Our Onboarding Methodology
Our on-boarding process is driven by processes that we've developed over more than a decade.
Most IT service providers' on-boarding process consists of two steps:
install their remote desktop software on your computers
wait for the phone to ring
Our operations are a good deal more mature than that
Our on-boarding process is driven by processes that we've developed over more than a decade.
In the first month
we perform the first technical review of your environment and pursue the checklist generated by our best practices alignment system, link to our secure network and password documentation platforms.
Each quarter
we meet with your team to go over the findings from our first technology review, get approval for implementing our recommended changes, and listen to your desires for the coming quarter.
First day
1
We'll send you links to our network documentation platform and password vault
We'll send you a click-to-accept request to grant Qore access to your Microsoft Office 365 tenant
We'll send you a one-page questionnaire to gather our technical, administrative, and billing points-of-contact
First week
2
Commence fielding your staff’s support requests
Install our various network performance monitoring, remote access, and security systems
Invite your staff to our remote desktop service so they can access their computers remotely
Install our computer management and security suite on all of your computers which includes software that enforces the installation of Microsoft and third-party patches, anti-virus software, malicious website filtering, and our end-point privilege management platform.
Learn more about our Security Program.First month
3
Perform the first technical review of your environment
Pursue the checklist generated by our best practices alignment system
Enroll in Microsoft EMS E5
Backup your computers to OneDrive
Enforce mobile device security policies
Configure Microsoft 365 identity protection and send alerts to our security helpdesk
Enroll everyone in multi-factor authentication
Encrypt your computers' hard drives
Protect your email from phishing
Prevent automatic forwarding of email out of your domain, a common hacker exfiltration technique
Replace your wireless access points at our cost
Each quarter
4
Update the firmware on your servers, firewalls, and wireless access points
Review your Office 365 licensing and remove unused licenses
Meet with your team to go over the findings from our first technology review, get approval for implementing our recommended changes, and listen to your desires for the coming quarter