FirstHR

IT Onboarding: Checklist and Process Guide

A 3-phase IT onboarding process for small businesses without an IT department. Covers pre-boarding setup, Day 1 configuration, Week 1 verification, security basics, and IT onboarding policy.

Nick Anisimov

Nick Anisimov

FirstHR Founder

Onboarding
14 min

IT Onboarding

A practical checklist and process guide for small businesses without an IT department

Every onboarding guide for IT setup starts the same way: "The IT department should provision accounts, configure devices, and brief the new hire on security policies." That is useful advice if you have an IT department. At a 20-person company, the person reading that sentence is also the CEO, the office manager, and the de facto IT department.

This guide is written for that person. The IT onboarding process here runs in three phases, takes less than two hours of active time spread across the week before and the week of a new hire's start date, and does not require any enterprise tools or technical expertise. It just requires doing the right things in the right order. FirstHR is built to automate the task tracking and document signing that makes this process run without reminders.

What Is IT Onboarding?

IT onboarding is the process of setting up technology, devices, software accounts, and system access for new employees before and during their first days at work. It includes hardware provisioning, account creation, security training, and access verification to ensure new hires can be productive from Day 1.

IT onboarding is a specific track within the broader employee onboarding process. General onboarding spans 90 days and covers culture, role expectations, team relationships, and performance milestones. IT onboarding is primarily a Day 1 and Week 1 activity. Both tracks run simultaneously, which is why combining them in a single workflow prevents the technology setup from being treated as an afterthought after the "real" onboarding is done.

TL;DR
IT onboarding covers three phases: pre-boarding setup (accounts and devices, 3-5 days before Day 1), Day 1 configuration (60-90 minutes: logins, 2FA, security briefing), and Week 1 verification (confirming all access works). For small businesses without an IT department, one named person owns the checklist. Shared ownership means nothing gets done.

Why IT Onboarding Matters for Small Businesses

Only 12% of employees say their company onboards well (Gallup), and a broken IT setup on Day 1 is one of the most visible signals that your company is in that 88%. A new hire who cannot access their email, the project management tool, or the shared drive on Day 1 wastes their own time and signals to the team that the company is disorganized. That signal is hard to walk back. Research from SHRM shows that employees who experience poor onboarding are significantly more likely to leave within the first 90 days.

For small businesses, the IT onboarding failure mode is almost always the same: accounts are created reactively on Day 1 instead of proactively before it. The new hire arrives, and someone scrambles to create an email, request tool access, and find a device. The setup takes three hours instead of ninety minutes, and the new hire spends their first day watching someone else manage IT tickets.

The ripple effects go further than the first morning. A new hire who spends Day 1 waiting for access forms an impression of organizational competence that shapes how they interpret everything that follows. If the first signal is chaos, they apply a chaos lens to the next ambiguous situation, the unclear process, the unresponsive manager. First impressions in onboarding are not just about feelings. They set the interpretive frame the new hire uses for their entire first 90 days.

IT onboarding also creates a security baseline from day one. Every new employee represents a new attack surface: a new set of credentials, a new device on your network, a new person who can be targeted by phishing. The 15-minute security briefing during IT onboarding is when you close that surface before it becomes a liability. Most small business security incidents are not sophisticated attacks. They are basic credential compromises that a 2FA requirement would have prevented.

The Cost of Poor IT Setup
Brandon Hall Group research shows organizations with strong onboarding improve new hire productivity by 70%. For IT onboarding specifically, the bottleneck is almost always access: a new hire who lacks tool access cannot contribute, cannot learn by doing, and cannot demonstrate competence. The fix costs 30 minutes of pre-boarding preparation.

IT onboarding also matters for security. Verizon's Data Breach Investigations Report consistently shows that compromised credentials are the leading cause of data breaches. A new employee who has never been briefed on phishing, who reuses passwords across personal and company accounts, and who has not enabled 2FA is a security risk from Day 1. The briefing takes fifteen minutes. The breach it prevents can cost far more than a small business can absorb.

Still Using Spreadsheets for Onboarding?

Automate documents, training assignments, task management, and track onboarding progress in real time.

See How It Works

The Complete IT Onboarding Checklist

This three-phase checklist covers everything from pre-boarding account creation through Week 1 verification. Every item has a clear action and can be completed by a non-technical person. For the broader onboarding context this checklist fits into, see the complete employee onboarding checklist for small businesses.

The most important design principle in this checklist: every item is a concrete action, not a category. "Set up accounts" is not a checklist item. "Create email address in Google Workspace admin panel" is. The specificity is what makes the checklist executable by whoever is running IT onboarding that week, whether it is you or someone you delegated to.

Phase 1: Before Day 1
3-5 days before start
Order or prepare laptop and peripherals
Create company email address
Set up core accounts (Slack, project tools, etc.)
Prepare access credentials document
Add to team calendars and communication channels
Ship equipment for remote hires (allow 5-7 days)
Phase 2: Day 1 Setup
60-90 minutes
Hand over device and confirm it powers on
Walk through email and calendar setup
Log in to all core tools together
Set up two-factor authentication on every account
Run 15-minute security briefing (passwords, phishing, data handling)
Confirm VPN access if applicable
Phase 3: Week 1 Verification
Ongoing through Day 5
Verify access to all role-specific tools
Confirm file storage and shared drive access
Check that video conferencing is working properly
Review any outstanding account requests
Brief on IT support process (who to contact when something breaks)
Confirm all logins are saved in password manager
What worked for me
The checklist only worked for us when we assigned every item to a specific person with a specific deadline, not a department or a general role. When I wrote "IT setup" as a task, it did not get done. When I wrote "Sarah creates email and Slack account by Tuesday EOD," it always got done. The specificity is the whole point. We also learned to block the Phase 2 setup session on both calendars before the new hire's start date. Every time we skipped that step and planned to "handle it on Day 1," something else came up and the setup got rushed or incomplete.

One addition worth making to your checklist: a verification column. After each item is completed, the owner marks it done and the new hire confirms they can access that tool. This two-step confirmation catches the setup errors that only become visible when someone actually tries to log in: wrong email domain, permissions set too low, accounts provisioned in the wrong workspace. Catching these on Day 1 takes two minutes. Catching them on Day 3 when the new hire realizes they cannot access a critical system wastes hours.

How to Run IT Onboarding Without an IT Department

Every IT onboarding guide assumes you have an IT team. You do not. Here is how to run the same process when you are the IT department, the HR department, and the person who also has seven other things to do this week.

1
Build an account master list before your first hire45 min, one time
Write down every tool your company uses: email, Slack, project management, file storage, any industry-specific software. For each tool, document how to create a new user account and where to find billing access. This takes 45 minutes once. Every subsequent IT onboarding runs from this list. When you add a new tool to your stack, add it to the list the same day.
2
Assign a named owner for IT onboardingOne decision
At five employees, this is probably you. At fifteen, it is probably your office manager or most technically comfortable senior employee. The owner does not need to be technical. They need to be organized and they need to own the checklist for every new hire. One person, named explicitly, is the difference between IT onboarding that happens and IT onboarding that was supposed to happen.
3
Run IT onboarding as a scheduled block, not a background task60-90 min, each hire
Block the Day 1 setup session on both your calendar and the new hire's calendar before they start. Treat it like a client meeting. Show up, do the setup together, answer questions in real time. This prevents the failure mode that causes most IT onboarding problems: sending instructions and assuming the new hire followed them.

The single most important shift in mindset: IT onboarding is a pre-boarding task, not a Day 1 task. By the time the new hire walks in, everything should already be created and waiting. Day 1 is for setup and handover, not for creation and provisioning. That distinction is the difference between a new hire who is productive by noon on Day 1 and one who watches you manage support tickets for three hours.

The Account Document
Create a shared document (stored in your password manager, not in Slack) that lists every account created for each employee: tool name, login email, creation date. This document serves two purposes: it is the Day 1 setup guide and the eventual IT offboarding checklist. Every account you create, you document. When the employee leaves, you revoke access in the same order. The employee offboarding checklist has the full IT revocation process.

The Small Business IT Tool Stack

Enterprise IT guides recommend MDM platforms, IAM solutions, and SSO configurations. Most of those tools are overkill for a 15-person company and require technical expertise to configure. Here is the typical tool stack for a small business and the account setup that needs to happen for each category.

Communication
Gmail / Google WorkspaceSlack or Microsoft TeamsZoom or Google Meet
Every new hire needs access to all three before Day 1.
File storage
Google DriveDropbox BusinessMicrosoft OneDrive
Set up shared drives and confirm folder access, not just account access.
Project management
AsanaNotionMonday.comLinear (for tech teams)
Add to relevant projects and boards, not just the tool.
Password management
1Password TeamsBitwarden BusinessLastPass Teams
Non-negotiable for small businesses. Shared passwords in Slack are a security incident waiting to happen.
HR and onboarding
FirstHR (e-signatures, task tracking, document management)
Automates the IT onboarding workflow so nothing falls through the cracks.
Security
Built-in 2FA on every toolVPN if handling sensitive dataAntivirus on company devices
For most small businesses, enabling 2FA everywhere is 80% of your security posture.

For developer or technical hires, the tool stack expands to include version control, development environments, and deployment tools. The developer onboarding guide covers that specific setup process separately.

A note on tool sprawl: small businesses accumulate tools faster than they document them. If you have not recently audited your tool stack, the IT onboarding process is a good forcing function. Before each new hire, run through every tool the company uses and confirm it belongs on the account creation list. Tools that nobody remembers using are tools that are paying for unused seats and creating unnecessary attack surface. Prune the list while you update it.

Companies Using FirstHR Onboard 3x Faster

Join hundreds of small businesses who transformed their new hire experience.

See It in Action

IT Security Basics Every New Hire Should Know

A fifteen-minute security briefing on Day 1 is one of the highest-ROI activities in IT onboarding. Most small business data incidents trace back to compromised credentials or a successful phishing attack, both of which are preventable with basic training. You do not need a security consultant to run this briefing. You need to cover four topics and have the new hire acknowledge them.

Passwords
Minimum 12 characters, mix of letters, numbers, symbols
Unique password for every account, no reuse
All passwords stored in company password manager
Never share passwords via Slack, email, or text
Two-factor authentication
Enable 2FA on every company tool before end of Day 1
Authenticator app preferred over SMS (more secure)
Save backup codes in password manager
Company email is highest priority: enable first
Phishing awareness
Never click links in unexpected emails from unknown senders
Verify wire transfer or payment requests by phone, not email
When in doubt, check with the sender via a separate channel
Report suspicious emails to the designated contact (name them)
Device and data handling
Lock screen when stepping away from device (Win+L / Cmd+Ctrl+Q)
No customer or employee data on personal devices
No work files in personal cloud storage (personal Google Drive, iCloud)
Report lost or stolen devices immediately

The security briefing should end with a signed acknowledgment, even if it is a simple "I have read and understood the IT security requirements" checkbox on the IT policy form. Acknowledgment signals that the rules are real and creates a record that the briefing occurred. This matters if an incident does happen and questions arise about what training the employee received.

For small businesses, the highest-priority security items in order are: 2FA on company email first (email is the master key to every other account), then 2FA on any financial tools, then password manager setup, then the phishing briefing. If you run out of time on Day 1, complete those four in that order and finish the rest in week one. An employee with 2FA-protected email and a password manager is dramatically more secure than one without either, regardless of whether they have completed every item on the security checklist.

Phishing deserves special attention at small businesses because founders and senior staff are disproportionately targeted. Business email compromise attacks often impersonate the CEO to request urgent wire transfers or payroll changes. Brief every new hire on the specific protocol for financial requests: any request involving money, even from a known email address, gets verified by phone before action is taken. This single protocol prevents the most expensive category of small business security incidents.

IT Onboarding Policy: What to Include

An IT onboarding policy is a written document that defines the rules governing technology use at your company. Every new hire should read and sign it on Day 1. For small businesses, this does not need to be a lengthy legal document. A one-page policy covering six sections is sufficient and will be more consistently read than a twenty-page handbook appendix.

1Acceptable use
What company devices and accounts may be used for. Covers personal use limits, prohibited activities, and the company's right to access company-owned devices.
2Account management
How accounts are created, who manages them, password requirements, and what happens to accounts when an employee leaves.
3Device policy
Who owns the device, what software may be installed, encryption requirements, and what to do if a device is lost or stolen.
4Data handling
What data may be stored where, prohibited storage locations (personal cloud accounts), and how customer and employee data must be handled.
5Security requirements
Mandatory 2FA, password manager usage, screen lock requirements, and reporting procedures for suspected security incidents.
6Offboarding procedures
How IT access is revoked when an employee departs and the timeline for device return. Cross-reference with your offboarding process.

Keep the IT policy in plain language. The goal is comprehension, not legal protection. A policy that employees actually understand and follow is more valuable than one that would hold up in court but gets ignored because nobody can parse it. Have a lawyer review it once when you write it, then update it annually or when your tool stack changes significantly.

The acceptable use section is where most small businesses are too vague. "Use company devices responsibly" is not a policy. A policy specifies: personal use is permitted during non-work hours, prohibited activities include installing unlicensed software and accessing adult content, and the company reserves the right to inspect company-owned devices. That level of specificity feels uncomfortable to write, but it is what makes the policy enforceable and what sets clear expectations from Day 1.

The offboarding section of the IT policy is the one most companies forget to include. Every policy should state explicitly that access will be revoked within 24 hours of termination and that company devices must be returned within a specified timeframe. Having this in a signed policy document simplifies the offboarding conversation and gives you a clear basis for action if a former employee retains access to company systems. The employee offboarding checklist has the full IT revocation process to pair with this policy.

Policy Acknowledgment
The IT policy acknowledgment does not need to be a separate form. Add a checkbox to your standard onboarding documents: "I have read and agree to the IT Acceptable Use Policy." Collect it alongside the other onboarding paperwork on Day 1. FirstHR handles e-signature collection for all onboarding documents in a single workflow, so nothing gets lost in email attachments.

Remote and Hybrid IT Onboarding

Remote IT onboarding runs the same three phases as in-person onboarding with additional logistics for physical device delivery and remote configuration. The biggest failure point for remote IT setup is timing: equipment that arrives on Day 2 because someone forgot to order it early enough.

7-10 days before
Ship the device
Use overnight or 2-day shipping to a verified address. Confirm delivery before Day 1. A new hire who cannot work on Day 1 because their laptop is in transit is an immediate bad signal.
3-5 days before
Pre-configure if possible
For Mac devices, Apple Business Manager lets you ship a pre-configured laptop that sets itself up when the new hire powers it on. For Windows, similar options exist via Autopilot. Both are worth the setup time if you hire regularly.
Day 1 morning
Screen-share setup session
Schedule a 60-minute video call for the IT setup walkthrough. Do it together in real time rather than sending a document and hoping they follow it. Screen sharing catches problems immediately.
Day 1
Send credentials securely
Never send passwords in plain text email. Use a password manager's sharing feature, a one-time link service, or a secure note. The new hire should change all shared passwords on first login.
Day 2-3
Verify everything works
Remote workers will not always speak up if something is not working right. Check in specifically: 'Is your video working in Zoom? Can you access the project files? Any tool where you are still waiting for access?'

For hybrid teams where some employees are in-office and some are remote, standardize the IT onboarding process regardless of location. Use the same checklist, the same security briefing, and the same policy acknowledgment. The only difference is whether the Day 1 setup session is in-person or via screen share. Standardization prevents the gap where remote employees get less thorough IT onboarding because "we just sent them the instructions."

One remote-specific risk worth addressing explicitly: credential delivery. In-person onboarding has a natural security advantage: you hand the device to the person in front of you and set up accounts together. Remote onboarding requires sending credentials before the new hire can do anything. Never send passwords in plain text email or Slack. Use your password manager's secure sharing feature, a one-time link service, or a secure note that expires. The new hire should change all provisioned passwords on first login, and that should be a documented step in your checklist, not an assumption.

For fully distributed teams where every employee is remote, consider investing in Apple Business Manager or Microsoft Intune for device management. Both allow you to ship a device that self-configures when the new hire powers it on, eliminating the need for manual setup. The upfront configuration cost (a few hours for someone with basic technical comfort) pays for itself quickly if you hire more than four or five remote employees per year. The digital employee onboarding guide covers automation options for distributed teams in more depth.

Common IT Onboarding Mistakes to Avoid

These four mistakes appear consistently in small business IT onboarding failures. Each one is preventable with a specific process change that takes less time to implement than the mistake costs to fix.

Creating accounts on Day 1 instead of before
A new hire who spends their first morning waiting for IT to create their email account loses 2-3 productive hours and forms an impression of organizational dysfunction. Account creation takes 15-20 minutes. There is no reason it cannot happen 3 days before the start date.
Fix: Add account creation to the pre-boarding checklist with a completion deadline of 2 business days before start.
No password manager from day one
Small businesses commonly share passwords via Slack messages, email threads, or a shared spreadsheet. This creates security exposure and an account management problem when any employee leaves.
Fix: Set up a team password manager (1Password Teams, Bitwarden Business) and add the new hire before Day 1. First task on Day 1: log in and store all credentials there.
Skipping 2FA setup
Many small businesses treat 2FA as optional. It is not. A single compromised credential without 2FA can expose every system the employee accesses. Setting up 2FA takes 10 minutes per tool and should happen on Day 1 before anything else.
Fix: Block 20 minutes of Day 1 specifically for 2FA setup across all company tools. Do it together on a screen share or in person.
No IT offboarding counterpart
IT onboarding gets a checklist; IT offboarding often gets a mental note. Every account that stays active after an employee leaves is a security liability. Offboarding should mirror onboarding: the same account list, revoked in order of sensitivity.
Fix: Build an offboarding checklist that exactly mirrors your IT onboarding checklist. Every account you create, you document for eventual revocation.

The common thread across all four mistakes: IT onboarding fails when it is treated as a reactive task rather than a proactive process. Every item on the list above is solved by moving the work earlier: accounts created before Day 1, password manager set up on Day 1 not week two, 2FA enabled during setup not left to the employee's discretion, offboarding list built during onboarding not assembled under pressure after a departure. The checklist does not require more time. It requires doing the same work earlier.

Key Takeaways
  • IT onboarding runs in three phases: pre-boarding setup (accounts and devices, 3-5 days before Day 1), Day 1 configuration (60-90 minutes), and Week 1 verification.
  • One named person must own the IT onboarding checklist for each new hire. Shared ownership means nothing gets done.
  • Accounts should be created before Day 1, not reactively on the morning the new hire arrives. Pre-boarding setup takes 20-30 minutes and prevents 2-3 hours of Day 1 chaos.
  • 2FA must be enabled on every account on Day 1. A 10-minute setup prevents the most common attack vector for small business data incidents.
  • Build an account master document during IT onboarding. Every account created goes on the list. When the employee leaves, you revoke access from that same list.
  • Remote IT onboarding requires early device shipping (7-10 days before start date) and a screen-share setup session rather than written instructions.

Frequently Asked Questions

What is IT onboarding?

IT onboarding is the process of setting up technology, devices, software accounts, and system access for new employees before and during their first days at work. It includes hardware provisioning, account creation, security training, and access verification to ensure new hires can be productive from Day 1. For small businesses without a dedicated IT department, IT onboarding is typically handled by the founder, office manager, or an assigned team member.

What should be included in IT onboarding?

A complete IT onboarding process should include: device setup and handover, email and calendar configuration, access to all role-specific tools and platforms, password manager setup, two-factor authentication enabled on every account, a security briefing covering passwords, phishing, and data handling, file storage and shared drive access, video conferencing setup verification, and documentation of all accounts for eventual offboarding. For small businesses, the entire process should take 60-90 minutes on Day 1 if pre-boarding setup is done correctly.

How long does IT onboarding take?

Full IT onboarding takes 1-5 business days split across three phases. Pre-boarding setup (creating accounts, preparing the device) takes 20-30 minutes and should happen 3-5 days before the start date. Day 1 setup (handing over the device, logging into tools, enabling 2FA, security briefing) takes 60-90 minutes. Week 1 verification (confirming all access is working, addressing gaps) is ongoing but takes about 20-30 minutes of total manager time. If IT onboarding is taking longer than this, accounts are being created reactively instead of proactively.

Who is responsible for IT onboarding at a small business without an IT department?

At a small business without a dedicated IT department, IT onboarding responsibility typically falls to one of three roles: the founder or CEO for the first few hires, the office manager or operations person as the company grows, or a designated senior technical employee if one exists. The key is that one named person owns the IT onboarding checklist for each new hire. Shared ownership means nobody does it. Document who is responsible for each task in your onboarding checklist before the new hire's start date.

What is an IT onboarding policy?

An IT onboarding policy is a written document that defines the rules, standards, and procedures governing technology use at your company. It should cover acceptable use of company devices and accounts, password requirements, mandatory security practices like 2FA, data handling rules, device management, and the procedures for IT offboarding when an employee leaves. For small businesses, an IT onboarding policy does not need to be a lengthy document. A one-page policy that every new hire reads and signs on Day 1 is sufficient.

What is the difference between IT onboarding and general employee onboarding?

General employee onboarding covers the complete 90-day process of integrating a new hire: culture, role expectations, team relationships, compliance paperwork, and performance milestones. IT onboarding is a specific track within the broader onboarding process that handles the technology setup. IT onboarding is primarily a Day 1 and Week 1 activity, while general onboarding spans 90 days. Both tracks need to run simultaneously, which is why combining them in a single onboarding workflow prevents the compliance and technology tasks from being treated as afterthoughts.

How do you handle IT onboarding for remote employees?

Remote IT onboarding requires the same steps as in-person onboarding with additional logistics for physical setup. Ship the device 7-10 days before the start date to ensure it arrives before Day 1. Send credentials securely using a password manager sharing feature rather than plain text email. Conduct the Day 1 setup session via screen share so you can walk through configuration together in real time. Follow up on Day 2-3 to verify that all tools are working, since remote workers are less likely to proactively report access issues.

Ready to transform your onboarding?

7-day free trial No credit card required
Start Your Free Trial