Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Checklists
  3. IT Employee Onboarding Checklist
IT Employee Onboarding Checklist
CHECKLISTBeginneroperations

IT Employee Onboarding Checklist

Complete IT onboarding checklist for new employee setup. Covers account provisioning, hardware deployment, security configuration, software installation,...

Dylan H.

IT Operations

February 11, 2026
7 min read
52 items

Overview

A structured IT onboarding checklist ensures every new hire gets consistent, secure access from day one. Missed steps lead to shadow IT, security gaps, and a poor employee experience.

Use this checklist for every new employee. Assign an IT buddy, track progress, and get sign-off before closing the ticket.


1. Pre-Arrival Preparation

Complete these items before the employee's first day. Ideally 3-5 business days in advance.

HR REQUESTNew hire formIT TICKETAuto-createdACCOUNT CREATIONAD / Entra IDHARDWARE PREPImage + configDAY 1 READY✓ Complete
  • Create AD/Entra ID account — Set up the user account in Active Directory or Microsoft Entra ID with correct OU/group placement

    New-ADUser -Name "Jane Smith" -SamAccountName "jsmith" -UserPrincipalName "jsmith@contoso.com" -Path "OU=Users,DC=contoso,DC=com" -Enabled $true
  • Assign Microsoft 365 license — Provision the appropriate E3/E5/Business license based on role

  • Send welcome email to hiring manager — Confirm start date, desk location, and first-day schedule

  • Order hardware — Laptop, monitor, dock, peripherals based on the role-specific hardware matrix

  • Prepare welcome packet — Print or stage Wi-Fi credentials, support contacts, and quick-start guide

  • Create accounts in line-of-business apps — CRM, ERP, ticketing system, or any role-specific platforms

  • Reserve desk/workspace — Confirm physical setup including power, network drop, and phone (if applicable)


2. Hardware Setup

Configure the device before handing it to the employee.

  • Image the device with standard OS build — Deploy the approved Windows 11 / macOS image via MDT, Autopilot, or ABM

  • Apply all Windows/macOS updates — Ensure fully patched before deployment

    # Check update status
    Get-WindowsUpdate -Install -AcceptAll -AutoReboot
  • Enroll in MDM (Intune / Jamf) — Device must be managed before it leaves IT

    # Verify Intune enrollment
    dsregcmd /status | findstr "AzureAdJoined"
  • Enable disk encryption (BitLocker / FileVault) — Full-disk encryption is mandatory

    manage-bde -status C:
  • Apply asset tag and record serial number — Log in asset management system with assigned user

  • Connect and test peripherals — Dock, monitors, keyboard, mouse, headset all functional

  • Verify device boots to login and connects to Wi-Fi — Confirm basic functionality before handoff


3. Account & Identity

Set up secure access across all identity systems.

Identity ProviderEntra ID / ADMFAAuthenticator AppSSOSingle Sign-OnApp AccessM365, CRM, VPNTeams, SharePointIdentity Stack Flow
  • Enroll in MFA — Register Microsoft Authenticator or FIDO2 key during first-day setup

  • Add to security groups — Assign department and role-based groups for proper access scoping

    Add-ADGroupMember -Identity "SG-Marketing-Users" -Members "jsmith"
  • Configure VPN access — Set up Always-On VPN or per-app VPN profile for remote access

  • Verify SSO works for all assigned apps — Test login to each provisioned SaaS application

  • Add to shared mailboxes and distribution lists — Department inbox, team DLs, all-company announcements

  • Set email signature — Deploy the standard company email signature template

  • Configure Conditional Access policies — Ensure the user's device meets compliance policies before granting access


4. Security Configuration

Every device must meet baseline security requirements before connecting to the corporate network.

  • Verify EDR agent is installed and reporting — SentinelOne, CrowdStrike, or Defender for Endpoint must be active

    # Check SentinelOne status
    & "C:\Program Files\SentinelOne\Sentinel Agent\SentinelCtl.exe" status
  • Confirm Windows Firewall / macOS firewall is enabled — Host firewall must be active with corporate profile

  • Deploy password manager — Install and configure Bitwarden, 1Password, or company-approved manager

  • Run initial vulnerability scan — Verify no critical vulnerabilities on the fresh build

  • Enable Windows Defender Credential Guard — Protect credentials from Pass-the-Hash attacks (Windows Enterprise)

  • Verify USB device policy — Confirm removable storage is blocked or restricted per policy

  • Confirm screen lock timeout — Auto-lock after 5 minutes of inactivity

    # Check via Group Policy
    gpresult /r | findstr "screen"

5. Software Installation

Install only approved software from the company catalog.

  • Install productivity suite — Microsoft 365 Apps (Word, Excel, PowerPoint, Outlook, OneNote)

  • Install communication tools — Microsoft Teams, Zoom, or Slack (as per company standard)

  • Install role-specific software — Design tools, IDEs, accounting packages, etc. per the software matrix

  • Install RMM agent — NinjaOne, Datto, or ConnectWise agent for remote support and monitoring

  • Install approved browser — Microsoft Edge or Google Chrome with managed policies pushed via Intune/GPO

  • Verify all installed software is licensed — Check license activation status for each commercial application


6. Network & Access

Connect the user to all required network resources.

  • Connect to corporate Wi-Fi (802.1X) — Deploy the Wi-Fi profile with certificate-based authentication

  • Verify correct VLAN assignment — Confirm the device is on the appropriate network segment

  • Map network drives / SharePoint libraries — Connect to department file shares and document libraries

  • Install and test network printers — Add printers via print server or universal print

  • Verify internet filtering profile — Confirm web content filtering policy is applied (DNS filtering or proxy)

  • Test internal application access — Verify connectivity to intranet, ticketing system, and knowledge base


7. Training & Compliance

Security awareness and policy acceptance are mandatory before granting full access.

D1OrientationAUP Sign-offW1Security TrainingOnline modulesW2Phishing SimBaseline testM130-Day ReviewAccess auditOnboarding Training Timeline
  • Complete security awareness training — New-hire module covering phishing, social engineering, and data handling

  • Enroll in phishing simulation — Add to the next scheduled phishing campaign for baseline testing

  • Sign Acceptable Use Policy (AUP) — Digital or physical signature on the IT acceptable use agreement

  • Provide IT support contacts — Helpdesk number, email, ticketing portal, and escalation path

  • Review data classification policy — Ensure the employee understands confidential vs. internal vs. public data

  • Complete compliance training — HIPAA, PCI-DSS, or industry-specific training if applicable


8. Verification & Handoff

Final checks before closing the onboarding ticket.

  • Test email send/receive — Send a test email and confirm it arrives in both directions

  • Test VPN connectivity — Connect via VPN from outside the office network and access internal resources

  • Verify MFA is working — Confirm the user can authenticate with MFA across all enrolled applications

  • Test all provisioned applications — Open each application and verify functional access

  • Complete IT onboarding sign-off form — Manager and employee sign the checklist confirming all items complete

  • Schedule 30-day follow-up — Calendar reminder to check in, review access, and remove any unused licenses


Quick Reference

PhaseItemsTimelineOwner
Pre-Arrival7T-5 daysIT Ops
Hardware Setup7T-2 daysDesktop Support
Account & Identity7T-1 dayIdentity Team
Security Config7Day 1Security Ops
Software Install6Day 1Desktop Support
Network & Access6Day 1Network Team
Training6Week 1-4IT + HR
Verification6Day 1 + Day 30IT Ops

Offboarding Counterpart

When the employee leaves, reverse this checklist: disable accounts, revoke MFA, wipe the device, reclaim hardware, and remove from all groups and licenses. A separate offboarding checklist ensures nothing is missed.

#Onboarding#Operations#IT#New Hire#Security
Back to all Checklists