<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>NJIT Public KB</title>
    <link>http://172.21.1.91:1313/</link>
    <description>Recent content on NJIT Public KB</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="http://172.21.1.91:1313/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Consulting Overview</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/overview/</guid>
      <description>&lt;p&gt;&lt;strong&gt;1. Incident Lifecycle &amp;amp; Decision Logic&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.1. ITIL Fundamentals:&lt;/strong&gt; The very basics on the ITIL Framework.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.2. Issue Ownership:&lt;/strong&gt; Establishing a triage workflow for complex blockers before considering escalation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.3. The Escalation Framework:&lt;/strong&gt; Creating a standardized template for genuine decision points (Context -&amp;gt; Business Impact -&amp;gt; Recommended Options).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.4. Managing Ambiguity:&lt;/strong&gt; How to operate when documentation is missing or incomplete.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;2. Consulting &amp;amp; Stakeholder Management&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.1. The &amp;ldquo;Consultant Muscle&amp;rdquo;:&lt;/strong&gt; Frameworks for reviewing solution requests against an &lt;em&gt;existing&lt;/em&gt; strategy.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.2. Constructive Pushback:&lt;/strong&gt; How to confidently say &amp;ldquo;no&amp;rdquo; to non-standard approaches while providing technical reasoning and a compliant alternative.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.3. Advising:&lt;/strong&gt; Translating complex M365 guardrails into practical &amp;ldquo;how to do it properly&amp;rdquo; steps for delivery teams.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.4. RAID/RAAIDD Logs:&lt;/strong&gt; Leveraging logs as a technical shield to document risks, decisions, and dependencies for accountability and clear architectural handovers.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Intro to ITIL</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/intro-to-itil/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/intro-to-itil/</guid>
      <description>&lt;p&gt;ITIL 4 is a globally recognized framework for IT Service Management (ITSM) that focuses on co-creating value with the business through a Service Value System, guiding principles, and continual improvement. It is the most widely adopted guidance for IT Service Management (ITSM) worldwide. In its current iteration, ITIL 4, the framework provides a practical and flexible approach to support organizations in their digital transformation journeys. It shifts the focus from managing isolated IT processes to adopting a holistic, systems-thinking approach that emphasizes the co-creation of value between IT service providers, customers, and other stakeholders.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Intro to PRINCE2</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/intro-to-prince2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/intro-to-prince2/</guid>
      <description>&lt;p&gt;PRINCE2 is a widely used project management method that provides a structured approach to managing projects by dividing it into seven processes. It emphasizes the importance of clear objectives, defined roles and responsibilities, and a focus on progress monitoring and control throughout the project lifecycle.&lt;/p&gt;&#xA;&lt;p&gt;PRINCE2, an acronym for &lt;strong&gt;PR&lt;/strong&gt;ojects &lt;strong&gt;IN&lt;/strong&gt; &lt;strong&gt;C&lt;/strong&gt;ontrolled &lt;strong&gt;E&lt;/strong&gt;nvironments, is a globally recognized, structured project management methodology. It provides a process-based approach designed to enhance organization and control within projects, focusing on the effective management of resources and risks. Central to PRINCE2 is its emphasis on product-based planning, meaning the methodology centres on the definition, delivery, and quality of specific project outputs or &amp;lsquo;products&amp;rsquo;. These products must meet clearly defined quality criteria and contribute to achieving a justified business case, ensuring the project delivers tangible value.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Intro to Scrum</title>
      <link>http://172.21.1.91:1313/docs/frameworks/scrum/intro-to-scrum/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/scrum/intro-to-scrum/</guid>
      <description>&lt;p&gt;From &lt;a href=&#34;https://scrumguides.org/scrum-guide.html&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;the official Scrum guide&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt; the definition of Scrum is:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;hellip;a lightweight framework that helps people, teams and organizations generate value through adaptive solutions for complex problems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft 365 Overview</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/overview/</guid>
      <description>&lt;p&gt;&lt;strong&gt;1. M365 Core Services &amp;amp; Architecture&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.1. Exchange Online:&lt;/strong&gt; Architecture hierarchy, mail flow troubleshooting, shared mailboxes, and hybrid concepts.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.2. SharePoint Online &amp;amp; OneDrive:&lt;/strong&gt; Architecture hierarchy, permissions, sprawl management, and sync client troubleshooting.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.3. Microsoft Teams:&lt;/strong&gt; Architecture hierarchy, meeting policies, app governance, and standardizing team creation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;1.4. Service-Wide:&lt;/strong&gt; Troubleshooting issues and data consistency across the ecosystem.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;2. Identity &amp;amp; Access (Entra ID)&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.1. Identity &amp;amp; Access Fundamentals:&lt;/strong&gt; Architecture hierarchy, user and device types, application identity, and cross-tenant relationships.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.2. Identity Lifecycle:&lt;/strong&gt; Understanding the flow from HR systems to Active Directory to Entra ID (JML - Joiners, Movers, Leavers).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.3. Conditional Access (CA):&lt;/strong&gt; Best practices for CA policies, troubleshooting sign-in logs, and managing exclusions securely.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;2.4. Authentication:&lt;/strong&gt; MFA enforcement, Self-Service Password Reset (SSPR), and modern authentication protocols.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;3. Governance &amp;amp; Compliance (Purview)&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>A guide to Scrum</title>
      <link>http://172.21.1.91:1313/docs/frameworks/scrum/a-guide/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/scrum/a-guide/</guid>
      <description>&lt;p&gt;&lt;em&gt;If you would like to, you can &lt;a href=&#34;https://scrumguides.org/scrum-guide.html&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;read the official Scrum guide here:&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Scrum is a lightweight framework to help teams develop a Product of value via a lean and adaptable approach. The theory behind it is based on the following fundamentals of Scrum:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Intro to ISO 19011</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso19011/intro-to-iso19011/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso19011/intro-to-iso19011/</guid>
      <description>&lt;p&gt;ISO 19011 is an international standard that offers guidelines for auditing management systems. We use these guidelines to audit clients&amp;rsquo; information security management systems (&lt;a href=&#34;http://172.21.1.91:1313/docs/frameworks/iso27001/&#34;&gt;like ISO 27001&lt;/a&gt; and other similar frameworks).&lt;/p&gt;&#xA;&lt;p&gt;Additionally, ISO 19011 can be applied to a variety of other systems, such as quality management systems (ISO 9001) and environmental management systems (ISO 14001). These guidelines are designed to ensure that audits are conducted consistently and effectively, and include:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Intro to ISO 27001</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso27001/intro-to-iso27001/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso27001/intro-to-iso27001/</guid>
      <description>&lt;p&gt;ISO 27001 is an international standard that provides guidelines for establishing, implementing, maintaining, and continually improving an information security management system (ISMS)&lt;/p&gt;&#xA;&lt;p&gt;ISO 27001 is designed to help organisations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties. The requirements for aligning to this standard are seperated into two components:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Clauses:&lt;/strong&gt; The ideas/framework for an organisation to follow when managing risks.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Controls:&lt;/strong&gt; Specific measures an organisation can implement to manage and reduce risks.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;When assessing an organisation on their alignment with this standard, the &lt;a href=&#34;http://172.21.1.91:1313/docs/frameworks/iso19011/&#34;&gt;ISO 19011 methodology of Management Systems auditing&lt;/a&gt; should be followed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 7 Guiding Principles</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/the-7-guiding-principles/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/the-7-guiding-principles/</guid>
      <description>&lt;p&gt;The 7 Guiding Principles are recommendations that can guide an organization in all circumstances, regardless of changes in its goals, strategies, type of work, or management structure. They are the core messages of ITIL and of service management in general.&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-focus-on-value&#34;&gt;1. Focus on value &lt;a href=&#34;#1-focus-on-value&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; Everything the organization does should link back, directly or indirectly, to value for itself, its customers, and other stakeholders. Value is not just financial; it includes customer experience and user experience.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Understand who the consumers of the service are and what they consider valuable. Map value streams and ruthlessly eliminate activities that do not contribute to value creation. Continuously evaluate whether an action or process is actively delivering or supporting value.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-start-where-you-are&#34;&gt;2. Start where you are &lt;a href=&#34;#2-start-where-you-are&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; Do not start from scratch and build something new without considering what is already available to be leveraged. There is often a great deal of value in existing services, processes, programs, projects, and people.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Objectively assess the current state using direct observation and measurement. Identify what works well and can be reused or improved, rather than discarding everything to build from the ground up.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-progress-iteratively-with-feedback&#34;&gt;3. Progress iteratively with feedback &lt;a href=&#34;#3-progress-iteratively-with-feedback&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; Resist the temptation to do everything at once. Organize work into smaller, manageable sections that can be executed and completed in a timely manner, making it easier to maintain a sharp focus on each effort.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Use agile methodologies to deliver work in iterations. Continuously gather and respond to feedback from stakeholders before, during, and after each iteration to ensure the work remains focused, relevant, and adaptable to changing circumstances.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-collaborate-and-promote-visibility&#34;&gt;4. Collaborate and promote visibility &lt;a href=&#34;#4-collaborate-and-promote-visibility&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; When initiatives involve the right people in the right roles, efforts benefit from better buy-in, more relevance, and increased likelihood of long-term success. Hidden work leads to duplication of effort, risks going unmanaged, and creates a lack of trust.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Break down silos. Ensure that work, progress, and even failures are shared transparently across the organization. Communicate clearly and involve stakeholders at all levels to build trust, share understanding, and make better decisions.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-think-and-work-holistically&#34;&gt;5. Think and work holistically &lt;a href=&#34;#5-think-and-work-holistically&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; No service, practice, process, department, or supplier stands alone. The outcomes achieved by the service provider and service consumer will suffer unless the organization works on the whole rather than just its individual parts.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Recognize the complexity of the systems involved. Ensure that all Four Dimensions of Service Management are considered in any initiative. Understand how different parts of the organization and external partners interact to co-create value along the entire service value chain.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-keep-it-simple-and-practical&#34;&gt;6. Keep it simple and practical &lt;a href=&#34;#6-keep-it-simple-and-practical&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; Always use the minimum number of steps needed to accomplish an objective. Outcome-based thinking should be used to produce practical solutions that deliver results without unnecessary bureaucracy.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Eliminate processes, services, actions, or metrics that fail to provide value or produce a useful outcome. If a process, service, action, or metric provides no value, eliminate it. Focus on doing the essentials very well rather than overcomplicating procedures.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;7-optimize-and-automate&#34;&gt;7. Optimize and automate &lt;a href=&#34;#7-optimize-and-automate&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; Organizations must maximize the value of the work carried out by their human and technical resources. Technology can help organizations scale up and take on frequent, repetitive tasks, freeing human resources for more complex work.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application:&lt;/strong&gt; Streamline and optimize processes to make them as efficient as possible &lt;em&gt;before&lt;/em&gt; applying automation. Attempting to automate a flawed process will only result in flawed outcomes happening faster. Use human intervention only where it truly adds value, such as in complex decision-making, strategic thinking, or empathetic customer interactions.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;in-closing&#34;&gt;In closing &lt;a href=&#34;#in-closing&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;These principles are universally applicable and intended to guide decisions and actions at all levels of the organization. They do not prescribe specific tasks, but rather provide a mindset and culture to support successful service management, agile operations, and the continuous realization of value. When faced with a challenge or decision, practitioners should refer back to these principles to ensure they remain aligned with the core philosophy of ITIL 4.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 7 Principles</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-principles/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-principles/</guid>
      <description>&lt;p&gt;The 7 Principle&amp;rsquo;s are:&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-continued-business-justification&#34;&gt;1. Continued Business Justification &lt;a href=&#34;#1-continued-business-justification&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;strong&gt;Explanation:&lt;/strong&gt; This principle mandates that a valid, justifiable reason must exist for initiating a project, and this justification must remain valid throughout the project&amp;rsquo;s entire lifecycle. The core of this justification lies in the project being desirable (benefits outweigh costs and risks), viable (capable of being delivered), and achievable. This rationale is formally documented and maintained in the Business Case.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.1) Exchange Online</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.1-exchange-online/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.1-exchange-online/</guid>
      <description>&lt;h2 id=&#34;1-exchange-online-mail-flow-architecture&#34;&gt;1. Exchange Online Mail Flow Architecture &lt;a href=&#34;#1-exchange-online-mail-flow-architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Understanding the sequence of connectors and filtering layers is critical for troubleshooting delivery and security.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Inbound Connectors:&lt;/strong&gt; The entry point for mail arriving from third-party security gateways (e.g., Mimecast) or on-premises Exchange servers in a hybrid configuration. These rely on TLS certificate validation or IP whitelisting to establish trust.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Tenant Edge / EOP:&lt;/strong&gt; The primary hygiene layer where Connection Filtering (IP reputation), Directory Based Edge Blocking (DBEB), and basic Anti-Malware/Anti-Spam scanning occur. Even with an Inbound Connector, EOP will still scan for Malware and High-Confidence Phishing. These are considered &amp;ldquo;non-negotiable&amp;rdquo; by Microsoft.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Exchange Transport Rules (ETRs):&lt;/strong&gt; Custom logic applied after initial hygiene. These rules fire in priority order and can be used for custom routing, disclaimer injection, or bypassing further scanning for trusted internal flows.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Microsoft Defender for Office 365 (MDO):&lt;/strong&gt; The advanced protection layer including &lt;strong&gt;Safe Attachments&lt;/strong&gt; (sandboxing) and &lt;strong&gt;Safe Links&lt;/strong&gt; (time-of-click verification). This layer also manages Zero-hour Auto Purge (ZAP) to remediate threats post-delivery.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Outbound Connectors:&lt;/strong&gt; The exit point for mail leaving the tenant destined for specific third-party gateways or on-premises environments. These ensure mail is routed through the correct smarthost rather than directly to the public internet. If the mail returns from the outbound service (e.g. an email signature service), it is treated as a new inbound connection at the edge.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mailbox Layer:&lt;/strong&gt; The final delivery point where SCL-based Junk Email filtering and user-defined Inbox Rules are processed.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-mail-flow--routing-troubleshooting&#34;&gt;2. Mail Flow &amp;amp; Routing Troubleshooting &lt;a href=&#34;#2-mail-flow--routing-troubleshooting&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Message Trace:&lt;/strong&gt; The primary diagnostic tool for mail delivery issues. Use the Exchange Admin Center (EAC) for messages within the last 10 days; use Historical Search for up to 90 days.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mail Flow Rules (Transport Rules):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Always verify rule execution order (Priority).&lt;/li&gt;&#xA;&lt;li&gt;Ensure &amp;ldquo;Stop processing more rules&amp;rdquo; is used deliberately to prevent conflicting actions.&lt;/li&gt;&#xA;&lt;li&gt;Test new rules in &amp;ldquo;Test with Policy Tips&amp;rdquo; or &amp;ldquo;Test without Policy Tips&amp;rdquo; mode before enforcement.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connectors:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Validate inbound/outbound connectors for third-party filtering services or on-premises environments.&lt;/li&gt;&#xA;&lt;li&gt;Check TLS certificate requirements and IP whitelisting.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Accepted Domains:&lt;/strong&gt; Verify authoritative vs. internal relay configurations to prevent routing loops.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-recipient-management--governance&#34;&gt;3. Recipient Management &amp;amp; Governance &lt;a href=&#34;#3-recipient-management--governance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Shared Mailboxes:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Governance:&lt;/strong&gt; Do not apply licenses to shared mailboxes unless they exceed 50GB or require a continuous In-Place Archive.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Permissions:&lt;/strong&gt; Distinguish between &lt;code&gt;FullAccess&lt;/code&gt; (read/manage) and &lt;code&gt;SendAs&lt;/code&gt; / &lt;code&gt;SendOnBehalf&lt;/code&gt; rights. Note that &lt;code&gt;FullAccess&lt;/code&gt; does not automatically grant sending rights.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Automapping:&lt;/strong&gt; Managed via PowerShell (&lt;code&gt;Add-MailboxPermission -AutoMapping $false&lt;/code&gt; if users complain about Outlook client performance issues).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Group Types:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Distribution Lists (DLs):&lt;/strong&gt; Legacy broadcast communication. Ensure message approval or sender restrictions are applied to large DLs.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Microsoft 365 Groups:&lt;/strong&gt; Modern collaboration tied to SharePoint and Teams. Enforce naming and expiration policies via Entra ID.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Resource Mailboxes:&lt;/strong&gt; Manage automated booking via &lt;code&gt;Set-CalendarProcessing&lt;/code&gt; and configure booking windows and delegate approval.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-security-protection--authentication&#34;&gt;4. Security, Protection &amp;amp; Authentication &lt;a href=&#34;#4-security-protection--authentication&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Email Authentication Standards:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;SPF (Sender Policy Framework):&lt;/strong&gt; Validates outbound sending IPs. Keep DNS lookups under the 10-limit threshold.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;DKIM (DomainKeys Identified Mail):&lt;/strong&gt; Cryptographic signing of outbound emails. Ensure CNAME records are published and DKIM is enabled in Defender.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;DMARC:&lt;/strong&gt; Policy enforcement (&lt;code&gt;p=none&lt;/code&gt;, &lt;code&gt;quarantine&lt;/code&gt;, &lt;code&gt;reject&lt;/code&gt;). Review aggregate reports before moving to strict enforcement.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Control:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Verify Basic Authentication is permanently disabled across the tenant.&lt;/li&gt;&#xA;&lt;li&gt;Control client access (e.g., POP/IMAP) via Client Access Rules or CAS Mailbox settings.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Protection Policies:&lt;/strong&gt; Review Anti-Spam, Anti-Phishing, and Anti-Malware policies and manage Safe Links and Safe Attachments.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-hybrid-environment-considerations-enterprise&#34;&gt;5. Hybrid Environment Considerations (Enterprise) &lt;a href=&#34;#5-hybrid-environment-considerations-enterprise&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Attribute Authority:&lt;/strong&gt; In an AD-synced environment, Exchange attributes must be managed on-premises via ADUC or an Exchange Management Server.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Routing in Hybrid:&lt;/strong&gt; Understand the role of the &lt;code&gt;targetAddress&lt;/code&gt; (typically &lt;code&gt;alias@tenant.mail.onmicrosoft.com&lt;/code&gt;) for routing mail from on-premises to cloud mailboxes.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Cross-Premises Permissions:&lt;/strong&gt; &lt;code&gt;SendAs&lt;/code&gt; and &lt;code&gt;ReceiveAs&lt;/code&gt; permissions do not reliably span across on-premises and Exchange Online boundaries; migrations of delegates and shared mailboxes must be batched together.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-exchangeonlinemanagement-module&#34;&gt;6. Essential PowerShell Cmdlets (ExchangeOnlineManagement Module) &lt;a href=&#34;#6-essential-powershell-cmdlets-exchangeonlinemanagement-module&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-ExchangeOnline&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Diagnostics:&lt;/strong&gt; &lt;code&gt;Get-MessageTrace -SenderAddress user@domain.com -StartDate (Get-Date).AddDays(-2)&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Permissions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MailboxPermission -Identity &amp;quot;Shared Mailbox&amp;quot;&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Add-RecipientPermission -Identity &amp;quot;Mailbox&amp;quot; -Trustee &amp;quot;User&amp;quot; -AccessRights SendAs&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mailbox Configuration:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Set-Mailbox -Identity user@domain.com -HiddenFromAddressListsEnabled $true&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Set-CASMailbox -Identity user@domain.com -ImapEnabled $false -PopEnabled $false&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>1.1) ITIL Fundamentals</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.1-itil-fundamentals/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.1-itil-fundamentals/</guid>
      <description>&lt;h2 id=&#34;1-incident-vs-problem-management-the-break-fix-boundary&#34;&gt;1. Incident vs. Problem Management (The Break-Fix Boundary) &lt;a href=&#34;#1-incident-vs-problem-management-the-break-fix-boundary&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Do not treat every recurring outage as a standalone emergency. As a Consultant, you are expected to elevate the operation from reactive firefighting to proactive root-cause resolution.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Incident Management:&lt;/strong&gt; The goal is to restore normal service operations as quickly as possible. Workarounds are entirely acceptable here. &lt;em&gt;(e.g., &amp;ldquo;The user&amp;rsquo;s Teams desktop app is crashing; clear the cache and have them use Teams on the Web so they can join their current meeting.&amp;rdquo;)&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Problem Management:&lt;/strong&gt; The goal is to identify the root cause of one or more Incidents to prevent them from happening again. &lt;em&gt;(e.g., &amp;ldquo;Why are 50 users experiencing Teams desktop crashes after the latest Intune deployment? We need to analyze the deployment logs and correct the packaging.&amp;rdquo;)&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Consultant Pivot:&lt;/strong&gt; When you see Helpdesk logging the same Incident multiple times, step in, declare a &amp;ldquo;Problem,&amp;rdquo; and lead the root cause analysis.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-navigating-change-management-the-cab&#34;&gt;2. Navigating Change Management (The CAB) &lt;a href=&#34;#2-navigating-change-management-the-cab&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Never walk into a Change Advisory Board (CAB) meeting with a &amp;ldquo;we&amp;rsquo;ll figure it out&amp;rdquo; attitude. You are dealing with business-critical M365 infrastructure. You must accurately classify your changes and prepare the necessary documentation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.2) Issue Ownership</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.2-issue-ownership/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.2-issue-ownership/</guid>
      <description>&lt;h2 id=&#34;1-the-definition-of-ownership&#34;&gt;1. The Definition of &amp;ldquo;Ownership&amp;rdquo; &lt;a href=&#34;#1-the-definition-of-ownership&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;In a senior role, &amp;ldquo;owning&amp;rdquo; an issue does not mean you have to personally execute every fix. It means you own the &lt;em&gt;resolution lifecycle&lt;/em&gt;. You are the primary shield protecting the role owner from operational noise.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Consultant Mindset:&lt;/strong&gt; You are the investigator, the communicator, and the triage engineer. You only pass the baton when a definitive architectural or financial boundary is hit.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The &amp;ldquo;Black Hole&amp;rdquo; Avoidance:&lt;/strong&gt; Stakeholders escalate when they feel ignored. Ownership means proactively communicating the status (&amp;ldquo;I have reproduced the issue and am analyzing the Entra logs&amp;rdquo;) even if you don&amp;rsquo;t have the fix yet.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-the-triage-boundary-own-vs-escalate&#34;&gt;2. The Triage Boundary (Own vs. Escalate) &lt;a href=&#34;#2-the-triage-boundary-own-vs-escalate&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Establish clear rules of engagement for what you resolve independently versus what requires the role owner.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.2) SharePoint Online and OneDrive</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.2-sharepoint-online-and-onedrive/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.2-sharepoint-online-and-onedrive/</guid>
      <description>&lt;h2 id=&#34;1-sharepoint-hierarchy--architecture&#34;&gt;1. SharePoint Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-sharepoint-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Modern SharePoint is built on a &lt;strong&gt;flat architecture&lt;/strong&gt; designed for cloud scalability and governance, moving away from the legacy subsite model in favor of independent site collections.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Tenant Boundary:&lt;/strong&gt; The global container for the organization&amp;rsquo;s entire SharePoint and OneDrive service.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Hub Sites:&lt;/strong&gt; The logical &amp;ldquo;connective tissue&amp;rdquo; used to group related site collections (e.g., &amp;ldquo;HR&amp;rdquo; or &amp;ldquo;Projects&amp;rdquo;) to provide shared navigation, branding, and a unified search scope.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Site Collections (The Administrative Unit):&lt;/strong&gt; These are the primary units of governance. Each collection is an independent boundary for permissions and features, categorized into two primary types:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Team Sites:&lt;/strong&gt; Group-connected sites backed by an M365 Group, designed for active internal collaboration with a shared mailbox and Teams integration.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Communication Sites:&lt;/strong&gt; Non-group-connected sites intended for broad broadcasting, such as an Intranet homepage or company news.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Resource Management:&lt;/strong&gt; Architecture is governed by tenant-level storage limits. Administrators should configure individual site quotas to prevent any single site collection from exhausting the tenant’s total allocation.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Document Libraries:&lt;/strong&gt; Containers within a site for storing files that can be configured with unique metadata, versioning, and sensitivity labels.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Folders &amp;amp; Files:&lt;/strong&gt; Individual items stored within libraries. Item-level permissions are possible but discouraged due to administrative overhead.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-permissions--access-control&#34;&gt;2. Permissions &amp;amp; Access Control &lt;a href=&#34;#2-permissions--access-control&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Governing access requires a balance between external collaboration needs and internal security guardrails.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.3) Microsoft Teams</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.3-microsoft-teams/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.3-microsoft-teams/</guid>
      <description>&lt;h2 id=&#34;1-microsoft-teams-hierarchy--architecture&#34;&gt;1. Microsoft Teams Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-microsoft-teams-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Microsoft Teams serves as a &amp;ldquo;logical wrapper&amp;rdquo; or frontend that aggregates data and services from across the Microsoft 365 ecosystem. It does not natively store its own data; instead, it relies on the following underlying architecture:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The M365 Group:&lt;/strong&gt; The foundational identity and access framework. Creating a Team automatically provisions an M365 Group, which provides a shared Exchange mailbox, calendar, and SharePoint site.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;SharePoint Online:&lt;/strong&gt; Stores all files uploaded within standard and private Team channels. Each Team is connected to a specific SharePoint Site Collection.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;OneDrive for Business:&lt;/strong&gt; Stores files shared during 1:1 or group chats.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Exchange Online:&lt;/strong&gt; Manages the Team calendar and stores &amp;ldquo;hidden&amp;rdquo; copies of all chat messages for compliance, eDiscovery, and search purposes.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;User Mailboxes:&lt;/strong&gt; Store copies of 1:1 chat and group chat messages.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;M365 Group Mailboxes:&lt;/strong&gt; Store copies of standard channel messages.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra ID:&lt;/strong&gt; Handles the core user identity, authentication, and the enforcement of naming and expiration policies.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-governance--lifecycle-management&#34;&gt;2. Governance &amp;amp; Lifecycle Management &lt;a href=&#34;#2-governance--lifecycle-management&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Provisioning Strategy:&lt;/strong&gt; Enterprise environments often disable self-service Team creation to prevent sprawl. A documented and functional provisioning workflow (e.g., via Power Automate or a custom app) is essential.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Naming Conventions:&lt;/strong&gt; Enforced via Entra ID (e.g., &lt;code&gt;[Department] - [Project Name]&lt;/code&gt;). Blocked word lists should be configured to prevent unauthorized use of terms like &amp;ldquo;HR&amp;rdquo; or &amp;ldquo;Payroll&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Lifecycle &amp;amp; Expiration:&lt;/strong&gt; Backed by M365 Groups. Expiration policies (e.g., 365 days) trigger renewal emails to owners. Orphaned Teams must have an escalation path for reassignment or archiving.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Archiving:&lt;/strong&gt; Preferred over deletion for compliance, archiving makes the SharePoint site read-only and freezes the chat.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-external-collaboration--access-types&#34;&gt;3. External Collaboration &amp;amp; Access Types &lt;a href=&#34;#3-external-collaboration--access-types&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;External Access (Federation):&lt;/strong&gt; Allows users to find, call, and chat with people in other M365 domains. It does not grant access to channels or files.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Guest Access:&lt;/strong&gt; Grants external users access to specific Teams, channels, and files via Entra External ID (B2B collaboration). It must be enabled at the Tenant, Group, and Site levels.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Shared Channels (B2B Direct Connect):&lt;/strong&gt; Allows sharing a single channel with external organizations without adding them as guests. This requires cross-tenant access settings in Entra ID for both inbound and outbound traffic.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-meeting-calling--device-policies&#34;&gt;4. Meeting, Calling, &amp;amp; Device Policies &lt;a href=&#34;#4-meeting-calling--device-policies&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Meeting Policies:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Lobby Management:&lt;/strong&gt; The safest default is &amp;ldquo;People in my organization&amp;rdquo; to ensure external users only bypass the lobby when explicitly desired.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Recording &amp;amp; Transcription:&lt;/strong&gt; Controlled via policies. Recordings are saved to OneDrive (for chats) or SharePoint (for channel meetings).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Telephony / Voice:&lt;/strong&gt; Connectivity models include Calling Plans, Operator Connect, or Direct Routing. Voice routing is traced via the Dial Plan, Voice Routing Policy, PSTN Usage, and Voice Route.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Resource Accounts:&lt;/strong&gt; Used for Auto Attendants and Call Queues. These require a &amp;ldquo;Microsoft Teams Shared Devices&amp;rdquo; or a free &amp;ldquo;Microsoft Teams Phone Resource Account&amp;rdquo; license.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-app-governance--management&#34;&gt;5. App Governance &amp;amp; Management &lt;a href=&#34;#5-app-governance--management&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Permission Policies:&lt;/strong&gt; Control which users can install specific apps. A common enterprise standard is blocking all third-party apps by default until they pass a security review.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Setup Policies:&lt;/strong&gt; Controls the &amp;ldquo;Left Rail&amp;rdquo; (app bar) layout. This is used to pin critical apps like Viva Connections or ServiceNow for specific departments.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-troubleshooting--diagnostics&#34;&gt;6. Troubleshooting &amp;amp; Diagnostics &lt;a href=&#34;#6-troubleshooting--diagnostics&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Call Quality Dashboard (CQD):&lt;/strong&gt; The primary tool for investigating audio/video issues like jitter or dropped calls.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&amp;ldquo;New Teams&amp;rdquo; Client (v2):&lt;/strong&gt; Built on WebView2 rather than Electron. To clear the cache, delete the contents in &lt;code&gt;%localappdata%\Packages\MSTeams_8wekyb3d8bbwe\LocalCache\Microsoft\MSTeams&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Teams Web App:&lt;/strong&gt; Using &lt;a href=&#34;https://teams.microsoft.com/v2/&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;https://teams.microsoft.com/v2/&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt; is the recommended first step to isolate client-side from tenant-side issues.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;7-essential-powershell-cmdlets-microsoftteams-module&#34;&gt;7. Essential PowerShell Cmdlets (MicrosoftTeams Module) &lt;a href=&#34;#7-essential-powershell-cmdlets-microsoftteams-module&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-MicrosoftTeams&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Team Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-Team -User user@domain.com&lt;/code&gt; (Finds all Teams a user belongs to).&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Set-Team -GroupId &amp;lt;ObjectID&amp;gt; -Visibility Private&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Policy Assignment:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Grant-CsTeamsMeetingPolicy -Identity user@domain.com -PolicyName &amp;quot;Restricted Meetings&amp;quot;&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Voice Configuration:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-CsOnlineUser -Identity user@domain.com | Format-List LineURI, EnterpriseVoiceEnabled, VoiceRoutingPolicy&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>1.3) The Escalation Framework</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.3-the-escalation-framework/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.3-the-escalation-framework/</guid>
      <description>&lt;h2 id=&#34;1-the-trigger-conditions&#34;&gt;1. The Trigger Conditions &lt;a href=&#34;#1-the-trigger-conditions&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Do not escalate simply because a problem is difficult; escalate because a boundary has been crossed. The four definitive triggers for escalating to the role owner are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Architecture/Security Boundary:&lt;/strong&gt; The solution requires bypassing a baseline Conditional Access policy, changing a tenant-wide sharing setting, or modifying global identity sync rules.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Financial Boundary:&lt;/strong&gt; The solution requires purchasing net-new licenses (e.g., Entra ID P2, Teams Premium, Power Apps Premium) or Azure consumption resources.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Systemic Outage:&lt;/strong&gt; A core service degradation affecting a significant portion of the environment (after verifying the Microsoft Service Health Dashboard).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Political Deadlock:&lt;/strong&gt; A highly-ranked stakeholder refuses the compliant alternative after you have clearly documented the technical and compliance risks.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-the-standardized-escalation-template&#34;&gt;2. The Standardized Escalation Template &lt;a href=&#34;#2-the-standardized-escalation-template&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Never forward a messy, 15-reply email chain to the role owner with a note saying &amp;ldquo;Thoughts?&amp;rdquo; Package the escalation into a concise, easily digestible format that forces a decision.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.4) Managing Ambiguity</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.4-managing-ambiguity/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/1.4-managing-ambiguity/</guid>
      <description>&lt;h2 id=&#34;1-the-consultants-mindset&#34;&gt;1. The Consultant&amp;rsquo;s Mindset &lt;a href=&#34;#1-the-consultants-mindset&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;In an enterprise, &amp;ldquo;lack of documentation&amp;rdquo; can be the default state, not an exception. You are being paid for your ability to operate in the gray.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Rule of Assumption:&lt;/strong&gt; Assume every bizarre, seemingly illogical configuration was put there for a specific, urgent business reason at the time. Do not tear down a fence until you know why it was built, see &lt;a href=&#34;https://www.google.com/search?q=Chesterton’s+Fence&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;Chesterton’s Fence&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Investigation over Escalation:&lt;/strong&gt; Never escalate a ticket to the role owner stating, &amp;ldquo;I don&amp;rsquo;t know what this does.&amp;rdquo; Escalate by stating, &amp;ldquo;I have traced this undocumented configuration to X, and it appears to impact Y. Should we decommission it?&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-forensic-discovery-your-hidden-documentation&#34;&gt;2. Forensic Discovery (Your &amp;ldquo;Hidden&amp;rdquo; Documentation) &lt;a href=&#34;#2-forensic-discovery-your-hidden-documentation&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;When SharePoint wikis and IT portals are empty, the Microsoft 365 backend logs become your source of truth.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1.4) Service-wide</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.4-service-wide/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/1.4-service-wide/</guid>
      <description>&lt;h2 id=&#34;1-the-m365-group-the-connective-tissue&#34;&gt;1. The M365 Group (The Connective Tissue) &lt;a href=&#34;#1-the-m365-group-the-connective-tissue&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Blast Radius:&lt;/strong&gt; M365 Groups are the underlying identity and access framework for modern collaboration. Creating a Group automatically provisions an Exchange Mailbox/Calendar, a SharePoint Team Site, a OneNote notebook, and a Planner plan. Adding Teams is an optional overlay.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Deletion &amp;amp; Recovery:&lt;/strong&gt; Deleting a Team or a Group-connected SharePoint site deletes the entire M365 Group and all associated data across every workload.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Soft-deleted groups can be restored within 30 days via the Entra ID portal or Exchange Admin Center.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Naming &amp;amp; Expiration Policies:&lt;/strong&gt; Administered centrally in Entra ID, these policies cascade down. If an M365 Group expires and is not renewed by the owner, all connected services (Teams, SharePoint, Exchange) are deleted.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-data-sync--propagation-delays-the-wait-24-hours-rule&#34;&gt;2. Data Sync &amp;amp; Propagation Delays (The &amp;ldquo;Wait 24 Hours&amp;rdquo; Rule) &lt;a href=&#34;#2-data-sync--propagation-delays-the-wait-24-hours-rule&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Identity Sync (Entra ID to M365):&lt;/strong&gt; Changes to user attributes (UPN, Name, Title) or Group memberships in Entra ID often take time to reflect across the ecosystem.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Exchange Online and SharePoint usually update within 15–60 minutes.&lt;/li&gt;&#xA;&lt;li&gt;The Microsoft Teams client relies heavily on local caching and can take up to 24–48 hours to fully reflect profile changes or new group access.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Search Indexing:&lt;/strong&gt; Newly uploaded files in SharePoint/OneDrive or newly created Teams channels are not instantly searchable. Microsoft Search relies on continuous background crawling. If an entire site is missing from search, you can request a re-index via SharePoint Site Settings, but execution time is governed by Microsoft&amp;rsquo;s backend load.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Offline Address Book (OAB):&lt;/strong&gt; For users running Outlook in Cached Exchange Mode, new hires or deleted users will not show up in the Global Address List immediately. Force an OAB download via the Outlook Send/Receive tab to isolate sync issues.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-microsoft-search--information-architecture&#34;&gt;3. Microsoft Search &amp;amp; Information Architecture &lt;a href=&#34;#3-microsoft-search--information-architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Security Trimming:&lt;/strong&gt; Microsoft Search (across Bing for Business, SharePoint, and Teams) is strictly security-trimmed. Users will &lt;em&gt;only&lt;/em&gt; see results for files and sites they have explicit permission to access. If a user complains they can&amp;rsquo;t find a document, it is almost always a permissions issue, not a search engine failure.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Oversharing Risks:&lt;/strong&gt; Because Search aggregates data across the tenant, poorly permissioned SharePoint sites or over-permissioned Teams channels (e.g., using &amp;ldquo;Everyone except external users&amp;rdquo;) will surface sensitive documents in routine employee searches.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Bookmarks &amp;amp; Q&amp;amp;A:&lt;/strong&gt; Managed via the M365 Admin Center (Search &amp;amp; Intelligence). Use these to promote official company resources (e.g., HR portals, IT Helpdesk) to the top of search results.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-licensing--service-plans&#34;&gt;4. Licensing &amp;amp; Service Plans &lt;a href=&#34;#4-licensing--service-plans&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;License Composition:&lt;/strong&gt; Enterprise licenses (E3/E5) are not monolithic; they are bundles of individual &amp;ldquo;Service Plans&amp;rdquo; (e.g., Exchange Online Plan 2, SharePoint Plan 2, Sway, Planner, Viva Insights).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Granular Troubleshooting:&lt;/strong&gt; If a user has an E3 license but cannot access Planner or Stream, check their specific license assignment in Entra ID or the M365 Admin Center. Individual service plans can be toggled off by administrators or group-based licensing policies.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Group-Based Licensing:&lt;/strong&gt; In an enterprise environment, licenses should never be assigned manually. They must be managed via Entra ID Security Groups. Troubleshooting missing licenses requires checking the user&amp;rsquo;s group membership and the licensing group&amp;rsquo;s assignment logs.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-essential-powershell-cmdlets-microsoft-graph&#34;&gt;5. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href=&#34;#5-essential-powershell-cmdlets-microsoft-graph&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;&lt;em&gt;The &lt;code&gt;MSOnline&lt;/code&gt; and &lt;code&gt;AzureAD&lt;/code&gt; modules are deprecated. &lt;code&gt;Microsoft Graph PowerShell&lt;/code&gt; is the required standard for cross-platform and identity management.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Key concepts of ISO 19011:2018 video</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso19011/key-concepts-of-iso-19011-video/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso19011/key-concepts-of-iso-19011-video/</guid>
      <description>&lt;p&gt;If you prefer a visual breakdown over reading through documentation, this 10-minute video is the fastest way to get up to speed. It covers the core pillars of ISO 19011:2018, including audit principles and program management, in a concise, easy-to-digest format.&lt;/p&gt;&#xA;&lt;iframe width=&#34;720&#34; height=&#34;405&#34; src=&#34;https://www.youtube.com/embed/zyv-BDthFRU?si=haj_cyjF3LtDBrce&#34; title=&#34;YouTube video player&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; allowfullscreen&gt;&lt;/iframe&gt;</description>
    </item>
    <item>
      <title>Overview of the ISO 27001 Clauses</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso27001/overview-of-clauses/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso27001/overview-of-clauses/</guid>
      <description>&lt;p&gt;The requirements for an organization&amp;rsquo;s Information Security Management System (ISMS) in ISO 27001 are outlined in Clauses 4 to 10. These clauses are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Context of the organization&lt;/li&gt;&#xA;&lt;li&gt;Leadership&lt;/li&gt;&#xA;&lt;li&gt;Planning&lt;/li&gt;&#xA;&lt;li&gt;Support&lt;/li&gt;&#xA;&lt;li&gt;Operation&lt;/li&gt;&#xA;&lt;li&gt;Performance evaluation&lt;/li&gt;&#xA;&lt;li&gt;Improvement&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The following is a brief description of each of these clauses.&lt;/p&gt;&#xA;&lt;h2 id=&#34;clause-4-context-of-the-organization&#34;&gt;Clause 4: Context of the organization &lt;a href=&#34;#clause-4-context-of-the-organization&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;An organization&amp;rsquo;s ISMS needs to document its purpose. It states requirements like:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;4.1)&lt;/strong&gt; The organization needs to identify internal and exteral issues relevant to it and it&amp;rsquo;s ability to have a successful ISMS.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;4.2 a)&lt;/strong&gt; The organization needs to identify stakeholders.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;4.2 b)&lt;/strong&gt; The organization needs to identify each stakeholder&amp;rsquo;s needs.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;4.3)&lt;/strong&gt; The scope of the ISMS needs to be defined based on the above and made available as documented information.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;clause-5-leadership&#34;&gt;Clause 5: Leadership &lt;a href=&#34;#clause-5-leadership&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;For an ISMS to be effective it needs support and commitment from top management. It states requirements like:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Scrum Table of Terms</title>
      <link>http://172.21.1.91:1313/docs/frameworks/scrum/table-of-terms/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/scrum/table-of-terms/</guid>
      <description>&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;Term&lt;/th&gt;&#xA;          &lt;th&gt;Definition&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Product&lt;/td&gt;&#xA;          &lt;td&gt;The output of the project, it is something of value that has clearly defined stakeholders, users and boundaries&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Product Goal&lt;/td&gt;&#xA;          &lt;td&gt;The future state of the Product, illustrating what the long-term goal of the Product is&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Product Backlog&lt;/td&gt;&#xA;          &lt;td&gt;An evolving and prioritised list of work items that need to be done on to fulfill the Product Goal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Definition of Done&lt;/td&gt;&#xA;          &lt;td&gt;The set of standards that the work on a Product Backlog item must meet to be considered complete&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Scrum Team&lt;/td&gt;&#xA;          &lt;td&gt;A small team of people working together on building the Product, working towards the Product Goal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Product Owner&lt;/td&gt;&#xA;          &lt;td&gt;The person accountable for the Product Backlog and ensuring the Product Goal is worked towards&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Scrum Master&lt;/td&gt;&#xA;          &lt;td&gt;The person who acting as the coach for the team helps makes sure everyone is working effectively under Scrum&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Developers&lt;/td&gt;&#xA;          &lt;td&gt;The people in the Scrum Team completing the work in the Product Backlog&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprints&lt;/td&gt;&#xA;          &lt;td&gt;Fixed-length blocks of work done on the Product to complete items from the Product Backlog&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprint Goal&lt;/td&gt;&#xA;          &lt;td&gt;A statement on why the current Sprint is valuable to stakeholders&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprint Backlog&lt;/td&gt;&#xA;          &lt;td&gt;The selected Product Backlog items for a given Sprint along with the Sprint Goal and the plan for getting the work done within the Sprint&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Increment&lt;/td&gt;&#xA;          &lt;td&gt;One or more &amp;ldquo;Done&amp;rdquo; work items that are a usable step towards the Product Goal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Scrum Events&lt;/td&gt;&#xA;          &lt;td&gt;Formal Scrum events that happen during every Sprint&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprint Planning&lt;/td&gt;&#xA;          &lt;td&gt;The first Scrum Event where the Scrum Team establishes the Sprint Goal and Sprint Backlog for the current Sprint&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Daily Scrum&lt;/td&gt;&#xA;          &lt;td&gt;A daily Scrum Event where the developers meet to review progress on the Sprint Goal and adapt the Sprint Backlog if required&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprint Review&lt;/td&gt;&#xA;          &lt;td&gt;The second last Scrum Event where the Scrum Team and the Product stakeholders meet to review Sprint outcomes and the progress towards Product Goal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;Sprint Retrospective&lt;/td&gt;&#xA;          &lt;td&gt;The last Scrum Event where the Scrum Team meet and review how the Sprint went&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;</description>
    </item>
    <item>
      <title>The 4 Dimensions of Service Management</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/the-4-dimensions/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/the-4-dimensions/</guid>
      <description>&lt;p&gt;The objective of an organization is to create value for its stakeholders, and this is achieved through the provisioning and consumption of services. To ensure that the Service Value System (SVS) functions properly and efficiently, organizations must consider all aspects of their behavior. In ITIL 4, these are represented by the Four Dimensions of Service Management.&lt;/p&gt;&#xA;&lt;p&gt;Failing to address all four dimensions adequately can result in services becoming undeliverable, or failing to meet expectations of quality or efficiency.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 7 Practices</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-practices/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-practices/</guid>
      <description>&lt;p&gt;The seven practices provide detailed guidance on &lt;em&gt;how&lt;/em&gt; the PRINCE2 principles should be put into practice. In earlier versions they were referred to as &amp;lsquo;Themes&amp;rsquo; but have been renamed to &amp;lsquo;Practices&amp;rsquo; to better reflect the need for their consistent application rather than being viewed as static topics. Like other elements of PRINCE2, the application of these practices should be tailored to the specific context and complexity of the project.&lt;/p&gt;&#xA;&lt;p&gt;These practices collectively form the control framework of PRINCE2. They are not merely areas of interest but active management disciplines through which the project manager and the Project Board ensure the project remains aligned with its objectives (Business Case, Quality, Plans), effectively manages uncertainty (Risk, Change), monitors performance against baselines (Progress), and maintains the necessary structure for governance (Organisation). They are the mechanisms that operationalize the principles and enable the structured control central to the PRINCE2 philosophy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2.1) Identity &amp; Access Fundamentals</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.1-identity-access-fundamentals/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.1-identity-access-fundamentals/</guid>
      <description>&lt;h2 id=&#34;1-identity-hierarchy--architecture&#34;&gt;1. Identity Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-identity-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Entra ID serves as the centralized identity control plane for the Microsoft 365 ecosystem.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Tenant:&lt;/strong&gt; The primary boundary for all identity objects and security configurations.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Identity Plane:&lt;/strong&gt; Manages the relationship between &lt;strong&gt;Users&lt;/strong&gt;, &lt;strong&gt;Devices&lt;/strong&gt;, and &lt;strong&gt;Applications&lt;/strong&gt; to determine access to resources like SharePoint, Teams, and Fabric.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Object Relationships:&lt;/strong&gt; Access is typically granted by adding Users or Devices to &lt;strong&gt;Groups&lt;/strong&gt;, which are then assigned permissions to specific resources or applications.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-users--devices-the-core-entities&#34;&gt;2. Users &amp;amp; Devices (The Core Entities) &lt;a href=&#34;#2-users--devices-the-core-entities&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;User Types:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Members:&lt;/strong&gt; Internal accounts, typically synced from on-premises AD, with full directory visibility.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Guests:&lt;/strong&gt; External users invited via B2B collaboration; they exist as guest objects in the directory.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Agents:&lt;/strong&gt; AI-driven identities assigned a unique &lt;strong&gt;Entra Agent ID&lt;/strong&gt; and their own dedicated M365 resources (Email, OneDrive).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Device States (Trust Signals):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra Registered:&lt;/strong&gt; Used for BYOD/personal devices; allows for Mobile Application Management (MAM) without full device control.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra Joined:&lt;/strong&gt; Cloud-native corporate devices fully managed via Intune.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Hybrid Entra Joined:&lt;/strong&gt; Legacy domain-joined devices synced from on-premises AD to Entra ID.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-the-group-ecosystem-logical-containers&#34;&gt;3. The Group Ecosystem (Logical Containers) &lt;a href=&#34;#3-the-group-ecosystem-logical-containers&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Distribution Lists (DLs):&lt;/strong&gt; Legacy, mail-flow only containers; they do not have a Security SID and cannot be used for resource permissions.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Security Groups:&lt;/strong&gt; The primary tool for assigning permissions and licenses; these are security-principals only and do not have an email address.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mail-Enabled Security Groups:&lt;/strong&gt; A &amp;ldquo;hybrid&amp;rdquo; container that possesses a Security SID for permissions and an email address for distribution. These are ideal for granting resource access while maintaining a single point of contact for notifications.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Microsoft 365 Groups:&lt;/strong&gt; The modern &amp;ldquo;connective tissue&amp;rdquo; that automatically provisions an Exchange mailbox, SharePoint site, and Teams overlay.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dynamic Groups:&lt;/strong&gt; Membership is automatically calculated based on user attributes (e.g., &lt;code&gt;JobTitle -eq &amp;quot;Manager&amp;quot;&lt;/code&gt;), ensuring access is updated as users move within the organization.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;source-of-authority-soa--management&#34;&gt;Source of Authority (SoA) &amp;amp; Management &lt;a href=&#34;#source-of-authority-soa--management&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h3&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Synced Groups:&lt;/strong&gt; If a group is synchronized from on-premises Active Directory, it &lt;strong&gt;cannot&lt;/strong&gt; be edited in Entra ID or the M365 Admin Center. All membership and attribute changes (like email aliases) must occur on-premises.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Cloud-Native Groups:&lt;/strong&gt; Created and managed entirely within the Entra ID portal or M365 Admin Center.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Writeback:&lt;/strong&gt; In hybrid environments, certain groups created in the cloud can be &amp;ldquo;written back&amp;rdquo; to on-premises AD if the specific synchronization feature is enabled.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-application-identity-app-reg-vs-enterprise-apps&#34;&gt;4. Application Identity: App Reg vs. Enterprise Apps &lt;a href=&#34;#4-application-identity-app-reg-vs-enterprise-apps&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Understanding the distinction between these two views of the same application is critical for security governance.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2.1) The Consultant Muscle</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.1-the-consultant-muscle/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.1-the-consultant-muscle/</guid>
      <description>&lt;h2 id=&#34;1-the-intake-framework-uncovering-the-why&#34;&gt;1. The Intake Framework (Uncovering the &amp;ldquo;Why&amp;rdquo;) &lt;a href=&#34;#1-the-intake-framework-uncovering-the-why&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Golden Rule:&lt;/strong&gt; Users ask for &lt;em&gt;solutions&lt;/em&gt; (e.g., &amp;ldquo;I need a custom Power Automate flow to break inheritance on 500 folders&amp;rdquo;). A good Consultant must uncover the &lt;em&gt;requirement&lt;/em&gt; (e.g., &amp;ldquo;We need to securely share specific documents with different external vendors&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Triage Questions:&lt;/strong&gt; Before reviewing any technical solution, establish:&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Data Classification:&lt;/strong&gt; What is the sensitivity of the data being handled? (Dictates the required Purview labels and sharing restrictions).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Audience &amp;amp; Lifecycle:&lt;/strong&gt; Who is the audience (Internal vs. B2B Guests), and when does this project end? (Dictates identity lifecycle and M365 Group expiration).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Supportability:&lt;/strong&gt; Who owns this when the project is over? If it requires custom code (e.g., SPFx, complex Power Apps), is there an internal developer team to maintain it?&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-evaluating-requests-against-existing-governance&#34;&gt;2. Evaluating Requests Against Existing Governance &lt;a href=&#34;#2-evaluating-requests-against-existing-governance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Strategy Alignment Check:&lt;/strong&gt; You are there to enforce the &lt;em&gt;existing&lt;/em&gt; strategy, not invent a new one. Filter requests through these baseline questions:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Is this out-of-the-box (OOTB)?&lt;/em&gt; Always default to native M365 capabilities before approving third-party apps or custom development.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Does it bypass security controls?&lt;/em&gt; (e.g., Requests for service accounts that bypass MFA, or requests to disable DLP for a specific executive).&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Does it scale?&lt;/em&gt; (e.g., Manually managing item-level permissions works for 10 files, but fails for 10,000. Pivot the user to a metadata-driven approach or separate Document Libraries).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-constructive-pushback-the-art-of-the-compliant-no&#34;&gt;3. Constructive Pushback (The Art of the Compliant &amp;ldquo;No&amp;rdquo;) &lt;a href=&#34;#3-constructive-pushback-the-art-of-the-compliant-no&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Framework (Acknowledge -&amp;gt; State Risk -&amp;gt; Provide Alternative):&lt;/strong&gt; Never issue a flat &amp;ldquo;No.&amp;rdquo;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Example Request:&lt;/em&gt; &amp;ldquo;We need a shared mailbox for 50 people.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Acknowledge:&lt;/em&gt; &amp;ldquo;I understand the team needs a central place to receive and manage these generic inquiries.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;State Risk:&lt;/em&gt; &amp;ldquo;However, adding 50 people to a single shared mailbox will cause severe Outlook performance issues, sync delays, and lacks an audit trail of who replied to what.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Provide Alternative:&lt;/em&gt; &amp;ldquo;To align with our M365 standards, we should set this up as a Microsoft Teams shared channel or a Group-connected Team site, which is designed for large-scale collaboration.&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Depersonalize the Decision:&lt;/strong&gt; Reference the policy, not your personal opinion. Use phrases like, &amp;ldquo;To align with the organization&amp;rsquo;s Zero Trust framework&amp;hellip;&amp;rdquo; or &amp;ldquo;Based on the enterprise M365 architectural guardrails&amp;hellip;&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-practical-translation-for-delivery-teams&#34;&gt;4. Practical Translation for Delivery Teams &lt;a href=&#34;#4-practical-translation-for-delivery-teams&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Avoid &amp;ldquo;Policy Parroting&amp;rdquo;:&lt;/strong&gt; Do not just send delivery teams a link to a 50-page governance PDF.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Provide the &amp;ldquo;How-To&amp;rdquo;:&lt;/strong&gt; Translate the governance into actionable, step-by-step configurations.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Bad:&lt;/em&gt; &amp;ldquo;Ensure your new SharePoint site complies with the external sharing policy.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Good:&lt;/em&gt; &amp;ldquo;When provisioning this site, you must run &lt;code&gt;Set-PnPTenantSite -SharingCapability ExistingExternalUserSharingOnly&lt;/code&gt; and assign the &amp;lsquo;Confidential&amp;rsquo; sensitivity label to the connected M365 Group.&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Standardized Templates:&lt;/strong&gt; If you notice delivery teams repeatedly asking the same questions, create a 1-page standard operating procedure (SOP) or a PowerShell snippet they can reuse.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>2.2) Identity Lifecycle</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.2-identity-lifecycle/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.2-identity-lifecycle/</guid>
      <description>&lt;h2 id=&#34;1-source-of-authority-soa--synchronization&#34;&gt;1. Source of Authority (SoA) &amp;amp; Synchronization &lt;a href=&#34;#1-source-of-authority-soa--synchronization&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Golden Rule of Hybrid:&lt;/strong&gt; In a directory-synchronized environment Active Directory (On-Premises) is the Source of Authority.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;You cannot edit synced attributes (Name, Manager, Department, ProxyAddresses) directly in Entra ID or the M365 Admin Center. You must modify them on-premises and wait for the sync (or force it).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sync Engines:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra Connect Sync (formerly AAD Connect):&lt;/strong&gt; The legacy/standard engine. Syncs every 30 minutes. Requires an on-premises server.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra Cloud Sync:&lt;/strong&gt; The modern, lightweight agent. Syncs every 2 minutes. Used for disconnected forests or simpler topologies.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Hard vs. Soft Match:&lt;/strong&gt; When resolving duplicate accounts, understand how Entra ID matches on-premises AD users to cloud users.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Soft Match:&lt;/strong&gt; Matches based on &lt;code&gt;UserPrincipalName&lt;/code&gt; or &lt;code&gt;Primary SMTP Address&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Hard Match:&lt;/strong&gt; Matches based on &lt;code&gt;SourceAnchor&lt;/code&gt; (usually the on-premises &lt;code&gt;ObjectGUID&lt;/code&gt; converted to a Base64 string called &lt;code&gt;ImmutableID&lt;/code&gt; in Entra).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-the-jml-process-joiners-movers-leavers&#34;&gt;2. The JML Process (Joiners, Movers, Leavers) &lt;a href=&#34;#2-the-jml-process-joiners-movers-leavers&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Joiners (Onboarding):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Flow:&lt;/strong&gt; HR System -&amp;gt; Active Directory -&amp;gt; Entra ID -&amp;gt; Licensing Group -&amp;gt; Mailbox/OneDrive Provisioned.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Licensing:&lt;/strong&gt; Never assign licenses directly to the user. Add the user to an Entra ID Security Group configured for Group-Based Licensing.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Pre-Provisioning:&lt;/strong&gt; M365 services (like Exchange and OneDrive) do not fully provision until the user is licensed &lt;em&gt;and&lt;/em&gt; the backend service registers the license. Do not panic if a mailbox isn&amp;rsquo;t instantly available after sync.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Movers (Transitions):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Accumulation:&lt;/strong&gt; The biggest security risk. When users change departments, they often retain their old access.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt; Rely on &lt;strong&gt;Dynamic Security Groups&lt;/strong&gt; based on the &lt;code&gt;Department&lt;/code&gt; or &lt;code&gt;Title&lt;/code&gt; attribute so access is automatically revoked when HR updates the title.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Leavers (Offboarding):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Standard Enterprise Workflow:&lt;/strong&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Reset password / scramble on-premises.&lt;/li&gt;&#xA;&lt;li&gt;Block Sign-in (Entra ID).&lt;/li&gt;&#xA;&lt;li&gt;Revoke active refresh tokens (Force Sign-out).&lt;/li&gt;&#xA;&lt;li&gt;Wipe corporate data from personal devices (Intune App Protection) or wipe corporate devices.&lt;/li&gt;&#xA;&lt;li&gt;Convert to Shared Mailbox and remove M365 license (to free up the license pool while retaining data).&lt;/li&gt;&#xA;&lt;li&gt;Move user to a disabled OU on-premises (which either syncs as disabled or drops them from sync, depending on scoping rules).&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-identity-governance--entitlement-management-requires-entra-id-p2&#34;&gt;3. Identity Governance &amp;amp; Entitlement Management (Requires Entra ID P2) &lt;a href=&#34;#3-identity-governance--entitlement-management-requires-entra-id-p2&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Packages:&lt;/strong&gt; Used to bundle resources (SharePoint sites, Teams, Entra Groups, Enterprise Apps) into a single requestable package.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Reviews:&lt;/strong&gt; Automated campaigns asking managers or resource owners to attest to whether users still need access to a specific group or application. Crucial for auditing privileged access.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Privileged Identity Management (PIM):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Standard users should have zero standing access to admin roles (e.g., Global Admin, Exchange Admin).&lt;/li&gt;&#xA;&lt;li&gt;PIM requires admins to &amp;ldquo;elevate&amp;rdquo; their access just-in-time (JIT) for a set duration (e.g., 4 hours), requiring MFA and a ticket number for auditing.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-dynamic-groups--attributes&#34;&gt;4. Dynamic Groups &amp;amp; Attributes &lt;a href=&#34;#4-dynamic-groups--attributes&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Rule Syntax:&lt;/strong&gt; Used heavily for automated licensing and app deployment.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Example:&lt;/em&gt; &lt;code&gt;(user.department -eq &amp;quot;Sales&amp;quot;) -and (user.accountEnabled -eq true)&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Processing Delay:&lt;/strong&gt; Dynamic group membership is not instant. In a large tenant, it can take anywhere from a few minutes to several hours to recalculate after an attribute change.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-essential-powershell-cmdlets-microsoft-graph&#34;&gt;5. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href=&#34;#5-essential-powershell-cmdlets-microsoft-graph&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-MgGraph -Scopes &amp;quot;User.ReadWrite.All&amp;quot;, &amp;quot;Directory.ReadWrite.All&amp;quot;&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Troubleshooting Sync/Attributes:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MgUser -UserId user@domain.com -Property OnPremisesSyncEnabled, OnPremisesImmutableId, UserPrincipalName&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Offboarding Actions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Update-MgUser -UserId user@domain.com -AccountEnabled:$false&lt;/code&gt; (Block Sign-in)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Revoke-MgUserSignInSession -UserId user@domain.com&lt;/code&gt; (Kills active sessions across all devices/apps)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Group Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MgGroup -Filter &amp;quot;groupTypes/any(c:c eq &#39;DynamicMembership&#39;)&amp;quot;&lt;/code&gt; (Lists all dynamic groups)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>2.2) Constructive Pushback</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.2-constructive-pushback/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.2-constructive-pushback/</guid>
      <description>&lt;h2 id=&#34;1-the-core-framework-ara&#34;&gt;1. The Core Framework (ARA) &lt;a href=&#34;#1-the-core-framework-ara&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;When pushing back against a misaligned request, never use a flat &amp;ldquo;No&amp;rdquo; or cite personal preference. Rely on the &lt;strong&gt;Acknowledge -&amp;gt; Risk -&amp;gt; Alternative (ARA)&lt;/strong&gt; framework to remain collaborative while strictly enforcing governance.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Acknowledge:&lt;/strong&gt; Validate the underlying business requirement. Users don&amp;rsquo;t want to break the rules; they just want to solve a workflow problem.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Risk (Objective):&lt;/strong&gt; Cite the specific enterprise constraint (Security, Governance, Scale, or Cost) that blocks their proposed solution. Depersonalize it (&amp;ldquo;The framework requires&amp;hellip;&amp;rdquo; not &amp;ldquo;I won&amp;rsquo;t let you&amp;hellip;&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Alternative (Compliant):&lt;/strong&gt; Pivot immediately to the native Microsoft 365 solution that solves their business problem within the guardrails.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-common-m365-scenarios--phrasing-templates&#34;&gt;2. Common M365 Scenarios &amp;amp; Phrasing Templates &lt;a href=&#34;#2-common-m365-scenarios--phrasing-templates&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Scenario A: The &amp;ldquo;VIP Exemption&amp;rdquo; Request&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>2.3) Conditional Access</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.3-conditional-access/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.3-conditional-access/</guid>
      <description>&lt;h2 id=&#34;1-architecture--core-concepts&#34;&gt;1. Architecture &amp;amp; Core Concepts &lt;a href=&#34;#1-architecture--core-concepts&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The CA Engine:&lt;/strong&gt; Conditional Access is the zero-trust policy engine of Entra ID. It evaluates &lt;em&gt;Signals&lt;/em&gt; (Who, What, Where, Risk), makes a &lt;em&gt;Decision&lt;/em&gt; (Block, Grant, Require MFA/Compliance), and applies &lt;em&gt;Enforcement&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Evaluation Logic:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Policies are evaluated &lt;em&gt;simultaneously&lt;/em&gt;, not hierarchically.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Block trumps all.&lt;/strong&gt; If Policy A grants access and Policy B blocks access, the user is blocked.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Licensing:&lt;/strong&gt; Requires Entra ID P1 (minimum) or P2 (for risk-based policies like Identity Protection).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-enterprise-baseline-policies-the-must-haves&#34;&gt;2. Enterprise Baseline Policies (The &amp;ldquo;Must-Haves&amp;rdquo;) &lt;a href=&#34;#2-enterprise-baseline-policies-the-must-haves&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Block Legacy Authentication:&lt;/strong&gt; Blocks protocols that cannot prompt for MFA (e.g., POP, IMAP, older Office clients). This is the single most critical security policy.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Require MFA for All Users:&lt;/strong&gt; Targets &amp;ldquo;All Users&amp;rdquo; and &amp;ldquo;All Cloud Apps&amp;rdquo;. (Always utilize exclusions for break-glass accounts).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Require MFA for Azure Management:&lt;/strong&gt; Specifically targets the &amp;ldquo;Microsoft Azure Management&amp;rdquo; app to protect the Azure Portal and PowerShell interfaces.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Device Compliance / Hybrid Joined:&lt;/strong&gt; For accessing sensitive apps (or all of M365), require the device to be marked as compliant in Intune OR be Hybrid Entra ID Joined.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Risk-Based Policies (If Entra ID P2 is active):&lt;/strong&gt; Require MFA or password change when User Risk or Sign-in Risk is detected as Medium/High.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-governance-exclusions--safety-nets&#34;&gt;3. Governance, Exclusions &amp;amp; Safety Nets &lt;a href=&#34;#3-governance-exclusions--safety-nets&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Emergency Access (&amp;ldquo;Break-Glass&amp;rdquo;) Accounts:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Create at least two cloud-only, highly privileged accounts (e.g., &lt;code&gt;bg-admin1@tenant.onmicrosoft.com&lt;/code&gt;).&lt;/li&gt;&#xA;&lt;li&gt;Exclude these accounts from &lt;em&gt;all&lt;/em&gt; Conditional Access policies to prevent tenant-wide lockouts if MFA or federation fails.&lt;/li&gt;&#xA;&lt;li&gt;Monitor these accounts aggressively via Log Analytics / Sentinel alerts.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Service Accounts &amp;amp; Exclusions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Never use &amp;ldquo;All Users&amp;rdquo; without a dedicated exclusion group (e.g., &lt;code&gt;CA-Exclusions-MFA&lt;/code&gt;).&lt;/li&gt;&#xA;&lt;li&gt;Service accounts that cannot perform MFA must be excluded but should be locked down via other signals (e.g., Named Locations / Trusted IPs).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Report-Only Mode:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Always&lt;/em&gt; deploy new CA policies in Report-Only mode first.&lt;/li&gt;&#xA;&lt;li&gt;Let it run for 7-14 days to monitor the Sign-in logs and ensure it doesn&amp;rsquo;t break legitimate business processes before flipping to &amp;ldquo;On&amp;rdquo;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-session-controls--granular-security&#34;&gt;4. Session Controls &amp;amp; Granular Security &lt;a href=&#34;#4-session-controls--granular-security&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sign-in Frequency:&lt;/strong&gt; Forces a user to re-authenticate after a specified period (e.g., 90 days for standard users, 1 hour for risky sign-ins or specific portal access).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Persistent Browser Session:&lt;/strong&gt; Controls whether users can remain signed in after closing and reopening their browser. Often set to &amp;ldquo;Never persistent&amp;rdquo; for shared devices.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;App Enforced Restrictions:&lt;/strong&gt; Integrates with SharePoint Online and Exchange Online to provide limited, web-only access (blocking downloads) when users log in from unmanaged (BYOD) devices.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Authentication Context:&lt;/strong&gt; Allows applying granular CA policies to specific data within an application. For example, requiring a fresh MFA claim only when a user attempts to access a highly sensitive SharePoint site, even if they are already signed into the tenant.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-sharepoint-content-protection--sam&#34;&gt;5. SharePoint Content Protection &amp;amp; SAM &lt;a href=&#34;#5-sharepoint-content-protection--sam&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;With the &lt;strong&gt;SharePoint Advanced Management (SAM)&lt;/strong&gt; license, Conditional Access can be extended to protect specific SharePoint content rather than the entire service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2.3) Advising</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.3-advising/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.3-advising/</guid>
      <description>&lt;h2 id=&#34;1-the-translation-framework-policy-vs-practice&#34;&gt;1. The Translation Framework (Policy vs. Practice) &lt;a href=&#34;#1-the-translation-framework-policy-vs-practice&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Delivery teams (Project Managers, Business Analysts, Developers) often view governance as a roadblock because it is written in abstract compliance terms. Your role is to serve as the translator.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Anti-Pattern:&lt;/strong&gt; &amp;ldquo;Your proposed solution violates the Data Handling Standard v2.4. Please revise.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Consultant Pattern:&lt;/strong&gt; &amp;ldquo;Because this project handles PII, the Data Handling Standard requires us to use a dedicated SharePoint site with the external sharing slider set to &amp;lsquo;New and Existing Guests,&amp;rsquo; combined with a 90-day access review policy. Here is how we configure that.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Goal:&lt;/strong&gt; Never make the delivery team guess what the compliant solution looks like.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-building-the-pre-approved-menu-architectural-patterns&#34;&gt;2. Building the &amp;ldquo;Pre-Approved Menu&amp;rdquo; (Architectural Patterns) &lt;a href=&#34;#2-building-the-pre-approved-menu-architectural-patterns&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;To avoid designing bespoke solutions for every request, mentally categorize M365 collaboration needs into standardized, pre-approved patterns. When advising, you are simply helping them select the right pattern from the menu.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2.4) Authentication</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.4-authentication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/2.4-authentication/</guid>
      <description>&lt;h2 id=&#34;1-hybrid-authentication-topologies&#34;&gt;1. Hybrid Authentication Topologies &lt;a href=&#34;#1-hybrid-authentication-topologies&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Password Hash Synchronization (PHS) + Seamless SSO:&lt;/strong&gt; The Microsoft-recommended standard for 90% of enterprises. Syncs a hash of the on-premises AD password hash to Entra ID. Provides cloud-auth resilience even if on-premises domain controllers go down.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Pass-Through Authentication (PTA):&lt;/strong&gt; Validates passwords directly against on-premises Active Directory via lightweight agents. Used when strict security policies prohibit any form of password hash leaving the on-premises network.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Federation (e.g., AD FS, Ping, Okta):&lt;/strong&gt; Entra ID redirects the authentication request to a third-party Identity Provider (IdP).&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Consultant Note:&lt;/em&gt; Many large organizations are actively migrating &lt;em&gt;away&lt;/em&gt; from AD FS to PHS/Seamless SSO to reduce infrastructure overhead and mitigate on-premises vulnerabilities.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-mfa--modern-authentication-methods&#34;&gt;2. MFA &amp;amp; Modern Authentication Methods &lt;a href=&#34;#2-mfa--modern-authentication-methods&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Authentication Methods Policy:&lt;/strong&gt; Microsoft has deprecated the legacy per-user MFA portal and legacy SSPR policies. All authentication methods must be managed centrally via the &lt;strong&gt;Entra ID &amp;gt; Security &amp;gt; Authentication methods&lt;/strong&gt; blade.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Method Hierarchy (Weakest to Strongest):&lt;/strong&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;em&gt;SMS / Voice Call:&lt;/em&gt; Highly susceptible to SIM swapping. Strongly advocate for deprecation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Microsoft Authenticator (Push):&lt;/em&gt; &lt;strong&gt;Number Matching&lt;/strong&gt; is now mandatory globally to prevent MFA fatigue attacks.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Phishing-Resistant MFA:&lt;/em&gt; FIDO2 Security Keys (YubiKey) and Windows Hello for Business (WHfB). The gold standard for privileged administrative accounts.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;System-Preferred Multifactor Authentication:&lt;/strong&gt; Enable this tenant-wide. If a user has both SMS and the Authenticator app registered, Entra ID will automatically prompt them with the most secure method available.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-self-service-password-reset-sspr--registration&#34;&gt;3. Self-Service Password Reset (SSPR) &amp;amp; Registration &lt;a href=&#34;#3-self-service-password-reset-sspr--registration&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Combined Registration:&lt;/strong&gt; Users register for both MFA and SSPR in a single workflow (&lt;code&gt;aka.ms/mfasetup&lt;/code&gt;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;SSPR Configuration:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Targeting:&lt;/strong&gt; Target a specific Entra ID Security Group before rolling out to &amp;ldquo;All Users.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Methods Required:&lt;/strong&gt; The enterprise standard is requiring &lt;strong&gt;2 methods&lt;/strong&gt; to reset a password (e.g., Authenticator App + Mobile App Code).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Password Writeback:&lt;/strong&gt; If the organization is hybrid (using Entra Connect), Password Writeback must be enabled in the sync engine so cloud resets are written back to on-premises Active Directory.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-legacy-authentication-a-prime-attack-vector&#34;&gt;4. Legacy Authentication (A Prime Attack Vector) &lt;a href=&#34;#4-legacy-authentication-a-prime-attack-vector&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;What it is:&lt;/strong&gt; Older protocols (POP3, IMAP4, SMTP Auth, older Office 2013 clients) that cannot interpret Modern Authentication (OAuth 2.0) and therefore bypass MFA.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Remediation:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Exchange Online has disabled Basic Auth at the tenant level, but it can still be a risk in other areas.&lt;/li&gt;&#xA;&lt;li&gt;Explicitly block legacy auth via Conditional Access.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Exception:&lt;/em&gt; SMTP Auth is often still required for on-premises multi-function printers or legacy application relay. Restrict SMTP Auth to specific service accounts and lock those accounts down by IP address in Conditional Access.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-troubleshooting--diagnostics&#34;&gt;5. Troubleshooting &amp;amp; Diagnostics &lt;a href=&#34;#5-troubleshooting--diagnostics&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sign-in Logs (The Source of Truth):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Interactive vs. Non-Interactive:&lt;/strong&gt; Interactive means the user physically typed a password or clicked an MFA prompt. Non-interactive means a client app used a refresh token to get a new access token seamlessly.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Common Error Codes to Memorize:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;50126:&lt;/strong&gt; Invalid username or password (Check if the password recently changed on-premises and hasn&amp;rsquo;t synced, or if PTA agents are down).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;500121:&lt;/strong&gt; User didn&amp;rsquo;t complete the MFA prompt (This error can appear if the user hasn&amp;rsquo;t completed setting up MFA).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;50074:&lt;/strong&gt; Strong authentication is required and the user did not pass the MFA challenge (A Conditional Access policy may have blocked the seamless token and forced an interactive MFA prompt).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;For more:&lt;/strong&gt; &lt;a href=&#34;https://learn.microsoft.com/en-us/entra/identity-platform/reference-error-codes&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;https://learn.microsoft.com/en-us/entra/identity-platform/reference-error-codes&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra ID Protection (Risk-Based Auth):&lt;/strong&gt; If the tenant has Entra ID P2, users flagged with &amp;ldquo;High User Risk&amp;rdquo; (e.g., leaked credentials found on the dark web) can be forced to securely reset their password via SSPR before logging in.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-microsoft-graph&#34;&gt;6. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href=&#34;#6-essential-powershell-cmdlets-microsoft-graph&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-MgGraph -Scopes &amp;quot;UserAuthenticationMethod.ReadWrite.All&amp;quot;, &amp;quot;AuditLog.Read.All&amp;quot;&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Manage User Authentication Methods:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MgUserAuthenticationMethod -UserId user@domain.com&lt;/code&gt; (Lists registered methods)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;New-MgUserAuthenticationPhoneMethod -UserId user@domain.com -phoneType &amp;quot;mobile&amp;quot; -phoneNumber &amp;quot;+1 5555555555&amp;quot;&lt;/code&gt; (Pre-populate phone numbers for users, though Authenticator app is preferred).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Troubleshooting Password Sync:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MgUser -UserId user@domain.com -Property LastPasswordChangeDateTime&lt;/code&gt; (Check when Entra ID thinks the password was last changed).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>2.4) RAID/RAAIDD Logs</title>
      <link>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.4-raid-raaidd-logs/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/consulting/cheatsheet/2.4-raid-raaidd-logs/</guid>
      <description>&lt;h2 id=&#34;1-the-definitions&#34;&gt;1. The Definitions &lt;a href=&#34;#1-the-definitions&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;RAID (Project Baseline):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Risk:&lt;/strong&gt; Potential future events that could negatively impact the project (e.g., &amp;ldquo;The upcoming Microsoft API deprecation might break the custom script&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Action:&lt;/strong&gt; Immediate tasks or activities required to maintain momentum.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Issue:&lt;/strong&gt; Current, active blockers that are preventing progress (e.g., &amp;ldquo;The production sync is currently failing&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Decision:&lt;/strong&gt; Formal choices made by stakeholders (e.g., &amp;ldquo;The Steering Committee approved the use of PHS over PTA&amp;rdquo;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;RAAIDD (The Enterprise Expansion):&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Assumption:&lt;/strong&gt; Facts or conditions taken as true without immediate proof (e.g., &amp;ldquo;Assuming all user devices are already Hybrid-Joined&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dependency:&lt;/strong&gt; External factors the project requires to succeed (e.g., &amp;ldquo;The Intune rollout depends on the network team opening firewall port 443&amp;rdquo;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-raid-logs-as-a-consultants-shield&#34;&gt;2. RAID Logs as a Consultant’s &amp;ldquo;Shield&amp;rdquo; &lt;a href=&#34;#2-raid-logs-as-a-consultants-shield&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Decision Tracking:&lt;/strong&gt; Every time a stakeholder chooses a non-standard or &amp;ldquo;Option B&amp;rdquo; path (see 2.3), it must be logged. This creates an audit trail that prevents the Consultant from being held liable for security or performance issues resulting from that choice.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Managing Assumptions:&lt;/strong&gt; As a contractor, you often operate with limited initial data. Explicitly logging Assumptions (e.g., &amp;ldquo;Assuming the client has E5 licenses for this Purview feature&amp;rdquo;) allows you to immediately flag a &lt;strong&gt;Risk&lt;/strong&gt; or &lt;strong&gt;Issue&lt;/strong&gt; if that assumption is later proven false.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Impact of Dependencies:&lt;/strong&gt; In the M365 ecosystem, dependencies are often external (e.g., the Microsoft roadmap or third-party IdPs). Highlighting these early ensures the project timeline reflects reality, not just the delivery team&amp;rsquo;s optimism.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-m365-specific-raid-examples&#34;&gt;3. M365 Specific RAID Examples &lt;a href=&#34;#3-m365-specific-raid-examples&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Risk:&lt;/strong&gt; &amp;ldquo;Users might experience Outlook sync delays during the first 48 hours of the shared mailbox migration.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Issue:&lt;/strong&gt; &amp;ldquo;Conditional Access Policy &amp;lsquo;CA001&amp;rsquo; is blocking legitimate logins from the New York office.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Assumption:&lt;/strong&gt; &amp;ldquo;Assuming the on-premises Active Directory schema is at the minimum required version for Entra Connect.&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dependency:&lt;/strong&gt; &amp;ldquo;Completion of the Exchange Hybrid setup is dependent on the firewall team publishing the on-premises EWS endpoint.&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-best-practices-for-maintenance&#34;&gt;4. Best Practices for Maintenance &lt;a href=&#34;#4-best-practices-for-maintenance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Centralization:&lt;/strong&gt; Never keep the log in a private document. Use a &lt;strong&gt;Microsoft List&lt;/strong&gt; within the project’s Team site to ensure real-time visibility and collaborative ownership.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Weekly Rhythm:&lt;/strong&gt; Review the log during every status meeting. Focus on converting &lt;strong&gt;Risks&lt;/strong&gt; into &lt;strong&gt;Actions&lt;/strong&gt; (mitigation) and closing &lt;strong&gt;Issues&lt;/strong&gt; to prevent them from becoming &lt;strong&gt;Decisions&lt;/strong&gt; (accepting the status quo).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Handover Value:&lt;/strong&gt; A comprehensive RAID log is the single most important artifact for a clean offboarding. It ensures the role owner understands not just &lt;em&gt;what&lt;/em&gt; is configured, but the historical context of the risks that were identified and the decisions that were made.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-essential-tools-for-raid-management&#34;&gt;5. Essential Tools for RAID Management &lt;a href=&#34;#5-essential-tools-for-raid-management&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Microsoft Lists:&lt;/strong&gt; The industry standard for RAID logs. Use the &amp;ldquo;Issue Tracker&amp;rdquo; template as a baseline and customize it with &amp;ldquo;Decision&amp;rdquo; and &amp;ldquo;Risk&amp;rdquo; columns.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Microsoft Planner:&lt;/strong&gt; Ideal for the &lt;strong&gt;Action&lt;/strong&gt; and &lt;strong&gt;Issue&lt;/strong&gt; portions of the log to assign specific tasks to delivery team members with due dates.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Power BI:&lt;/strong&gt; For large-scale enterprise projects, use Power BI to visualize the &amp;ldquo;Risk Heatmap&amp;rdquo; and &amp;ldquo;Issue Aging&amp;rdquo; to report to executive stakeholders.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Overview of the ISO 27001 Controls</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso27001/overview-of-controls/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso27001/overview-of-controls/</guid>
      <description>&lt;p&gt;The Controls, listed in Annex A of ISO 27001 fall into the four groups which are derived from and aligned with Clauses 5 to 8. They are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Organisational controls&lt;/li&gt;&#xA;&lt;li&gt;People controls&lt;/li&gt;&#xA;&lt;li&gt;Physical controls&lt;/li&gt;&#xA;&lt;li&gt;Technological controls&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The following is a brief overview of controls in these groups.&lt;/p&gt;&#xA;&lt;h2 id=&#34;5-organisational-controls&#34;&gt;5) Organisational controls &lt;a href=&#34;#5-organisational-controls&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;This group consists of 37 controls designed to enable effective management of information security risks. It includes controls related to risk management, incident response planning, information security policies, and the clear definition and assignment of roles and responsibilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Scrum in relation to Agile</title>
      <link>http://172.21.1.91:1313/docs/frameworks/scrum/in-relation-to-agile/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/scrum/in-relation-to-agile/</guid>
      <description>&lt;p&gt;It is important to know that Scrum is an implementation of Agile principles. While Scrum is indeed a framework (a structured approach with defined roles, artifacts, and processes) Agile however is not. Agile is more of an ideology to adopt and as such, it&amp;rsquo;s not something that you &amp;ldquo;do&amp;rdquo;, but instead Agile shapes the way that you &amp;ldquo;do&amp;rdquo;.&lt;/p&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s a link to &lt;a href=&#34;https://agilemanifesto.org/&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;the official Agile Manifesto&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt;. There is not much to it, just 4 values and 12 principles.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 7 Processes</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-processes/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/the-7-processes/</guid>
      <description>&lt;p&gt;Each process is designed to achieve a specific objective, taking defined inputs (information or products) and transforming them through a series of activities into defined outputs. These processes provide the framework within which the PRINCE2 principles are upheld and the themes are actively applied. There are seven distinct processes in the PRINCE2 model.&lt;/p&gt;&#xA;&lt;p&gt;The flow between these processes follows a logical progression, often visualized in process model diagrams. A typical project starts pre-project, moves into Starting Up a Project (SU), which triggers Directing a Project (DP) by the Project Board. DP authorizes Initiating a Project (IP). Once initiated, the project moves into delivery stages, cycling between Controlling a Stage (CS) and Managing Product Delivery (MP), with Managing a Stage Boundary (SB) occurring between stages. Finally, Closing a Project (CP) concludes the lifecycle. Detailed diagrams sometimes use color-coding to indicate frequency: blue for processes run once per project (like SU, IP, CP), green for once per stage (like SB), and orange/red for processes run multiple times within a stage (like CS, MP, DP activities).&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Service Value System (SVS)</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/service-value-system/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/service-value-system/</guid>
      <description>&lt;p&gt;The ITIL Service Value System (SVS) represents how the various components and activities of the organization work together to facilitate value creation through IT-enabled services. It maps how demand and opportunity are transformed into tangible value for stakeholders.&lt;/p&gt;&#xA;&lt;p&gt;The SVS ensures that the organization continually co-creates value with all stakeholders through the use and management of products and services. The key inputs to the SVS are &lt;strong&gt;opportunity&lt;/strong&gt; and &lt;strong&gt;demand&lt;/strong&gt;, and the output of the SVS is &lt;strong&gt;value&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The seven principles of auditing</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso19011/seven-principles-of-auditing/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso19011/seven-principles-of-auditing/</guid>
      <description>&lt;p&gt;The seven principles of auditing are:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Integrity&lt;/strong&gt;: the foundation of professionalism.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;Auditors and those managing audit programmes should perform their work ethically, honestly and responsibly. They should only undertake activities if competent to do so. They should work in an impartial manner and be on the look out for influences that may affect their judgement.&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;&lt;strong&gt;Fair presentation&lt;/strong&gt;: the obligation to report truthfully and accurately.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;The findings of an audit should truthfully and accurately represent what was witnessed during the audit. When a bad example was witnessed, was that in contrast to 10 good examples or 100? Significant obstacles and diverging opinions between the audit team and the entity being audited should be reported.&lt;/p&gt;</description>
    </item>
    <item>
      <title>3.1) Data Loss Prevention</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.1-data-loss-prevention/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.1-data-loss-prevention/</guid>
      <description>&lt;h2 id=&#34;1-deployment-strategy-the-crawl-walk-run-approach&#34;&gt;1. Deployment Strategy (The &amp;ldquo;Crawl, Walk, Run&amp;rdquo; Approach) &lt;a href=&#34;#1-deployment-strategy-the-crawl-walk-run-approach&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Never Start in Enforcement:&lt;/strong&gt; Implementing a block policy on day one will halt business operations and generate immediate escalations. Always follow the phased rollout:&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Test it out (Audit Only):&lt;/strong&gt; Silently gathers data to show you the baseline of what users are sharing.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Test it out with Policy Tips:&lt;/strong&gt; Audits the data but displays a warning to the user (e.g., &amp;ldquo;This email contains sensitive data&amp;rdquo;), educating them without blocking the action.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Turn it on right away (Enforcement):&lt;/strong&gt; Actively blocks or encrypts the data.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Scoping:&lt;/strong&gt; Policies should ideally be scoped to specific locations (Exchange, SharePoint, OneDrive, Teams, Endpoints). Avoid massive &amp;ldquo;All Locations&amp;rdquo; policies with complex rules, as they are notoriously difficult to troubleshoot.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-classifying-the-data-what-are-we-protecting&#34;&gt;2. Classifying the Data (What are we protecting?) &lt;a href=&#34;#2-classifying-the-data-what-are-we-protecting&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sensitive Information Types (SITs):&lt;/strong&gt; Microsoft provides hundreds of out-of-the-box SITs.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Local Contexts:&lt;/em&gt; For example, if you are Australian, familiarize yourself with &lt;strong&gt;Australia Tax File Number (TFN)&lt;/strong&gt;, &lt;strong&gt;Australia Medicare Number&lt;/strong&gt;, and &lt;strong&gt;Australia Passport Number&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Custom SITs:&lt;/em&gt; Built using Regular Expressions (Regex) + Keywords + Proximity (e.g., finding a 9-digit number &lt;em&gt;within 50 characters&lt;/em&gt; of the word &amp;ldquo;Account&amp;rdquo;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Exact Data Match (EDM):&lt;/strong&gt; Used to prevent false positives. Instead of looking for &lt;em&gt;any&lt;/em&gt; credit card, EDM hashes an export of your actual customer database and only triggers a block if it sees a credit card belonging to a known customer.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Trainable Classifiers:&lt;/strong&gt; Machine learning models trained on hundreds of sample documents to recognize a &lt;em&gt;type&lt;/em&gt; of document (e.g., Source Code, Resumes, Legal Agreements) regardless of specific keywords.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-policy-rules--the-user-experience&#34;&gt;3. Policy Rules &amp;amp; The User Experience &lt;a href=&#34;#3-policy-rules--the-user-experience&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Conditions &amp;amp; Exceptions:&lt;/strong&gt; The most common enterprise condition is: &lt;code&gt;Content contains [SIT]&lt;/code&gt; AND &lt;code&gt;Content is shared [Outside my organization]&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Confidence Levels &amp;amp; Instance Counts:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;High Confidence:&lt;/strong&gt; Requires the data pattern, a keyword, and validation (like a checksum).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Instance Count:&lt;/strong&gt; Set thresholds. (e.g., 1-4 credit cards = send a warning. 5+ credit cards = hard block and alert the security team).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;User Overrides &amp;amp; Business Justifications:&lt;/strong&gt; When moving to enforcement, configuring &amp;ldquo;Allow user to override&amp;rdquo; is critical. It shifts the liability to the user. They must type a reason (e.g., &amp;ldquo;Approved by client&amp;rdquo;) which is logged for the compliance team, preventing the IT Helpdesk from becoming a bottleneck.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-endpoint-dlp-securing-the-local-device&#34;&gt;4. Endpoint DLP (Securing the Local Device) &lt;a href=&#34;#4-endpoint-dlp-securing-the-local-device&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Onboarding:&lt;/strong&gt; Devices must be onboarded to Microsoft Purview (usually done silently via Intune configuration profiles) to read endpoint signals.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Capabilities:&lt;/strong&gt; Endpoint DLP extends protection beyond the browser. It allows you to block users from:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Copying sensitive files to USB drives.&lt;/li&gt;&#xA;&lt;li&gt;Printing sensitive documents.&lt;/li&gt;&#xA;&lt;li&gt;Copying sensitive text to the clipboard.&lt;/li&gt;&#xA;&lt;li&gt;Uploading files to unsanctioned cloud storage (e.g., blocking upload to personal Google Drive via Edge/Chrome).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-alerts-triage--permissions&#34;&gt;5. Alerts, Triage &amp;amp; Permissions &lt;a href=&#34;#5-alerts-triage--permissions&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Role-Based Access Control (RBAC):&lt;/strong&gt; Being a Global Admin or SharePoint Admin does &lt;em&gt;not&lt;/em&gt; grant you access to read the contents of a DLP violation. You must be explicitly assigned the &lt;strong&gt;Compliance Data Administrator&lt;/strong&gt; or &lt;strong&gt;Information Protection Investigator&lt;/strong&gt; role to view the source item in the Content Explorer.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Alert Fatigue:&lt;/strong&gt; Bundle alerts to prevent overwhelming the SOC. Configure rules to send an alert only when a specific volume is reached (e.g., &amp;ldquo;Send an alert when 5 activities occur within 60 minutes&amp;rdquo;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-exchangeonlinemanagement--security--compliance&#34;&gt;6. Essential PowerShell Cmdlets (ExchangeOnlineManagement / Security &amp;amp; Compliance) &lt;a href=&#34;#6-essential-powershell-cmdlets-exchangeonlinemanagement--security--compliance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;Note: You must connect to the Security &amp;amp; Compliance center specifically, which is nested within the Exchange module.&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-IPPSSession&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Policy Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-DlpCompliancePolicy&lt;/code&gt; (Lists the high-level policies)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-DlpComplianceRule&lt;/code&gt; (Lists the granular rules nested inside the policies)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-DlpSensitiveInformationType -Identity &amp;quot;Australia Tax File Number (TFN)&amp;quot;&lt;/code&gt; (View the configuration of a specific SIT)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>3.2) Information Protection</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.2-information-protection/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.2-information-protection/</guid>
      <description>&lt;h2 id=&#34;1-information-protection-hierarchy-the-classification-engine&#34;&gt;1. Information Protection Hierarchy (The Classification Engine) &lt;a href=&#34;#1-information-protection-hierarchy-the-classification-engine&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Microsoft Purview Information Protection relies on a structured hierarchy to identify, classify, and protect data from the ground up.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Level 1: Sensitive Information Types (SITs) &amp;amp; Classifiers:&lt;/strong&gt; The &amp;ldquo;What.&amp;rdquo; These are the technical definitions used to identify sensitive data.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;SITs:&lt;/strong&gt; Patterns like credit card numbers or tax file numbers identified via Regex and keywords.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Trainable Classifiers:&lt;/strong&gt; Machine learning models that recognize document types (e.g., contracts or source code) based on their overall structure.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Level 2: Sensitivity Labels:&lt;/strong&gt; The &amp;ldquo;Definition.&amp;rdquo; This layer defines what happens to the data (e.g., encryption, watermarking). Labels are the metadata tags that users see and apply.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Level 3: Label Policies:&lt;/strong&gt; The &amp;ldquo;Who and How.&amp;rdquo; Policies are used to publish labels to specific users or groups.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Label Publishing:&lt;/strong&gt; Makes labels visible for manual application.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Auto-labeling:&lt;/strong&gt; Automatically applies labels based on the SITs or Classifiers found in the content.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-taxonomy--deployment-strategy&#34;&gt;2. Taxonomy &amp;amp; Deployment Strategy &lt;a href=&#34;#2-taxonomy--deployment-strategy&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Taxonomy:&lt;/strong&gt; An enterprise should have a simple, universally understood taxonomy, typically consisting of four to five tiers: &lt;em&gt;Public&lt;/em&gt;, &lt;em&gt;General/Internal&lt;/em&gt;, &lt;em&gt;Confidential&lt;/em&gt;, and &lt;em&gt;Highly Confidential&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Default Labels:&lt;/strong&gt; Applying a default label (e.g., &lt;em&gt;General/Internal&lt;/em&gt;) to all new emails and documents is the most effective way to baseline tenant security.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mandatory Labeling:&lt;/strong&gt; Forcing users to choose a label before saving or sending data. This requires users to actively categorize their work.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-item-level-vs-container-level-labels&#34;&gt;3. Item-Level vs. Container-Level Labels &lt;a href=&#34;#3-item-level-vs-container-level-labels&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Item-Level Labels:&lt;/strong&gt; Applied directly to a file (Word, Excel, PDF) or an email. The protection—such as encryption or watermarks—travels with the file regardless of its location.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Container-Level Labels:&lt;/strong&gt; Applied to M365 Groups, Teams, or SharePoint Sites.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;They &lt;strong&gt;do not&lt;/strong&gt; automatically encrypt the files inside.&lt;/li&gt;&#xA;&lt;li&gt;They control &lt;strong&gt;container settings&lt;/strong&gt;: Privacy (Public vs. Private), External Guest Access, and Unmanaged Device Access (e.g., web-only access).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Default Library Labels:&lt;/strong&gt; A SharePoint Document Library setting that acts as a &amp;ldquo;bridge,&amp;rdquo; automatically applying an &lt;strong&gt;Item-Level&lt;/strong&gt; label to any new or edited file within that specific library.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-encryption--access-control-azure-rms&#34;&gt;4. Encryption &amp;amp; Access Control (Azure RMS) &lt;a href=&#34;#4-encryption--access-control-azure-rms&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Azure Rights Management (RMS):&lt;/strong&gt; When a label applies encryption, the document is wrapped in Azure RMS, requiring users to authenticate against Entra ID to open it.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Granular Permissions:&lt;/strong&gt; Admins can define specific rights, such as View Only, Edit, Print, or Copy.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Co-Authoring:&lt;/strong&gt; To allow multiple users to edit encrypted documents simultaneously in SharePoint or OneDrive, &amp;ldquo;Co-authoring for files with sensitivity labels&amp;rdquo; must be enabled at the tenant level.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-auto-labeling-requires-e5--purview-premium&#34;&gt;5. Auto-Labeling (Requires E5 / Purview Premium) &lt;a href=&#34;#5-auto-labeling-requires-e5--purview-premium&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Client-Side Auto-Labeling:&lt;/strong&gt; Real-time recommendations or automatic application as a user types sensitive information into Word or Outlook.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Service-Side Auto-Labeling:&lt;/strong&gt; A background process that scans data at rest in SharePoint, OneDrive, and Exchange.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Constraint:&lt;/strong&gt; This process can only handle a maximum of 25,000 files per day per tenant, making it unsuitable for instant remediation of massive legacy migrations.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-troubleshooting--client-behavior&#34;&gt;6. Troubleshooting &amp;amp; Client Behavior &lt;a href=&#34;#6-troubleshooting--client-behavior&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Built-in Labeling:&lt;/strong&gt; Organizations must use the native labeling capabilities built into M365 Apps; the legacy AIP unified labeling client is deprecated.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sync Delays:&lt;/strong&gt; New or updated labels can take up to 24 hours to appear in desktop applications. Users can force a sync by clearing the local cache in &lt;code&gt;%localappdata%\Microsoft\Office\CLP&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;PDF Support:&lt;/strong&gt; Native M365 apps and Adobe Acrobat support reading and applying labels to PDF files.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;7-essential-powershell-cmdlets-security--compliance&#34;&gt;7. Essential PowerShell Cmdlets (Security &amp;amp; Compliance) &lt;a href=&#34;#7-essential-powershell-cmdlets-security--compliance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-IPPSSession&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Label &amp;amp; Policy Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-Label&lt;/code&gt;: Lists all sensitivity labels.&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-LabelPolicy&lt;/code&gt;: Lists all published policies.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;File Diagnostics:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Unlock-SPOSensitivityLabelEncryptedFile&lt;/code&gt;: Allows a compliance admin to strip encryption from a file if the original owner has left the company.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>3.3) Data Lifecycle</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.3-data-lifecycle/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/3.3-data-lifecycle/</guid>
      <description>&lt;h2 id=&#34;1-the-core-mechanisms-policies-vs-labels&#34;&gt;1. The Core Mechanisms: Policies vs. Labels &lt;a href=&#34;#1-the-core-mechanisms-policies-vs-labels&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;&lt;em&gt;This is another critical distinction to explain to stakeholders, similar to Information Protection.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Retention Policies:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Applied at the &lt;strong&gt;container level&lt;/strong&gt; (e.g., an entire Exchange mailbox, a SharePoint site, all Teams chats).&lt;/li&gt;&#xA;&lt;li&gt;Broad and invisible to the end user.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Example:&lt;/em&gt; &amp;ldquo;Retain all employee OneDrive data for 7 years after they leave, then silently delete it.&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Retention Labels:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Applied at the &lt;strong&gt;item level&lt;/strong&gt; (a specific Word document or email).&lt;/li&gt;&#xA;&lt;li&gt;Visible to the user (can be selected from a dropdown in Office apps).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Records Management:&lt;/strong&gt; Labels can declare a document as a &amp;ldquo;Record.&amp;rdquo; Once marked as a Record, the document is locked and cannot be edited or deleted by &lt;em&gt;anyone&lt;/em&gt; (including Global Admins) until the retention period expires.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-the-principles-of-retention-the-conflict-engine&#34;&gt;2. The Principles of Retention (The Conflict Engine) &lt;a href=&#34;#2-the-principles-of-retention-the-conflict-engine&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;&lt;em&gt;In an enterprise, a single document might be subject to multiple conflicting policies (e.g., a 7-year HR retain policy, but a 3-year IT auto-delete policy). &lt;a href=&#34;https://learn.microsoft.com/en-us/purview/retention-flowchart&#34; rel=&#34;external&#34; target=&#34;_blank&#34;&gt;Microsoft uses a strict hierarchy to resolve this&lt;svg width=&#34;16&#34; height=&#34;16&#34; viewBox=&#34;0 0 24 24&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z&#34;/&gt;&lt;/svg&gt;&lt;/a&gt;:&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Documented information requirements for ISO 27001</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso27001/documented-information/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso27001/documented-information/</guid>
      <description>&lt;p&gt;The term &amp;quot;Documented information&amp;quot; is used within ISO 27001:2022 27 times. There is no one correct way to manage your documented information but the following are some key documents you would be expected to maintain.&lt;/p&gt;&#xA;&lt;table class=&#34;collapse-1280&#34;&gt;&#xD;&#xA;&lt;thead&gt;&#xD;&#xA;&lt;tr&gt;&lt;td style=&#34;min-width:100px&#34;&gt;Document&lt;/td&gt;&lt;td&gt;Description&lt;/td&gt;&lt;td&gt;Notes&lt;/td&gt;&lt;/tr&gt;&#xD;&#xA;&lt;/thead&gt;&#xD;&#xA;&lt;tbody&gt;&#xD;&#xA;&lt;tr&gt;&#xD;&#xA;&#x9;&lt;td class=&#34;bold-1280&#34;&gt;ISMS Manual&lt;/td&gt;&#xD;&#xA;&#x9;&lt;td&gt;A document for defining the scope of the ISMS, who relevant stakeholders are, their needs, and who is responsible for what within the ISMS.&lt;/td&gt;&#xD;&#xA;&#x9;&lt;td&gt;&#xD;&#xA;&#x9;&#x9;&lt;p&gt;This is ideal for holding documented information pertaining to:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Project Roles and Responsibilities</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/roles-and-responsibilities/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/roles-and-responsibilities/</guid>
      <description>&lt;p&gt;In PRINCE2 a single individual might hold multiple roles (especially in smaller projects), or a single role might be shared by several people, provided accountability is clear and conflicts of interest are avoided. The primary goal is absolute clarity on who is responsible for what, ensuring effective decision-making and communication within a structured framework.&lt;/p&gt;&#xA;&lt;h2 id=&#34;project-management-team-structure&#34;&gt;Project Management Team Structure &lt;a href=&#34;#project-management-team-structure&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;PRINCE2 typically defines four levels within and around the project management structure:&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 34 Management Practices</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/management-practices/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/management-practices/</guid>
      <description>&lt;p&gt;In previous versions of ITIL, the framework heavily emphasized &amp;ldquo;processes.&amp;rdquo; ITIL 4 shifted this focus to &lt;strong&gt;Management Practices&lt;/strong&gt;. A practice is defined as a set of organizational resources designed for performing work or accomplishing an objective. This change reflects the fact that delivering services requires more than just a process flow; it requires considering all Four Dimensions of Service Management (People, Information/Technology, Partners, and Value Streams/Processes).&lt;/p&gt;&#xA;&lt;p&gt;The 34 ITIL management practices are grouped into three distinct categories:&lt;/p&gt;</description>
    </item>
    <item>
      <title>The audit process for ISO 19011</title>
      <link>http://172.21.1.91:1313/docs/frameworks/iso19011/audit-process/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/iso19011/audit-process/</guid>
      <description>&lt;h2 id=&#34;stage-1-initiate-the-audit&#34;&gt;Stage 1: Initiate the audit &lt;a href=&#34;#stage-1-initiate-the-audit&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Before doing anything else a team leader needs to be appointed to own and run the audit process. With the team leader chosen the audit team needs to reach out to the client to understand the context of the auditee. At a minimum the following needs to be established:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;The objective: Why is the audit being done?&lt;/li&gt;&#xA;&lt;li&gt;The scope: What are the boundaries of the audit? (e.g. are only specific locations or specific activities being audited?)&lt;/li&gt;&#xA;&lt;li&gt;The criteria: What requirements are the team auditing against?&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Before starting the audit get confirmation in writing that the above has been approved by upper management.&lt;/p&gt;</description>
    </item>
    <item>
      <title>4.1) Defender for Office 365</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.1-defender-for-office-365/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.1-defender-for-office-365/</guid>
      <description>&lt;h2 id=&#34;1-safe-links--safe-attachments-the-core-shields&#34;&gt;1. Safe Links &amp;amp; Safe Attachments (The Core Shields) &lt;a href=&#34;#1-safe-links--safe-attachments-the-core-shields&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Safe Links:&lt;/strong&gt; Provides time-of-click verification of URLs in emails, Teams messages, and Office apps.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;URL Rewriting:&lt;/strong&gt; URLs are wrapped in a Microsoft prefix. If a site is later identified as malicious, the user is blocked from visiting even if they click the link hours or days after receipt.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Advanced Settings:&lt;/strong&gt; Ensure &amp;ldquo;Wait for URL scanning to complete before delivering the message&amp;rdquo; is enabled for high-security environments.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Safe Attachments:&lt;/strong&gt; Uses a virtual sandbox environment (detonation chamber) to open attachments and check for malicious behavior before delivery.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dynamic Delivery:&lt;/strong&gt; The recommended setting for user experience. It delivers the body of the email immediately with a placeholder attachment while scanning occurs, replacing the placeholder once the file is cleared.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Block vs. Replace:&lt;/strong&gt; Avoid &amp;ldquo;Monitor&amp;rdquo; in production; use &amp;ldquo;Block&amp;rdquo; to prevent delivery entirely or &amp;ldquo;Replace&amp;rdquo; to deliver the message without the malicious file.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-anti-phishing--impersonation-protection&#34;&gt;2. Anti-Phishing &amp;amp; Impersonation Protection &lt;a href=&#34;#2-anti-phishing--impersonation-protection&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Impersonation Detection:&lt;/strong&gt; Specifically protects high-profile users (C-Suite) and internal domains.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;User Impersonation:&lt;/strong&gt; Protects against look-alike names (e.g., &amp;ldquo;John Doe&amp;rdquo; using a personal Gmail account).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Domain Impersonation:&lt;/strong&gt; Protects against look-alike domains (e.g., &lt;code&gt;cont0so.com&lt;/code&gt; vs &lt;code&gt;contoso.com&lt;/code&gt;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Mailbox Intelligence:&lt;/strong&gt; Uses AI to learn a user&amp;rsquo;s frequent contacts. It triggers alerts if an email arrives from a sender who looks like a frequent contact but is not.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Safety Tips:&lt;/strong&gt; Enable visual cues in Outlook (e.g., &amp;ldquo;This sender is new to you&amp;rdquo; or impersonation warnings) to provide real-time user education.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-automated-investigation-and-response-air&#34;&gt;3. Automated Investigation and Response (AIR) &lt;a href=&#34;#3-automated-investigation-and-response-air&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Playbook:&lt;/strong&gt; When a high-confidence phish or malware is detected, Defender can trigger an automated investigation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Investigation Steps:&lt;/strong&gt; The system automatically analyzes the message, identifies other recipients of the same &amp;ldquo;campaign,&amp;rdquo; and checks if the user clicked the link or downloaded the file.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Remediation Actions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Pending Approval:&lt;/strong&gt; AIR will suggest actions (e.g., &amp;ldquo;Soft delete 15 messages,&amp;rdquo; &amp;ldquo;Block the sender,&amp;rdquo; &amp;ldquo;Reset user&amp;rsquo;s password&amp;rdquo;).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-threat-explorer--campaign-discovery&#34;&gt;4. Threat Explorer &amp;amp; Campaign Discovery &lt;a href=&#34;#4-threat-explorer--campaign-discovery&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Threat Explorer:&lt;/strong&gt; The primary hunting tool. Use it to search for all emails from a specific sender IP, sender domain, or containing a specific URL/File Hash.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Campaign Views:&lt;/strong&gt; Aggregates individual phishing attempts into &amp;ldquo;Campaigns.&amp;rdquo; This allows you to see the scope of an attack and determine if it was targeted (spear-phishing) or a broad broadcast.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Message Header Analysis:&lt;/strong&gt; Accessible directly within the portal. Check the &lt;code&gt;X-MS-Exchange-Organization-PCL&lt;/code&gt; (Probability Level) and &lt;code&gt;SCL&lt;/code&gt; (Spam Confidence Level) to determine why a message was or wasn&amp;rsquo;t blocked.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-attack-simulation-training&#34;&gt;5. Attack Simulation Training &lt;a href=&#34;#5-attack-simulation-training&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Purpose:&lt;/strong&gt; Proactively test user vulnerability to phishing.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Templates:&lt;/strong&gt; Use real-world harvested payloads (e.g., &amp;ldquo;Password Reset,&amp;rdquo; &amp;ldquo;HR Policy Update&amp;rdquo;) to simulate attacks.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Outcome-Based Learning:&lt;/strong&gt; Automatically assign mandatory training modules (e.g., &amp;ldquo;How to spot a phish&amp;rdquo;) to users who fail the simulation by clicking or providing credentials.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-security--compliance&#34;&gt;6. Essential PowerShell Cmdlets (Security &amp;amp; Compliance) &lt;a href=&#34;#6-essential-powershell-cmdlets-security--compliance&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-IPPSSession&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Safe Links Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-SafeLinksPolicy&lt;/code&gt; (Lists policies)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-SafeLinksRule&lt;/code&gt; (Lists the scoping/priorities of the rules)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Safe Attachment Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-SafeAttachmentPolicy&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-SafeAttachmentRule&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Investigative Cmdlets:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MalwareFilterPolicy&lt;/code&gt; (Review the anti-malware settings)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-PhishFilterPolicy&lt;/code&gt; (Review impersonation and anti-phish settings)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>4.2) Defender for Endpoint (MDE)</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.2-defender-for-endpoint-mde/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.2-defender-for-endpoint-mde/</guid>
      <description>&lt;h2 id=&#34;1-onboarding--sensor-health&#34;&gt;1. Onboarding &amp;amp; Sensor Health &lt;a href=&#34;#1-onboarding--sensor-health&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Onboarding Methods:&lt;/strong&gt; In an enterprise environment, use Intune (Configuration Profiles) or Group Policy for automated deployment. Local scripts are available for testing but should be avoided for production scale.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sensor Health Monitoring:&lt;/strong&gt; Regularly check the &amp;ldquo;Device Inventory&amp;rdquo; for devices in an &amp;ldquo;Inactive&amp;rdquo; or &amp;ldquo;No sensor data&amp;rdquo; state. This usually indicates connectivity blocks to MDE backend URLs or the &lt;code&gt;SENSE&lt;/code&gt; service being disabled.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Offboarding Governance:&lt;/strong&gt; When a device is decommissioned, it must be offboarded to prevent it from negatively impacting the organization&amp;rsquo;s exposure score. Note that offboarding scripts have a 30-day expiration period for security reasons.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-attack-surface-reduction-asr&#34;&gt;2. Attack Surface Reduction (ASR) &lt;a href=&#34;#2-attack-surface-reduction-asr&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;ASR Rules:&lt;/strong&gt; Implement rules to close common entry points for malware (e.g., &amp;ldquo;Block credential stealing from the Windows local security authority subsystem&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Phased Rollout:&lt;/strong&gt; Always deploy ASR rules in &lt;strong&gt;Audit Mode&lt;/strong&gt; first. Use the &amp;ldquo;Attack Surface Reduction&amp;rdquo; report in the Defender portal to identify potential business-critical software that would be blocked before switching to &lt;strong&gt;Enforcement Mode&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Exclusions:&lt;/strong&gt; Manage ASR exclusions at the policy level rather than globally to maintain a tight security posture.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-vulnerability-management-tvm&#34;&gt;3. Vulnerability Management (TVM) &lt;a href=&#34;#3-vulnerability-management-tvm&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Exposure Score:&lt;/strong&gt; Monitor this real-time metric to understand the organization&amp;rsquo;s current risk level relative to the threat landscape.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Security Recommendations:&lt;/strong&gt; Focus on &amp;ldquo;Top Security Recommendations&amp;rdquo; which are prioritized based on active exploits in the wild and the business impact on the tenant.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Software Inventory:&lt;/strong&gt; Use the inventory to track end-of-life (EOL) software and missing patches across Windows, macOS, and Linux endpoints.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-detection--response-edr&#34;&gt;4. Detection &amp;amp; Response (EDR) &lt;a href=&#34;#4-detection--response-edr&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Alert Triage:&lt;/strong&gt; MDE correlates related alerts into a single &lt;strong&gt;Incident&lt;/strong&gt;, providing a full story of the attack chain. Prioritize incidents over individual alerts.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Live Response:&lt;/strong&gt; A command-line console used to remotely collect forensic data, run scripts, or remediate threats on a compromised endpoint in real-time.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Automation Levels:&lt;/strong&gt; Configure &amp;ldquo;Device Groups&amp;rdquo; with specific automation levels (e.g., &amp;ldquo;Full - remediate threats automatically&amp;rdquo;) to allow AIR (Automated Investigation and Response) to resolve known threats without manual intervention.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-next-generation-protection-antivirus&#34;&gt;5. Next-Generation Protection (Antivirus) &lt;a href=&#34;#5-next-generation-protection-antivirus&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Cloud-Delivered Protection:&lt;/strong&gt; Must be enabled to provide near-instant protection against new and emerging malware that hasn&amp;rsquo;t been seen by local signatures yet.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Tamper Protection:&lt;/strong&gt; A critical tenant-wide setting that prevents malicious apps (or local admins) from disabling Microsoft Defender antivirus or EDR sensors.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-windows-defender-module&#34;&gt;6. Essential PowerShell Cmdlets (Windows Defender Module) &lt;a href=&#34;#6-essential-powershell-cmdlets-windows-defender-module&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Client Status:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MpComputerStatus&lt;/code&gt; (Verify if real-time protection and MDE sensor are active)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Configuration Review:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MpPreference&lt;/code&gt; (View current exclusions and scan schedules)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Diagnostic Logging:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MpThreatDetection&lt;/code&gt; (Review a history of threats detected on the local machine)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connectivity Troubleshooting:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Start-Process &amp;quot;C:\Program Files\Windows Defender\MpCmdRun.exe&amp;quot; -ArgumentList &amp;quot;-ValidateEdgeConnectivity&amp;quot;&lt;/code&gt; (Validates that the device can reach MDE cloud service endpoints)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>4.3) Defender for Cloud Apps (CASB)</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.3-defender-for-cloud-apps-casb/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.3-defender-for-cloud-apps-casb/</guid>
      <description>&lt;h2 id=&#34;1-cloud-discovery--shadow-it&#34;&gt;1. Cloud Discovery &amp;amp; Shadow IT &lt;a href=&#34;#1-cloud-discovery--shadow-it&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Discovery Logs:&lt;/strong&gt; Ingest traffic logs from network firewalls, proxies, or Defender for Endpoint to identify which cloud apps are being used across the organization.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Risk Score:&lt;/strong&gt; Each discovered app is assigned a score (1–10) based on over 90 risk factors (e.g., regulatory compliance like GDPR/HIPAA, data encryption at rest, and legal terms).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sanctioning vs. Unsanctioning:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Sanctioned:&lt;/strong&gt; Apps approved for corporate use; often integrated via API for deeper visibility.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Unsanctioned:&lt;/strong&gt; Apps explicitly blocked. Integration with Defender for Endpoint allows for automatic blocking of these URLs on managed devices.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-conditional-access-app-control-session-controls&#34;&gt;2. Conditional Access App Control (Session Controls) &lt;a href=&#34;#2-conditional-access-app-control-session-controls&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Reverse Proxy:&lt;/strong&gt; Redirects user traffic through Defender for Cloud Apps in real-time when accessing web applications. This is triggered via a Conditional Access policy with the &amp;ldquo;Use Conditional Access App Control&amp;rdquo; session setting.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Real-Time Actions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Block Download:&lt;/strong&gt; Allow users to view sensitive data in the browser but prevent them from downloading it to an unmanaged device.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Protect on Download:&lt;/strong&gt; Automatically apply a Purview sensitivity label (encryption) to a file as it is downloaded from a cloud app.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Monitor Activity:&lt;/strong&gt; Log every action taken within a third-party app (e.g., Salesforce, AWS, or Slack) for audit purposes.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-app-governance--oauth-permissions&#34;&gt;3. App Governance &amp;amp; OAuth Permissions &lt;a href=&#34;#3-app-governance--oauth-permissions&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;OAuth App Inventory:&lt;/strong&gt; Tracks which third-party applications have been granted permissions to access M365 data (e.g., &amp;ldquo;Read your mail&amp;rdquo; or &amp;ldquo;Access your files&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Permission Triage:&lt;/strong&gt; Identify &amp;ldquo;high-privilege&amp;rdquo; apps that have not been used in 90 days or apps from unverified publishers.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;App Governance Add-on:&lt;/strong&gt; Provides advanced machine learning to detect anomalous app behavior, such as an app suddenly downloading a massive volume of data or sending thousands of emails.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-information-protection--dlp-integration&#34;&gt;4. Information Protection &amp;amp; DLP Integration &lt;a href=&#34;#4-information-protection--dlp-integration&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;API Connectors:&lt;/strong&gt; Connect Defender for Cloud Apps directly to third-party clouds (Google Workspace, Box, Dropbox) to scan for sensitive data at rest.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;File Policies:&lt;/strong&gt; Create policies to automatically apply sensitivity labels or remove public sharing links if a file containing PII is detected in a non-Microsoft cloud environment.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Unified Labels:&lt;/strong&gt; Defender for Cloud Apps natively reads Microsoft Purview sensitivity labels, ensuring a consistent data protection policy regardless of where the file is stored.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-threat-detection--anomaly-policies&#34;&gt;5. Threat Detection &amp;amp; Anomaly Policies &lt;a href=&#34;#5-threat-detection--anomaly-policies&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Impossible Travel:&lt;/strong&gt; Detects when a user signs in from two geographically distant locations in a timeframe that is physically impossible.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Ransomware Detection:&lt;/strong&gt; Identifies patterns of high-volume file deletions or encryptions within cloud storage.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Activity Policies:&lt;/strong&gt; Custom alerts for specific administrative actions, such as &amp;ldquo;Multiple failed login attempts to a sanctioned app&amp;rdquo; or &amp;ldquo;Creation of a new global admin in a third-party cloud.&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell-cmdlets-microsoft-graph--api&#34;&gt;6. Essential PowerShell Cmdlets (Microsoft Graph &amp;amp; API) &lt;a href=&#34;#6-essential-powershell-cmdlets-microsoft-graph--api&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;em&gt;Note: Most CASB management is performed via the portal or the Cloud App Security API. Management via the Microsoft Graph PowerShell SDK is the modern standard for automation.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>4.4) Defender for Identity &amp; XDR</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.4-defender-for-identity-and-xdr/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/4.4-defender-for-identity-and-xdr/</guid>
      <description>&lt;h2 id=&#34;1-microsoft-defender-xdr-signal-correlation-architecture&#34;&gt;1. Microsoft Defender XDR Signal Correlation Architecture &lt;a href=&#34;#1-microsoft-defender-xdr-signal-correlation-architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Microsoft Defender XDR acts as a unified &amp;ldquo;brain&amp;rdquo; that correlates raw signals from individual workloads into a cohesive security narrative.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Signal Sources:&lt;/strong&gt; Isolated alerts and telemetry are gathered from &lt;strong&gt;Defender for Endpoint (MDE)&lt;/strong&gt;, &lt;strong&gt;Defender for Office 365 (MDO)&lt;/strong&gt;, &lt;strong&gt;Defender for Identity (MDI)&lt;/strong&gt;, and &lt;strong&gt;Defender for Cloud Apps (MDA)&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Correlation Engine:&lt;/strong&gt; These signals are fed into a central engine that uses AI and machine learning to group related alerts into a single &lt;strong&gt;Incident&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Incident Storytelling:&lt;/strong&gt; This process transforms hundreds of individual alerts into a chronological &amp;ldquo;story&amp;rdquo; of an attack, such as a phishing email (MDO) leading to a compromised user (MDI) who then performs lateral movement (MDE) and data exfiltration (MDA).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Signal Sharing:&lt;/strong&gt; Enabling XDR integration allows different products to share risk levels; for instance, a &amp;ldquo;High Risk&amp;rdquo; device identified by MDE can automatically trigger a block in Entra ID via Conditional Access.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-defender-for-identity-mdi--on-premises-security&#34;&gt;2. Defender for Identity (MDI) &amp;amp; On-Premises Security &lt;a href=&#34;#2-defender-for-identity-mdi--on-premises-security&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Sensor:&lt;/strong&gt; Installed directly on Domain Controllers and AD FS servers to parse network traffic (RPC, LDAP, Kerberos) and Windows Events.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Detection Categories:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Reconnaissance:&lt;/strong&gt; Enumeration of users/groups and DNS or SMB sessions.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Lateral Movement:&lt;/strong&gt; Pass-the-Ticket, Pass-the-Hash, and malicious service creation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Domain Dominance:&lt;/strong&gt; Skeleton Key, Golden Ticket, and Malicious Data Protection API (DPAPI) requests.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Identity Security Posture (ISPM):&lt;/strong&gt; Integrated into Microsoft Secure Score to identify vulnerabilities like NTLMv1, unsecure account attributes, and clear-text password exposures.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-automated-investigation-and-response-air&#34;&gt;3. Automated Investigation and Response (AIR) &lt;a href=&#34;#3-automated-investigation-and-response-air&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Cross-Product Playbooks:&lt;/strong&gt; When an incident triggers, AIR executes playbooks that can simultaneously quarantine an email, isolate a device, and disable a compromised user.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Evidence &amp;amp; Entity Center:&lt;/strong&gt; Provides a unified list of files, processes, URLs, and accounts involved, allowing for &amp;ldquo;one-click&amp;rdquo; remediation across the environment.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Action Center:&lt;/strong&gt; The single pane of glass used to approve or audit all automated remediation actions.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-advanced-hunting-kql&#34;&gt;4. Advanced Hunting (KQL) &lt;a href=&#34;#4-advanced-hunting-kql&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Schema:&lt;/strong&gt; Use Kusto Query Language (KQL) to query raw data across all workloads.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;IdentityLogonEvents&lt;/code&gt;: Tracks all authentication attempts across on-prem and cloud.&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;IdentityDirectoryEvents&lt;/code&gt;: Tracks changes to AD objects like group memberships or password resets.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Proactive Hunting:&lt;/strong&gt; Used to search for &amp;ldquo;Indicators of Attack&amp;rdquo; (IoA) that have not yet triggered a formal alert.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-microsoft-sentinel-integration&#34;&gt;5. Microsoft Sentinel Integration &lt;a href=&#34;#5-microsoft-sentinel-integration&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;SIEM/SOAR Connection:&lt;/strong&gt; Sentinel provide the broad view across the entire enterprise, including firewalls and multi-vendor logs.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Defender XDR Connector:&lt;/strong&gt; A bi-directional sync ensuring that closing an incident in Sentinel also closes it in the Defender portal, and vice versa.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-essential-powershell--diagnostic-tools&#34;&gt;6. Essential PowerShell &amp;amp; Diagnostic Tools &lt;a href=&#34;#6-essential-powershell--diagnostic-tools&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;MDI Sensor Management:&lt;/strong&gt; &lt;code&gt;Test-MdiSensorApiConnection.ps1&lt;/code&gt; (bundled with the sensor) validates connectivity from the DC to the MDI cloud service.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;KQL Query Example:&lt;/strong&gt;&#xA;&#xA;&#xA;    &#xA;    &lt;pre tabindex=&#34;0&#34;&gt;&lt;code class=&#34;language-kql&#34; data-lang=&#34;kql&#34;&gt;// Find users who had a failed logon followed by a successful one from a different IP&#xD;&#xA;IdentityLogonEvents&#xD;&#xA;| where ActionType == &amp;#34;LogonFailed&amp;#34;&#xD;&#xA;| join kind=inner (IdentityLogonEvents | where ActionType == &amp;#34;LogonSuccess&amp;#34;) on AccountObjectId&#xD;&#xA;| where IPAddress != IPAddress1&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Health Monitoring:&lt;/strong&gt; Monitor the portal for &amp;ldquo;Packet fragmentation&amp;rdquo; or &amp;ldquo;Dropped events&amp;rdquo; which indicate a DC is overloaded or the sensor is misconfigured.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Continual Improvement</title>
      <link>http://172.21.1.91:1313/docs/frameworks/itil/continual-improvement/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/itil/continual-improvement/</guid>
      <description>&lt;p&gt;Just as project management frameworks require tailoring to fit the environment, ITIL 4 recognizes that IT service management cannot be static. Organizations must continually adopt and adapt the framework, their services, and their operating models to meet evolving business demands, technological advancements, and external pressures. This adaptability is driven by the concept of &lt;strong&gt;Continual Improvement&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Continual Improvement happens at all levels of the organization, from strategic executive decisions down to the operational activities of individual teams. It applies to all Four Dimensions of Service Management and all activities within the Service Value Chain.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tailoring PRINCE2</title>
      <link>http://172.21.1.91:1313/docs/frameworks/prince2/tailoring/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/frameworks/prince2/tailoring/</guid>
      <description>&lt;h2 id=&#34;why-tailor&#34;&gt;Why Tailor? &lt;a href=&#34;#why-tailor&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;The primary reason for tailoring is to ensure that the project management method applied is appropriate for the project&amp;rsquo;s specific circumstances. Applying the full PRINCE2 methodology rigidly, without adaptation (&amp;lsquo;robotically&amp;rsquo;), can lead to unnecessary bureaucracy, especially for smaller or simpler projects. Conversely, insufficient application on complex or high-risk projects can lead to a loss of control. Tailoring aims to strike the right balance, providing adequate governance and control without overburdening the project team, thus making the application of PRINCE2 efficient and relevant.&lt;/p&gt;</description>
    </item>
    <item>
      <title>5.1) Microsoft Intune (Endpoint Management)</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.1-microsoft-intune/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.1-microsoft-intune/</guid>
      <description>&lt;h2 id=&#34;1-intune-architecture--service-flow&#34;&gt;1. Intune Architecture &amp;amp; Service Flow &lt;a href=&#34;#1-intune-architecture--service-flow&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Microsoft Intune is a cloud-based service that relies on the integration of identity, policy, and local device agents to manage endpoints.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Intune Service (Cloud):&lt;/strong&gt; The central management engine where administrators define configuration, compliance, and application policies.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Entra ID (Identity):&lt;/strong&gt; Serves as the source of truth for the device object. Every managed device must have a record in Entra ID to receive policies based on user or group membership.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;MDM Channel:&lt;/strong&gt; The native communication path (Ovirt/WNS) used by the OS to receive standard configuration profiles and compliance checks.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Intune Management Extension (IME):&lt;/strong&gt; A local sidecar service installed on Windows devices to handle complex tasks the native MDM channel cannot, such as Win32 app deployments and PowerShell scripts.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Service Flow:&lt;/strong&gt; The device initiates a check-in → Intune evaluates applicable policies → settings are delivered via the MDM channel or IME → the device executes the settings and reports success or failure back to the portal.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-compliance-vs-configuration-policies&#34;&gt;2. Compliance vs. Configuration Policies &lt;a href=&#34;#2-compliance-vs-configuration-policies&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Compliance Policies:&lt;/strong&gt; These define the &amp;ldquo;security floor&amp;rdquo; for a device, such as requiring BitLocker or a specific OS version.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Signal:&lt;/strong&gt; Compliance status is a critical signal sent to Entra ID.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Conditional Access Integration:&lt;/strong&gt; If a device is marked non-compliant, Conditional Access can automatically block access to M365 data until the issue is resolved.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Configuration Profiles:&lt;/strong&gt; The primary tool for managing granular settings, often referred to as the &amp;ldquo;GPO of the cloud&amp;rdquo;.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Settings Catalog:&lt;/strong&gt; The modern interface for configuring thousands of settings across Windows, macOS, and iOS.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Conflict Resolution:&lt;/strong&gt; If two profiles attempt to set the same value differently, the setting enters a &amp;ldquo;Conflict&amp;rdquo; state and is not applied. Compliance policies do not &amp;ldquo;conflict&amp;rdquo; in this way; any single failure marks the whole device non-compliant.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-device-enrollment--windows-autopilot&#34;&gt;3. Device Enrollment &amp;amp; Windows Autopilot &lt;a href=&#34;#3-device-enrollment--windows-autopilot&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Enrollment Spectrum:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;BYOD (Registered):&lt;/strong&gt; Users add a &amp;ldquo;Work or School account,&amp;rdquo; typically used for Mobile Application Management (MAM).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Corporate (Joined):&lt;/strong&gt; The device is fully owned and managed by the organization.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Windows Autopilot:&lt;/strong&gt; A suite of technologies used to pre-configure and set up new devices for productive use.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Hardware Hash:&lt;/strong&gt; The unique ID required to register a device with the Autopilot service.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Deployment Profiles:&lt;/strong&gt; Control the Out-of-Box Experience (OOBE), such as forcing a standard user account or skipping privacy settings.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Enrollment Status Page (ESP):&lt;/strong&gt; Tracks the installation of critical apps and profiles before the user reaches the desktop.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-mobile-application-management-mam-vs-mdm&#34;&gt;4. Mobile Application Management (MAM) vs. MDM &lt;a href=&#34;#4-mobile-application-management-mam-vs-mdm&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;MAM-WE (Without Enrollment):&lt;/strong&gt; Allows IT to protect corporate data inside specific apps (like Outlook or Teams) without managing the entire personal device.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;App Protection Policies (APP):&lt;/strong&gt; The core of MAM, used to prevent &amp;ldquo;Save As&amp;rdquo; to personal storage, restrict Copy/Paste between corporate and personal apps, and require a separate PIN.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;App Configuration Policies:&lt;/strong&gt; Used to pre-configure app settings, such as corporate mail server URLs, to simplify the user setup experience.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-endpoint-security-integration&#34;&gt;5. Endpoint Security Integration &lt;a href=&#34;#5-endpoint-security-integration&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Security Baselines:&lt;/strong&gt; Microsoft-recommended groups of settings that provide a hardened starting point for Windows security.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Defender for Endpoint Plug-in:&lt;/strong&gt; Intune is the primary engine for deploying the MDE sensor and managing Antivirus, Firewall, and EDR settings centrally.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Remote Actions:&lt;/strong&gt; Essential for incident response, including &lt;strong&gt;Retire&lt;/strong&gt; (removes corporate data), &lt;strong&gt;Wipe&lt;/strong&gt; (factory reset), and &lt;strong&gt;Sync&lt;/strong&gt; (forces immediate policy check-in).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-troubleshooting--lifecycle&#34;&gt;6. Troubleshooting &amp;amp; Lifecycle &lt;a href=&#34;#6-troubleshooting--lifecycle&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Company Portal App:&lt;/strong&gt; The user-facing interface for installing optional apps and checking device compliance.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Log Analysis:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Local Logs:&lt;/strong&gt; Win32 app and script failures are logged in &lt;code&gt;C:\ProgramData\Microsoft\IntuneManagementExtension\Logs&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Portal Logs:&lt;/strong&gt; The &amp;ldquo;Troubleshooting + support&amp;rdquo; blade provides a per-user view of policy and app deployment status.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;7-essential-powershell-cmdlets-microsoftgraphintune&#34;&gt;7. Essential PowerShell Cmdlets (Microsoft.Graph.Intune) &lt;a href=&#34;#7-essential-powershell-cmdlets-microsoftgraphintune&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Connect-MgGraph -Scopes &amp;quot;DeviceManagementManagedDevices.ReadWrite.All&amp;quot;, &amp;quot;DeviceManagementConfiguration.ReadWrite.All&amp;quot;&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Inventory:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-MgUserManagedDevice -UserId user@domain.com&lt;/code&gt; (Lists devices for a specific user).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Management Actions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Invoke-MgDeviceManagementManagedDeviceSyncDevice -ManagedDeviceId &amp;lt;ID&amp;gt;&lt;/code&gt; (Triggers a forced sync).&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Invoke-MgDeviceManagementManagedDeviceRetire -ManagedDeviceId &amp;lt;ID&amp;gt;&lt;/code&gt; (Removes corporate data).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>5.2) Microsoft Copilot &amp; AI Agents</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.2-microsoft-copilot/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.2-microsoft-copilot/</guid>
      <description>&lt;h2 id=&#34;1-architecture--the-oversharing-risk&#34;&gt;1. Architecture &amp;amp; The &amp;ldquo;Oversharing&amp;rdquo; Risk &lt;a href=&#34;#1-architecture--the-oversharing-risk&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Microsoft 365 Copilot and its associated agents rely on a &amp;ldquo;human-led, agent-operated&amp;rdquo; model grounded in your organizational data.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Work IQ:&lt;/strong&gt; The intelligence layer grounded in personal and work data (emails, chats, meetings) that provides the context for AI reasoning.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Golden Rule:&lt;/strong&gt; Copilot and Agents &lt;em&gt;never&lt;/em&gt; bypass existing permissions; they utilize the Microsoft Graph and Semantic Index to surface data the user already has access to.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Oversharing Remediation:&lt;/strong&gt; Organizations must identify and lock down sites with excessive &amp;ldquo;Everyone except external users&amp;rdquo; permissions or broad sharing links before deployment to prevent AI from surfacing sensitive data to unauthorized users.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-microsoft-365-agents--entra-agent-id&#34;&gt;2. Microsoft 365 Agents &amp;amp; Entra Agent ID &lt;a href=&#34;#2-microsoft-365-agents--entra-agent-id&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Beyond simple chat, Microsoft 365 now supports autonomous and semi-autonomous agents that possess their own organizational identities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>5.3) Power Platform</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.3-power-platform/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.3-power-platform/</guid>
      <description>&lt;h2 id=&#34;1-power-platform-hierarchy--architecture&#34;&gt;1. Power Platform Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-power-platform-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;The Power Platform is structured to allow for granular governance and scale across an enterprise tenant.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Tenant:&lt;/strong&gt; The top-level boundary, tied to a single Entra ID tenant.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Environments:&lt;/strong&gt; The primary containers used to store, manage, and share business data, apps, and flows.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Solutions:&lt;/strong&gt; The mechanism for implementing Application Lifecycle Management (ALM); used to package and transport components across environments.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Items/Components:&lt;/strong&gt; The actual tools built by makers, including Power Apps, Power Automate flows, Copilot Studio bots, and Power Pages.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dataverse:&lt;/strong&gt; The underlying cloud-scale database and security layer that can be provisioned within an environment.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connectors:&lt;/strong&gt; The bridges that allow apps and flows to interact with data sources (e.g., SharePoint, SQL, or 3rd-party APIs).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-environment-strategy&#34;&gt;2. Environment Strategy &lt;a href=&#34;#2-environment-strategy&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Default Environment:&lt;/strong&gt; Every tenant has one, which cannot be deleted or disabled. Every user with a license is automatically an Environment Maker here.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Best Practice:&lt;/strong&gt; This environment should be renamed (e.g., &amp;ldquo;[Company Name] - Personal Productivity&amp;rdquo;) to signal its use for non-critical, personal apps.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Permissions:&lt;/strong&gt; While everyone can create items, they remain private until explicitly shared with other users.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dedicated Environments (Prod/Dev/Test):&lt;/strong&gt; These should be created for departmental or enterprise-grade solutions to maintain strict separation.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Managed Environments:&lt;/strong&gt; Provide enhanced governance features, such as sharing limits and usage insights. Note that every user accessing an app in a Managed Environment must have a Premium license.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dataverse Integration:&lt;/strong&gt; Environments can be provisioned with or without a Dataverse database. Enterprise-grade apps typically require Dataverse for relational data storage and granular security roles.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;3-power-platform-data-loss-prevention-dlp&#34;&gt;3. Power Platform Data Loss Prevention (DLP) &lt;a href=&#34;#3-power-platform-data-loss-prevention-dlp&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connector Categorization:&lt;/strong&gt; Connectors within a DLP policy are grouped into three distinct buckets:&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Business:&lt;/strong&gt; Data can be shared freely between connectors in this bucket (e.g., SharePoint and Outlook).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Non-Business (General):&lt;/strong&gt; Data can be shared between these, but cannot interact with connectors in the Business bucket.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Blocked:&lt;/strong&gt; These connectors are entirely disabled for use within the scoped environments (e.g., social media or personal storage).&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Policy Scoping:&lt;/strong&gt; Policies can be applied to &amp;ldquo;All Environments,&amp;rdquo; &amp;ldquo;Multiple Environments,&amp;rdquo; or used to &amp;ldquo;Exclude Specific Environments&amp;rdquo;.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Strategy:&lt;/strong&gt; It is recommended to apply a highly restrictive &amp;ldquo;Tenant-Wide&amp;rdquo; policy and create more permissive policies for specifically sanctioned &amp;ldquo;Project&amp;rdquo; environments.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;4-licensing--capacity&#34;&gt;4. Licensing &amp;amp; Capacity &lt;a href=&#34;#4-licensing--capacity&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Standard vs. Premium:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Standard:&lt;/strong&gt; Included with M365 E3/E5 licenses, covering basic connectors like SharePoint, OneDrive, and Outlook.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Premium:&lt;/strong&gt; Required for &amp;ldquo;Premium&amp;rdquo; connectors (e.g., SQL, HTTP), On-premises Gateways, and any use of Dataverse.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;License Types:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Per User:&lt;/strong&gt; Allows a single user to run unlimited apps.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Per App:&lt;/strong&gt; Allows a single user to run one specific app in one specific environment.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Capacity Management:&lt;/strong&gt; Power Platform storage is shared across the tenant and categorized into &lt;strong&gt;Database&lt;/strong&gt; (Dataverse tables), &lt;strong&gt;File&lt;/strong&gt; (attachments), and &lt;strong&gt;Log&lt;/strong&gt; (audit trails).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;5-the-center-of-excellence-coe-starter-kit&#34;&gt;5. The Center of Excellence (CoE) Starter Kit &lt;a href=&#34;#5-the-center-of-excellence-coe-starter-kit&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Purpose:&lt;/strong&gt; A collection of Microsoft-provided components designed to move administration from reactive to proactive management.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Inventory:&lt;/strong&gt; The kit automatically crawls the tenant to identify every App and Flow, their creators, and usage frequency.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Compliance Flow:&lt;/strong&gt; This can automate governance by emailing makers of &amp;ldquo;orphaned&amp;rdquo; apps (where the owner has left) to request business justification or mark them for deletion.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;6-on-premises-data-gateways&#34;&gt;6. On-Premises Data Gateways &lt;a href=&#34;#6-on-premises-data-gateways&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Function:&lt;/strong&gt; Enables Power Apps and Power Automate to securely access data residing on-premises, such as SQL Server or local File Shares.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Management:&lt;/strong&gt; Gateways are installed on local servers and managed in &amp;ldquo;Gateway Clusters&amp;rdquo; to ensure high availability.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Security:&lt;/strong&gt; The gateway does not bypass underlying permissions; users must still have valid credentials for the data source itself.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;7-essential-powershell-cmdlets-microsoftpowerappsadministrationpowershell&#34;&gt;7. Essential PowerShell Cmdlets (Microsoft.PowerApps.Administration.PowerShell) &lt;a href=&#34;#7-essential-powershell-cmdlets-microsoftpowerappsadministrationpowershell&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Connection:&lt;/strong&gt; &lt;code&gt;Add-PowerAppsAccount&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Environment Discovery:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-AdminPowerAppEnvironment&lt;/code&gt;: Lists all environments.&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-AdminPowerApp -EnvironmentName &amp;lt;ID&amp;gt;&lt;/code&gt;: Lists all apps in a specific environment.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;DLP Management:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Get-AdminDlpPolicy&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Ownership Reassignment:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;Set-AdminPowerAppOwner -AppId &amp;lt;AppID&amp;gt; -EnvironmentName &amp;lt;EnvID&amp;gt; -NewOwner &amp;lt;UserUPN&amp;gt;&lt;/code&gt;: Critical for managing orphaned apps during offboarding.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>5.4) Microsoft Fabric</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.4-microsoft-fabric/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/5.4-microsoft-fabric/</guid>
      <description>&lt;h2 id=&#34;1-the-fabric-hierarchy--architecture&#34;&gt;1. The Fabric Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-the-fabric-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Fabric is a data platform service residing within an Entra Tenant. The organizational levels are structured as follows:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Tenant:&lt;/strong&gt; The top-level container for the Fabric service.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Capacity:&lt;/strong&gt; The compute resources within Fabric. A tenant can have multiple capacities, each with a specific location and size.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Domains &amp;amp; Subdomains (Optional):&lt;/strong&gt; Logical groups of Workspaces within a Capacity.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Workspaces:&lt;/strong&gt; Containers for items. Each user has a personal &amp;ldquo;My Workspace&amp;rdquo;. Workspaces are attached to a single capacity and require that compute power to function.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Items:&lt;/strong&gt; The building blocks within Workspaces used for data storage and transformation.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Lakehouse:&lt;/strong&gt; Stores structured, semi-structured, and unstructured tables and files.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Warehouse:&lt;/strong&gt; Stores structured transaction tables.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Objects:&lt;/strong&gt; Elements existing within items, such as tables, files, views, and stored procedures.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-onelake-the-onedrive-for-data&#34;&gt;2. OneLake (The &amp;ldquo;OneDrive for Data&amp;rdquo;) &lt;a href=&#34;#2-onelake-the-onedrive-for-data&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;OneLake is the unified SaaS data lake for the entire organization, built on Azure Data Lake Storage (ADLS) Gen2.&lt;/p&gt;</description>
    </item>
    <item>
      <title>6.1) VoIP Fundamentals</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/6.1-voip-fundamentals/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/6.1-voip-fundamentals/</guid>
      <description>&lt;h2 id=&#34;1-the-standard-call-path-the-chain&#34;&gt;1. The Standard Call Path (The Chain) &lt;a href=&#34;#1-the-standard-call-path-the-chain&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Understanding the journey of a packet is essential for isolating call drops and audio degradation. This &amp;ldquo;Chain&amp;rdquo; connects the internal user to the global telephone network.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;PSTN (Public Switched Telephone Network):&lt;/strong&gt; The global collection of interconnected circuit-switched networks. This is the &amp;ldquo;outside world&amp;rdquo; where traditional E.164 phone numbers reside.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;SIP Trunk:&lt;/strong&gt; A virtual version of an analog phone line. It utilizes the &lt;strong&gt;Session Initiation Protocol (SIP)&lt;/strong&gt; to connect a PBX to the PSTN over an internet connection.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;SBC (Session Border Controller):&lt;/strong&gt; The gatekeeper and firewall for VoIP. It sits at the network &amp;ldquo;border&amp;rdquo; to manage security, NAT traversal, and protocol translation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;PABX / PBX (Private Automatic Branch Exchange):&lt;/strong&gt; The &amp;ldquo;brain&amp;rdquo; of the phone system. It manages internal switching and call routing logic. In the M365 ecosystem, this is replaced by the &lt;strong&gt;Microsoft Phone System&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;IVR (Interactive Voice Response):&lt;/strong&gt; The automated menu logic (e.g., &amp;ldquo;Press 1 for Sales&amp;rdquo;). In Teams architecture, these are configured as &lt;strong&gt;Auto Attendants&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Call Queues:&lt;/strong&gt; The logic used to hold callers in a line until an agent is available, typically incorporating Music on Hold (MoH) and specific routing methods (Circular, Longest Idle).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Handsets / Endpoints:&lt;/strong&gt; The physical IP phones or &amp;ldquo;softphone&amp;rdquo; clients (the Teams app) where the audio termination occurs.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-technical-voip-vocabulary&#34;&gt;2. Technical VoIP Vocabulary &lt;a href=&#34;#2-technical-voip-vocabulary&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;When troubleshooting with &amp;ldquo;comms&amp;rdquo; or telco engineers, the following metrics and terms define the health of the voice stream:&lt;/p&gt;</description>
    </item>
    <item>
      <title>6.2) Teams Calling</title>
      <link>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/6.2-teams-calling/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>http://172.21.1.91:1313/docs/microsoft-365/cheatsheet/6.2-teams-calling/</guid>
      <description>&lt;h2 id=&#34;1-teams-calling-hierarchy--architecture&#34;&gt;1. Teams Calling Hierarchy &amp;amp; Architecture &lt;a href=&#34;#1-teams-calling-hierarchy--architecture&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Teams Calling (Teams Phone) is a cloud-based private branch exchange (PABX) system that connects the Microsoft Teams client to the Public Switched Telephone Network (PSTN).&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The PABX Service:&lt;/strong&gt; Microsoft Phone System provides call control, auto-attendants, call queues, and voicemail.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Logical Layers:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Client:&lt;/strong&gt; Teams app (Desktop, Mobile, or IP Phone) where the user interacts with the dialer.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Signal:&lt;/strong&gt; SIP signaling traffic always travels to the nearest Microsoft 365 server &amp;ldquo;front door&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Media:&lt;/strong&gt; Voice/Video traffic (SRTP) follows the most direct path between participants or to the PSTN gateway.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;The Gateway:&lt;/strong&gt; The bridge to the global telephone network.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;2-pstn-connectivity-models&#34;&gt;2. PSTN Connectivity Models &lt;a href=&#34;#2-pstn-connectivity-models&#34; class=&#34;anchor&#34; aria-hidden=&#34;true&#34;&gt;&lt;i class=&#34;material-icons align-middle&#34;&gt;link&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Choosing a connectivity model is the most critical architectural decision for a voice deployment.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
