IT Onboarding Checklist

Default Logo
Max 4 MB | PNG, JPG

IT Onboarding Checklist

Employee Name:

Department:

Start Date:

IT Contact Person:

Hardware Provisioning

Order and configure laptop or desktop

Select the appropriate hardware specification for the role, install the operating system, and apply standard company configurations.

Set up monitors and docking station

Connect external monitors, docking station, keyboard, and mouse at the employee's workstation and test all connections.

Provide company mobile phone if required

Issue a configured smartphone with the company MDM profile installed and all required business apps pre-loaded.

Prepare headset and video conferencing equipment

Provide a quality headset and webcam for virtual meetings and ensure they are tested and functioning properly.

Label and register all equipment assets

Affix asset tags to all hardware, record serial numbers, and register each item in the IT asset management system.

Account and Access Setup

Create corporate email account

Set up the employee's company email address following the standard naming convention and configure initial mailbox settings.

Set up Active Directory or identity provider

Create the user account in the directory service with the correct organizational unit, group memberships, and security roles.

Provision VPN access for remote connectivity

Configure VPN credentials and install the client software so the employee can securely access company resources from any location.

Grant access to shared drives and folders

Assign the appropriate permissions to network drives, cloud storage, and team folders based on the employee's department and role.

Enable multi-factor authentication

Set up MFA on the employee's account using an authenticator app or hardware token to strengthen login security.

Create accounts for required SaaS platforms

Provision user accounts in all cloud applications the employee needs such as CRM, project management, and design tools.

Software Installation

Install standard productivity suite

Set up Microsoft Office, Google Workspace, or the company's standard productivity applications on the employee's computer.

Install communication and messaging tools

Download and configure Slack, Microsoft Teams, Zoom, and any other communication platforms used by the organization.

Deploy endpoint security software

Install antivirus, firewall, and endpoint detection software to protect the device and ensure compliance with security policies.

Install role-specific applications

Set up specialized software required for the position such as IDEs, design tools, analytics platforms, or accounting systems.

Configure browser extensions and bookmarks

Install approved browser extensions and set up bookmarks for frequently used internal sites, dashboards, and documentation portals.

Security and Compliance

Review IT security policies with employee

Walk through the acceptable use policy, data classification rules, and incident reporting procedures to set clear expectations.

Enroll device in mobile device management

Register the employee's company devices in the MDM platform to enforce security policies, encryption, and remote wipe capabilities.

Set up disk encryption on all devices

Enable BitLocker, FileVault, or equivalent full-disk encryption to protect data in case the device is lost or stolen.

Configure automatic software update policies

Enable automatic updates for the operating system and critical software to ensure security patches are applied promptly.

Assign required cybersecurity training modules

Enroll the employee in mandatory security awareness training covering phishing, password hygiene, and data protection best practices.

Communication and Collaboration

Add employee to relevant email groups

Subscribe the new hire to department distribution lists, project mailing lists, and company-wide announcement groups.

Add to appropriate chat channels and teams

Invite the employee to relevant Slack channels or Teams groups for their department, projects, and social communities.

Set up shared calendar access

Grant the employee visibility into team calendars, conference room booking systems, and manager calendars as appropriate.

Configure video conferencing integrations

Link the employee's calendar with Zoom, Teams, or Google Meet so meetings automatically generate video call links.

Verification and Documentation

Test all accounts and system access

Have the employee log in to every provisioned system and application to verify credentials work and permissions are correct.

Verify printing and scanning functionality

Confirm the employee can print to the nearest printer and use the office scanner by running a test print and scan job.

Document all assigned assets and licenses

Record every piece of hardware, software license, and account credential issued to the employee in the IT tracking system.

Share IT support contact and ticket process

Provide the help desk phone number, email, and ticketing portal URL so the employee knows how to get technical assistance.

Confirm employee can access IT knowledge base

Verify the new hire can reach the self-service IT documentation portal for common troubleshooting guides and FAQs.

What Is an IT Onboarding Checklist?

An IT onboarding checklist is a step-by-step guide for provisioning all technology, systems access, and security configurations a new employee needs to be productive from day one. It covers hardware setup, software installation, account creation, security training, and access permissions. A thorough IT onboarding process prevents first-day downtime and ensures new hires can start contributing immediately.

Why IT Teams Need This Checklist

IT onboarding failures are among the top complaints from new employees and their managers. Missing software licenses, unconfigured email accounts, and delayed VPN access waste productive hours and create a poor first impression. This checklist ensures IT teams receive adequate lead time and have a standardized provisioning workflow for every new hire regardless of role or department.

Key Areas Covered in This Checklist

The checklist covers hardware procurement and configuration, email and calendar account creation, collaboration tool provisioning, VPN and network access setup, role-based application access, security policy configuration, multi-factor authentication enrollment, security awareness training, mobile device management, and IT support orientation. It also includes asset tracking documentation.

How to Use This Free IT Onboarding Checklist

Use the Brief view for standard office roles with basic technology needs and the Detailed view for technical roles requiring specialized software, development environments, or elevated access permissions. Customize the checklist by adding your organization's specific tools, security requirements, and approval workflows. Download and integrate it into your IT ticketing system to automate provisioning tasks.

Frequently  Asked  Questions

How far in advance should IT prepare for a new hire?

IT should receive notification of a new hire at least five to seven business days before the start date. This allows time for hardware procurement, software licensing, account creation, security configuration, and testing. For remote employees, additional time is needed for equipment shipping. Late notifications are the most common cause of first-day IT problems.

What technology should be ready on a new hire's first day?

At minimum, a fully configured laptop or workstation, email account, calendar access, collaboration tools like Slack or Teams, VPN access, printer access, and any role-specific software should be operational before the employee arrives. Everything should be tested by IT before handoff. Providing written setup instructions and IT support contact information completes the package.

How do I manage access permissions for new employees?

Implement role-based access control where permissions are defined by job role rather than individual requests. The hiring manager should specify the access level needed and IT should provision accordingly using the principle of least privilege. Document all access grants and review them periodically. This approach ensures security while streamlining the provisioning process.

What security training should new hires receive?

New hires should complete security awareness training covering password management, phishing recognition, data handling policies, acceptable use guidelines, and incident reporting procedures. This training should be completed within the first week and refreshed annually. Many compliance frameworks require documented security training for all employees.

How do I onboard remote employees from an IT perspective?

Ship pre-configured equipment with clear setup instructions at least two days before the start date. Schedule a virtual IT orientation session for the first day covering VPN connection, tool walkthroughs, and security configuration. Provide remote support channel information and ensure the employee can reach IT help easily. Test remote connectivity before the employee's first day.

What is an IT asset management process for new hires?

Document every piece of hardware and software assigned to the new employee in your asset management system. Record serial numbers, license keys, and assignment dates. The employee should sign an asset acknowledgment form. Proper asset tracking simplifies equipment recovery during offboarding and ensures accurate inventory and license compliance.

How do I handle BYOD for new employees?

If your organization allows Bring Your Own Device, enroll the employee's personal device in your mobile device management solution, configure security policies, and ensure company data is partitioned from personal data. Have the employee sign a BYOD agreement covering acceptable use, security requirements, and data wipe authorization. Provide clear guidelines on which tasks can be performed on personal devices.

What should I include in an IT orientation for new hires?

Cover how to access IT support and submit help desk tickets, an overview of communication and collaboration tools, file storage and sharing procedures, printing setup, VPN usage, password management, security best practices, and a Q&A session. Keep the orientation under an hour and provide written reference materials the employee can review later.
Adithyan RKWritten by Adithyan RK
Surya N
Fact Checked by Surya N
Published on: 3 Mar 2026Last updated:
Share now: