IT Due Diligence for Searchers
Use our IT Due Diligence Discovery Questionnaire to establish an IT baseline and identify near-term risk or cost drivers before close.
Already under LOI or post-close? See our post-close IT support for operators 🡪
Clarity on IT risk before it's your problem
A target company can look healthy on the surface while hiding avoidable technology risk underneath. Aging hardware, undocumented networking, messy Microsoft 365 administration, unsupported software, and overlooked voice systems can all create cost and disruption after close.
Our IT Due Diligence Discovery Questionnaire is built to establish a practical IT baseline during diligence. It helps searchers understand how the environment works today, where resilience may be weak, and what may need attention soon after close.
What this questionnaire is built to surface
Current-state Environment
See what the business actually depends on today.
Document the basics of the environment, including sites, users, connectivity, hardware, cloud or virtualization choices, software, networking, voice, directory, email, and business-critical dependencies.
Resilience and Support Gaps
Find where continuity may be weaker than it looks.
Understand backup approach, offsite backup, firewalls, VPN usage, MDM, antivirus, spam filtering, DR planning, and whether the business has policies and documentation in place.
Near-term Cost Drivers
Spot what may turn into spend soon after close.
Spot where replacement, standardization, licensing cleanup, roadmap work, or vendor changes may be needed soon after close.
What the IT DD questionnaire actually covers
This is not just a cybersecurity checklist. It is a broader IT diligence discovery resource designed to help establish a practical baseline across the full environment, including:
- sites, users, and connectivity
- server and end-user hardware
- virtualization and cloud services
- proprietary software and platform requirements
- antivirus, spam filtering, and MDM
- storage, backup tools, backup targets, and offsite backup
- networking, firewalls, wireless, VPN, topology, and VLANs
- phone and communications setup
- Active Directory and group policy
- Microsoft 365, Exchange, DNS, and mailbox environment
- business dependencies such as compliance, employee IT policy, disaster recovery, and roadmap
Why that matters in diligence
A buyer inherits architecture decisions, vendor relationships, aging equipment, backup practices, licensing choices, and support assumptions. This questionnaire helps you gather those facts early enough to make better decisions before close.
Get the IT Due Diligence discovery questionnaire
Use this questionnaire to establish an IT baseline on the target company. It is structured to help you review the environment category by category so you can identify what exists today, what may need follow-up, and what could impact transition, continuity, or near-term spend.
We can help you interpret the answers and identify likely first-phase priorities after close.
What ETA searchers are usually trying to understand
Infrastructure Condition
How many servers exist, what platform they run on, how old they are, whether hardware will need replacement, and how standardized the environment really is.
Cloud & Software Dependencies
Which applications and cloud services are in use, what versions they run, which vendors support them, and whether there are proprietary or operational dependencies that need to be maintained.
Backup & Network Resilience
How backup is handled, whether offsite protection exists, what firewalls and VPN practices are in place, and whether the network is documented and segmented.
Business & Governance Risk
Whether the business has compliance requirements, retention policies, employee IT policies, a disaster recovery plan, and any current technology roadmap.
Hear the ETA perspective behind this questionnaire
Catch Nick Akers’ appearance on Let's Buy a Business where he explores the messy, outdated environments many buyers unknowingly walk into.
Frequently Asked Questions
-
What is the goal of the IT Due Diligence Discovery Questionnaire?
The goal of the IT Due Diligence Discovery Questionnaire is to establish an IT baseline during diligence, understand the current technology environment, assess resilience, and surface near-term cost and risk drivers before close. It is designed to help searchers evaluate what they may be inheriting across infrastructure, software, networking, communications, Microsoft 365, backup, and business dependencies.
-
Is this just a cybersecurity checklist?
No. This IT due diligence questionnaire is broader than a cybersecurity checklist. It covers infrastructure, cloud and virtualization, software, storage and backup, networking, phone systems, directory, Microsoft 365 and email, and business dependencies in addition to security and resilience questions.
-
What kinds of issues can IT due diligence help uncover before an acquisition?
IT due diligence can help uncover aging servers, inconsistent hardware standards, undocumented networks, unclear backup practices, software administration issues, vendor dependence, and missing disaster recovery planning. Those issues often become post-close cost, cleanup, and transition problems if they are not identified early.
-
Why does IT due diligence matter before close?
IT due diligence matters because the technology environment affects continuity, support burden, future spend, and the speed of post-close stabilization. A clearer baseline helps buyers separate manageable cleanup from issues that may require immediate investment after closing.
-
Can Inzo Technologies help after the questionnaire is completed?
Yes. Inzo Technologies will help you review the answers, identify likely priority issues, and turn the diligence findings into a practical post-close action plan. If the deal is already moving toward transition, you can also explore our services for post-close technology support.
-
What happens after close if issues are found?
If issues are found, the next step is usually to prioritize what needs immediate attention versus what can be addressed over time. For operators who need help stabilizing inherited systems, reducing cyber risk, and organizing vendors and support, we support operators with IT, cybersecurity, and voice services.
-
Is Inzo only focused on IT and cybersecurity?
No. Inzo Technologies also supports business communications and voice solutions, which can be an important part of diligence when a company depends on multi-site phones, call routing, or older voice infrastructure. That broader scope helps position Inzo as a more complete post-close technology partner.
Already under LOI or post-close? Explore our post-close IT support for operators.
Establish the IT baseline before you close
Use the IT Due Diligence Discovery Questionnaire to understand the current environment, surface likely risk and cost drivers, and prepare for a smoother post-close transition.