Skip to main content

Access to Systems

​​Before we can start implementation, we need to ensure that we have access to VPN/remote access, firewall, DNS, Active Directory, e-mail, and file systems. In circumstances where we cannot access these directly, we need to know who can make required changes on our behalf.

Remember, for security reasons, you should never send passwords through e-mail. We'll provide a secure means of sharing credentials with you.