Lesson 3.5 — Laptops, desktops and virtual desktops: make, OS and scope completeness

This lesson helps the learner identify all in-scope laptops, desktops and virtual desktops, record the required make and operating system information, and avoid common inventory gaps that later affect security updates, secure configuration, user access control and malware protection.

CE questionnaire questions: A2.6

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • create a complete register of in-scope laptops
  • desktops and virtual desktops
  • including make and operating system
  • identify any devices that need investigation before the assessment can be submitted safely.

Why This Matters

The most common problems are:

  • listing only office-based devices;
  • forgetting remote-worker laptops;
  • forgetting spare or loan laptops;
  • forgetting director, owner, partner or trustee devices;

The Core Rule

A2.6 asks for the laptops, desktops and virtual desktops in scope.

You need to record make and operating system.

Common Mistakes

  • listing only office-based devices;
  • forgetting remote-worker laptops;
  • forgetting spare or loan laptops;
  • forgetting director, owner, partner or trustee devices;
  • ignoring personal laptops used for business work;
  • ignoring contractor devices;

Copy This

Work through the workbook activity for this lesson. Each question maps directly to the CE questionnaire.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What does A2.6 ask for?
  • [ ] Why is the laptop and desktop inventory important?
  • [ ] Is “Windows” a strong enough operating system answer?
  • [ ] Should spare laptops be ignored?
  • [ ] Why are senior leader devices important?

Your Action

Do this now — it takes 10–20 minutes.

Build your laptop and desktop inventory. For each device record: type, make, operating system, OS version, and who uses it. Add to Section A2.

Key Takeaway

The device inventory created here becomes the basis for later controls on firewalls, secure configuration, updates, access control, malware protection and Cyber Essentials Plus readiness.

Your Workbook Activity

Complete: Laptop, desktop and virtual desktop inventory

This covers questionnaire questions: A2.6

Next Lesson

In the next lesson: Thin clients, servers and virtual servers: what to include and how to describe them