User Onboarding Checklist
Pre-Day-1 Setup
Pull the new-hire ticket from HR (Workday, BambooHR, or your HRIS) and confirm legal name, manager, start date, role title, work location, and any access exceptions. Capture work location and role tier here — both drive conditional steps later (remote shipping, privileged-access provisioning). Don't start provisioning before HR confirms — start-date slips and rescinded offers happen, and a half-provisioned account is harder to clean up than a delayed one.
Reference the role-to-access matrix (IT Glue / Hudu / SharePoint) for this job title — Entra ID security groups, M365 license SKU (E3 vs E5 vs F3), and SaaS app entitlements. If this is a brand-new role with no matrix entry, get manager + InfoSec sign-off on the proposed access before provisioning. Group-bloat is the #1 source of access-review findings.
Reserve a laptop matching the role's hardware tier (developer vs standard knowledge worker vs field). If stock is empty, place the vendor PO immediately — Apple and Dell lead times can run 2-4 weeks and miss start dates. Tag the device in asset management as reserved to this hire so it doesn't get re-allocated.
Identity & Account Provisioning
Use the standard naming convention (firstname.lastname) and place the user in the OU that matches their department — OU placement drives GPO and conditional access policy inheritance. Set the account expiration to 14 days past start date if the hire hasn't shown up yet; that prevents orphaned active accounts for no-shows.
Add to dynamic groups where possible (department-driven) and explicit groups only where dynamic membership doesn't apply. Avoid dropping anyone into Domain Users-derived shares; that's how project access turns into company-wide access five years later.
Assign the license SKU identified in the role mapping. Confirm mailbox provisioning completed (can take 15-60 minutes after license assignment) before sending the welcome email. Set the default OWA timezone and add the user to the appropriate distribution lists.
Confirm the user is in scope of the org-wide CA policy that blocks IMAP, POP, SMTP-AUTH, and other legacy authentication endpoints. MFA on modern auth is bypassable if basic-auth endpoints stay open — this is the single most exploited misconfiguration in M365 tenants.
Endpoint Provisioning
Confirm the hardware hash is registered with the Autopilot service and the device is assigned to the correct deployment profile (kiosk vs standard vs developer). For Macs, use the equivalent Jamf/Kandji DEP enrollment. The goal is a zero-touch experience — the user signs in and the device configures itself.
Verify the BitLocker recovery key (or FileVault PRK on Mac) escrowed to Entra ID / Intune. A device with no recovery key in escrow is a device you cannot recover when the user forgets their PIN — and the data-loss risk is on you, not them.
Verify the EDR agent (CrowdStrike, SentinelOne, or Defender for Endpoint depending on your stack) is installed, registered to the tenant, and reporting healthy in the console before the device leaves IT's hands. A laptop deployed without EDR is invisible to your SOC.
Use a tracked carrier with signature required. Include the peripherals kit (keyboard, mouse, headset, dock) and a printed Day-1 quick-start card with the IT helpdesk number. Confirm the home address with HR — never ship to an address pulled from email, phishing-induced shipping fraud is real.
Access & Authentication
Confirm the user is provisioned to Okta via SCIM from Entra ID (or your HRIS, depending on your source-of-truth) and that role-based app assignments fired correctly. Spot-check 2-3 critical apps (Salesforce, GitHub, Slack) appear in the user's Okta dashboard.
Walk through MFA enrollment live (Duo Push or Microsoft Authenticator) — don't email a self-enrollment link without a deadline. Push-fatigue and SMS-fallback are common bypass paths; require a hardware token (YubiKey) for privileged or executive tier per the role matrix.
Privileged-tier hires get a separate Tier 1 / Tier 0 admin account, never permanent rights on their daily-driver account. Enroll the admin account in CyberArk (or Delinea / BeyondTrust) with JIT elevation and require a Privileged Access Workstation for Tier 0 work. Standing Domain Admin is how pass-the-hash compromises one laptop and owns the domain.
Have the user authenticate to ZTNA (Zscaler, Cloudflare Access, Twingate) or the VPN (FortiGate, Meraki, GlobalProtect) from the issued device while you watch. Confirm conditional access policies fire correctly — an unmanaged device should be blocked. First login is when posture-check misconfigurations surface.
Orientation, Training & Audit
30-minute live walkthrough: helpdesk ticketing portal, password manager (1Password / Keeper / Bitwarden) and how to use the company vault, MFA recovery procedures, the data-classification handling rules, and what NOT to put in personal email or cloud accounts. Reference the most recent real internal incident (anonymized) so the rules feel concrete.
Enroll the user in the new-hire training campaign (KnowBe4, Hoxhunt, Proofpoint, or your platform). Set a 14-day completion deadline with manager-cc reminder. The phishing simulation cadence starts after baseline training completes — don't simulate-attack a user who hasn't been trained.
Log the device in asset management (IT Glue, Hudu, Snipe-IT) with serial, asset tag, and assigned user. Capture the user's signature on the Acceptable Use Policy and have them sign the equipment-receipt acknowledgment. The signed AUP is the document HR / Legal will ask for at termination — don't skip it.
30 days in, pull the user's actual group memberships and SaaS entitlements and reconcile against the role matrix. Standing access drift starts in week 2 — a Slack channel here, a shared drive there. Catching it at 30 days is much cheaper than catching it at the annual SOC 2 access review.
Use this template in Manifestly
- User Offboarding Checklist
- Application Performance Monitoring Checklist
- Employee Training Checklist
- Hardware Upgrade Checklist
- Network Troubleshooting Checklist
- IT Strategy Checklist
- Hardware Troubleshooting Checklist
- Performance Tuning Checklist
- Patch Deployment Checklist
- IT Policy Review Checklist
- Database Security Checklist
- System Monitoring Checklist
- Software Installation Checklist
- Disaster Recovery Plan Checklist
- Patch Management Checklist
- Customer Support Ticket Workflow
- User Access Review Checklist
- Software Upgrade Checklist
- Cloud Monitoring Checklist
- Containerization Rollout Checklist
- Server Maintenance Checklist
- Business Continuity Plan Checklist
- Rollback Plan Checklist
- Password Management Checklist
- Server Decommissioning Checklist
- Network Upgrade Checklist
- Backup and Restore Checklist
- Server Backup Checklist
- IT Resource Allocation Checklist
- Incident Response Checklist
- Infrastructure as Code Checklist
- Hardware Disposal Checklist
- Database Backup Checklist
- Cloud Security Checklist
- Cloud Migration Checklist
- IT Service Request Checklist
- Network Monitoring Checklist
- Cloud Deployment Checklist
- IT Budgeting Checklist
- Database Installation Checklist
- Capacity Planning Checklist
- Security Audit Checklist
- Cloud Cost Management Checklist
- Database Migration Checklist
- Firewall Configuration Checklist
- Quarterly Network Security Review
- Change Management Checklist
- User Role Management Checklist
- IT Staff Performance Review
- Server Security Checklist
- Employee Onboarding Checklist
- Quarterly Compliance Reporting Checklist
- Access Control Checklist
- Incident Management Checklist
- Compliance Audit Checklist
- IT Emergency Response Checklist
- Hardware Maintenance Checklist
- Server Build and Hardening Checklist
- IT Regulatory Compliance Review
- Help Desk Ticket Handling Checklist
- Release Management Checklist
- Data Recovery Checklist
- Problem Management Checklist
- Hardware Inventory Checklist
- IT Vendor Management Checklist
- New Employee Onboarding Checklist (Accounting Department)
- Employee Training Checklist
- New Employee Payroll Setup Checklist
- Payroll Onboarding Checklist
- Property Management Staff Onboarding Checklist
- Legal Compliance Checklist for New Properties
- New Employee Onboarding Checklist
- New Engineer Onboarding Checklist
- Peer Review Onboarding Checklist
- Development Environment Setup Checklist
- Onboarding a New Software Developer
- Software Engineer Onboarding Checklist
- Real Estate Agent Onboarding Checklist
- Real Estate Assistant Training Checklist
- Consulting New-Hire Onboarding Checklist
- Employee Onboarding Checklist
- Hiring Checklist
- Employee Onboarding Checklist
- Manufacturing Employee Onboarding Checklist
- Manufacturing Employee Training Checklist
- Insurance Agency Employee Onboarding
- Law Firm Employee Onboarding Checklist
- Marketing New Hire Training Checklist
- Attorney Onboarding Checklist
- Remote Work Onboarding Checklist for Marketing Teams
- Employee Onboarding Checklist
- Advisor and Employee Onboarding Checklist
- Employee Training Checklist
- Employee Onboarding Checklist
- Desktop Configuration Checklist
- New Consultant Onboarding
- Manufacturing Employee Training Checklist
- New Developer Onboarding Checklist
- New Hire Onboarding Checklist
- Agency Employee Onboarding Checklist
- Staff Training Checklist
- Restaurant Employee Onboarding Checklist
- Staff Training Program Checklist
- Retail Employee Training Checklist
- Retail Employee Training Checklist
- Hotel Staff Training Checklist
- Law Firm Employee Onboarding Checklist
- New Hire Paperwork Checklist
- Restaurant New Hire Checklist
- New Employee Onboarding Checklist
- Marketing Team Employee Onboarding Checklist
- Restaurant Employee Training Checklist
- Retail Employee Onboarding Checklist
- Retail Store Hiring Checklist
- Product Knowledge Training Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
