Endpoint Inventory

Introduction

Keeping an accurate, up-to-date endpoint inventory allows you, your department, and the IT Security Office to collaborate and quickly respond to security incidents.

Procedure

  1. Register endpoints with your department’s inventory system. An inventory system should include the following things:
    • What is the purpose of the endpoint?
    • What software is the endpoint running?
    • Where is the endpoint located?
      • Building
      • Room
      • Portal
    • Who is responsible for maintaining the endpoint?
      • Name
      • Email
      • Phone number
  2. Update the inventory system annually.

Other

If you have questions that are not covered in this procedure, please contact the Virginia Tech IT Security Office at itso@vt.edu for a consultation.

Resources