Office

Derwent Point, Clasper Way
Swalwell, Newcastle Upon Tyne
NE16 3BE

Microsoft PartnerCyber Essentials PlusISO 27001CHAS
Resources/Template

New Starter IT Setup

14 min read|Updated February 2026

A structured 7-day plan for onboarding new employees with the right IT access and security from day one.

First impressions matter. When a new employee joins your organisation, the quality of their IT onboarding experience shapes how they feel about the company, how quickly they become productive, and how securely they interact with your systems from their very first login. A well-structured onboarding process is not a luxury. It is a fundamental business requirement that pays dividends in productivity, security, and staff retention.

Yet most organisations still treat IT onboarding as an afterthought. Someone joins, the IT team scrambles to create accounts, a laptop appears from a cupboard, and the new starter spends their first three days asking colleagues for passwords and access. The result is frustration, wasted time, and a series of security shortcuts that become permanent habits. Shared logins, overly broad permissions, MFA deferred “until next week” because nobody had time to set it up properly.

This template provides a complete, phased approach to IT onboarding that covers everything from pre-arrival preparation through to end-of-week verification. It is designed for UK SMEs using Microsoft 365, but the principles apply regardless of your platform. Follow it consistently, and you will reduce support tickets, close security gaps, and give every new starter the experience they deserve.

Modern office workspace with laptop setup

Why structured IT onboarding matters

The first week of employment is a window of extraordinary influence. How you handle IT onboarding during that window determines outcomes across security, productivity, and retention.

Security

Closing the window of vulnerability

New employees are prime targets for phishing and social engineering attacks. They do not yet know what normal communication looks like in your organisation, they are eager to be helpful, and they are unlikely to question unusual requests from apparent authority figures. A rushed onboarding that skips MFA setup, defers security training, or grants excessive permissions creates a window of vulnerability that attackers actively exploit. Every day without MFA is a day your organisation is unnecessarily exposed.

Productivity

Time to full effectiveness

Research consistently shows that structured onboarding reduces time-to-productivity by 50% or more. When a new starter has the right equipment, the right access, and the right training from day one, they contribute meaningfully within their first week. When they spend that week chasing permissions, learning workarounds, and waiting for equipment, you lose not just their time but also the time of every colleague who stops their own work to help. The cost of a poorly onboarded employee is measured in weeks of lost output, not hours.

Before day one

The most important phase of IT onboarding happens before the new starter arrives. Give yourself at least five working days of lead time. Ten is better. This is where you create accounts, provision equipment, arrange application access, and ensure that everything is tested and ready. The goal is simple: when the new employee sits down on their first morning, everything works. No waiting, no scrambling, no apologies.

Create user accounts

Set up the new starter’s identity in Microsoft 365 or Active Directory before they walk through the door. This means creating their primary email address, assigning them to the correct organisational unit, and ensuring their display name, job title, and department are accurate from the outset. These details feed into address books, Teams directories, and automated workflows. Getting them wrong on day one creates a cascade of minor corrections that waste everyone’s time.

Assign licences and security groups

Every role in your organisation should have a defined set of licences and group memberships. A marketing coordinator needs different tools than a finance analyst. Map out the correct Microsoft 365 licence tier, add the user to the relevant security groups for SharePoint access, distribution lists, and shared mailboxes, and ensure conditional access policies will apply correctly from first login. This is where a well-maintained role-based access matrix pays for itself.

Procure and prepare equipment

Laptops take time to arrive, configure, and test. If you are using Intune or another MDM platform, the device needs enrolling, applications need pushing, and compliance policies need verifying before handover. If you leave this until the week of arrival, you are gambling on supply chains, shipping delays, and configuration issues. Order hardware at least two weeks before the start date. Three weeks is better. A new starter sitting idle on day one because their laptop is not ready sends entirely the wrong message.

Arrange application access

Beyond Microsoft 365, most roles require access to line-of-business applications: your CRM, accounting software, project management tools, industry-specific platforms. Some of these have their own provisioning processes, approval workflows, or licence costs. Identify every application the new starter will need, raise the access requests, and confirm that accounts are created and tested. If a critical tool requires a separate onboarding call from the vendor, schedule it in advance.

Prepare the physical workspace

If the new starter will work from an office, ensure their desk is set up with a monitor, keyboard, mouse, and any docking station or adaptor their laptop requires. If they will work remotely, ship peripherals in advance and confirm delivery. Check that network ports are active, that Wi-Fi credentials are ready to share, and that any building access cards or security passes have been arranged. These details are small individually, but collectively they determine whether someone’s first day feels organised or chaotic.

“A new starter’s first interaction with your IT systems sets the tone for their entire relationship with technology in your organisation. Get it right, and you build confidence and trust. Get it wrong, and you create habits and workarounds that persist for years.”

Day one

Day one is about getting the new starter securely connected and independently operational. By the end of this day, they should be able to log in to their laptop, access their email, authenticate with MFA, and know exactly how to get help when they need it. Nothing more, nothing less. Resist the temptation to cover everything on day one. Overloading a new employee with information they cannot absorb leads to mistakes and forgotten steps.

Assign a specific person to guide the new starter through each step. This should not be an afterthought delegated to whoever happens to be free. It should be a planned, scheduled activity with someone who knows the process and has the patience to explain things clearly.

Hand over equipment and credentials

Present the laptop, charger, and any peripherals in person or via a scheduled video call for remote starters. Provide the temporary password securely. Never send credentials by email. Use a password manager, an encrypted message, or deliver them verbally. Walk the new starter through powering on the device, connecting to Wi-Fi, and signing in for the first time. This is their first interaction with your IT environment, and it sets the tone for everything that follows.

First login and password change

Guide the new starter through the initial login process and immediate password change. Explain your password policy clearly: minimum length, complexity requirements if applicable, and why these rules exist. If you use a password manager, this is the moment to introduce it. Show them how to create a strong, unique password and store it properly. Rushing through this step, or worse, letting them choose something weak just to get past the prompt, undermines everything else you are building.

Configure multi-factor authentication

MFA setup should happen within the first hour. Walk the new starter through installing Microsoft Authenticator (or your chosen MFA app) on their phone, scanning the QR code, and completing a test authentication. Explain what MFA is and why it matters in plain language. Many new employees have never used MFA before, and a clear, patient explanation here prevents confused support calls for weeks afterward. Verify that MFA is working correctly before moving on to anything else.

Configure email and mobile devices

If the new starter has a company mobile phone, set up email, Teams, and any required applications on it. If they will use a personal device for work purposes (checking email, joining Teams calls), ensure it meets your BYOD policy requirements and that any required MDM profiles are installed. Explain the boundaries clearly: what the company can and cannot see on their personal device, what happens if the device is lost, and how to request a remote wipe if needed.

Explain how to get IT support

Before the new starter encounters their first problem, make sure they know exactly how to get help. Show them the helpdesk portal, give them the support email address and phone number, and explain expected response times. If your organisation uses a ticketing system, walk them through raising a ticket. If there is an emergency contact for critical issues outside business hours, share that too. A new employee who does not know how to ask for help will either sit in silence or try to fix things themselves. Neither outcome is good.

Employee setting up a new laptopIT support guiding a new starter

Days two and three

With the fundamentals in place, days two and three focus on deepening the new starter’s familiarity with the tools and systems they will use daily. This is where training happens, access is verified, and collaboration platforms are configured. The objective is to move the new employee from “I can log in” to “I know where everything is and how to use it.” Take the time to do this properly. Cutting corners here creates support tickets for months afterward.

Application training sessions

Schedule focused training on the core applications the new starter will use daily. This is not a generic overview of your entire software estate. It is targeted, role-specific training on the three or four tools that will occupy most of their time. Cover the basics, then show them where to find documentation, training videos, or internal guides for deeper learning. Record the session if possible, so they can refer back to it when they need a refresher.

Verify access to all required systems

Sit with the new starter (physically or virtually) and have them log in to every system they need. Do not assume that because you raised the access request, it was actioned correctly. Test each application, check that permissions are appropriate, and confirm that they can reach the data and features their role requires. Document any gaps and raise them immediately. Access issues discovered in week one are easy to fix. Access issues discovered in week four, after the new starter has been working around them, are a sign that nobody checked.

Teams, SharePoint, and collaboration tools

Add the new starter to the correct Teams channels, SharePoint sites, and shared drives. Show them the folder structure, explain naming conventions, and point out where key documents live. If your organisation uses a company intranet or wiki, walk them through it. Collaboration tools are only useful if people know where things are. A new employee who spends their first week asking colleagues where to find documents is a new employee whose organisation has not invested in proper onboarding.

OneDrive and file management setup

Configure OneDrive sync for the folders the new starter will use most frequently. Explain the difference between OneDrive (personal work files) and SharePoint (shared team files). Show them how to save, sync, and share documents properly. Cover your organisation’s approach to file storage: what belongs in the cloud, what stays local, and what the backup and recovery process looks like. This is also the right moment to explain your data classification policy, if you have one, so they understand how to handle sensitive information from the start.

Days four to seven

The final phase of the first week is about reinforcement, security, and verification. By now, the new starter should be comfortable with their equipment and core applications. This is the right moment to focus on security awareness, policy understanding, and a formal check-in to surface any unresolved issues. Do not skip this phase. The organisations that treat the end of week one as a checkpoint consistently report fewer support tickets, fewer security incidents, and higher new-starter satisfaction.

Security awareness briefing

Deliver a focused security awareness session covering the threats that are most relevant to your organisation. This should include phishing recognition (with real examples of phishing emails your organisation has received), social engineering tactics, safe browsing habits, and the importance of reporting anything suspicious. Make it practical and specific, not a generic compliance video. New employees are disproportionately targeted by attackers because they are unfamiliar with internal processes and eager to be helpful. Preparing them properly is not optional.

IT policy review and sign-off

Walk the new starter through your IT acceptable use policy, data protection policy, and any other relevant policies. Do not just send them a PDF and ask them to sign it. Discuss the key points, explain the reasoning behind the rules, and answer questions. Policies that are understood are policies that are followed. Policies that are merely signed are forgotten by lunchtime. If your organisation requires formal acknowledgement, collect it after the discussion, not instead of one.

First-week IT check-in

Schedule a dedicated IT check-in at the end of the first week. Ask the new starter directly: is everything working? Can you access everything you need? Have you encountered any problems you have not reported? Are there tools or access you need that nobody has mentioned? This conversation surfaces issues that would otherwise go unreported for weeks. It also demonstrates that your IT team is approachable and invested in getting things right. For remote workers, this check-in is especially important because they lack the ability to lean over and ask a colleague for help.

Update asset register and documentation

Record every piece of equipment issued to the new starter in your asset register: laptop serial number, model, assigned date, any peripherals. Update your user directory with their details. If you maintain a device inventory for Cyber Essentials or insurance purposes, add the new device now, not six months later during an audit scramble. Good asset management starts at the point of issue. Trying to reconstruct it retrospectively is painful, inaccurate, and entirely avoidable.

“Organisations that invest in structured IT onboarding see 40% fewer support tickets in the first month and measurably higher retention at six months. The correlation between a good first week and long-term engagement is not coincidental. It is causal.”

Common pitfalls to avoid

We have supported hundreds of IT onboarding processes across organisations of all sizes. These are the mistakes that appear repeatedly, and every one of them is avoidable with proper planning and a commitment to doing things right.

Leaving setup until the start date

The single most common failure. A new starter arrives, their laptop is not ready, their accounts do not exist, and their first day is spent watching someone else work while IT scrambles to provision everything. This is not just inefficient. It is demoralising. The new employee’s first impression of your organisation is one of disorganisation and unpreparedness. Start the provisioning process at least two weeks before day one.

Granting excessive permissions

In the rush to get someone productive, it is tempting to grant broad access and tighten it later. This never happens. The new starter accumulates permissions they do not need, those permissions persist indefinitely, and your attack surface grows with every hire. Follow the principle of least privilege from day one. Grant only the access the role requires. Review it at 30 days. If they have not used a permission, remove it.

Skipping security training

Organisations that invest heavily in technical controls and then skip security awareness training for new starters are leaving their front door open. Phishing attacks target new employees specifically because they are unfamiliar with internal processes, eager to please, and unlikely to question unusual requests. A 30-minute security briefing in week one is worth more than any firewall rule you will ever write.

No follow-up after day one

Handing someone a laptop and sending them on their way is not onboarding. It is abandonment. Without structured check-ins during the first week, problems go unreported, workarounds become habits, and the new starter quietly struggles with issues that would have taken five minutes to resolve. Schedule the check-ins. Make them mandatory. And make sure someone actually attends them.

The bigger picture: onboarding and retention

IT onboarding does not exist in isolation. It is part of a broader employee experience that directly influences whether someone stays with your organisation or starts looking for the exit within their first quarter. Research from the Brandon Hall Group found that organisations with a strong onboarding process improve new hire retention by 82% and productivity by over 70%. IT is a critical component of that experience.

Think about it from the new starter’s perspective. They have accepted an offer, given notice at their previous employer, and arrived with enthusiasm and expectations. If their first experience is a working laptop, a clear schedule, and a patient guide through the systems they need, they feel valued and confident. If their first experience is sitting in a corner while someone tries to find them a charger, they start wondering whether they made the right decision.

Good IT onboarding also reduces the hidden cost of informal support. When a new starter does not receive proper training, they ask colleagues. Those colleagues stop their own work to help. Multiply this across every new hire, every month, and the cumulative productivity loss is significant. A structured process with documented steps and scheduled training sessions eliminates this drain almost entirely.

The impact of getting it right

Structured IT onboarding is not an overhead. It is an investment with measurable returns across security, productivity, and employee satisfaction.

82%

improvement in new hire retention with structured onboarding processes

40%

fewer IT support tickets in the first month when onboarding is standardised

50%

faster time-to-productivity when new starters have day-one access to all tools

Need help with IT onboarding?

We handle new starter IT setup as part of our managed services. That includes account provisioning, device configuration, MFA setup, application access, security training, and first-week support. Everything in this template, delivered consistently for every new hire, without your internal team lifting a finger.

If you are onboarding regularly and finding that the process is inconsistent, time-consuming, or creating security gaps, a conversation about how we can help takes 30 minutes and will give you a clear picture of what a managed onboarding process looks like.