ITSourcePro
Excluded Services
Last Updated: 01/06/2025
EXCLUDED SERVICES:
Any service not specifically identified as included under Client’s SOW.
Parts, equipment, or software not covered by vendor/manufacturer warranty or support.
The cost of any software, licensing, or software renewal or upgrade fees not included in Client’s SOW.
The cost of any 3rd party vendor or manufacturer support or incident fees.
The cost to bring Customer’s environment up to minimum standards required for services.
Maintenance of application software packages, whether acquired from Company or any other source.
Data restoration due to failed hardware or software corruption.
Any response to or remediation of an identified security incident (ransomware, business email compromise, data exfiltration, etc.).
Any significant organizational additions/changes/moves or investigations/research/documentation that affect IT systems, software, and/or configurations which will require more than six (6) hours of labor. These changes will be considered a project.
Moving equipment over 20 lbs.
SUITABILITY OF EXISTING ENVIRONMENT:
All servers, desktops and laptops with Microsoft Windows operating systems must be running a version that is not end of life per Microsoft, have all the latest Microsoft updates installed, and all drives must be encrypted with industry standard enterprise-level encryption.
Hardware and software must not be end-of-sale or end-of-life. Replaceable parts must be reasonably available.
All software must be genuine, properly licensed and vendor-supported.
The entire IT environment must have a currently licensed, up-to-date, and vendor-supported server-based antivirus or EDR solution protecting all servers, desktops, laptops, and email.
The environment must have a currently licensed, vendor-supported backup solution.
The environment must have a currently licensed, vendor-supported firewall between the internal network and the Internet.
Any wireless data traffic in the LAN environment must be encrypted with industry standard, enterprise-level encryption.
There must be an outside static IP address assigned to a network device, allowing VPN access.