Desktop Configuration Checklist

Hardware Provisioning

    Log the manufacturer, model, serial, MAC address, and firm asset tag in the CMDB or RMM (NinjaOne, Datto RMM, IT Glue). Untracked devices are a recurring SOC 2 access-review finding — every endpoint must be tied to an owner of record before it leaves the bench.

    Verify keyboard, mouse, monitor(s), dock, and power adapter match the build sheet. Note any DOA items so the vendor RMA window (typically 30 days) doesn't lapse.

    Confirm dock firmware is current and monitors are running the standard EDID profile. Mismatched DisplayPort versions are the most common Day-1 ticket — flash the dock before handoff.

    Push print queues via MDM (Jamf, Intune) rather than installing local drivers. Confirm scan-to-email or scan-to-folder works against the user's mailbox or shared drive.

OS Image and Software Baseline

    Use Apple Business Manager / Automated Device Enrollment for Macs or Windows Autopilot for PCs. Manually-enrolled devices skip the supervised profile and lose remote-wipe capability — always check the supervision flag in the MDM console after first boot.

    If MDM enrollment failed or didn't show as supervised, wipe the device with Apple Configurator or Windows Autopilot reset and start enrollment over. Don't ship a manually-enrolled endpoint — it will fail the next access review.

    Push the baseline profile: FileVault / BitLocker on, screen lock at 5 minutes, firewall enabled, Gatekeeper / SmartScreen on, automatic updates enforced. Verify the profile shows compliant in the MDM dashboard before moving on.

    Deploy via MDM app catalog: Office / Microsoft 365 Apps, browser of record, Slack or Teams, 1Password or Bitwarden, Zoom. Avoid installer .exe / .pkg files outside MDM — uninventoried apps fail SOC 2 software-asset evidence.

    Engineering gets VS Code, Docker Desktop, and Git; finance gets the ERP client and Excel add-ins; designers get Figma desktop and the Adobe CC suite. Pull the role-to-app mapping from the new-hire build sheet rather than guessing.

Identity and Access

    Create the user in Okta / Entra ID / Google Workspace and confirm SCIM provisioning fired downstream apps. Manual one-off accounts in connected SaaS are the leading offboarding gap — every app should sit behind the IdP.

    Issue and register a YubiKey or Titan key as the primary MFA factor. SMS and email codes don't meet the phishing-resistant bar — disable them in the IdP factor policy for this user before handoff.

    Add the user to the role-based groups that drive downstream RBAC (e.g., eng-prod-readonly, finance-erp-users). Direct app assignments outside groups bypass the access-review process — always provision through groups.

    Confirm the user can reach role-appropriate SharePoint / Google Drive folders and GitHub or GitLab repositories. SSH keys go through the IdP-backed certificate authority, not local key generation, so they can be revoked at offboarding.

Security Baseline

    Verify CrowdStrike, SentinelOne, or Defender for Endpoint reports the device as online and policy-compliant in the console. A device whose EDR is uninstalled but still showing in MDM is a common drift case — check both consoles.

    If the agent is missing or unhealthy, push reinstall via MDM and confirm the sensor reports back to the EDR console. Don't release the device until status reads healthy — an unprotected endpoint on the corporate network is a P2 finding.

    Confirm the FileVault or BitLocker recovery key is escrowed in the MDM console — not stored locally or with the user. Lost recovery keys are the most expensive ticket at offboarding; verify before handoff, not after.

    Force a patch run via Action1, Automox, or MDM software-update commands; reboot; confirm OS build matches the current baseline. Cross-check against CISA KEV — any KEV-listed CVE pending must clear before user handoff.

    Test the WireGuard / Cisco AnyConnect / Cloudflare WARP / Zscaler client connects and the posture check (EDR present, OS patched, disk encrypted) passes. Devices that fail posture should be quarantined to a remediation VLAN, not allowed onto production.

Handoff and Documentation

    Cover SSO sign-in, hardware-key tap, password manager unlock, and the helpdesk channel. New hires who get a laptop with no walkthrough generate 3-5 Day-1 tickets that a 15-minute session avoids.

    Set the assigned-user, location, deployment date, and warranty expiry in the CMDB (IT Glue, Hudu, ServiceNow). This record drives the next access review and the eventual offboarding ticket.

    Tier-2 lead reviews the build evidence — MDM compliance screenshot, EDR healthy screenshot, recovery-key escrow confirmation — and signs off. This package is the SOC 2 / ISO 27001 evidence for endpoint-provisioning controls.

    Confirm with the user that nothing's broken — printer mappings, VPN posture, role-app access. Catches the deprovisioning-style gaps that show up only after real use, before the quarterly access review surfaces them as findings.

Use this template in Manifestly

Start a Free 14 Day Trial
Use Slack? Start your trial with one click

Related Endpoint Management Checklists
Related Onboarding Checklists

Ready to take control of your recurring tasks?

Start Free 14-Day Trial


Use Slack? Sign up with one click

With Slack