IT Department daily Operation check list

1. System Health Check

  • Access server monitoring tools.
  • Check the uptime status for each server.
  • Review CPU, memory, and disk usage metrics.
  • Identify any performance issues or anomalies.
  • Document findings for review.
  • Use network monitoring software.
  • Test connectivity to key endpoints.
  • Measure bandwidth usage across networks.
  • Identify any bottlenecks or connectivity issues.
  • Report findings to network administrator.
  • Access backup management console.
  • Review logs for last backup jobs.
  • Confirm successful completion status.
  • Check for any backup errors or warnings.
  • Schedule follow-up if issues are found.
  • Access log management system.
  • Filter logs for errors and warnings.
  • Note any critical issues that need addressing.
  • Prioritize log entries based on severity.
  • Document and escalate issues if necessary.
  • Access server management tools.
  • Check for the latest security patches.
  • Verify installation status of patches.
  • Document any missing patches.
  • Schedule updates as necessary.
  • Use monitoring software to check CPU temperature.
  • Inspect disk usage and health status.
  • Review SMART data for disk reliability.
  • Identify any failing components.
  • Report and replace faulty hardware if needed.
  • Run performance monitoring tools.
  • Collect response time data for critical applications.
  • Identify any performance bottlenecks.
  • Analyze trends over time.
  • Report issues to development teams.
  • Check backup logs for errors.
  • Verify backup completion status.
  • Select random backups for test restores.
  • Conduct test restores to a non-production environment.
  • Document results and address any failures.
  • Access antivirus management console.
  • Check for recent updates and definitions.
  • Review scan logs for threats detected.
  • Ensure quarantine actions are taken.
  • Schedule full system scans if needed.
  • Access firewall and IDS/IPS logs.
  • Look for unusual access patterns.
  • Identify blocked attempts and their sources.
  • Investigate any flagged incidents.
  • Report findings to security personnel.
  • Check the status of critical services via command line.
  • Use monitoring tools to verify uptime.
  • Restart any services that are down.
  • Document any service interruptions.
  • Notify relevant teams of issues.
  • Check the status of UPS units.
  • Test battery levels and functionality.
  • Verify power supply to critical hardware.
  • Document any anomalies.
  • Schedule maintenance if necessary.
  • Review the maintenance schedule.
  • Verify completion status of tasks.
  • Document any incomplete tasks.
  • Reschedule unfinished maintenance.
  • Notify stakeholders of maintenance outcomes.
  • Access user access logs.
  • Look for failed login attempts and anomalies.
  • Identify unusual user activity.
  • Investigate and report any suspicious access.
  • Ensure access controls are enforced.

2. Security Monitoring

  • Verify all antivirus software is running.
  • Check for the latest definition updates.
  • Schedule automatic updates if not enabled.
  • Run a full system scan to detect any threats.
  • Access the firewall management console.
  • Filter logs for unusual traffic patterns.
  • Look for blocked attempts from unfamiliar IP addresses.
  • Document any findings for further investigation.
  • Check the system update management tool.
  • Verify that all critical and recommended patches are installed.
  • Schedule updates for any pending patches.
  • Document compliance with update policies.
  • Access the server's access log files.
  • Identify failed login attempts or access from unknown locations.
  • Investigate any repeated attempts from the same IP.
  • Report anomalies to the security team.
  • Use a reliable vulnerability scanning tool.
  • Perform scans on all network devices and servers.
  • Identify and categorize vulnerabilities based on severity.
  • Plan remediation actions for high-risk vulnerabilities.
  • Access the IDS management interface.
  • Review alerts generated since the last check.
  • Investigate alerts for legitimacy and potential breaches.
  • Escalate serious threats to the security team.
  • Check encryption status for sensitive data at rest and in transit.
  • Confirm that SSL/TLS certificates are valid and not expired.
  • Test encryption functionality on key applications.
  • Document any issues and resolutions.
  • Review configuration change logs for all critical systems.
  • Identify changes made outside of normal change management processes.
  • Investigate any unauthorized modifications.
  • Report findings to the IT management team.
  • Inspect physical security systems for operational status.
  • Verify access logs for keycard systems.
  • Check that all surveillance cameras are functional.
  • Report any physical security breaches or concerns.
  • Review the incident response plan for accuracy.
  • Conduct a tabletop exercise with the team.
  • Evaluate response time and decision-making processes.
  • Document lessons learned and update the plan as needed.
  • Review security policies for alignment with regulations.
  • Conduct audits to assess compliance levels.
  • Identify areas needing improvement.
  • Report compliance status to management.
  • Access user access rights management tool.
  • Audit permissions against job roles and responsibilities.
  • Remove or adjust unnecessary access rights.
  • Document changes and rationale.
  • Verify backup schedules and completion logs.
  • Test restore processes for critical data.
  • Ensure backup data is encrypted and stored securely.
  • Document backup status and any issues.
  • Use network monitoring tools to visualize traffic data.
  • Identify and investigate unusual spikes in traffic.
  • Document patterns that deviate from normal behavior.
  • Report findings and recommendations.
  • Compile data from all security monitoring activities.
  • Highlight key findings, incidents, and trends.
  • Include recommendations for improvements.
  • Distribute the report to leadership and stakeholders.

3. Guest Services Technology

  • Access the check-in/check-out system interface.
  • Perform a test check-in for a dummy reservation.
  • Complete the check-out process for the same reservation.
  • Verify that all data is accurately reflected in the system.
  • Document any issues or discrepancies.
  • Check all POS terminals for power and network connectivity.
  • Perform a test transaction on each terminal.
  • Confirm that transaction data is syncing with the central system.
  • Review error logs for any anomalies.
  • Report any connectivity issues to the network team.
  • Conduct speed tests in various locations.
  • Check for any dead zones or connectivity issues.
  • Ensure guest access credentials are functioning.
  • Monitor guest feedback regarding Wi-Fi performance.
  • Document and address any issues found.
  • Log into the PMS and navigate through key functions.
  • Check for any lag or responsiveness issues.
  • Review system alerts or notifications for updates.
  • Confirm data integrity and availability.
  • Document any performance issues for follow-up.
  • Test each kiosk for functionality and responsiveness.
  • Check user interface for ease of navigation.
  • Ensure all content is current and relevant.
  • Monitor for any error messages during use.
  • Document any user feedback for improvements.
  • Check for available software updates.
  • Review release notes for important changes.
  • Schedule downtime for updates, if necessary.
  • Test the updated software post-installation.
  • Document any issues encountered during the update.
  • Download and install the latest version of the app.
  • Perform test transactions for room service and concierge requests.
  • Verify that notifications are being received correctly.
  • Ensure app layout is user-friendly.
  • Document any bugs or issues for developers.
  • Check power and connectivity of each display.
  • Verify that scheduled content is being displayed.
  • Test remote access to update content as needed.
  • Monitor feedback from guests regarding information accuracy.
  • Document any technical issues for repair.
  • Review data flow between the PMS and other systems.
  • Test transactions that involve multiple systems.
  • Confirm that guest information is synchronized accurately.
  • Monitor for any integration errors or delays.
  • Document any inconsistencies for resolution.
  • Test the online booking process from start to finish.
  • Check for responsiveness on various devices.
  • Verify that available rates and inventory are accurate.
  • Monitor guest feedback on the booking experience.
  • Document any errors encountered during testing.
  • Check guest feedback platforms for recent reviews.
  • Compile feedback related to technology use.
  • Prioritize issues based on frequency and severity.
  • Communicate critical issues to the relevant departments.
  • Document findings for future reference.
  • Test payment processing on all terminals.
  • Verify that encryption and security measures are active.
  • Monitor for any error messages during transactions.
  • Ensure compliance with PCI standards.
  • Document any anomalies for further investigation.
  • Program a set of key cards for test rooms.
  • Verify key card access to designated rooms.
  • Check for any programming errors or malfunctions.
  • Document any issues and follow up with maintenance.
  • Ensure backup key systems are operational.
  • Check project timelines and milestones.
  • Confirm completion status with responsible teams.
  • Review any pending tasks or requirements.
  • Communicate updates to relevant stakeholders.
  • Document any delays or issues encountered.
  • Inspect all technology installations in public areas.
  • Test the functionality of kiosks and displays.
  • Gather feedback from guests using the technology.
  • Identify areas for improvement or upgrades.
  • Document findings for future planning.

4. Communication Systems

  • Make calls to and from various extensions.
  • Check for dial tone and call clarity.
  • Test features like hold, transfer, and voicemail.
  • Document any issues and escalate as needed.
  • Log in to all internal communication platforms.
  • Send test messages to team members.
  • Check for updates or notifications.
  • Resolve any access issues immediately.
  • Send test messages to guest rooms.
  • Verify message delivery and response functionality.
  • Check for any system errors or delays.
  • Report any discrepancies to the technical team.
  • Send and receive test emails from various accounts.
  • Review email deliverability and check spam folders.
  • Test attachments and links within emails.
  • Document any performance issues.
  • Schedule a test meeting with participants.
  • Check audio, video, and screen sharing functions.
  • Test connections on different devices.
  • Address any connectivity or performance issues.
  • Perform a test call through the intercom system.
  • Check volume levels in different areas.
  • Ensure clarity of the audio.
  • Adjust settings as necessary.
  • Gather the latest contact information from all departments.
  • Update any changes in roles or personnel.
  • Ensure accuracy and accessibility of contact lists.
  • Distribute updated lists to relevant staff.
  • Check notification settings on all platforms.
  • Send test alerts and verify receipt.
  • Ensure that alerts are timely and relevant.
  • Document any failures in notification delivery.
  • Verify the functionality of all backup systems.
  • Test failover procedures for critical communication tools.
  • Document the status and readiness of backups.
  • Train staff on backup usage if necessary.
  • Run through automated scenarios to check functionality.
  • Verify that triggers and responses work as intended.
  • Document any errors for future correction.
  • Ensure workflows are aligned with current procedures.

5. Support Requests

  • Access the help desk system.
  • Sort tickets by urgency and impact.
  • Identify high-priority requests for immediate attention.
  • Assign tickets to appropriate team members.
  • Set deadlines for resolution based on priority.
  • Review yesterday's unresolved tickets.
  • Contact staff for updates on ongoing issues.
  • Check for any escalated requests.
  • Ensure all follow-ups are logged in the system.
  • Determine if further action is needed.
  • Draft a summary of current IT issues.
  • Send an email or message to relevant staff.
  • Include expected resolution times and updates.
  • Encourage staff to report any additional problems.
  • Schedule a follow-up communication if necessary.
  • Create a log of new issues in the system.
  • Gather detailed information from staff or guests.
  • Categorize issues by type and urgency.
  • Assign issues to appropriate team members.
  • Ensure documentation is clear and concise.

6. Equipment Inventory

7. Staff Training and Support

8. End of Day Review

Related Checklists