Endpoint Inventory
Introduction
Keeping an accurate, up-to-date endpoint inventory allows you, your department, and the IT Security Office to collaborate and quickly respond to security incidents.
Procedure
- Register endpoints with your department’s inventory system. An inventory system should include the following things:
- What is the purpose of the endpoint?
- What software is the endpoint running?
- Where is the endpoint located?
- Building
- Room
- Portal
- Who is responsible for maintaining the endpoint?
- Name
- Phone number
- Update the inventory system annually.
Other
If you have questions that are not covered in this procedure, please contact the Virginia Tech IT Security Office at itso@vt.edu for a consultation.
Resources
- ISORA (Users must be pre-enrolled in Isora GRC before it can be accessed. Please contact itso-grc-g@vt.edu to be enrolled.)
- Jamf for Apple Devices