, cameras)
    • Wi-Fi SSIDs, which VLAN they map to, and who should have access

    This is the difference between a 15-minute fix and a 4-hour “why can’t the scanner see the server” scavenger hunt.

    Password vault policy and access control documentation (no more sticky notes)

    Look, I’m not going to sugarcoat this: if your passwords live in a notebook, a shared spreadsheet, or a pile of sticky notes on the monitor, you’re not “old school.” You’re one spilled coffee away from a bad week.

    What a password vault policy should say

    You don’t need a novel. You need rules people can follow:

    • Where passwords are stored: approved password manager/vault only
    • MFA requirement: enabled for email, admin portals, finance apps, and the vault itself
    • Sharing policy: no shared logins unless there’s a documented reason
    • Offboarding rule: access removed same day, shared credentials rotated
    • Break-glass accounts: how emergency admin access is stored and audited

    If you’re using Microsoft 365, MFA is not optional in 2026. Microsoft documents how to use Authenticator and MFA here: Microsoft Support guidance on Microsoft Authenticator and MFA.

    Access control documentation: “who has access to what”

    Write down:

    • Admin accounts for Microsoft 365, firewall, DNS, backups, accounting, payroll
    • Named owners for each system (not “IT” as a concept)
    • Role-based access rules (who should have admin rights and who shouldn’t)
    • Where logs/audit trails live and who reviews them

    And yes, document what NOT to do: don’t give everyone admin “because it’s easier.” It’s also easier to leave your car unlocked with the keys on the seat. Let me know how that works out.

    Runbooks: onboarding, offboarding, and the fixes you do repeatedly

    Runbooks are step-by-step instructions for repeatable tasks. Think of them like the instructions taped inside the VCR cabinet back when people recorded shows (and nobody remembered how). They’re boring. They save you.

    Onboarding runbook (new hire setup)

    • Create accounts (Microsoft 365, line-of-business apps)
    • Assign licenses and groups
    • Set up MFA and password vault access
    • Provision laptop, encryption, updates, and baseline apps
    • Map printers and shared drives (if used)
    • Confirm access works before day one ends

    Offboarding runbook (where businesses get burned)

    • Disable user sign-in immediately
    • Remove from groups and revoke sessions
    • Transfer email/OneDrive ownership as needed
    • Rotate shared passwords (yes, all of them that mattered)
    • Recover company devices and wipe if necessary
    • Document what was done and when

    Offboarding is where “tribal knowledge” turns into “former employee still has access.” Don’t be that headline.

    Disaster recovery documentation: backups, restores, and the truth

    If you don’t have a backup, you don’t have data. You’re just borrowing it. And if you’ve never tested a restore, you don’t have a backup either. You have a hope.

    What to document for backups

    • What is backed up (servers, PCs, Microsoft 365 data, databases)
    • Backup method and schedule
    • Retention policy (how long backups are kept)
    • Where backups are stored (cloud, local, both)
    • Who gets alerts and where they go

    Disaster recovery documentation: your “power went out and everything is on fire” plan

    • Recovery Time Objective (RTO): how fast you need systems back
    • Recovery Point Objective (RPO): how much data loss is acceptable
    • Restore steps (in order) for key systems
    • Priority list: what comes back first (email, POS, phones, file server)
    • Emergency contacts and escalation path

    Want a steady stream of real-world cautionary tales? Read a few incident write-ups over at Malwarebytes blog on real-world security incidents and prevention. It’s not to scare you. It’s to remind you that “it won’t happen to us” is not a strategy.

    Where to store IT documentation securely (so it’s available but not exposed)

    Here’s what not to do: don’t store your entire IT playbook in an unencrypted folder called “Passwords” synced to everyone’s laptop. I wish I was making that up.

    Instead, aim for:

    • Central storage with access control (least privilege)
    • Auditability (you can tell who changed what)
    • Offsite availability (you can reach it during an office outage)
    • Separation between general docs and sensitive credentials

    In practice, many SMBs use a combination: documentation in a secured knowledge base or controlled document library, and credentials in a password vault with MFA. If you need help setting that up cleanly, that’s the sort of thing we do under Microsoft 365 administration and support and business cybersecurity services.

    How often to review documentation (hint: not “when something breaks”)

    Documentation rots. It’s like milk, not like canned beans.

    • Monthly: review user access changes, SaaS licenses, and vendor billing oddities
    • Quarterly: validate backups, test at least one restore, confirm admin accounts and MFA
    • Twice a year: update network diagrams, asset inventory, and DR runbooks
    • After every change: new firewall, new ISP, new Wi-Fi, new line-of-business app

    If you want “boring but works,” set a recurring calendar reminder and assign an owner. Unowned documentation becomes fiction.

    How an MSP uses documentation to reduce downtime and control costs

    When you work with an MSP (managed service provider), the documentation is how we avoid playing 20 questions while your staff can’t work.

    At Fix My PC Store, our managed IT services rely on accurate documentation to:

    • Speed up support: we know what you have, how it’s configured, and who to call
    • Reduce downtime: faster diagnosis, fewer “surprises,” cleaner change control
    • Improve security: access is tracked, MFA is enforced, offboarding is consistent
    • Control costs: find unused licenses, replace aging hardware on schedule, avoid panic buys

    And yes, we serve businesses across Palm Beach County. West Palm Beach, Palm Beach Gardens, Lake Worth Beach, Boynton Beach, Jupiter, Wellington, Royal Palm Beach, Riviera Beach, and the surrounding areas. If you’re nearby and your IT is held together with hope and old passwords, you’re not alone.

    A simple 30-day plan to fix your documentation without losing your mind

    Week 1: Inventory and owners

    • Start asset inventory for computers, network gear, and printers
    • Start SaaS inventory with costs and owners

    Week 2: Network documentation checklist and diagrams

    • Create a basic network diagram and IP/VLAN table
    • Document ISP details and firewall management access

    Week 3: Password vault policy and access control documentation

    • Pick an approved vault process and require MFA
    • List admin accounts and remove unnecessary admin rights

    Week 4: Runbooks and disaster recovery documentation

    • Write onboarding/offboarding runbooks
    • Document backups and test a restore

    See the theme? Write it down. Assign an owner. Review it. Repeat. Not exciting. Very effective.

    Need Reliable Business IT Support?

    Get professional managed IT services, Microsoft 365 support, and cybersecurity from Palm Beach County's business technology experts.

    Share this article

    You May Also Like