On handover nobody knows how restore works
A runbook belongs with delivery. Passwords, paths, restore steps, contacts in one place.
Try this first
- 1Document per job: source, target, retention, password location
- 2Add restore steps with screenshots
- 3Record where encryption keys live (vault or password manager)
- 4Deliver at handover and review yearly
When to bring us in
When taking over an environment without a runbook
See also
- We have backups but we do not know if they workA backup that cannot be restored is not a backup. Testing matters as much as taking the backup.
- Suspected ransomware: what to do RIGHT NOWThe first 30 minutes are critical. One wrong move spreads the damage. Read before acting.
- Someone accidentally deleted an important folderUsually fine to recover. The trick: do not save anything new on that drive until you know how.
None of the above fits?
Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.
Or skip the DIY entirely
Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.