Lesson 3.5 — Laptops, desktops and virtual desktops: make, OS and scope completeness
This lesson helps the learner identify all in-scope laptops, desktops and virtual desktops, record the required make and operating system information, and avoid common inventory gaps that later affect security updates, secure configuration, user access control and malware protection.
CE questionnaire questions:
A2.6
What You'll Be Able to Do
By the end of this lesson, you will be able to:
- create a complete register of in-scope laptops
- desktops and virtual desktops
- including make and operating system
- identify any devices that need investigation before the assessment can be submitted safely.
Why This Matters
The most common problems are:
- listing only office-based devices;
- forgetting remote-worker laptops;
- forgetting spare or loan laptops;
- forgetting director, owner, partner or trustee devices;
The Core Rule
A2.6 asks for the laptops, desktops and virtual desktops in scope.
You need to record make and operating system.
Common Mistakes
- listing only office-based devices;
- forgetting remote-worker laptops;
- forgetting spare or loan laptops;
- forgetting director, owner, partner or trustee devices;
- ignoring personal laptops used for business work;
- ignoring contractor devices;
Copy This
Work through the workbook activity for this lesson. Each question maps directly to the CE questionnaire.
Quick Checklist
Before moving on, make sure you can say yes to these:
- [ ] What does A2.6 ask for?
- [ ] Why is the laptop and desktop inventory important?
- [ ] Is “Windows” a strong enough operating system answer?
- [ ] Should spare laptops be ignored?
- [ ] Why are senior leader devices important?
Your Action
Do this now — it takes 10–20 minutes.
Build your laptop and desktop inventory. For each device record: type, make, operating system, OS version, and who uses it. Add to Section A2.
Key Takeaway
The device inventory created here becomes the basis for later controls on firewalls, secure configuration, updates, access control, malware protection and Cyber Essentials Plus readiness.
Your Workbook Activity
Complete: Laptop, desktop and virtual desktop inventory
This covers questionnaire questions: A2.6
Next Lesson
In the next lesson: Thin clients, servers and virtual servers: what to include and how to describe them