When Your Only IT Person Quits: Best Practices for IT Knowledge Transfer in Manufacturing
It is one of the scenarios that manufacturing operations leaders know is possible but rarely plan for adequately: the person who knows how everything in the IT environment works, the one who configured the servers, set up the production network, maintains the vendor relationships, and carries a mental map of every workaround and undocumented configuration in the building, gives notice.
In an office-based business, this is a serious problem. In a manufacturing facility with production-critical IT infrastructure, automation systems, and regulatory documentation requirements, it is a crisis.
The institutional IT knowledge that a single individual accumulates over years in a manufacturing environment is not stored in any single document or system. It lives in their head: the sequence to restart the SCADA system after a power event, the specific firmware version the spare PLC needs to be running before it will communicate with the network, the cell phone number of the automation vendor’s emergency contact, and the reason that one production workstation is on a different network segment than every other terminal on the floor.
When that person leaves, none of that knowledge walks back in the door.
Why IT Knowledge Loss Hits Manufacturing Harder
Generic knowledge transfer guidance addresses the loss of business process knowledge: how to process a purchase order, who approves vendor invoices, and what the escalation path for customer complaints looks like. That knowledge, while valuable, is typically documented somewhere or can be reconstructed from observation.
Manufacturing IT knowledge is different in character and consequence.
Control Systems Add Complexity That Does Not Exist in Other Environments
Manufacturing facilities running automation and control systems have an IT infrastructure that does not appear in standard IT environments. The configuration of programmable logic controllers, the network segmentation between corporate IT and the production OT network, the specific settings that make the SCADA system communicate correctly with field instruments, and the version dependencies between automation software and the hardware it runs on are all pieces of knowledge that a skilled manufacturing IT professional accumulates over time working in that specific environment.
This knowledge can’t be found through a simple Google search, like standard IT configurations. And none of it is typically documented in the format that someone new to the environment can pick up and act on immediately.
Undocumented Workarounds Are the Norm, Not the Exception
Every manufacturing IT environment has workarounds: a server that needs to be restarted in a specific sequence or it loses its connection to the automation network, a workstation that requires a local printer driver because the network driver does not work correctly with the production management software, a network switch that reboots spontaneously every few months and needs to have its configuration file pushed again when it does.
The person who has been managing the environment knows all of these. They are not documented because that person never needed documentation. When they leave, those workarounds are invisible until something breaks and the new person discovers the hard way that standard troubleshooting does not apply.
Compliance Documentation Depends on System Knowledge
In regulated food manufacturing environments, IT systems support compliance functions: electronic batch records, temperature monitoring logs, and audit trails for quality management systems. When the IT person who configured those systems leaves, the documentation of how they are configured, what settings govern their behavior, and what changes have been made since initial deployment may exist only in that person’s memory.
An FDA inspection that includes questions about how the electronic batch record system is configured, what access controls are in place, or what the audit trail settings are requires the ability to demonstrate the answers, not just describe them from memory.
What Manufacturing IT Knowledge Actually Includes
A comprehensive IT knowledge transfer in manufacturing goes well beyond usernames and passwords. It covers:
Network architecture documentation: The complete map of the network, including all devices, IP addresses, VLANs, connections between the corporate IT network and the production OT network, remote access configurations, and firewall rules. In manufacturing environments, this map needs to include the connections between network infrastructure and automation systems.
Vendor and support contacts: Every hardware and software vendor’s support contact, account number, contract expiration date, and the name of the support representative who has been the primary contact. This includes the ERP vendor, the automation software vendor, the building management system vendor, the shipping carrier integration platform, and every hardware warranty agreement.
System configuration baselines: The documented configuration of every critical system, including server configurations, network device configurations, automation system settings, and production workstation builds. These baselines make it possible to restore or replicate a system without starting from scratch.
Change history: A log of what has been changed in the environment, when, by whom, and why. In regulated environments, this is a compliance requirement. In all environments, it is the forensic trail that makes troubleshooting possible when something breaks in a system that should be working.
License and subscription management: Every software license key, subscription renewal date, and purchasing account. A critical license that expires without renewal because the person who managed renewals is no longer there can take a production system offline.
Emergency procedures: The step-by-step procedures for responding to specific failure scenarios: how to restore the ERP from backup, how to restart the SCADA system after a power event, and how to switch to the failover server if the primary goes down.
The Immediate Crisis: First 72 Hours
When an IT departure happens with little or no transition time, the first 72 hours determine how much continuity is preserved.
Hour one: Secure access. Change passwords for all critical systems to which the departing employee had access, including servers, network devices, cloud accounts, vendor portals, and any remote access credentials. This is the priority regardless of the circumstances of the departure.
Hour two: Identify active projects and pending actions. What was the IT person working on? Are there systems in a partially upgraded state? Are there vendor tickets open? Are there scheduled maintenance windows coming up that will need to be handled by someone? Get this inventory before any institutional memory walks out the door.
Day one: Extract what can be extracted. If the departure is voluntary and the employee is cooperative, schedule intensive knowledge transfer sessions focused on the highest-risk knowledge gaps: the undocumented workarounds, the vendor contacts, the system configuration specifics that are not written down anywhere.
Day two: Assess current system health. Get an external IT assessment of the current state of the IT environment while the previous administrator’s configurations are still fresh and before any undetected issues surface as production problems.
Day three: Bring in interim support. Do not run a manufacturing facility on self-service IT after the specialist has left. Interim managed IT support that can maintain existing systems, respond to issues, and begin building the documentation that should have existed before the departure is the bridge between crisis and stability.
Building a Knowledge Transfer Plan
For organizations that have advance notice of a departure, a structured knowledge transfer plan should include:
Documentation sprint: Use the notice period to document what has not been documented. Prioritize by risk: systems where undocumented configurations would be most costly to reconstruct go first.
Shadow sessions: Have the replacement or the incoming Manufacturing IT Services Provider shadow the current IT person through routine tasks, troubleshooting scenarios, and system administration activities.
Vendor introduction: Introduce the incoming IT contact to every vendor relationship, ideally through a warm handoff that transfers account ownership and establishes the new point of contact on vendor support tickets.
Testing and validation: Test the documented procedures. Can someone else follow the emergency restart procedure and get the expected result? If the documentation does not produce the expected outcome when tested, it is not complete.
How Managed IT Solves the Institutional Knowledge Problem
The structural solution to IT knowledge concentration risk in manufacturing is not better documentation discipline, though that matters. It is a managed IT relationship where institutional knowledge is held by an organization rather than an individual.
A managed IT partner maintains documented system baselines, tracks configuration changes, maintains vendor relationships, and holds the institutional knowledge of the IT environment in a form that does not depend on any single person. When a team member at the managed IT provider leaves, the documentation and processes they followed remain. The next technician assigned to the account has access to the complete history of the environment.
This is the fundamental difference between an internal IT generalist and a managed IT relationship in terms of knowledge continuity. The generalist accumulates knowledge that lives in their head and leaves when they do. The managed IT organization accumulates knowledge that lives in documented systems and stays when any individual leaves.
For manufacturing facilities that cannot afford production disruption when their IT support model changes, that difference is not just organizational. It is operational.