IT security workflow for Tallyfy

Provision remote access without security gaps

Remote access requests often skip security review and create compliance risks. This workflow ensures manager approval, security assessment, proper credential setup, and user training before granting access.

6 steps

Run this workflow in Tallyfy

1
Import this template into Tallyfy and assign employees to submit requests, managers to approve, IT security to review compliance, and IT staff to configure credentials and conduct training
2
Configure day-based deadlines across the 6-step provisioning process with tasks for documentation review, request submission, manager approval, security compliance review, and user training handoff
3
Track each access request in real-time through Tallyfy from initial documentation review through formal approval, VPN and MFA configuration, to verified user training completion
Import this template into Tallyfy

Process steps

1

Review Remote Desktop Connection Guide

5 days from previous step
task
Before you kick off setup, take a few minutes to review the remote access documentation and video guide. It covers how to enable Remote Desktop on your work PC (Start > Settings > System > Remote Desktop), how to connect from another device using Remote Desktop Connection, and basic troubleshooting steps. Reviewing this upfront means you won't hit unnecessary snags during setup.
2

Submit Remote Access Request Form

1 day from previous step
task
Fill out the remote access request form with the specific details IT needs. Include your employee ID, your direct manager's name, the exact systems you need (email, CRM, file shares, etc.), and a clear business justification for why you need remote access in your role. Be specific - requests like 'I need access to everything' will get rejected. The more specific you are, the faster you'll get approved.
3

Obtain Manager Approval for Remote Access

1 day from previous step
task
As the direct manager, you'll review and approve the remote access request. Check that your employee actually needs access to those specific systems for their job, and make sure they understand what's expected of them when working remotely. IT can't move forward without your approval, so if the justification isn't clear enough, push it back for clarification rather than guessing.
4

Complete IT Security Compliance Review

1 day from previous step
task
Your IT security team needs to evaluate the request against company security policies and compliance requirements. Figure out if VPN access is needed, whether MFA has to be enabled, and if any of the requested systems hold sensitive or regulated data that requires extra controls. Document any security conditions that must be met before you can grant access - don't skip this step.
5

Configure VPN and Access Credentials

1 day from previous step
task
Now it's time to provision the approved remote access. You'll be creating or updating VPN credentials, setting up multi-factor authentication tokens, installing required security software on the remote device, and granting the right permissions. Test all the connections before handing off to the user - don't assume it works, verify it works from outside the office network.
6

Complete User Training and Handoff

1 day from previous step
task
Run a training session with the employee so they're confident using their new remote access setup. Walk through the VPN connection process step by step, show them how MFA works, and go over the remote work security policy - what's acceptable, how to handle data, and what to do if something looks off. Give them written docs with connection instructions, troubleshooting tips, and the IT helpdesk contact. Have them do a test connection while you're watching to make sure everything actually works. Don't mark this complete until they can access all their approved systems on their own.

Ready to use this template?

Sign up free and start running this process in minutes.