Gather Information on the device (who the vendor is, what device is going in, what does it do, and what does it need from IT)
Meet with the vendor and fill out a risk assessment form
Setup the networking for the device (configure the VLAN, give it a DNS Alias, connect it to the network, and add it to AD if the vendor allows)
Configure the ports through the firewall if needed