Skip to content

SOP: New Business Startup Package

Document Type: Standard Operating Procedure (SOP)
Version: 1.0
Status: Approved for Use
Audience: Technician + Client
Confidentiality: Internal / Client Delivery
Platforms Supported: Google Workspace, Microsoft 365, Various Hosting Platforms


To provide comprehensive digital infrastructure setup for new businesses, establishing professional online presence, communication systems, and productivity tools from day one.


This SOP applies to:

  • New business digital infrastructure setup
  • Google Workspace or Microsoft 365 configuration
  • Domain acquisition and DNS management
  • Business identity and online presence establishment
  • Employee onboarding and training

Not included:

  • Ongoing IT support and maintenance
  • Custom software development
  • Advanced network infrastructure
  • Physical hardware setup

Project Manager Responsibilities

  • Coordinate all aspects of business setup
  • Manage timeline and deliverable schedule
  • Ensure client satisfaction and communication
  • Oversee quality control and testing
  • Handle vendor relationships and subscriptions

IT Technician Responsibilities

  • Configure all technical systems and services
  • Set up user accounts and permissions
  • Implement security measures and best practices
  • Provide technical training and support
  • Document all configurations and procedures

Client Responsibilities

  • Provide business information and requirements
  • Make timely decisions on configuration options
  • Supply employee information for account setup
  • Attend training sessions and ask questions
  • Approve configurations and go-live

  • Business name and legal structure
  • Business address and contact information
  • Employee list with roles and permissions
  • Business type and industry classification
  • Budget constraints and preferences
  • Domain name preferences (if not already owned)
  • Existing email accounts to migrate
  • Business software and tools currently used
  • Security and compliance requirements
  • Mobile device requirements
  • Business registration documents
  • Tax identification numbers
  • Industry-specific compliance requirements
  • Data privacy and security policies
  • Employee privacy agreements

5. Procedure — Initial Assessment and Planning

Section titled “5. Procedure — Initial Assessment and Planning”
  1. Business Analysis

    • Understand business model and operations
    • Identify communication and collaboration needs
    • Assess technical requirements and constraints
    • Define success metrics and objectives
  2. Requirements Gathering

    • Document all required services and features
    • Identify integration needs with existing systems
    • Determine security and compliance requirements
    • Establish budget and timeline constraints
  1. Platform Selection

    • Choose between Google Workspace and Microsoft 365
    • Select appropriate subscription tiers
    • Plan domain and email strategy
    • Determine additional software requirements
  2. Implementation Timeline

    • Create detailed project timeline
    • Set up milestone dates and deliverables
    • Plan employee training schedule
    • Establish go-live date and procedures

  1. Google Workspace Account Setup

    • Create Google Workspace account
    • Select appropriate subscription plan
    • Configure billing and payment information
    • Verify domain ownership
  2. Domain Configuration

    • Purchase domain if not already owned
    • Configure DNS records for Google Workspace
    • Set up MX records for email routing
    • Configure SPF, DKIM, and DMARC records
  1. User Creation

    • Create user accounts for all employees
    • Set up organizational units and groups
    • Configure user roles and permissions
    • Create shared mailboxes and distribution lists
  2. Security Configuration

    • Enable two-factor authentication for all users
    • Configure password policies and requirements
    • Set up security alerts and monitoring
    • Implement mobile device management (MDM)
  1. Gmail Setup

    • Configure email routing and delivery
    • Set up email signatures and templates
    • Configure spam filters and security settings
    • Set up email forwarding and auto-responses
  2. Google Drive Configuration

    • Set up shared drives for teams
    • Configure folder structures and permissions
    • Set up backup and retention policies
    • Configure sharing settings and restrictions
  3. Google Calendar Setup

    • Create shared calendars for teams
    • Set up meeting rooms and resources
    • Configure calendar sharing and permissions
    • Set up booking and appointment systems
  4. Google Meet Configuration

    • Configure meeting settings and security
    • Set up meeting recording and transcription
    • Configure live streaming if needed
    • Set up meeting hardware integration

7. Procedure — Microsoft 365 Alternative Setup

Section titled “7. Procedure — Microsoft 365 Alternative Setup”
  1. Account Creation and Configuration

    • Create Microsoft 365 tenant
    • Select appropriate subscription plan
    • Configure billing and payment
    • Verify domain ownership
  2. Domain and Email Configuration

    • Configure DNS records for Microsoft 365
    • Set up MX records for email routing
    • Configure SPF, DKIM, and DMARC
    • Set up email migration if needed
  1. User Account Management

    • Create user accounts and mailboxes
    • Set up distribution groups and shared mailboxes
    • Configure user roles and permissions
    • Enable multi-factor authentication
  2. Service Configuration

    • Configure Exchange Online settings
    • Set up SharePoint and Teams
    • Configure OneDrive for Business
    • Set up security and compliance features

8. Procedure — Domain and DNS Management

Section titled “8. Procedure — Domain and DNS Management”
  1. Domain Registration

    • Research available domain names
    • Register preferred domain name
    • Configure domain privacy protection
    • Set up auto-renewal settings
  2. DNS Configuration

    • Configure A records for website
    • Set up CNAME records for services
    • Configure MX records for email
    • Set up TXT records for verification
  1. Certificate Installation

    • Obtain SSL certificate for domain
    • Install certificate on web server
    • Configure automatic renewal
    • Test certificate installation
  2. Security Configuration

    • Configure HTTPS redirects
    • Set up security headers
    • Configure certificate monitoring
    • Set up security alerts

  1. Profile Creation

    • Create Google Business Profile
    • Verify business location
    • Add business information and hours
    • Upload photos and videos
  2. Profile Optimization

    • Optimize business description
    • Add services and products
    • Set up customer review collection
    • Configure posts and updates
  1. Account Creation

    • Create business social media accounts
    • Optimize profiles with business information
    • Connect profiles to website
    • Set up posting schedules
  2. Brand Consistency

    • Ensure consistent branding across platforms
    • Set up profile pictures and cover photos
    • Configure linking between platforms
    • Set up social media monitoring

10. Procedure — Productivity and Workflow Setup

Section titled “10. Procedure — Productivity and Workflow Setup”
  1. Team Communication

    • Set up team chat and messaging
    • Configure video conferencing
    • Set up project management tools
    • Configure file sharing and collaboration
  2. Workflow Automation

    • Set up email automation and filters
    • Configure document approval workflows
    • Set up meeting scheduling automation
    • Configure notification preferences
  1. File Organization

    • Create folder structures for teams
    • Set up document templates
    • Configure version control and sharing
    • Set up document retention policies
  2. Collaboration Setup

    • Configure real-time collaboration
    • Set up commenting and review workflows
    • Configure access permissions and sharing
    • Set up backup and recovery

  1. Access Control

    • Configure user access permissions
    • Set up role-based access control
    • Configure privileged access management
    • Set up access review processes
  2. Data Protection

    • Configure data encryption
    • Set up data loss prevention
    • Configure backup and recovery
    • Set up data retention policies
  1. Regulatory Compliance

    • Configure GDPR compliance if applicable
    • Set up HIPAA compliance if needed
    • Configure industry-specific compliance
    • Set up compliance monitoring
  2. Audit and Monitoring

    • Set up audit logging
    • Configure security monitoring
    • Set up compliance reporting
    • Configure alerting and notifications

12. Procedure — Employee Onboarding and Training

Section titled “12. Procedure — Employee Onboarding and Training”
  1. User Account Setup

    • Create individual user accounts
    • Set up initial passwords and security
    • Configure user preferences and settings
    • Set up mobile device access
  2. Orientation Session

    • Conduct system overview training
    • Demonstrate key features and workflows
    • Provide hands-on practice opportunities
    • Answer questions and provide support
  1. Training Materials

    • Create user guides and documentation
    • Provide video tutorials and resources
    • Set up knowledge base and FAQ
    • Create quick reference guides
  2. Support Structure

    • Set up help desk and support channels
    • Configure escalation procedures
    • Set up user community and forums
    • Provide ongoing training opportunities

13. Procedure — Documentation and Handoff

Section titled “13. Procedure — Documentation and Handoff”
  1. System Documentation

    • Document all system configurations
    • Create network diagrams and architecture
    • Document security configurations
    • Create troubleshooting guides
  2. User Documentation

    • Create user manuals and guides
    • Document best practices and procedures
    • Create training materials and resources
    • Document support contact information
  1. Admin Guides

    • Create administrator guides
    • Document user management procedures
    • Create backup and recovery procedures
    • Document security and compliance procedures
  2. Business Documentation

    • Create business process documentation
    • Document workflows and procedures
    • Create service level agreements
    • Document vendor and subscription information

Project Manager verifies:

  • All services configured and working correctly
  • Client requirements met and expectations exceeded
  • Timeline and budget managed effectively
  • Quality standards maintained throughout
  • Documentation complete and accurate

IT Technician verifies:

  • All technical configurations correct
  • Security measures implemented properly
  • User accounts set up correctly
  • Integrations working as expected
  • Training provided effectively

Client verifies:

  • Systems meet business needs
  • Employees trained and comfortable
  • Security and compliance requirements met
  • Overall solution provides value
  • Ready for business operations

ProblemCauseFix
Email delivery issuesDNS configuration problemsVerify MX records and DNS settings
User access problemsPermission configuration errorsReview and correct user permissions
Domain verification failuresIncorrect DNS recordsCheck and update DNS configuration
Mobile sync issuesDevice configuration problemsReconfigure mobile devices and settings
Security alertsMisconfigured security settingsReview and adjust security configurations

  • Regular Updates: Keep all systems and software updated
  • Security Monitoring: Continuous security monitoring and alerts
  • Backup Management: Regular backup testing and verification
  • User Management: Regular access reviews and updates
  • Performance Monitoring: System performance and uptime monitoring

  • Always use strong passwords and enable MFA
  • Regularly review and update security configurations
  • Keep documentation current for future reference
  • Test backup and recovery procedures regularly
  • Monitor for security threats and vulnerabilities

  • Version: 1.0
  • Editor: Wizard Tech Services
  • Next Review: Within 90 Days