De4sec Technology
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

Small Business Secure IT Setup Checklist

A complete implementation checklist for new and growing businesses โ€” identity, devices, network, backup, and monitoring from day one.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
Edition
2026 ยท Updated March
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. Why Your IT Foundation Matters
  2. Identity & Access Management
  3. Device & Endpoint Security
  4. Network Security
  5. Backup & Disaster Recovery
  6. Monitoring & Response
01

Why Your IT Foundation Matters

Most businesses build IT reactively โ€” adding tools as needs arise, fixing problems after they occur. Businesses that stay secure as they grow do the opposite: they build a foundation designed to be secure from the start.

This checklist covers the core setup that De4sec implements for every new client. Done correctly, it takes 2โ€“5 days for a business of 1โ€“20 staff.

A properly configured IT environment costs less than one hour of downtime from a ransomware event.

02

Identity & Access Management

Microsoft 365 Setup

โœ“Create tenant with custom domain โ€” not @outlook.com
โœ“Assign licences by role โ€” not everyone needs E3
โœ“Configure tenant region, timezone, and compliance settings

Multi-Factor Authentication

โœ“Enable MFA for every user โ€” no exceptions
โœ“Use Microsoft Authenticator app, not SMS where possible
โœ“Disable legacy auth protocols (SMTP Auth, IMAP, POP3 where not required)
โœ“Create a break-glass admin account for emergencies

Conditional Access

โœ“Require MFA for all cloud app access
โœ“Block legacy authentication protocols
โœ“Require compliant device for sensitive data access
โœ“Flag logins from unexpected countries

Admin Separation

โœ“Dedicated admin accounts separate from daily-use accounts
โœ“Admin accounts have no mailbox and are never used for browsing
โœ“Apply Privileged Identity Management (PIM) for Just-in-Time admin access
03

Device & Endpoint Security

Microsoft Intune

โœ“Enrol all Windows and macOS devices
โœ“Configure compliance policies โ€” encryption, OS version, screen lock
โœ“Deploy Microsoft Defender for Endpoint baseline
โœ“Create device groups for ring-based update rollout

Encryption

โœ“Enable BitLocker (Windows) via Intune policy
โœ“Enable FileVault (macOS) via Intune
โœ“Confirm keys are escrowed to Entra ID โ€” not just local

Endpoint Protection Baseline

โœ“Defender real-time protection enabled on all devices
โœ“Tamper protection enabled
โœ“Cloud-delivered protection and auto-sample submission enabled
โœ“Attack surface reduction rules configured
โœ“Web content filtering applied
04

Network Security

Wi-Fi

โœ“Separate SSIDs for business, guest, and IoT/POS
โœ“Business Wi-Fi on WPA3 or WPA2-Enterprise
โœ“Guest Wi-Fi isolated from business network
โœ“Default router admin credentials changed

Segmentation

โœ“VLAN separation for POS/payment systems
โœ“Firewall rules: deny by default, allow by exception
โœ“Unused ports and services disabled

Email Authentication

โœ“SPF record published
โœ“DKIM configured and signing all outbound email
โœ“DMARC at p=quarantine minimum, reporting to monitored mailbox
05

Backup & Disaster Recovery

The most common finding in our assessments: backups that have never been tested.

Backup Scope

โœ“Microsoft 365 mailboxes (requires third-party tool)
โœ“SharePoint and OneDrive content
โœ“On-premise servers and NAS
โœ“Critical application databases

Backup Configuration

โœ“Daily automated backups
โœ“30-day minimum retention (90 days preferred)
โœ“Offsite or separate cloud region copy
โœ“Immutable or ransomware-protected storage

Recovery Testing

โœ“Test restore within 30 days of initial setup
โœ“Quarterly restore tests โ€” document results
โœ“Document RTO and RPO for business
06

Monitoring & Response

Microsoft 365 Monitoring

โœ“Unified audit log enabled
โœ“Sign-in monitoring โ€” alert on impossible travel
โœ“Microsoft Secure Score above 60% for SMB baseline
โœ“Defender alerts reviewed weekly

Endpoint Monitoring

โœ“Intune device compliance reports reviewed
โœ“Patch compliance report monthly โ€” target 95%+
โœ“Defender incidents reviewed and resolved

Incident Response Contacts

โœ“Who to call if incident occurs โ€” documented
โœ“What to do in first 30 minutes if ransomware suspected
โœ“Printed copy kept off-site
// NEXT STEP

Ready to implement this in your environment?

De4sec provides hands-on implementation, not just advice. Book a free discovery call โ€” we assess your current environment against this guide at no cost, no obligation.

Book a Free Discovery Call โ†’or visit de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.