Auditing and reporting
With i-doit, you can evaluate your IT and infrastructure information centrally and make it available for audits, checks and internal controls in an audit-proof manner.
Reports on locations, assets, software, contracts, lifecycles and responsibilities can be created, evaluated and exported in a structured manner.
4.7/5 on Capterra | 2,000+ satisfied customers

The 6 most important functions for auditing & reporting
All information from locations, assets, software, contracts and workstations can be evaluated centrally.
Predefined reports are immediately available and can be customized to meet individual requirements.
Data, changes and statuses are documented in a traceable manner and can be used as audit evidence.
Reports can be easily exported and made available centrally for auditors, management or specialist departments.
Responsibilities, status and dependencies are clearly visible in evaluations.
Customized reporting via the integrated Report Manager
How do you create customized reports with the integrated Report Manager?
Standard reports are often not sufficient to answer specific questions. The required information has to be laboriously collected from various sources or prepared manually.
With the integrated Report Manager, i-doit offers a flexible way of creating individual reports. Relevant information can be specifically selected, combined and evaluated - precisely tailored to your requirements.
Advantages:
- Flexible creation of individual reports without additional tools
- Combination of a wide variety of data from the CMDB
- Quick answers to specific questions
- Reusable report templates for regular evaluations

Verifiable audit reports as PDF
How do you create verifiable audit reports in PDF format?
Audit reviews require structured, comprehensible reports. If information is compiled manually, inconsistencies and additional work arise.
i-doit generates audit-ready PDF reports that clearly summarize and structure relevant information. The data originates from the current CMDB status and is structured in a comprehensible manner at all times.
Advantages:
- Standardized, auditable PDF reports
- Clear and comprehensible
- presentation of all audited data
- Reduced effort for internal and external audits
- Reports directly from current CMDB data
- Use for different target groups (audit, management, operations)

Flexible filter options for report generation
How do you use flexible filter options for precise reports?
Standard reports often show too much data or not the right data. Without targeted filters, there is no focus on relevant information. i-doit offers extensive filter options for creating reports. You define evaluations according to location, person responsible, status, cost center or any other criteria - resulting in precise and targeted reports instead of overloaded lists
Advantages:
- Precise evaluations instead of general overviews
- Reports can be configured specifically as required
- Faster analysis of relevant data
- Filter logic for complex selection criteria (AND/OR)
- Less unnecessary information in reports

Automatic export as PDF or CSV documents
How do you automate the export of reports?
If reports have to be exported and processed manually, this creates additional work and increases the risk of errors.
i-doit enables the automatic export of reports as PDF or CSV files. This means that results can be forwarded, archived or transferred to other systems without any manual intermediate steps - reliably and repeatably.
Advantages:
- Automatic export without manual effort
- Standardized, repeatable export processes
- Easy transfer to auditors, management or specialist departments
- CSV data for external analyses or import into third-party systems
- Archiving of auditable reports

Analysis and improvement of data quality
How do you analyze and improve data quality in the long term?
A CMDB is only as valuable as the quality of its data. Incomplete or inconsistent information limits the usefulness of reports and audits.
i-doit analyzes data quality in a structured and object-related manner. Missing information, incomplete categories or inconsistencies are displayed transparently so that targeted maintenance requirements can be identified.
Advantages:
- Transparent assessment of data quality per property type
- Targeted identification of gaps and missing information
- Measurable progress in data maintenance
- Reliable database for audits, reports and decisions
- Sustainable improvement of CMDB data quality

Book your personal live demo
Our i-doit team will be happy to take the time to advise you personally on your application.
Suitable add-ons
Our add-ons for modular function expansion
Create powerful automations without programming knowledge, simply start them on a schedule or manually at the touch of a button.
Get 4 powerful add-ons for the price of 2! Flows, Documents, Analysis and Forms.
Automatically create documents as PDFs with daily updated data (e.g. hardware handover certificate or disaster recovery plan).
Automate the operation of your data center with the latest data from the CMDB. Events trigger and control further processes.
The maintenance add-on supports the planning, execution and documentation of maintenance and inspections. Maintenance intervals, dates and responsibilities are managed centrally and linked directly to the respective devices, installations or systems.
With the API add-on, data can be automatically read, written and updated in i-doit. Perfect for integrations with ticket systems, inventory tools or your own automations.
Add-on for powerful data analysis. Calculate service costs, check the data quality of the CMDB and carry out failure simulations.
Easily create forms that you can make available to users for simplified data entry. Example: Allow users to document hardware or goods themselves.
Set up an information security management system with risk analysis and management in accordance with ISO 27001.
Integrate the Checkmk2 monitoring system into i-doit. This supports comparisons between TARGET and ACTUAL from CMDB and monitoring.
Store buttons with your own triggers and start IT processes directly from i-doit - e.g. the automatic deployment of a virtual machine.
With this add-on, you can create an information security management system (ISMS) in accordance with the BSI's IT baseline protection methodology.
Related use cases
i-doit offers companies comprehensive functions and interfaces

You connect ticket systems, automation tools and monitoring systems such as Zammad or n8n directly via API.

You document workstations with devices, peripherals and responsible persons and control handovers and returns centrally.

You control audits centrally, plan audits, document results and automatically generate audit reports.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You are automatically informed about deadlines, licenses and guarantees and can keep an eye on the status and need for action.

You automatically record clients, servers, printers and peripherals and document hardware, software and QR codes centrally.

You manage users, accounts and rights centrally, document responsibilities and control access per system, including LDAP and group connections.

You document data protection incidents in compliance with the GDPR, assess risks and derive measures centrally.

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

You create technical and organizational restart plans with automatic calculation of the restart times.

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

You link tickets to affected devices, analyze causes via dependencies and monitor SLAs centrally.

You record and uniquely identify assets using QR and barcodes, create individual labels and take a mobile inventory of devices using the app and printer tool.

You document emergency concepts, system manuals, backups and disaster recovery centrally and comprehensibly.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

You integrate monitoring data directly into the IT documentation, see asset failures and link statuses to the change history.

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You manage entries and exits, including device handovers, returns and referral certificates centrally.

i-doit enables protection requirement analyses with automatic inheritance into the infrastructure, risk assessment and tracking of measures.

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

You keep an eye on servers, VMs, dependencies and certificates centrally and automatically synchronized.

