New Device Setup for Accounting & Finance
A procedure for configuring and deploying new computing devices for employees, ensuring they are properly set up with required software, security configurations, and network access.
Purpose
To provide employees with fully configured and secure devices that are ready for productive use from the first day, while maintaining consistent security standards and asset tracking.
Scope
Covers all new computing device setups including laptops, desktops, tablets, and mobile phones issued to employees across the organisation.
Prerequisites
- New device received and registered in the asset management system
- User account and access provisioned in the identity management system
- Standard device configuration image or profile available
- List of required software and security configurations for the user role
Built with ASIC regulatory requirements, AML/CTF compliance, Tax Practitioners Board obligations, and APES standards in mind.
Step-by-Step Procedure
Receive and Inspect the Device
Unpack the new device, inspect it for damage, and verify it matches the purchase instruction specification.
- 1.1Unpack the device and check for physical damage
- 1.2Verify the device model, serial number, and specifications match the instruction
- 1.3Register the device in the IT asset management system
Apply Base Configuration
Install the operating system and apply the standard device configuration image or profile including security settings.
- 2.1Install or deploy the standard operating system image
- 2.2Apply security configurations including disk encryption and firewall settings
- 2.3Enable automatic updates for the operating system and security software
Join to Domain and Configure Network
Connect the device to the organisational network, join it to the domain, and configure network settings.
- 3.1Join the device to the corporate domain or management platform
- 3.2Configure wireless and wired network settings
- 3.3Verify the device can access required network resources
Install Required Software
Install all software applications required for the user role, including productivity tools, line-of-business applications, and security software.
- 4.1Install standard productivity software suite
- 4.2Install role-specific line-of-business applications
- 4.3Verify that endpoint protection and security software are active and updated
Configure User Profile
Set up the user profile, email account, and personalised settings on the device.
- 5.1Configure the user email account and calendar
- 5.2Set up printer connections and mapped network drives
- 5.3Configure multi-factor authentication on the device
Test and Verify
Perform a comprehensive test to ensure all hardware, software, and network functions are working correctly.
- 6.1Test all hardware components including display, keyboard, and peripherals
- 6.2Verify all installed software launches and functions correctly
- 6.3Test network connectivity, email, and printing
- 6.4Confirm security software is active and device management enrolment is complete
- Run through the checklist methodically to avoid missing any configuration items
Deliver to User
Hand over the configured device to the user, provide orientation on basic setup and security practices, and obtain acknowledgement.
- 7.1Deliver the device to the user with accessories
- 7.2Provide a brief orientation on device use and security practices
- 7.3Obtain the user signature on the asset acknowledgement form
Quality Checkpoints
Common Mistakes to Avoid
Expected Outcomes
Average time from device receipt to user report delivery, measuring setup efficiency.
Percentage of devices delivered fully functional with all required software on or before the user start date.
Frequently Asked Questions
What happens to the old device when a new one is issued?
The old device is returned to IT, data is migrated as needed, the device is wiped, and it is either reassigned, refurbished, or disposed of through the asset disposal process.
How far in advance should a new device be requested?
New device requests should be submitted at least two weeks before the required date to allow time for procurement, configuration, and testing. Urgent requests may be accommodated from existing stock.
Can employees use their own devices for work?
This depends on the organisation bring-your-own-device policy. If permitted, personal devices must meet minimum security requirements and be enrolled in the device management system.
Want this customised for YOUR business?
We'll tailor every step to your exact operations, tools, and team structure.