Back to IT & Systems
IT & Systems
Professional Services
Updated March 2026

How to Create a New Device Setup for Professional Services

A procedure for configuring and deploying new computing devices for employees, ensuring they are properly set up with required software, security configurations, and network access.

Purpose

To provide employees with fully configured and secure devices that are ready for productive use from the first day, while maintaining consistent security standards and asset tracking.

Scope

Covers all new computing device setups including laptops, desktops, tablets, and mobile phones issued to employees across the organisation.

Prerequisites

  • New device received and registered in the asset management system
  • User account and access provisioned in the identity management system
  • Standard device configuration image or profile available
  • List of required software and security configurations for the user role
Compliance Note

Designed to meet professional indemnity requirements, client confidentiality obligations, and industry body reporting standards.

Step-by-Step Procedure

1

Receive and Inspect the Device

Unpack the new device, inspect it for damage, and verify it matches the purchase instruction specification.

  • 1.1Unpack the device and check for physical damage
  • 1.2Verify the device model, serial number, and specifications match the instruction
  • 1.3Register the device in the IT asset management system
IT Support Technician
10 minutes
Asset Management System, Purchase Order
2

Apply Base Configuration

Install the operating system and apply the standard device configuration image or profile including security settings.

  • 2.1Install or deploy the standard operating system image
  • 2.2Apply security configurations including disk encryption and firewall settings
  • 2.3Enable automatic updates for the operating system and security software
IT Support Technician
45 minutes
Deployment Tools, Configuration Management System
3

Join to Domain and Configure Network

Connect the device to the organisational network, join it to the domain, and configure network settings.

  • 3.1Join the device to the corporate domain or management platform
  • 3.2Configure wireless and wired network settings
  • 3.3Verify the device can access required network resources
IT Support Technician
15 minutes
Active Directory, Network Configuration Tools
4

Install Required Software

Install all software applications required for the user role, including productivity tools, line-of-business applications, and security software.

  • 4.1Install standard productivity software suite
  • 4.2Install role-specific line-of-business applications
  • 4.3Verify that endpoint protection and security software are active and updated
IT Support Technician
30 minutes
Software Deployment Tools, Software Asset Register
5

Configure User Profile

Set up the user profile, email account, and personalised settings on the device.

  • 5.1Configure the user email account and calendar
  • 5.2Set up printer connections and mapped network drives
  • 5.3Configure multi-factor authentication on the device
IT Support Technician
15 minutes
Email Server, Print Management System
6

Test and Verify

Perform a comprehensive test to ensure all hardware, software, and network functions are working correctly.

  • 6.1Test all hardware components including display, keyboard, and peripherals
  • 6.2Verify all installed software launches and functions correctly
  • 6.3Test network connectivity, email, and printing
  • 6.4Confirm security software is active and device management enrolment is complete
IT Support Technician
15 minutes
Device Testing Checklist
Tips
  • Run through the checklist methodically to avoid missing any configuration items
7

Deliver to User

Hand over the configured device to the user, provide orientation on basic setup and security practices, and obtain acknowledgement.

  • 7.1Deliver the device to the user with accessories
  • 7.2Provide a brief orientation on device use and security practices
  • 7.3Obtain the user signature on the asset acknowledgement form
IT Support Technician
15 minutes
Asset Acknowledgement Form

Quality Checkpoints

Device is registered in the asset management system before configuration begins
Disk encryption and endpoint protection are verified as active
All required software is installed and functional before service delivery to the user
User acknowledges receipt and accepts responsibility for the device

Common Mistakes to Avoid

Not enabling disk encryption, leaving data vulnerable if the device is lost or stolen
Forgetting to install role-specific software, requiring follow-up visits
Not registering the device in the asset management system, losing track of the asset
Skipping the testing step, resulting in the user discovering issues on their first day

Expected Outcomes

Device Setup Time

Average time from device receipt to user service delivery, measuring setup efficiency.

First-Day Readiness Rate

Percentage of devices delivered fully functional with all required software on or before the user start date.

Frequently Asked Questions

Can employees use their own devices for work?

This depends on the organisation bring-your-own-device policy. If permitted, personal devices must meet minimum security requirements and be enrolled in the device management system.

What happens to the old device when a new one is issued?

The old device is returned to IT, data is migrated as needed, the device is wiped, and it is either reassigned, refurbished, or disposed of through the asset disposal process.

How far in advance should a new device be requested?

New device requests should be submitted at least two weeks before the required date to allow time for procurement, configuration, and testing. Urgent requests may be accommodated from existing stock.

Want this customised for YOUR business?

We'll tailor every step to your exact operations, tools, and team structure.