{"id":6463,"date":"2026-05-05T08:00:00","date_gmt":"2026-05-05T12:00:00","guid":{"rendered":"https:\/\/verito.com\/blog\/?p=6463"},"modified":"2026-05-05T22:09:12","modified_gmt":"2026-05-06T02:09:12","slug":"co-managed-it-support-scope","status":"publish","type":"post","link":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/","title":{"rendered":"Co-Managed IT Support Scope for CPA Firms (2026)"},"content":{"rendered":"<h2 id=\"h-what-co-managed-it-support-services-actually-cover\" class=\"wp-block-heading\"><span id=\"what-co-managed-it-support-services-actually-cover\"><strong>What Co-Managed IT Support Services Actually Cover<\/strong><\/span><\/h2>\n<p>The FTC Safeguards Rule requires every U.S. tax preparer to oversee their service providers. That&#8217;s hard to do when you&#8217;re not sure what you actually bought.<\/p>\n<p>Co-managed IT support services cover some of your IT workload, leave some to your in-house team, and rarely include a few items buyers assume are bundled. This post walks through the standard scope, what shifts compared to <a href=\"https:\/\/verito.com\/managed-it\" target=\"_blank\" rel=\"dofollow\" >fully managed IT<\/a>, and what to verify in writing before you sign.<\/p>\n<p><a href=\"http:\/\/verito.com\/managed-it\/co-managed\" target=\"_blank\" rel=\"dofollow\" >Co-managed IT<\/a> is a split-responsibility model. The MSP brings tooling, monitoring, security operations, and after-hours coverage. Your internal IT person or office manager keeps the relationships, strategy decisions, and day-to-day judgment calls. The Federal Trade Commission frames it plainly in Safeguards Rule guidance: you can outsource the work, but the buck still stops with you. Use the table below as your scope reference, then read the prose for what each line looks like in practice at a CPA firm.<\/p>\n\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1766\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean.jpg\" alt=\"Server rack indicator panel with green and amber LEDs in a small office wiring closet\" class=\"wp-image-6511\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean.jpg 1600w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-272x300.jpg 272w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-928x1024.jpg 928w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-768x848.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-1392x1536.jpg 1392w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-380x419.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-800x883.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-1160x1280.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-scope-clean-150x166.jpg 150w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n\n\n<h2 id=\"h-co-managed-it-master-scope-table\" class=\"wp-block-heading\"><span id=\"co-managed-it-master-scope-table\"><strong>Co-Managed IT Master Scope Table<\/strong><\/span><\/h2>\n<p>Sixteen common service lines, who typically owns each one in a co-managed agreement, and how that compares to fully managed. Use this as your first-pass checklist when reading a Statement of Work.<\/p>\n<figure class=\"wp-block-table has-fixed-layout\">\n<table>\n<thead>\n<tr>\n<th><strong>Service Line<\/strong><\/th>\n<th><strong>Co-Managed Ownership<\/strong><\/th>\n<th><strong>Fully Managed Ownership<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Endpoint patching (Windows, third-party apps)<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Endpoint Detection and Response (EDR) \/ antivirus<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Email security (anti-phishing, link-scan, attachment sandbox)<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication (MFA) enforcement and review<\/td>\n<td>Shared<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Helpdesk Tier 1 (password resets, basic break-fix)<\/td>\n<td>Client retains or Shared<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Helpdesk Tier 2-3 (server, network, escalations)<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>24\/7 after-hours incident response<\/td>\n<td>Provider (verify in SLA)<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Endpoint and server backup<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Disaster Recovery (DR) testing<\/td>\n<td>Shared<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Network monitoring (firewall, switches, Wi-Fi)<\/td>\n<td>Provider<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>FTC Safeguards Rule documentation<\/td>\n<td>Shared (firm signs, MSP supports)<\/td>\n<td>Shared (firm always signs)<\/td>\n<\/tr>\n<tr>\n<td>Written Information Security Plan (<a class=\"wpil_keyword_link\" title=\"WISP\" href=\"http:\/\/verito.com\/written-information-security-plan\" target=\"_blank\" rel=\"dofollow noopener\" data-wpil-keyword-link=\"linked\" data-wpil-monitor-id=\"1202\">WISP<\/a>) authoring<\/td>\n<td>Shared or Client retains<\/td>\n<td>Shared<\/td>\n<\/tr>\n<tr>\n<td>Hardware procurement and refresh<\/td>\n<td>Client retains<\/td>\n<td>Often add-on<\/td>\n<\/tr>\n<tr>\n<td>Vendor liaison (Drake, Lacerte, ProSeries, ISP)<\/td>\n<td>Shared<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>New-staff onboarding (account, device, app provisioning)<\/td>\n<td>Shared<\/td>\n<td>Provider<\/td>\n<\/tr>\n<tr>\n<td>Compliance reporting and audit support<\/td>\n<td>Shared<\/td>\n<td>Shared<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>&#8220;Provider&#8221; means the MSP runs and is accountable. &#8220;Shared&#8221; means the MSP does the heavy lifting but the firm makes decisions, signs artifacts, or reviews output. &#8220;Client retains&#8221; means the firm still owns the work. Most scope disputes happen on the Shared and Client-retains rows. Read those carefully in any contract.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-compliance-scope\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-scope-compliance\"><span id=\"compliance-scope\"><strong>Co-Managed IT Support Scope: Compliance<\/strong><\/span><\/span><\/h2>\n<p>Compliance is where co-managed agreements have the biggest gap between what the contract lists and what the firm is still on the hook for. Read this section before any other.<\/p>\n<h3 id=\"h-ftc-safeguards-rule-alignment\" class=\"wp-block-heading\"><span id=\"ftc-safeguards-rule-and-irs-publication-4557\"><span id=\"ftc-safeguards-rule-alignment\"><strong>FTC Safeguards Rule and IRS Publication 4557<\/strong><\/span><\/span><\/h3>\n<p>The Federal Trade Commission (FTC) Safeguards Rule (16 CFR Part 314) applies to every U.S. tax preparer because tax-prep firms are explicitly listed as financial institutions under the rule (<a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FTC Safeguards Rule guidance<\/a>). Section 314.4 lists nine required elements of an information security program. A co-managed MSP can implement most of the technical controls (access controls, encryption, MFA, monitoring, change management, incident response). It cannot designate your Qualified Individual, sign your annual report, or own your written risk assessment. Section 314.4(f) also requires you to oversee your service providers, including the MSP itself.<\/p>\n<p>IRS Publication 4557, &#8220;Safeguarding Taxpayer Data,&#8221; lays out the data-security obligations for tax professionals (<a href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IRS Publication 4557<\/a>). Federal law, enforced through the FTC, requires every preparer to maintain a Written Information Security Plan (WISP). The IRS Security Summit reinforced it in 2024: tax professionals are required by law to create a WISP to protect their clients&#8217; data (<a href=\"https:\/\/www.irs.gov\/newsroom\/irs-security-summit-remind-tax-pros-they-must-have-a-written-information-security-plan-to-protect-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IRS Newsroom<\/a>).<\/p>\n<h3 id=\"h-wisp-authoring-and-annual-review\" class=\"wp-block-heading\"><span id=\"wisp-authoring-and-audit-ready-documentation\"><span id=\"wisp-authoring-and-annual-review\"><strong>WISP Authoring and Audit-Ready Documentation<\/strong><\/span><\/span><\/h3>\n<p>Co-managed MSPs typically support WISP creation in one of three ways: deliver a templated WISP populated with your firm&#8217;s specifics, review and red-line a WISP your firm authored, or operate the technical controls referenced in your WISP. Some charge for authoring separately. Almost none sign the WISP. The Qualified Individual at your firm signs it; the firm carries the liability.<\/p>\n<p>Compliance-serious MSPs will give you a documentation pack: SOC 2 report, network diagrams, control descriptions, change-management logs, and quarterly review notes. If the MSP cannot produce a current SOC 2 Type II report on request, that is a scope flag.<\/p>\n<h3 id=\"h-shared-responsibility-framing\" class=\"wp-block-heading\"><span id=\"shared-responsibility-stated-plainly\"><span id=\"shared-responsibility-framing\"><strong>Shared Responsibility, Stated Plainly<\/strong><\/span><\/span><\/h3>\n<p>The National Institute of Standards and Technology (NIST) frames\u00a0<a href=\"https:\/\/verito.com\/blog\/cybersecurity-for-accounting-firms\" target=\"_blank\" rel=\"dofollow\" >cybersecurity<\/a>\u00a0as a shared responsibility for small businesses. Its Cybersecurity Framework 2.0 Small Business Quick-Start Guide positions the framework as a discussion prompt between a business owner and whomever they have chosen to help reduce their cybersecurity risks, including a managed security service provider (<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1300.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NIST SP 1300, CSF 2.0<\/a>). The FTC says the same thing more bluntly in its guidance.<\/p>\n<figure class=\"wp-block-pullquote\">\n<blockquote>\n<p>&#8220;The buck still stops with you.&#8221;<\/p>\n<p><cite>FTC Safeguards Rule guidance<\/cite><\/p>\n<\/blockquote>\n<\/figure>\n<p>That is the most important sentence in this entire post.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-security-scope\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-scope-security\"><span id=\"security-scope\"><strong>Co-Managed IT Support Scope: Security<\/strong><\/span><\/span><\/h2>\n<p>Security is the line item that varies most. &#8220;Managed security&#8221; can mean a single antivirus license or a 24\/7 Security Operations Center. Verify the components.<\/p>\n<h3 id=\"h-edr-and-antivirus\" class=\"wp-block-heading\"><span id=\"edr-mfa-and-email-security\"><span id=\"edr-and-antivirus\"><strong>EDR, MFA, and Email Security<\/strong><\/span><\/span><\/h3>\n<p>Endpoint Detection and Response (EDR) is the modern replacement for legacy antivirus. EDR watches process behavior, not just file signatures, and can isolate a compromised endpoint automatically. A standard co-managed package includes EDR licensing, deployment, policy tuning, and active threat response. Confirm that &#8220;active threat response&#8221; means a human reviews and acts on detections, not just a rule firing into a logging queue.<\/p>\n<p>Multi-Factor Authentication (MFA) is required by the FTC Safeguards Rule for any access to customer information, with limited written exceptions (<a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FTC Safeguards Rule, 16 CFR 314.4<\/a>). The MSP configures, monitors, and reports on MFA enforcement across Microsoft 365, remote access, and your tax-software cloud. Your firm still owns the policy on who has MFA exceptions and why.<\/p>\n<p>Email remains the top entry vector against tax practitioners. Co-managed scope here is anti-phishing scanning, link rewriting and click-time detonation, attachment sandboxing, and Domain-based Message Authentication (DMARC) configuration. Verify whether security awareness training is bundled or sold separately.<\/p>\n<h3 id=\"h-soc-coverage\" class=\"wp-block-heading\"><span id=\"24-7-soc-vs-business-hours-monitoring\"><span id=\"soc-coverage\"><strong>24\/7 SOC vs Business-Hours Monitoring<\/strong><\/span><\/span><\/h3>\n<p>A 24\/7 Security Operations Center (SOC) means humans review correlated security alerts around the clock. Business-hours monitoring means the queue gets reviewed Monday to Friday. The price gap is significant; the risk gap is larger during tax season, when phishing campaigns spike. Ask explicitly which one is in scope. Vulnerability scans usually run monthly or quarterly with a remediation report; penetration testing is almost always a separate engagement.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-daily-operations-scope\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-scope-daily-operations\"><span id=\"daily-operations-scope\"><strong>Co-Managed IT Support Scope: Daily Operations<\/strong><\/span><\/span><\/h2>\n<p>&#8220;Monitoring, patching, and helpdesk&#8221; is the headline of almost every co-managed package. What that means in practice is more specific than the headline suggests.<\/p>\n<h3 id=\"h-patching-cadence-and-reboot-windows\" class=\"wp-block-heading\"><span id=\"patching-cadence-and-reboot-windows\"><strong>Patching Cadence and Reboot Windows<\/strong><\/span><\/h3>\n<p>A standard agreement covers Windows patches, third-party app patches (browsers, Adobe, Java), and firmware on managed devices, typically weekly with critical security patches pushed faster. Verify the reboot window before tax season. Many MSPs default to a 2 a.m. local reboot every Tuesday, which works in May but not on March 14 when a senior partner is running extension calculations. A good co-managed agreement freezes non-critical patching from late January through April 15 and applies only emergency patches with firm sign-off.<\/p>\n<h3 id=\"h-monitoring-and-escalation-paths\" class=\"wp-block-heading\"><span id=\"monitoring-and-escalation-paths\"><strong>Monitoring and Escalation Paths<\/strong><\/span><\/h3>\n<p>Monitoring is agent-based polling of every covered endpoint and server, plus the firewall and switches. The MSP&#8217;s Remote Monitoring and Management (RMM) platform fires alerts on disk pressure, RAM saturation, failed logins, suspicious processes, agent disconnects, and patch failures. Cheaper agreements review alerts the next business day. Stronger agreements have a 24\/7 Network Operations Center (NOC) acknowledging critical alerts within minutes. Ask for the alert-to-acknowledgement Service Level Agreement (SLA) in writing.<\/p>\n<h3 id=\"h-tier-1-vs-tier-2-3-helpdesk\" class=\"wp-block-heading\"><span id=\"helpdesk-tiers-and-slas\"><span id=\"tier-1-vs-tier-2-3-helpdesk\"><strong>Helpdesk Tiers and SLAs<\/strong><\/span><\/span><\/h3>\n<p>Tier 1 is the everyday &#8220;I forgot my password&#8221; call. In co-managed agreements, Tier 1 often stays with your in-house person. The MSP picks up Tier 2 (misconfigurations) and Tier 3 (server, network, or identity issues). If your firm doesn&#8217;t have an in-house IT person, confirm Tier 1 is included or the per-incident rate will surprise you.<\/p>\n<p>On SLAs, response time is when a human picks up the ticket; resolution time is when the issue is fixed. Most MSPs publish a tight response SLA (15 to 60 minutes) and a vague or absent resolution SLA. For a CPA firm, the resolution target on Severity 1 (firm-down, e-file blocked) matters more than the response number. Push for both in writing. Our guide on\u00a0<a href=\"https:\/\/verito.com\/blog\/managed-it-contract-cpa-firms\/\" target=\"_blank\" rel=\"dofollow\" >managed IT contracts for CPA firms<\/a>\u00a0walks through clause-by-clause language.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-backup-and-disaster-recovery-scope\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-scope-backup-and-disaster-recovery\"><span id=\"backup-and-disaster-recovery-scope\"><strong>Co-Managed IT Support Scope: Backup and Disaster Recovery<\/strong><\/span><\/span><\/h2>\n<p>Backup is over-promised and under-tested in most co-managed agreements. The contract usually says &#8220;managed backup.&#8221; What that means varies.<\/p>\n<h3 id=\"h-endpoint-vs-server-backup\" class=\"wp-block-heading\"><span id=\"endpoint-vs-server-backup-rpo-and-rto\"><span id=\"endpoint-vs-server-backup\"><strong>Endpoint vs Server Backup, RPO and RTO<\/strong><\/span><\/span><\/h3>\n<p>Endpoint backup covers laptops and desktops. Server backup covers your file server, your hosted Drake or Lacerte database, your QuickBooks file server, and your email environment. The agreement should state both are in scope. If only &#8220;endpoint backup&#8221; appears, the tax-software server backup is likely a separate line item.<\/p>\n<p>Recovery Point Objective (RPO) is how much data you are willing to lose, measured in time. Recovery Time Objective (RTO) is how long you can be down before recovery completes. Co-managed agreements should publish both as numbers, not adjectives. &#8220;Near real-time backup&#8221; is marketing. &#8220;RPO 15 minutes, RTO 4 hours&#8221; is a contract. For more on choosing between backup tiers, see our breakdown of\u00a0<a href=\"https:\/\/verito.com\/blog\/managed-backup-vs-baas-vs-draas\/\" target=\"_blank\" rel=\"dofollow\" >managed backup vs BaaS vs DRaaS<\/a>.<\/p>\n<h3 id=\"h-annual-recovery-testing\" class=\"wp-block-heading\"><span id=\"recovery-testing-and-backup-exclusions\"><span id=\"annual-recovery-testing\"><strong>Recovery Testing and Backup Exclusions<\/strong><\/span><\/span><\/h3>\n<p>Backups that have never been restored are not backups. A serious co-managed agreement schedules at least one full DR test per year with a written report. Many MSPs scope this as a paid add-on. Verify whether DR testing is in the base agreement and how you get the test results.<\/p>\n<p>Backup scope often excludes user-error file recovery beyond a defined retention window (commonly 30 to 90 days), personal cloud storage (Dropbox, OneDrive Personal), and external USB drives. It typically excludes data inside Software-as-a-Service apps unless a separate SaaS backup tool is in scope. If your tax software vendor hosts the database in their cloud, find out who is backing it up: them, you, or your MSP.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-cpa-specific-scope\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-scope-for-cpa-firms-specifically\"><span id=\"cpa-specific-scope\"><strong>Co-Managed IT Support Scope for CPA Firms Specifically<\/strong><\/span><\/span><\/h2>\n<p>What changes when the firm being supported is a CPA practice instead of a generic professional services office? Five scope items shift in ways that matter at signing.<\/p>\n<h3 id=\"h-tax-software-hosting\" class=\"wp-block-heading\"><span id=\"tax-software-hosting-and-performance\"><span id=\"tax-software-hosting\"><strong>Tax Software Hosting and Performance<\/strong><\/span><\/span><\/h3>\n<p>Drake, Lacerte, ProSeries, UltraTax CS, and CCH each have different hosting requirements. A firm running Drake on a local server has different scope needs from a firm running ProSystem fx in a vendor-hosted environment, which has different needs again from a firm using a private cloud host. The MSP needs to know which environment yours runs in and own the performance, patching, and integration boundaries for each. NVMe storage matters during March; spinning disk does not.<\/p>\n<h3 id=\"h-tax-season-sla-windows\" class=\"wp-block-heading\"><span id=\"tax-season-sla-windows\"><strong>Tax Season SLA Windows<\/strong><\/span><\/h3>\n<p>Generic MSP SLAs are flat across the year. CPA-firm SLAs should not be. Severity 1 response targets that are acceptable in October become unacceptable on March 14. A serious co-managed agreement names January 15 through April 15 as a heightened-priority window with tighter response and resolution targets, and freezes non-emergency change windows during that period.<\/p>\n<h3 id=\"h-e-file-infrastructure\" class=\"wp-block-heading\"><span id=\"e-file-infrastructure\"><strong>E-File Infrastructure<\/strong><\/span><\/h3>\n<p>IRS e-Services accounts, EFIN credentials, and transmission portals are the firm&#8217;s identity to the IRS, not a generic IT asset. The MSP scope should cover MFA enforcement on these accounts, monitoring for unauthorized access, and immediate incident response if credentials are suspected to be compromised. The firm still owns the EFIN and the relationship with IRS Stakeholder Liaison.<\/p>\n<h3 id=\"h-document-retention\" class=\"wp-block-heading\"><span id=\"document-retention-and-audit-support\"><span id=\"document-retention\"><strong>Document Retention and Audit Support<\/strong><\/span><\/span><\/h3>\n<p>IRS retention requirements run seven years for most tax records and longer for some categories. The MSP scope should specify retention policies for both active and archived data, the format of audit-response data extracts, and how quickly the firm can pull a specific client&#8217;s records under subpoena or audit notice. If the SOW is silent on retention, the firm carries the assumption.<\/p>\n<h3 id=\"h-client-portal-management\" class=\"wp-block-heading\"><span id=\"client-portal-management\"><strong>Client Portal Management<\/strong><\/span><\/h3>\n<p>Most CPA firms run a client portal for document exchange (SmartVault, ShareFile, Liscio, or one bundled with their tax software). Scope should specify whether the MSP manages portal user access, handles client onboarding and offboarding in the portal, and supports clients calling for password help. If the firm runs a separate portal vendor, the MSP scope should include vendor liaison.<\/p>\n<p>If your draft SOW does not address these five lines, ask. Generic MSP scope documents do not, and the gaps become incidents during tax season.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-whats-typically-not-included\" class=\"wp-block-heading\"><span id=\"whats-typically-not-included-in-co-managed-it\"><span id=\"whats-typically-not-included\"><strong>What&#8217;s Typically NOT Included in Co-Managed IT<\/strong><\/span><\/span><\/h2>\n<p>These six items show up in the wishful interpretation of &#8220;managed IT&#8221; and almost never in the contract. Plan for them as separate spend.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Hardware refresh and procurement.<\/strong> Sourcing and replacing laptops, desktops, and switches is billed per project or as an add-on.<\/li>\n<li><strong>Software license budgeting.<\/strong> The MSP can recommend tiers; the firm owns Microsoft 365, Adobe, and tax-software license decisions.<\/li>\n<li><strong>Custom application support.<\/strong> Drake, Lacerte, ProSeries, UltraTax CS, and CCH still own their apps. The MSP configures, integrates, and patches around them.<\/li>\n<li><strong>Project work outside the agreement.<\/strong> Office moves, full server migrations, and M&amp;A integrations are scoped as separate projects.<\/li>\n<li><strong>Compliance attestations.<\/strong> The firm signs the WISP, the Qualified Individual designation, and the annual board report. The MSP supports; the MSP does not attest.<\/li>\n<li><strong>Virtual CIO (vCIO) advisory.<\/strong> Quarterly business reviews and IT roadmapping are sometimes bundled in higher tiers, otherwise sold as an add-on.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-questions-to-ask-before-you-sign\" class=\"wp-block-heading\"><span id=\"questions-to-ask-before-you-sign\"><strong>Questions to Ask Before You Sign<\/strong><\/span><\/h2>\n<p>An eight-point checklist for your next vendor call. Print it, paste it into the meeting agenda, get answers in writing.<\/p>\n<ol class=\"wp-block-list\">\n<li>Which Tier 1, Tier 2, and Tier 3 helpdesk activities are in the base price, and which are billed hourly?<\/li>\n<li>What is the response SLA and the resolution SLA for Severity 1 incidents during tax season (January 15 to April 30)?<\/li>\n<li>Is the SOC monitoring 24\/7 with humans, or is it business-hours queue review?<\/li>\n<li>Is endpoint AND server backup included, with named RPO and RTO numbers?<\/li>\n<li>Is at least one full DR test per year included, and how do we receive the report?<\/li>\n<li>What does the MSP author for our WISP, and what do we have to write or sign ourselves?<\/li>\n<li>Will you provide your current SOC 2 Type II report and your most recent third-party penetration test summary?<\/li>\n<li>What is excluded from the base agreement: hardware refresh, vCIO, project work, compliance attestations, anything else?<\/li>\n<\/ol>\n<p>If a vendor cannot answer these in writing, the gap is your future change order.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-where-verito-fits\" class=\"wp-block-heading\"><span id=\"where-verito-fits\"><strong>Where Verito Fits<\/strong><\/span><\/h2>\n<p>Verito&#8217;s co-managed offering, VeritGuard, is built for U.S. CPA and tax firms. Scope follows the model above: 24\/7 monitoring, EDR, email security, MFA enforcement, endpoint and server backup, vendor liaison for Drake, Lacerte, ProSeries, UltraTax CS, and CCH, plus WISP and FTC Safeguards documentation support. Compliance always sits with the firm; Verito handles the technical controls and the audit-ready documentation. Verito is SOC 2 Type II certified, has maintained 100% uptime since 2016, and runs at NPS 95 across the support practice. If you want a second opinion on scope, you can <a href=\"https:\/\/verito.com\/security-assessment\" target=\"_blank\" rel=\"dofollow\" >book a free security assessment with Verito<\/a>.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 id=\"h-co-managed-it-faqs\" class=\"wp-block-heading\"><span id=\"co-managed-it-support-services-faqs\"><span id=\"co-managed-it-faqs\"><strong>Co-Managed IT Support Services: FAQs<\/strong><\/span><\/span><\/h2>\n<h3 id=\"h-faq-difference-co-managed-fully-managed\" class=\"wp-block-heading\"><span id=\"whats-the-difference-between-co-managed-it-and-fully-managed-it-scope\"><span id=\"faq-difference-co-managed-fully-managed\"><strong>What&#8217;s the difference between co-managed IT and fully managed IT scope?<\/strong><\/span><\/span><\/h3>\n<p>Co-managed IT splits responsibility between an internal IT contact at your firm and the MSP. The internal contact often owns Tier 1 helpdesk, vendor relationships, and strategic decisions. The MSP owns tooling, monitoring, security operations, and Tier 2 to Tier 3 escalations. Fully managed puts almost all of those on the MSP, including Tier 1.<\/p>\n<h3 id=\"h-faq-does-co-managed-include-wisp\" class=\"wp-block-heading\"><span id=\"does-co-managed-it-include-wisp-authoring\"><span id=\"faq-does-co-managed-include-wisp\"><strong>Does co-managed IT include WISP authoring?<\/strong><\/span><\/span><\/h3>\n<p>Sometimes. Many MSPs include a templated WISP at onboarding, populated with your firm&#8217;s specifics. Some require an add-on engagement. Almost none sign the WISP. Federal law requires the firm itself to maintain it.<\/p>\n<h3 id=\"h-faq-247-helpdesk-standard\" class=\"wp-block-heading\"><span id=\"is-24-7-helpdesk-standard-in-co-managed-agreements\"><span id=\"faq-247-helpdesk-standard\"><strong>Is 24\/7 helpdesk standard in co-managed agreements?<\/strong><\/span><\/span><\/h3>\n<p>24\/7 incident response for Severity 1 events is common. 24\/7 helpdesk for everyday issues is not. Many agreements offer business-hours helpdesk plus after-hours on-call for outages. If your firm runs nights during tax season, ask whether a preparer can call at 11 p.m. on April 14 and reach a human within minutes.<\/p>\n<h3 id=\"h-faq-mfa-firm-or-msp\" class=\"wp-block-heading\"><span id=\"who-owns-mfa-enforcement-the-firm-or-the-msp\"><span id=\"faq-mfa-firm-or-msp\"><strong>Who owns MFA enforcement, the firm or the MSP?<\/strong><\/span><\/span><\/h3>\n<p>Shared. The MSP configures, monitors, and reports on MFA across Microsoft 365, remote access, and your tax-software cloud. The firm owns the exception policy. The FTC Safeguards Rule requires MFA for access to customer information, with limited written exceptions.<\/p>\n<h3 id=\"h-faq-hardware-included\" class=\"wp-block-heading\"><span id=\"is-hardware-procurement-included-in-co-managed-it\"><span id=\"faq-hardware-included\"><strong>Is hardware procurement included in co-managed IT?<\/strong><\/span><\/span><\/h3>\n<p>Usually no. Sourcing, imaging, and shipping new laptops or desktops is typically billed as a project or per-device fee on top of the base agreement. The MSP can recommend specs; the firm pays for the hardware.<\/p>\n<h3 id=\"h-faq-msp-handle-tax-software-issues\" class=\"wp-block-heading\"><span id=\"will-my-msp-handle-drake-or-lacerte-support-tickets\"><span id=\"faq-msp-handle-tax-software-issues\"><strong>Will my MSP handle Drake or Lacerte support tickets?<\/strong><\/span><\/span><\/h3>\n<p>The MSP handles installation, configuration, patching, integration, and the network and identity layers your tax software depends on. Vendor-side bugs and feature-level questions still go to Drake, Lacerte, ProSeries, UltraTax CS, or CCH directly. A good MSP will open the ticket and stay on the call as a vendor liaison.<\/p>\n<h3 id=\"h-faq-soc-2-required\" class=\"wp-block-heading\"><span id=\"does-my-msp-need-to-be-soc-2-certified\"><span id=\"faq-soc-2-required\"><strong>Does my MSP need to be SOC 2 certified?<\/strong><\/span><\/span><\/h3>\n<p>The FTC Safeguards Rule requires you to oversee service providers and to select providers capable of maintaining appropriate safeguards. A current SOC 2 Type II report is the cleanest way for an MSP to demonstrate that capability. If the MSP cannot produce one, you have to document why you selected them anyway, and you carry the exposure.<\/p>\n<h3 id=\"h-faq-vcio-included\" class=\"wp-block-heading\"><span id=\"is-virtual-cio-vcio-advisory-included-or-extra\"><span id=\"faq-vcio-included\"><strong>Is virtual CIO (vCIO) advisory included or extra?<\/strong><\/span><\/span><\/h3>\n<p>It depends on the tier. Some packages bundle quarterly business reviews and an IT roadmap. Others sell the vCIO as a paid add-on, billed monthly or per engagement.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div class=\"wp-block-spacer\" style=\"height: 20px;\">\u00a0<\/div>\n<h2 id=\"h-next-step\" class=\"wp-block-heading\"><span id=\"your-next-step\"><span id=\"next-step\"><strong>Your Next Step<\/strong><\/span><\/span><\/h2>\n<p>Co-managed IT works when scope is clear, SLAs are written, and both sides know what the firm still owns. Before you sign or renew, line your draft SOW up against the master scope table and run the eight-question checklist on your vendor call. To go deeper, review Verito&#8217;s <a href=\"https:\/\/verito.com\/managed-it\/co-managed\" target=\"_blank\" rel=\"dofollow\" >co-managed IT support services<\/a>.<\/p>\n<p>Related reading: <a href=\"https:\/\/verito.com\/blog\/managed-it-for-accounting-firms-it-guy-quits\/\" target=\"_blank\" rel=\"dofollow\" >Managed IT: When Your IT Guy Quits<\/a>, <a href=\"https:\/\/verito.com\/blog\/best-it-support-accounting-firms\/\" target=\"_blank\" rel=\"dofollow\" >Best IT Support for Accounting Firms<\/a>, <a href=\"https:\/\/verito.com\/blog\/wisp-for-cpa-firms\/\" target=\"_blank\" rel=\"dofollow\" >WISP for CPA Firms<\/a>, and <a href=\"https:\/\/verito.com\/blog\/irs-publication-4557-explained\/\" target=\"_blank\" rel=\"dofollow\" >IRS Publication 4557 Explained<\/a>.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p>\u00a0<\/p>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"The full scope of co-managed IT support services for CPA firms, including what&#8217;s typically extra and what to verify before signing.\n","protected":false},"author":12,"featured_media":6510,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[104],"tags":[491,392,351],"class_list":{"0":"post-6463","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-managed-it-services","8":"tag-co-managed-it","9":"tag-ftc-safeguards","10":"tag-managed-it-services"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Co-Managed IT Support Scope for CPA Firms (2026) - Verito Technologies | Blog<\/title>\n<meta name=\"description\" content=\"The FTC requires you to oversee your IT provider. Here&#039;s what&#039;s in and out of scope for co-managed IT support.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Co-Managed IT Support Scope for CPA Firms (2026)\" \/>\n<meta property=\"og:description\" content=\"The full scope of co-managed IT support services for CPA firms, including what&#039;s typically extra and what to verify before signing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/\" \/>\n<meta property=\"og:site_name\" content=\"Verito Technologies | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-05T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-06T02:09:12+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"783\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camren Majors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camren Majors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Co-Managed IT Support Scope for CPA Firms (2026) - Verito Technologies | Blog","description":"The FTC requires you to oversee your IT provider. Here's what's in and out of scope for co-managed IT support.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/","og_locale":"en_US","og_type":"article","og_title":"Co-Managed IT Support Scope for CPA Firms (2026)","og_description":"The full scope of co-managed IT support services for CPA firms, including what's typically extra and what to verify before signing.","og_url":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/","og_site_name":"Verito Technologies | Blog","article_published_time":"2026-05-05T12:00:00+00:00","article_modified_time":"2026-05-06T02:09:12+00:00","og_image":[{"width":1600,"height":783,"url":"http:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg","type":"image\/jpeg"}],"author":"Camren Majors","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camren Majors","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#article","isPartOf":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/"},"author":{"name":"Camren Majors","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e"},"headline":"Co-Managed IT Support Scope for CPA Firms (2026)","datePublished":"2026-05-05T12:00:00+00:00","dateModified":"2026-05-06T02:09:12+00:00","mainEntityOfPage":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/"},"wordCount":2929,"publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"image":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg","keywords":["co managed IT","FTC Safeguards","managed IT services"],"articleSection":["Managed IT Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/","url":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/","name":"Co-Managed IT Support Scope for CPA Firms (2026) - Verito Technologies | Blog","isPartOf":{"@id":"https:\/\/verito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#primaryimage"},"image":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg","datePublished":"2026-05-05T12:00:00+00:00","dateModified":"2026-05-06T02:09:12+00:00","description":"The FTC requires you to oversee your IT provider. Here's what's in and out of scope for co-managed IT support.","breadcrumb":{"@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verito.com\/blog\/co-managed-it-support-scope\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#primaryimage","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/04\/co-managed-it-support-services-included-hero-clean.jpg","width":1600,"height":783,"caption":"Row of unmarked filing organizers on a dark wooden CPA firm shelf"},{"@type":"BreadcrumbList","@id":"https:\/\/verito.com\/blog\/co-managed-it-support-scope\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Managed IT Services","item":"https:\/\/verito.com\/blog\/category\/managed-it-services\/"},{"@type":"ListItem","position":3,"name":"Co-Managed IT Support Scope for CPA Firms (2026)"}]},{"@type":"WebSite","@id":"https:\/\/verito.com\/blog\/#website","url":"https:\/\/verito.com\/blog\/","name":"Verito Technologies | Blog","description":"Verito Technologies Blog","publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verito.com\/blog\/#organization","name":"Verito Technologies","url":"https:\/\/verito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","width":625,"height":208,"caption":"Verito Technologies"},"image":{"@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e","name":"Camren Majors","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","caption":"Camren Majors"},"description":"Camren Majors is co-founder and Chief Revenue Officer of Verito Technologies, a cloud hosting and managed IT company built exclusively for tax and accounting firms. He is the co-author of Beyond Best Practices: Modernizing the Successful Accounting Firm (2026). His work has been featured in NATP TAXPRO Magazine and he has presented for NATP, NAEA, and NSA."}]}},"_links":{"self":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/comments?post=6463"}],"version-history":[{"count":10,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6463\/revisions"}],"predecessor-version":[{"id":6601,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6463\/revisions\/6601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media\/6510"}],"wp:attachment":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media?parent=6463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/categories?post=6463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/tags?post=6463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}