← Back to Blog
MSPs

June 25, 2026

By Alan Kern

MSP Client Offboarding: The Process You Probably Don't Have (But Need)

When a client leaves, the offboarding process is just as important as onboarding. Here's how MSPs automate it to protect themselves and their clients.

A client gives notice. Everyone's disappointed. The account manager has a conversation, tries to save it, and eventually accepts the decision. Then what?

In most MSPs, offboarding is ad hoc. Someone remembers to disable their monitoring. Someone else eventually removes the RMM agent. DNS records may or may not get transferred. Backup data sits on your systems indefinitely. And six months later, you realize their old VPN credentials still work.

This is a security and liability problem that most MSPs don't address until something goes wrong. And when it goes wrong, it goes really wrong — a data breach through credentials you forgot to revoke, a lawsuit over data you were supposed to delete, or a former client's network incident that somehow traces back to your orphaned agent software.

The irony is that most MSPs have detailed onboarding processes. They know exactly how to bring a client in. But the reverse process — equally important and arguably higher-stakes — is usually a rough mental checklist in someone's head.

Why Offboarding Matters More Than You Think

When you onboard a client, the worst case of a missed step is a delayed start. Annoying, but fixable. When you offboard a client, the worst case of a missed step is a security breach, a compliance violation, or a lawsuit.

Consider the scenarios:

Unrevoced credentials. Your technicians have admin access to the former client's network. If those credentials aren't revoked, you have access to systems you no longer manage. If something happens to that network — whether caused by you or not — your access becomes a liability. The former client's new MSP or legal team will ask why you still had admin rights months after the contract ended.

Orphaned agents. Your RMM agent is still installed on 50 workstations. It's still reporting back to your console. You're still collecting data from machines you have no business monitoring. Depending on the data involved and the jurisdiction, this could be a privacy violation.

DNS limbo. You managed their DNS. The contract ended but nobody transferred the records. Three months later, their SSL certificate expires, their email stops working because an MX record needs updating, and they can't fix it because you still control the zone. Now you're getting angry calls from a former client and their lawyer.

Billing ghosts. Their Microsoft 365 licenses are still on your tenant. You're paying for them. Or worse — they're still using them and you're footing the bill without realizing it because nobody cleaned up the licensing after the offboard.

Every one of these scenarios has happened to real MSPs. Most of them were preventable with a documented, automated offboarding process.

The Complete Offboarding Checklist

Here's what needs to happen when a client leaves, organized by category. The order matters — some steps depend on others being completed first.

Phase 1: Notification and Documentation (Days 1-3)

Formal acknowledgment. Send a written acknowledgment of the termination with the effective date and a summary of what will happen during the transition. This protects both parties and sets expectations. Include data handling terms from the contract.

Internal notification. Alert every team member who touches the client's account — technicians, the account manager, billing, and leadership. Everyone needs to know the timeline and their responsibilities. No one should be making changes to the client's environment without knowing an offboard is in progress.

Documentation export. Generate a complete documentation package: network diagrams, IP schemas, device inventories, credential lists (encrypted), configuration backups, vendor contact lists, and any runbooks specific to their environment. This package gets handed to the client or their new provider. Start this early because it takes longer than you think.

Contract review. Pull the contract and review the termination clause. What are your obligations regarding data retention? Data deletion? Transition assistance? The contract governs everything that follows, so make sure you know what it says before you start the technical offboard.

Phase 2: Access and Security (Days 3-7)

Credential inventory. List every credential your team holds for the client's environment. Every admin account, every VPN connection, every cloud console login, every vendor portal. Don't trust memory — pull from your documentation system and have techs verify. Missed credentials are the most common offboarding failure.

Credential transfer. For accounts the client needs to retain (their own admin accounts, vendor portals, domain registrar), transfer ownership by changing passwords and updating contact information to the client's designated person. Document each transfer with confirmation from the client.

Your access revocation. Remove or disable every credential your team uses. VPN accounts, RMM admin access, cloud admin roles, shared accounts — all of it. Do this on the agreed-upon date, not "whenever we get around to it." Verify revocation by attempting to log in after the change.

MFA cleanup. If your technicians are registered as MFA administrators or have authenticator apps configured for the client's systems, remove those registrations. An overlooked MFA enrollment is functionally the same as an unrevoced credential.

Phase 3: Agent and Software Removal (Days 5-10)

RMM agent removal. Uninstall your RMM agent from every managed device. Run a final audit to confirm removal. If any devices are offline during the removal window, document them and schedule follow-up. A single overlooked agent on a laptop that was in someone's desk drawer can create problems months later.

Security software transition. If you provide managed antivirus, EDR, or other security tools, coordinate the transition. The client needs replacement coverage before you remove yours. Leaving a gap is irresponsible; removing their security without warning is negligent. Work with the client or their new provider on the timing.

Backup agent removal. Remove backup agents and clarify data retention. Does the client want their backup data? Do they need it transferred to their new provider? Your contract should specify a retention period after which you delete the data. Follow it and document the deletion.

Other agents and scripts. Any custom scripts, scheduled tasks, or monitoring agents you've deployed need to be identified and removed. Check startup scripts, scheduled tasks, Group Policy objects, and any automation you've built for the client. These are easy to forget because they run silently in the background.

Phase 4: Infrastructure Transfer (Days 7-14)

DNS transfer. If you manage DNS, initiate the transfer to the client or their new provider. This includes the domain registrar account, DNS zone records, and any associated SSL certificates. Provide the client with a complete export of their DNS records. Test the transfer before cutting over.

Email and Microsoft 365 transition. If the client's Microsoft 365 tenant is under your CSP agreement, transition it to direct Microsoft billing or their new provider's CSP. This needs to happen before the contract end date or the client loses access. Don't use this as leverage — it's their data and their tenant.

Firewall and network equipment. If you own the firewall or other network equipment at the client's site, arrange for retrieval or sale. If the client owns it, remove your management access and ensure the new provider has admin credentials. Reset any equipment to factory defaults if you're retrieving it.

Cloud resource transfer. AWS accounts, Azure subscriptions, Google Workspace — transfer administrative ownership cleanly. This includes billing responsibility. Don't end up paying for a former client's cloud infrastructure because nobody updated the billing contact.

Phase 5: Financial Cleanup (Days 10-14)

Final billing. Generate the final invoice covering services through the contract end date. Include any early termination fees if applicable per the contract. Be fair and accurate — disputes over the final bill sour the relationship further and can lead to negative reviews.

License reconciliation. Cancel or transfer every license associated with the client. Microsoft 365, security tools, backup software, RMM per-device licenses — go through your licensing dashboard line by line. Every license you forget to cancel is money out of your pocket every month.

Recurring billing removal. Remove the client from your billing system entirely. Check for any auto-renewing subscriptions or annual commitments that reference the client. Set a calendar reminder for 30 days post-offboard to verify no charges have continued.

Why Automate This

Because humans forget steps when they're emotionally charged. Losing a client feels bad, and the natural instinct is to move on quickly rather than methodically work through a 25-item checklist. The account manager wants to stop thinking about it. The techs want to focus on current clients. Nobody is excited about doing careful, thorough work for someone who just fired them.

Automation removes emotion from the equation. An automated offboarding workflow triggers the complete checklist when a client's status changes in your PSA. Each step is assigned to the appropriate team member with a specific deadline. The system tracks completion, sends reminders for overdue items, and escalates to management when steps aren't completed on time.

Here's what the automation looks like in practice:

The account manager changes the client status to "offboarding" in your PSA. Immediately, the system creates a project with all offboarding tasks, assigns them to the right people, and sets deadlines based on the contract end date. The documentation team gets their tasks. The technical team gets theirs. Billing gets a notification about the final invoice timeline.

As tasks are completed, the system updates the project status. If a task is overdue, the assigned person gets a reminder. If it's three days overdue, their manager gets notified. Nothing falls through the cracks because the system doesn't forget, doesn't get emotional, and doesn't cut corners.

The Legal Protection Angle

Document everything during offboarding. Every credential revoked, every agent removed, every file transferred, every communication sent. If the client later claims you damaged their network, deleted their data, failed to transfer critical information, or left security vulnerabilities, your offboarding documentation is your defense.

Automated workflows create this documentation as a byproduct of the process. Each completed task is timestamped and logged. The documentation export is recorded. Credential transfers are confirmed in writing. You end up with a complete paper trail without anyone having to consciously create one.

This paper trail has saved MSPs from lawsuits. A former client's network gets breached six months after offboarding and they point the finger at you. Your offboarding log shows every credential was revoked on a specific date, every agent was removed and verified, and a complete documentation package was delivered to their new provider. That's a defensible position. "We think we did everything but we're not sure" is not.

Turning Offboarding Into a Reputation Builder

Here's something most MSPs miss: a professional offboarding process can actually generate referrals. Clients leave for all sorts of reasons — budget, internal IT hire, relocation, acquisition. Not all departures are acrimonious. How you handle the exit determines whether that former client speaks well of you or warns others away.

A clean, professional offboard that makes the transition easy signals maturity and integrity. The client's new MSP notices how well-documented everything is. The client tells colleagues, "They handled the transition really professionally." That's the kind of reputation that brings clients back and generates referrals from unexpected places.

The opposite is also true. A sloppy offboard where DNS records go missing, credentials aren't transferred, and the final bill includes charges for services after the end date — that generates the kind of online review that costs you far more than the time it would have taken to do it right.

Building Your Offboarding Automation

Start with your PSA. Most modern PSA platforms support project templates that can be triggered by status changes. Build your offboarding checklist as a project template with tasks, assignments, dependencies, and deadlines relative to the contract end date.

Add notification rules so the right people are alerted at the right time. Connect it to your documentation platform so the export step is streamlined. Integrate with your billing system so license cleanup is tracked alongside technical tasks.

Test it with a mock offboard before you need it for real. Walk through every step and verify that tasks fire correctly, notifications reach the right people, and nothing is missing from the checklist.

Need to build a bulletproof offboarding process? Let's talk about your current approach and close the gaps before they cost you.

Want to explore this for your business?

Book a free call. We'll look at your operations and identify the highest-impact automation opportunity.

Book a Free Call