IT security workflow for Tallyfy

Provision remote access without security gaps

Remote access requests often skip security review and create compliance risks. This workflow ensures manager approval, security assessment, proper credential setup, and user training before granting access.

6 steps

Run this workflow in Tallyfy

1
Import this template into Tallyfy and assign employees to submit requests, managers to approve, IT security to review compliance, and IT staff to configure credentials and conduct training
2
Configure day-based deadlines across the 6-step provisioning process with tasks for documentation review, request submission, manager approval, security compliance review, and user training handoff
3
Track each access request in real-time through Tallyfy from initial documentation review through formal approval, VPN and MFA configuration, to verified user training completion
Import this template into Tallyfy

Process steps

1

Review Remote Desktop Connection Guide

5 days from previous step
task
Before starting, review the remote access documentation and video guide. This covers how to enable Remote Desktop on your work PC (Start > Settings > System > Remote Desktop), how to connect using Remote Desktop Connection from another device, and basic troubleshooting. Understanding these steps upfront prevents confusion during setup.
2

Submit Remote Access Request Form

1 day from previous step
task
Complete the remote access request form with specific details. Include your employee ID, direct manager name, exact systems needed (email, CRM, file shares, etc.), and business justification explaining why remote access is required for your role. Be specific - requests like "I need access to everything" will be rejected. Clear requests get approved faster.
3

Obtain Manager Approval for Remote Access

1 day from previous step
task
The direct manager reviews and approves the remote access request. Verify that the employee genuinely needs access to the requested systems for their job function. Confirm they understand security responsibilities for remote work. Without manager approval, IT cannot proceed with provisioning. Reject or request clarification if the justification is unclear.
4

Complete IT Security Compliance Review

1 day from previous step
task
IT security team evaluates the request against company security policies and compliance requirements. Determine if VPN access is required, whether multi-factor authentication (MFA) must be enabled, and if the requested systems contain sensitive or regulated data requiring additional controls. Document any security conditions that must be met before granting access.
5

Configure VPN and Access Credentials

1 day from previous step
task
IT provisions the approved remote access. This includes creating or updating VPN credentials, configuring multi-factor authentication tokens, installing required security software on the remote device, and granting permissions to approved systems. Test all connections before handoff to ensure everything works correctly from outside the office network.
6

Complete User Training and Handoff

1 day from previous step
task
Conduct a training session with the employee to ensure successful remote access adoption. Walk through the VPN connection process step-by-step, demonstrate how to use multi-factor authentication, and review the remote work security policy covering acceptable use, data handling, and incident reporting. Provide written documentation with connection instructions, troubleshooting tips, and IT helpdesk contact information. Have the employee perform a test connection while you observe to verify everything works correctly. Only mark this step complete once the user confirms they can access all approved systems independently.

Ready to use this template?

Sign up free and start running this process in minutes.