• Cheatsheet Overview
    • 1.1) Exchange Online
    • 1.2) SharePoint Online and OneDrive
    • 1.3) Microsoft Teams
    • 1.4) Service-wide
    • 2.1) Identity Lifecycle
    • 2.2) Conditional Access
    • 2.3) Authentication
    • 3.1) Data Loss Prevention
    • 3.2) Information Protection
    • 3.3) Data Lifecycle
    • 4.1) Defender for Office 365
    • 4.2) Defender for Endpoint (MDE)
    • 4.3) Defender for Cloud Apps (CASB)
    • 4.4) Defender for Identity & XDR
    • 5.1) Microsoft Intune (Endpoint Management)
    • 5.2) Microsoft Copilot
    • 5.3) Power Platform
    • 6.1) ITIL Fundamentals
    • 6.2) Issue Ownership
    • 6.3) The Escalation Framework
    • 6.4) Managing Ambiguity
    • 7.1) The Consultant Muscle
    • 7.2) Constructive Pushback
    • 7.3) Advising
    • 7.4) RAID/RAAIDD Logs
      • Intro to ISO 19011
      • Key concepts of ISO 19011:2018 video
      • The seven principles of auditing
      • The audit process for ISO 19011
      • Intro to ISO 27001
      • Overview of the ISO 27001 Clauses
      • Overview of the ISO 27001 Controls
      • Documented information requirements for ISO 27001
      • Intro to ITIL
      • The 7 Guiding Principles
      • The 4 Dimensions of Service Management
      • The Service Value System (SVS)
      • The 34 Management Practices
      • Continual Improvement
      • Intro to PRINCE2
      • The 7 Principles
      • The 7 Practices
      • The 7 Processes
      • Project Roles and Responsibilities
      • Tailoring PRINCE2
      • Intro to Scrum
      • A guide to Scrum
      • Scrum Table of Terms
      • Scrum in relation to Agile
    • to navigate
    • to select
    • to close
      • Home
      • The M365 Consultant Cheatsheet
      On this page

      The M365 Consultant Cheatsheet

      article

      Cheatsheet Overview

      Table of contents

      article

      1.1) Exchange Online

      Mail flow troubleshooting, shared mailboxes, hybrid concepts.

      article

      1.2) SharePoint Online and OneDrive

      External sharing configurations, site architecture, sync client troubleshooting.

      article

      1.3) Microsoft Teams

      Meeting policies, app governance, and standardizing team creation.

      article

      1.4) Service-wide

      Troubleshooting issues and data consistency across the ecosystem.

      article

      2.1) Identity Lifecycle

      Understanding the flow from HR systems to Active Directory to Entra ID (JML - Joiners, Movers, …

      article

      2.2) Conditional Access

      Best practices for CA policies, troubleshooting sign-in logs, and managing exclusions securely.

      article

      2.3) Authentication

      MFA enforcement, Self-Service Password Reset (SSPR), and modern authentication protocols.

      article

      3.1) Data Loss Prevention

      Triage workflows for DLP alerts and understanding policy scoping.

      article

      3.2) Information Protection

      Sensitivity labels (content vs. container level) and practical deployment.

      article

      3.3) Data Lifecycle

      Retention policies vs. retention labels, and eDiscovery basics.

      article

      4.1) Defender for Office 365

      Managing "Safe Links" and "Safe Attachments" policies, and investigating phishing/spoofing alerts.

      article

      4.2) Defender for Endpoint (MDE)

      Device onboarding basics, EDR (Endpoint Detection and Response) sensor health, and interpreting …

      article

      4.3) Defender for Cloud Apps (CASB)

      Identifying "Shadow IT" through discovery logs and implementing session controls for unmanaged …

      article

      4.4) Defender for Identity & XDR

      Understanding how signals are correlated across the portal and using Automated Investigation and …

      article

      5.1) Microsoft Intune (Endpoint Management)

      Configuration vs. compliance policies, device enrollment (Autopilot), and mobile application …

      article

      5.2) Microsoft Copilot

      Basic data readiness concepts (oversharing risks in SharePoint) and licensing constraints.

      article

      5.3) Power Platform

      Core governance, environment strategies, and Power Platform DLP policies.

      article

      6.1) ITIL Fundamentals

      The very basics on the ITIL Framework.

      article

      6.2) Issue Ownership

      Establishing a triage workflow for complex blockers before considering escalation.

      article

      6.3) The Escalation Framework

      Creating a standardized template for genuine decision points (Context -> Business Impact -> …

      article

      6.4) Managing Ambiguity

      How to operate when documentation is missing or incomplete.

      article

      7.1) The Consultant Muscle

      Frameworks for reviewing solution requests against an existing strategy.

      article

      7.2) Constructive Pushback

      How to confidently say "no" to non-standard approaches while providing technical reasoning and a …

      article

      7.3) Advising

      Translating complex M365 guardrails into practical "how to do it properly" steps for delivery teams.

      article

      7.4) RAID/RAAIDD Logs

      Leveraging logs as a technical shield to document risks, decisions, and dependencies for …