

Minimum Standards for MSP Client Onboarding
Establish credibility and attract the right kind of clients.
Network & Security
-
Business-class firewall (e.g., Fortinet, Sophos, or equivalent) with active security subscription
-
No consumer-grade routers or unmanaged switches in production
-
Centralized and monitored antivirus/EDR solution on all endpoints
-
MFA (Multi-Factor Authentication) enforced for all Microsoft 365, VPN, and remote access accounts
-
Secure, unique local admin credentials — no shared “Admin” or default passwords
-
Properly segmented networks (e.g., guest Wi-Fi separate from internal LAN)
Infrastructure
-
✅ Servers running supported operating systems (no end-of-life OS such as Windows Server 2012)
-
✅ Workstations running Windows 10 or higher, enrolled in management (RMM/Intune)
-
✅ Business-grade backups configured and tested (local + cloud preferred)
-
✅ UPS/battery backup protection for all critical hardware
-
✅ Reliable business-class internet connection with documented failover plan
3. Microsoft 365 / Cloud Environment
-
✅ Single, managed Microsoft 365 tenant (no shared personal or mixed accounts)
-
✅ Admin access transferred or delegated to MSP prior to onboarding
-
✅ All users licensed appropriately (Business Standard or Premium preferred)
-
✅ Conditional Access or Security Defaults enabled
-
✅ Email security with spam/phishing protection (Defender, Proofpoint, etc.)
4. Data Protection & Compliance
-
✅ Defined data retention and offboarding policies
-
✅ Company data stored in approved, backed-up locations (SharePoint, OneDrive, etc.)
-
✅ Encryption enabled on all company laptops and mobile devices
-
✅ Signed Acceptable Use Policy and Security Policy for all employees
5. Operational Readiness
-
✅ Designated internal IT contact or leadership liaison
-
✅ Access to vendor portals, documentation, and credentials provided during onboarding
-
✅ Hardware/software inventory provided before transition
-
✅ Commitment to MSP’s change management and ticketing processes
-
✅ Client agrees to proactive roadmap reviews and technology alignment meetings
6. Optional (but strongly recommended)
-
🔹 Standardized naming convention for devices and users
-
🔹 Centralized password manager (e.g., Keeper, Bitwarden, 1Password)
-
🔹 Documented disaster recovery plan
-
🔹 Cybersecurity insurance with current coverage