Published Documentation Standards / Example Documentation ? ITIL ?

Posted on 2010-01-10
Medium Priority
Last Modified: 2012-05-08
Any there are freely available Documentation Standards for what an IT organization should follow? Does ITIL give any examples of what should be required in documentation?  Are the any freely available examples or templates for documentation?

Can anyone recommend what should be required?

Here is an example of what I think would be needed for a router or switch.
Location of IOS or OS image, location of configuration files, Document detailing how to stop, restart , ip addresses, network diag. list of network ports and connections to equipment. Steps if the device should have a problem - contact tech support. Steps if the device should fail, 24/7 support with vendor, grab replacement from X , or contact vendor, etc. If an hot spare is on the network online. How the device is monitored, what to do for specific alerts, and how to review for capacity / performance planning to and ensure the device will not become a bottleneck.

Thank you.
Question by:markpalinux
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
LVL 31

Accepted Solution

Justin Owens earned 2000 total points
ID: 26401836
Most ITIL standards are part of Training publications / classes and are copywrited.  It would not be legal for us to repost that information here.  My suggestion to you would be to get an ITIL v3 Standards book.  We are an ITIL certified shop (every employee), so I understand the cost involved.  I don't have a good resource for this to be free.

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question