<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NJIT Public KB</title><link>http://kb.njit.io/</link><description>Recent content on NJIT Public KB</description><generator>Hugo</generator><language>en-us</language><atom:link href="http://kb.njit.io/index.xml" rel="self" type="application/rss+xml"/><item><title>Cheatsheet Overview</title><link>http://kb.njit.io/docs/m365-consulting/overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/overview/</guid><description>&lt;p>&lt;strong>1. M365 Core Services &amp;amp; Architecture&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>&lt;strong>1.1. Exchange Online:&lt;/strong> Mail flow troubleshooting, shared mailboxes, hybrid concepts.&lt;/li>
&lt;li>&lt;strong>1.2. SharePoint Online &amp;amp; OneDrive:&lt;/strong> External sharing configurations, site architecture, sync client troubleshooting.&lt;/li>
&lt;li>&lt;strong>1.3. Microsoft Teams:&lt;/strong> Meeting policies, app governance, and standardizing team creation.&lt;/li>
&lt;li>&lt;strong>1.4. Service-Wide:&lt;/strong> Troubleshooting issues and data consistency across the ecosystem.&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>2. Identity &amp;amp; Access (Entra ID)&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>&lt;strong>2.1. Identity Lifecycle:&lt;/strong> Understanding the flow from HR systems to Active Directory to Entra ID (JML - Joiners, Movers, Leavers).&lt;/li>
&lt;li>&lt;strong>2.2. Conditional Access (CA):&lt;/strong> Best practices for CA policies, troubleshooting sign-in logs, and managing exclusions securely.&lt;/li>
&lt;li>&lt;strong>2.3. Authentication:&lt;/strong> MFA enforcement, Self-Service Password Reset (SSPR), and modern authentication protocols.&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>3. Governance &amp;amp; Compliance (Purview)&lt;/strong>&lt;/p></description></item><item><title>Intro to ITIL</title><link>http://kb.njit.io/docs/frameworks/itil/intro-to-itil/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/intro-to-itil/</guid><description>&lt;p>ITIL 4 is a globally recognized framework for IT Service Management (ITSM) that focuses on co-creating value with the business through a Service Value System, guiding principles, and continual improvement. It is the most widely adopted guidance for IT Service Management (ITSM) worldwide. In its current iteration, ITIL 4, the framework provides a practical and flexible approach to support organizations in their digital transformation journeys. It shifts the focus from managing isolated IT processes to adopting a holistic, systems-thinking approach that emphasizes the co-creation of value between IT service providers, customers, and other stakeholders.&lt;/p></description></item><item><title>Intro to PRINCE2</title><link>http://kb.njit.io/docs/frameworks/prince2/intro-to-prince2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/intro-to-prince2/</guid><description>&lt;p>PRINCE2 is a widely used project management method that provides a structured approach to managing projects by dividing it into seven processes. It emphasizes the importance of clear objectives, defined roles and responsibilities, and a focus on progress monitoring and control throughout the project lifecycle.&lt;/p>
&lt;p>PRINCE2, an acronym for &lt;strong>PR&lt;/strong>ojects &lt;strong>IN&lt;/strong> &lt;strong>C&lt;/strong>ontrolled &lt;strong>E&lt;/strong>nvironments, is a globally recognized, structured project management methodology. It provides a process-based approach designed to enhance organization and control within projects, focusing on the effective management of resources and risks. Central to PRINCE2 is its emphasis on product-based planning, meaning the methodology centres on the definition, delivery, and quality of specific project outputs or &amp;lsquo;products&amp;rsquo;. These products must meet clearly defined quality criteria and contribute to achieving a justified business case, ensuring the project delivers tangible value.&lt;/p></description></item><item><title>Intro to Scrum</title><link>http://kb.njit.io/docs/frameworks/scrum/intro-to-scrum/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/scrum/intro-to-scrum/</guid><description>&lt;p>From &lt;a href="https://scrumguides.org/scrum-guide.html" rel="external" target="_blank">the official Scrum guide&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a> the definition of Scrum is:&lt;/p>
&lt;blockquote>
&lt;p>&amp;hellip;a lightweight framework that helps people, teams and organizations generate value through adaptive solutions for complex problems.&lt;/p></description></item><item><title>A guide to Scrum</title><link>http://kb.njit.io/docs/frameworks/scrum/a-guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/scrum/a-guide/</guid><description>&lt;p>&lt;em>If you would like to, you can &lt;a href="https://scrumguides.org/scrum-guide.html" rel="external" target="_blank">read the official Scrum guide here:&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>&lt;/em>&lt;/p>
&lt;p>Scrum is a lightweight framework to help teams develop a Product of value via a lean and adaptable approach. The theory behind it is based on the following fundamentals of Scrum:&lt;/p></description></item><item><title>Intro to ISO 19011</title><link>http://kb.njit.io/docs/frameworks/iso19011/intro-to-iso19011/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso19011/intro-to-iso19011/</guid><description>&lt;p>ISO 19011 is an international standard that offers guidelines for auditing management systems. We use these guidelines to audit clients&amp;rsquo; information security management systems (&lt;a href="http://kb.njit.io/docs/frameworks/iso27001/">like ISO 27001&lt;/a> and other similar frameworks).&lt;/p>
&lt;p>Additionally, ISO 19011 can be applied to a variety of other systems, such as quality management systems (ISO 9001) and environmental management systems (ISO 14001). These guidelines are designed to ensure that audits are conducted consistently and effectively, and include:&lt;/p></description></item><item><title>Intro to ISO 27001</title><link>http://kb.njit.io/docs/frameworks/iso27001/intro-to-iso27001/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso27001/intro-to-iso27001/</guid><description>&lt;p>ISO 27001 is an international standard that provides guidelines for establishing, implementing, maintaining, and continually improving an information security management system (ISMS)&lt;/p>
&lt;p>ISO 27001 is designed to help organisations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties. The requirements for aligning to this standard are seperated into two components:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Clauses:&lt;/strong> The ideas/framework for an organisation to follow when managing risks.&lt;/li>
&lt;li>&lt;strong>Controls:&lt;/strong> Specific measures an organisation can implement to manage and reduce risks.&lt;/li>
&lt;/ul>
&lt;p>When assessing an organisation on their alignment with this standard, the &lt;a href="http://kb.njit.io/docs/frameworks/iso19011/">ISO 19011 methodology of Management Systems auditing&lt;/a> should be followed.&lt;/p></description></item><item><title>The 7 Guiding Principles</title><link>http://kb.njit.io/docs/frameworks/itil/the-7-guiding-principles/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/the-7-guiding-principles/</guid><description>&lt;p>The 7 Guiding Principles are recommendations that can guide an organization in all circumstances, regardless of changes in its goals, strategies, type of work, or management structure. They are the core messages of ITIL and of service management in general.&lt;/p>
&lt;h2 id="1-focus-on-value">1. Focus on value &lt;a href="#1-focus-on-value" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> Everything the organization does should link back, directly or indirectly, to value for itself, its customers, and other stakeholders. Value is not just financial; it includes customer experience and user experience.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Understand who the consumers of the service are and what they consider valuable. Map value streams and ruthlessly eliminate activities that do not contribute to value creation. Continuously evaluate whether an action or process is actively delivering or supporting value.&lt;/li>
&lt;/ul>
&lt;h2 id="2-start-where-you-are">2. Start where you are &lt;a href="#2-start-where-you-are" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> Do not start from scratch and build something new without considering what is already available to be leveraged. There is often a great deal of value in existing services, processes, programs, projects, and people.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Objectively assess the current state using direct observation and measurement. Identify what works well and can be reused or improved, rather than discarding everything to build from the ground up.&lt;/li>
&lt;/ul>
&lt;h2 id="3-progress-iteratively-with-feedback">3. Progress iteratively with feedback &lt;a href="#3-progress-iteratively-with-feedback" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> Resist the temptation to do everything at once. Organize work into smaller, manageable sections that can be executed and completed in a timely manner, making it easier to maintain a sharp focus on each effort.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Use agile methodologies to deliver work in iterations. Continuously gather and respond to feedback from stakeholders before, during, and after each iteration to ensure the work remains focused, relevant, and adaptable to changing circumstances.&lt;/li>
&lt;/ul>
&lt;h2 id="4-collaborate-and-promote-visibility">4. Collaborate and promote visibility &lt;a href="#4-collaborate-and-promote-visibility" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> When initiatives involve the right people in the right roles, efforts benefit from better buy-in, more relevance, and increased likelihood of long-term success. Hidden work leads to duplication of effort, risks going unmanaged, and creates a lack of trust.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Break down silos. Ensure that work, progress, and even failures are shared transparently across the organization. Communicate clearly and involve stakeholders at all levels to build trust, share understanding, and make better decisions.&lt;/li>
&lt;/ul>
&lt;h2 id="5-think-and-work-holistically">5. Think and work holistically &lt;a href="#5-think-and-work-holistically" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> No service, practice, process, department, or supplier stands alone. The outcomes achieved by the service provider and service consumer will suffer unless the organization works on the whole rather than just its individual parts.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Recognize the complexity of the systems involved. Ensure that all Four Dimensions of Service Management are considered in any initiative. Understand how different parts of the organization and external partners interact to co-create value along the entire service value chain.&lt;/li>
&lt;/ul>
&lt;h2 id="6-keep-it-simple-and-practical">6. Keep it simple and practical &lt;a href="#6-keep-it-simple-and-practical" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> Always use the minimum number of steps needed to accomplish an objective. Outcome-based thinking should be used to produce practical solutions that deliver results without unnecessary bureaucracy.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Eliminate processes, services, actions, or metrics that fail to provide value or produce a useful outcome. If a process, service, action, or metric provides no value, eliminate it. Focus on doing the essentials very well rather than overcomplicating procedures.&lt;/li>
&lt;/ul>
&lt;h2 id="7-optimize-and-automate">7. Optimize and automate &lt;a href="#7-optimize-and-automate" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Explanation:&lt;/strong> Organizations must maximize the value of the work carried out by their human and technical resources. Technology can help organizations scale up and take on frequent, repetitive tasks, freeing human resources for more complex work.&lt;/li>
&lt;li>&lt;strong>Application:&lt;/strong> Streamline and optimize processes to make them as efficient as possible &lt;em>before&lt;/em> applying automation. Attempting to automate a flawed process will only result in flawed outcomes happening faster. Use human intervention only where it truly adds value, such as in complex decision-making, strategic thinking, or empathetic customer interactions.&lt;/li>
&lt;/ul>
&lt;h2 id="in-closing">In closing &lt;a href="#in-closing" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>These principles are universally applicable and intended to guide decisions and actions at all levels of the organization. They do not prescribe specific tasks, but rather provide a mindset and culture to support successful service management, agile operations, and the continuous realization of value. When faced with a challenge or decision, practitioners should refer back to these principles to ensure they remain aligned with the core philosophy of ITIL 4.&lt;/p></description></item><item><title>The 7 Principles</title><link>http://kb.njit.io/docs/frameworks/prince2/the-7-principles/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/the-7-principles/</guid><description>&lt;p>The 7 Principle&amp;rsquo;s are:&lt;/p>
&lt;h2 id="1-continued-business-justification">1. Continued Business Justification &lt;a href="#1-continued-business-justification" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>
&lt;p>&lt;strong>Explanation:&lt;/strong> This principle mandates that a valid, justifiable reason must exist for initiating a project, and this justification must remain valid throughout the project&amp;rsquo;s entire lifecycle. The core of this justification lies in the project being desirable (benefits outweigh costs and risks), viable (capable of being delivered), and achievable. This rationale is formally documented and maintained in the Business Case.&lt;/p></description></item><item><title>1.1) Exchange Online</title><link>http://kb.njit.io/docs/m365-consulting/1.1-exchange-online/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/1.1-exchange-online/</guid><description>&lt;h2 id="1-mail-flow--routing-troubleshooting">1. Mail Flow &amp;amp; Routing Troubleshooting &lt;a href="#1-mail-flow--routing-troubleshooting" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Message Trace:&lt;/strong> The primary diagnostic tool for mail delivery issues. Use the Exchange Admin Center (EAC) for messages within the last 10 days; use Historical Search for up to 90 days.&lt;/li>
&lt;li>&lt;strong>Mail Flow Rules (Transport Rules):&lt;/strong>
&lt;ul>
&lt;li>Always verify rule execution order (Priority).&lt;/li>
&lt;li>Ensure &amp;ldquo;Stop processing more rules&amp;rdquo; is used deliberately to prevent conflicting actions.&lt;/li>
&lt;li>Test new rules in &amp;ldquo;Test with Policy Tips&amp;rdquo; or &amp;ldquo;Test without Policy Tips&amp;rdquo; mode before enforcement.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Connectors:&lt;/strong>
&lt;ul>
&lt;li>Validate inbound/outbound connectors for third-party filtering services (e.g., Mimecast, Proofpoint) or on-premises environments.&lt;/li>
&lt;li>Check TLS certificate requirements and IP whitelisting.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Accepted Domains:&lt;/strong> Verify authoritative vs. internal relay configurations to prevent routing loops.&lt;/li>
&lt;/ul>
&lt;h2 id="2-recipient-management--governance">2. Recipient Management &amp;amp; Governance &lt;a href="#2-recipient-management--governance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Shared Mailboxes:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Governance:&lt;/strong> Do not apply licenses to shared mailboxes unless they exceed 50GB or require a continuous In-Place Archive.&lt;/li>
&lt;li>&lt;strong>Permissions:&lt;/strong> Distinguish between &lt;code>FullAccess&lt;/code> (read/manage) and &lt;code>SendAs&lt;/code> / &lt;code>SendOnBehalf&lt;/code> rights. Note that &lt;code>FullAccess&lt;/code> does not automatically grant sending rights.&lt;/li>
&lt;li>&lt;strong>Automapping:&lt;/strong> Managed via PowerShell (&lt;code>Add-MailboxPermission -AutoMapping $false&lt;/code> if users complain about Outlook client performance issues due to too many shared mailboxes).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Group Types:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Distribution Lists (DLs):&lt;/strong> Legacy broadcast communication. Ensure message approval or sender restrictions are applied to large DLs.&lt;/li>
&lt;li>&lt;strong>Microsoft 365 Groups:&lt;/strong> Modern collaboration (tied to SharePoint/Teams). Enforce naming policies and expiration policies via Entra ID.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Resource (Room/Equipment) Mailboxes:&lt;/strong>
&lt;ul>
&lt;li>Manage automated booking via &lt;code>Set-CalendarProcessing&lt;/code>.&lt;/li>
&lt;li>Configure capacity, booking windows, and delegate approval for restricted rooms.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-security-protection--authentication">3. Security, Protection &amp;amp; Authentication &lt;a href="#3-security-protection--authentication" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Email Authentication Standards:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>SPF (Sender Policy Framework):&lt;/strong> Validates outbound sending IPs. Keep DNS lookups under the 10-limit threshold.&lt;/li>
&lt;li>&lt;strong>DKIM (DomainKeys Identified Mail):&lt;/strong> Cryptographic signing of outbound emails. Ensure CNAME records are published and DKIM is actively enabled in Microsoft 365 Defender.&lt;/li>
&lt;li>&lt;strong>DMARC (Domain-based Message Authentication, Reporting, and Conformance):&lt;/strong> Policy enforcement (&lt;code>p=none&lt;/code>, &lt;code>quarantine&lt;/code>, &lt;code>reject&lt;/code>). Review DMARC aggregate reports before moving to strict enforcement.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Access Control:&lt;/strong>
&lt;ul>
&lt;li>Verify Basic Authentication is permanently disabled across the tenant.&lt;/li>
&lt;li>Control client access (e.g., restricting POP/IMAP) via Client Access Rules or CAS Mailbox settings.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Protection Policies (EOP &amp;amp; Defender for Office 365):&lt;/strong>
&lt;ul>
&lt;li>Review Anti-Spam, Anti-Phishing, and Anti-Malware policies.&lt;/li>
&lt;li>Manage Safe Links and Safe Attachments policies (ensure they do not conflict with third-party security gateways).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="4-hybrid-environment-considerations-enterprise">4. Hybrid Environment Considerations (Enterprise) &lt;a href="#4-hybrid-environment-considerations-enterprise" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Attribute Authority:&lt;/strong> In an AD-synced environment, Exchange attributes (e.g., &lt;code>proxyAddresses&lt;/code>, &lt;code>targetAddress&lt;/code>, &lt;code>mailNickname&lt;/code>) must be managed on-premises via ADUC or an on-premises Exchange Management Server.&lt;/li>
&lt;li>&lt;strong>Routing in Hybrid:&lt;/strong> Understand the role of the &lt;code>targetAddress&lt;/code> (typically &lt;code>alias@tenant.mail.onmicrosoft.com&lt;/code>) for routing mail from on-premises to cloud mailboxes.&lt;/li>
&lt;li>&lt;strong>Cross-Premises Permissions:&lt;/strong> &lt;code>SendAs&lt;/code> and &lt;code>ReceiveAs&lt;/code> permissions do not reliably span across on-premises and Exchange Online boundaries; migrations of delegates and shared mailboxes must be batched together.&lt;/li>
&lt;/ul>
&lt;h2 id="5-essential-powershell-cmdlets-exchangeonlinemanagement-module">5. Essential PowerShell Cmdlets (ExchangeOnlineManagement Module) &lt;a href="#5-essential-powershell-cmdlets-exchangeonlinemanagement-module" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-ExchangeOnline&lt;/code>&lt;/li>
&lt;li>&lt;strong>Diagnostics:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MessageTrace -SenderAddress user@domain.com -StartDate (Get-Date).AddDays(-2)&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Permissions:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MailboxPermission -Identity &amp;quot;Shared Mailbox&amp;quot;&lt;/code>&lt;/li>
&lt;li>&lt;code>Add-RecipientPermission -Identity &amp;quot;Mailbox&amp;quot; -Trustee &amp;quot;User&amp;quot; -AccessRights SendAs&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Mailbox Configuration:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Set-Mailbox -Identity user@domain.com -HiddenFromAddressListsEnabled $true&lt;/code>&lt;/li>
&lt;li>&lt;code>Set-CASMailbox -Identity user@domain.com -ImapEnabled $false -PopEnabled $false&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>1.2) SharePoint Online and OneDrive</title><link>http://kb.njit.io/docs/m365-consulting/1.2-sharepoint-online-and-onedrive/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/1.2-sharepoint-online-and-onedrive/</guid><description>&lt;h2 id="1-architecture--site-governance">1. Architecture &amp;amp; Site Governance &lt;a href="#1-architecture--site-governance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Flat Architecture:&lt;/strong> Modern SharePoint relies on a &amp;ldquo;flat&amp;rdquo; structure using Hub Sites rather than legacy subsites.
&lt;ul>
&lt;li>&lt;strong>Hub Sites:&lt;/strong> Used to logically connect related sites (e.g., all &amp;ldquo;HR&amp;rdquo; sites) for shared navigation, branding, and search scope. Sites can only belong to one Hub at a time.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Site Types:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Team Sites:&lt;/strong> Backed by an M365 Group (includes shared inbox, calendar, Planner, Teams integration). Best for internal team collaboration.&lt;/li>
&lt;li>&lt;strong>Communication Sites:&lt;/strong> No M365 Group. Best for broad broadcasting (e.g., Intranet homepage, company-wide news).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Storage Management:&lt;/strong> Manage tenant-level storage limits. Configure site-level storage quotas to prevent single sites from consuming the entire tenant allocation.&lt;/li>
&lt;/ul>
&lt;h2 id="2-external-sharing--collaboration">2. External Sharing &amp;amp; Collaboration &lt;a href="#2-external-sharing--collaboration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Tenant vs. Site Limits:&lt;/strong> The tenant-level sharing setting acts as a ceiling. A site-level setting cannot be more permissive than the tenant-level setting.
&lt;ul>
&lt;li>&lt;em>Hierarchy:&lt;/em> &lt;code>Anyone&lt;/code> (Anonymous) &amp;gt; &lt;code>New and Existing Guests&lt;/code> &amp;gt; &lt;code>Existing Guests&lt;/code> &amp;gt; &lt;code>Only People in Your Organization&lt;/code>.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Entra External ID (B2B collaboration) Integration:&lt;/strong> Ensure SharePoint and OneDrive integration with Entra External ID (B2B collaboration) is enabled so guests get a seamless authentication experience via Entra ID rather than legacy SharePoint guest accounts.&lt;/li>
&lt;li>&lt;strong>Access Expiration:&lt;/strong> Configure guest access expiration policies at the tenant level (e.g., guests must be renewed every 90 days).&lt;/li>
&lt;/ul>
&lt;h2 id="3-permissions--access-control">3. Permissions &amp;amp; Access Control &lt;a href="#3-permissions--access-control" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>M365 Group Permissions vs. SharePoint Permissions:&lt;/strong>
&lt;ul>
&lt;li>Team sites rely on the underlying M365 Group (Owners/Members) for primary access.&lt;/li>
&lt;li>Avoid using legacy SharePoint Groups (Visitors/Members/Owners) on group-connected Team Sites unless specifically required for granular, non-group access.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Item-Level Permissions (Broken Inheritance):&lt;/strong>
&lt;ul>
&lt;li>Discourage breaking inheritance at the folder/file level at scale, as it creates massive administrative overhead and impacts performance.&lt;/li>
&lt;li>If a sub-folder requires different permissions, it usually warrants a separate Document Library or a separate Site.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Access Requests:&lt;/strong> Ensure the &amp;ldquo;Access Request&amp;rdquo; email is routed to active site owners, not an orphaned user account.&lt;/li>
&lt;/ul>
&lt;h2 id="4-onedrive-for-business-enterprise-management">4. OneDrive for Business (Enterprise Management) &lt;a href="#4-onedrive-for-business-enterprise-management" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Known Folder Move (KFM):&lt;/strong> Deployed via Intune/Group Policy to silently redirect Desktop, Documents, and Pictures to OneDrive. Essential for device backup and seamless hardware replacements.&lt;/li>
&lt;li>&lt;strong>Sync Client Troubleshooting:&lt;/strong>
&lt;ul>
&lt;li>Common issues involve file path limits (256/400 characters), invalid characters, or conflicting file locks.&lt;/li>
&lt;li>Use the OneDrive admin center (now merged into the SharePoint admin center) to track sync health across the organization.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>User Offboarding:&lt;/strong>
&lt;ul>
&lt;li>When an Entra ID account is deleted, the OneDrive retention period begins (default is 30 days, often increased to 93 or 3650 days via retention policies).&lt;/li>
&lt;li>Manager access: By default, the user&amp;rsquo;s manager (defined in Entra ID) is granted a link to the OneDrive data to salvage files before deletion.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="5-essential-powershell-cmdlets-pnp-powershell">5. Essential PowerShell Cmdlets (PnP PowerShell) &lt;a href="#5-essential-powershell-cmdlets-pnp-powershell" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;em>PnP PowerShell is the industry standard for SharePoint Online management, preferred over the native SharePoint Online Management Shell.&lt;/em>&lt;/p></description></item><item><title>1.3) Microsoft Teams</title><link>http://kb.njit.io/docs/m365-consulting/1.3-microsoft-teams/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/1.3-microsoft-teams/</guid><description>&lt;h2 id="1-governance--lifecycle-management">1. Governance &amp;amp; Lifecycle Management &lt;a href="#1-governance--lifecycle-management" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Provisioning Strategy:&lt;/strong> In an enterprise, self-service Team creation is often disabled to prevent sprawl. If disabled, ensure the provisioning workflow (usually via Power Automate, ServiceNow, or a custom app) is documented and functional.&lt;/li>
&lt;li>&lt;strong>Naming Conventions:&lt;/strong> Enforced via Entra ID (e.g., &lt;code>[Department] - [Project Name]&lt;/code>). Ensure blocked word lists are configured to prevent users from creating a team called &amp;ldquo;HR&amp;rdquo; or &amp;ldquo;Payroll&amp;rdquo;.&lt;/li>
&lt;li>&lt;strong>Lifecycle &amp;amp; Expiration:&lt;/strong> Backed by M365 Groups. Set expiration policies (e.g., 365 days) that trigger renewal emails to Team owners. Orphaned Teams (owners have left the company) must have an escalation path for reassignment or archiving.&lt;/li>
&lt;li>&lt;strong>Archiving:&lt;/strong> Archiving a Team makes the SharePoint site read-only and freezes the chat. This is preferred over deletion for compliance purposes unless governed by a strict retention policy.&lt;/li>
&lt;/ul>
&lt;h2 id="2-external-collaboration--access-types">2. External Collaboration &amp;amp; Access Types &lt;a href="#2-external-collaboration--access-types" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>External Access (Federation):&lt;/strong> * Allows users to find, call, and chat with people in &lt;em>other&lt;/em> Microsoft 365 domains.
&lt;ul>
&lt;li>Does &lt;em>not&lt;/em> grant access to Teams channels, files, or SharePoint.&lt;/li>
&lt;li>Configure allowed/blocked domains via the Teams Admin Center to prevent data leakage via chat.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Guest Access:&lt;/strong>
&lt;ul>
&lt;li>Grants external users access to specific Teams, channels, and files via Entra External ID (B2B collaboration).&lt;/li>
&lt;li>Must be enabled at the Tenant level (Teams Admin Center), Group level (M365 Groups), and Site level (SharePoint).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Shared Channels (B2B Direct Connect):&lt;/strong>
&lt;ul>
&lt;li>Allows sharing a single channel with external organizations without adding them as guests to the tenant.&lt;/li>
&lt;li>Requires configuring cross-tenant access settings in Entra ID (both inbound and outbound) for specific partner organizations.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-meeting-calling--device-policies">3. Meeting, Calling, &amp;amp; Device Policies &lt;a href="#3-meeting-calling--device-policies" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Meeting Policies:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Lobby Management:&lt;/strong> Crucial for security. Ensure external users and guests bypass the lobby &lt;em>only&lt;/em> if explicitly desired; the safest default is &amp;ldquo;People in my organization.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>Recording &amp;amp; Transcription:&lt;/strong> Determine who can record (e.g., organizers and presenters only). Recordings now save to OneDrive (for 1:1/group chats) or SharePoint (for channel meetings). Configure auto-expiration for recordings to save storage.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Telephony / Voice (Enterprise):&lt;/strong>
&lt;ul>
&lt;li>Understand their PSTN connectivity model: Calling Plans (Microsoft provides numbers), Operator Connect (managed third-party carrier), or Direct Routing (on-premises/cloud SBCs).&lt;/li>
&lt;li>&lt;strong>Voice Routing:&lt;/strong> For Direct Routing, trace the path from the user&amp;rsquo;s Dial Plan -&amp;gt; Voice Routing Policy -&amp;gt; PSTN Usage -&amp;gt; Voice Route.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Resource Accounts:&lt;/strong> Used for Auto Attendants and Call Queues. They require a &amp;ldquo;Microsoft Teams Shared Devices&amp;rdquo; license or a free &amp;ldquo;Microsoft Teams Phone Resource Account&amp;rdquo; license to function.&lt;/li>
&lt;/ul>
&lt;h2 id="4-app-governance--management">4. App Governance &amp;amp; Management &lt;a href="#4-app-governance--management" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Permission Policies:&lt;/strong> Controls &lt;em>who&lt;/em> can install specific apps. The enterprise standard is usually to block all third-party apps by default and require a security/compliance review before adding them to an Allow list.&lt;/li>
&lt;li>&lt;strong>Setup Policies:&lt;/strong> Controls the &amp;ldquo;Left Rail&amp;rdquo; (app bar) in the Teams client. Use this to pin critical company apps (e.g., Viva Connections, ServiceNow) and define the default layout for different departments.&lt;/li>
&lt;li>&lt;strong>Custom Apps:&lt;/strong> Manage the catalog of line-of-business (LOB) apps uploaded by developers.&lt;/li>
&lt;/ul>
&lt;h2 id="5-troubleshooting--diagnostics">5. Troubleshooting &amp;amp; Diagnostics &lt;a href="#5-troubleshooting--diagnostics" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Call Quality Dashboard (CQD):&lt;/strong> The primary tool for investigating dropped calls, jitter, and poor audio. Link building subnets to the CQD to isolate network issues to specific office locations.&lt;/li>
&lt;li>&lt;strong>The &amp;ldquo;New Teams&amp;rdquo; Client (v2):&lt;/strong>
&lt;ul>
&lt;li>Architecture is now WebView2 (no longer Electron).&lt;/li>
&lt;li>&lt;strong>Cache Clearing:&lt;/strong> The path has changed. Delete contents in &lt;code>%localappdata%\Packages\MSTeams_8wekyb3d8bbwe\LocalCache\Microsoft\MSTeams&lt;/code>.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Presence Issues:&lt;/strong> Usually caused by calendar sync delays with Exchange Online or stale cache. Verify the user&amp;rsquo;s status isn&amp;rsquo;t manually locked (e.g., set to &amp;ldquo;Duration&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Teams Web App:&lt;/strong> Always use the web app &lt;a href="https://teams.microsoft.com/v2/" rel="external" target="_blank">https://teams.microsoft.com/v2/&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a> as the first troubleshooting step to isolate client-side vs. tenant-side issues.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoftteams-module">6. Essential PowerShell Cmdlets (MicrosoftTeams Module) &lt;a href="#6-essential-powershell-cmdlets-microsoftteams-module" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-MicrosoftTeams&lt;/code>&lt;/li>
&lt;li>&lt;strong>Team Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-Team -User user@domain.com&lt;/code> (Find all Teams a user belongs to).&lt;/li>
&lt;li>&lt;code>Set-Team -GroupId &amp;lt;ObjectID&amp;gt; -Visibility Private&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Policy Assignment:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Grant-CsTeamsMeetingPolicy -Identity user@domain.com -PolicyName &amp;quot;Restricted Meetings&amp;quot;&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Voice Configuration (Direct Routing):&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-CsOnlineUser -Identity user@domain.com | Format-List LineURI, EnterpriseVoiceEnabled, VoiceRoutingPolicy&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>1.4) Service-wide</title><link>http://kb.njit.io/docs/m365-consulting/1.4-service-wide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/1.4-service-wide/</guid><description>&lt;h2 id="1-the-m365-group-the-connective-tissue">1. The M365 Group (The Connective Tissue) &lt;a href="#1-the-m365-group-the-connective-tissue" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Blast Radius:&lt;/strong> M365 Groups are the underlying identity and access framework for modern collaboration. Creating a Group automatically provisions an Exchange Mailbox/Calendar, a SharePoint Team Site, a OneNote notebook, and a Planner plan. Adding Teams is an optional overlay.&lt;/li>
&lt;li>&lt;strong>Deletion &amp;amp; Recovery:&lt;/strong> Deleting a Team or a Group-connected SharePoint site deletes the entire M365 Group and all associated data across every workload.
&lt;ul>
&lt;li>Soft-deleted groups can be restored within 30 days via the Entra ID portal or Exchange Admin Center.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Naming &amp;amp; Expiration Policies:&lt;/strong> Administered centrally in Entra ID, these policies cascade down. If an M365 Group expires and is not renewed by the owner, all connected services (Teams, SharePoint, Exchange) are deleted.&lt;/li>
&lt;/ul>
&lt;h2 id="2-data-sync--propagation-delays-the-wait-24-hours-rule">2. Data Sync &amp;amp; Propagation Delays (The &amp;ldquo;Wait 24 Hours&amp;rdquo; Rule) &lt;a href="#2-data-sync--propagation-delays-the-wait-24-hours-rule" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Identity Sync (Entra ID to M365):&lt;/strong> Changes to user attributes (UPN, Name, Title) or Group memberships in Entra ID often take time to reflect across the ecosystem.
&lt;ul>
&lt;li>Exchange Online and SharePoint usually update within 15–60 minutes.&lt;/li>
&lt;li>The Microsoft Teams client relies heavily on local caching and can take up to 24–48 hours to fully reflect profile changes or new group access.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Search Indexing:&lt;/strong> Newly uploaded files in SharePoint/OneDrive or newly created Teams channels are not instantly searchable. Microsoft Search relies on continuous background crawling. If an entire site is missing from search, you can request a re-index via SharePoint Site Settings, but execution time is governed by Microsoft&amp;rsquo;s backend load.&lt;/li>
&lt;li>&lt;strong>Offline Address Book (OAB):&lt;/strong> For users running Outlook in Cached Exchange Mode, new hires or deleted users will not show up in the Global Address List immediately. Force an OAB download via the Outlook Send/Receive tab to isolate sync issues.&lt;/li>
&lt;/ul>
&lt;h2 id="3-microsoft-search--information-architecture">3. Microsoft Search &amp;amp; Information Architecture &lt;a href="#3-microsoft-search--information-architecture" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Security Trimming:&lt;/strong> Microsoft Search (across Bing for Business, SharePoint, and Teams) is strictly security-trimmed. Users will &lt;em>only&lt;/em> see results for files and sites they have explicit permission to access. If a user complains they can&amp;rsquo;t find a document, it is almost always a permissions issue, not a search engine failure.&lt;/li>
&lt;li>&lt;strong>Oversharing Risks:&lt;/strong> Because Search aggregates data across the tenant, poorly permissioned SharePoint sites or over-permissioned Teams channels (e.g., using &amp;ldquo;Everyone except external users&amp;rdquo;) will surface sensitive documents in routine employee searches.&lt;/li>
&lt;li>&lt;strong>Bookmarks &amp;amp; Q&amp;amp;A:&lt;/strong> Managed via the M365 Admin Center (Search &amp;amp; Intelligence). Use these to promote official company resources (e.g., HR portals, IT Helpdesk) to the top of search results.&lt;/li>
&lt;/ul>
&lt;h2 id="4-licensing--service-plans">4. Licensing &amp;amp; Service Plans &lt;a href="#4-licensing--service-plans" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>License Composition:&lt;/strong> Enterprise licenses (E3/E5) are not monolithic; they are bundles of individual &amp;ldquo;Service Plans&amp;rdquo; (e.g., Exchange Online Plan 2, SharePoint Plan 2, Sway, Planner, Viva Insights).&lt;/li>
&lt;li>&lt;strong>Granular Troubleshooting:&lt;/strong> If a user has an E3 license but cannot access Planner or Stream, check their specific license assignment in Entra ID or the M365 Admin Center. Individual service plans can be toggled off by administrators or group-based licensing policies.&lt;/li>
&lt;li>&lt;strong>Group-Based Licensing:&lt;/strong> In an enterprise environment, licenses should never be assigned manually. They must be managed via Entra ID Security Groups. Troubleshooting missing licenses requires checking the user&amp;rsquo;s group membership and the licensing group&amp;rsquo;s assignment logs.&lt;/li>
&lt;/ul>
&lt;h2 id="5-essential-powershell-cmdlets-microsoft-graph">5. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href="#5-essential-powershell-cmdlets-microsoft-graph" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;em>The &lt;code>MSOnline&lt;/code> and &lt;code>AzureAD&lt;/code> modules are deprecated. &lt;code>Microsoft Graph PowerShell&lt;/code> is the required standard for cross-platform and identity management.&lt;/em>&lt;/p></description></item><item><title>Key concepts of ISO 19011:2018 video</title><link>http://kb.njit.io/docs/frameworks/iso19011/key-concepts-of-iso-19011-video/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso19011/key-concepts-of-iso-19011-video/</guid><description>&lt;p>If you prefer a visual breakdown over reading through documentation, this 10-minute video is the fastest way to get up to speed. It covers the core pillars of ISO 19011:2018, including audit principles and program management, in a concise, easy-to-digest format.&lt;/p>
&lt;iframe width="720" height="405" src="https://www.youtube.com/embed/zyv-BDthFRU?si=haj_cyjF3LtDBrce" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen>&lt;/iframe></description></item><item><title>Overview of the ISO 27001 Clauses</title><link>http://kb.njit.io/docs/frameworks/iso27001/overview-of-clauses/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso27001/overview-of-clauses/</guid><description>&lt;p>The requirements for an organization&amp;rsquo;s Information Security Management System (ISMS) in ISO 27001 are outlined in Clauses 4 to 10. These clauses are:&lt;/p>
&lt;ul>
&lt;li>Context of the organization&lt;/li>
&lt;li>Leadership&lt;/li>
&lt;li>Planning&lt;/li>
&lt;li>Support&lt;/li>
&lt;li>Operation&lt;/li>
&lt;li>Performance evaluation&lt;/li>
&lt;li>Improvement&lt;/li>
&lt;/ul>
&lt;p>The following is a brief description of each of these clauses.&lt;/p>
&lt;h2 id="clause-4-context-of-the-organization">Clause 4: Context of the organization &lt;a href="#clause-4-context-of-the-organization" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>An organization&amp;rsquo;s ISMS needs to document its purpose. It states requirements like:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>4.1)&lt;/strong> The organization needs to identify internal and exteral issues relevant to it and it&amp;rsquo;s ability to have a successful ISMS.&lt;/li>
&lt;li>&lt;strong>4.2 a)&lt;/strong> The organization needs to identify stakeholders.&lt;/li>
&lt;li>&lt;strong>4.2 b)&lt;/strong> The organization needs to identify each stakeholder&amp;rsquo;s needs.&lt;/li>
&lt;li>&lt;strong>4.3)&lt;/strong> The scope of the ISMS needs to be defined based on the above and made available as documented information.&lt;/li>
&lt;/ul>
&lt;h2 id="clause-5-leadership">Clause 5: Leadership &lt;a href="#clause-5-leadership" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>For an ISMS to be effective it needs support and commitment from top management. It states requirements like:&lt;/p></description></item><item><title>Scrum Table of Terms</title><link>http://kb.njit.io/docs/frameworks/scrum/table-of-terms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/scrum/table-of-terms/</guid><description>&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Term&lt;/th>
 &lt;th>Definition&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Product&lt;/td>
 &lt;td>The output of the project, it is something of value that has clearly defined stakeholders, users and boundaries&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Product Goal&lt;/td>
 &lt;td>The future state of the Product, illustrating what the long-term goal of the Product is&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Product Backlog&lt;/td>
 &lt;td>An evolving and prioritised list of work items that need to be done on to fulfill the Product Goal&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Definition of Done&lt;/td>
 &lt;td>The set of standards that the work on a Product Backlog item must meet to be considered complete&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Scrum Team&lt;/td>
 &lt;td>A small team of people working together on building the Product, working towards the Product Goal&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Product Owner&lt;/td>
 &lt;td>The person accountable for the Product Backlog and ensuring the Product Goal is worked towards&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Scrum Master&lt;/td>
 &lt;td>The person who acting as the coach for the team helps makes sure everyone is working effectively under Scrum&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Developers&lt;/td>
 &lt;td>The people in the Scrum Team completing the work in the Product Backlog&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprints&lt;/td>
 &lt;td>Fixed-length blocks of work done on the Product to complete items from the Product Backlog&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprint Goal&lt;/td>
 &lt;td>A statement on why the current Sprint is valuable to stakeholders&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprint Backlog&lt;/td>
 &lt;td>The selected Product Backlog items for a given Sprint along with the Sprint Goal and the plan for getting the work done within the Sprint&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Increment&lt;/td>
 &lt;td>One or more &amp;ldquo;Done&amp;rdquo; work items that are a usable step towards the Product Goal&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Scrum Events&lt;/td>
 &lt;td>Formal Scrum events that happen during every Sprint&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprint Planning&lt;/td>
 &lt;td>The first Scrum Event where the Scrum Team establishes the Sprint Goal and Sprint Backlog for the current Sprint&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Daily Scrum&lt;/td>
 &lt;td>A daily Scrum Event where the developers meet to review progress on the Sprint Goal and adapt the Sprint Backlog if required&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprint Review&lt;/td>
 &lt;td>The second last Scrum Event where the Scrum Team and the Product stakeholders meet to review Sprint outcomes and the progress towards Product Goal&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Sprint Retrospective&lt;/td>
 &lt;td>The last Scrum Event where the Scrum Team meet and review how the Sprint went&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title>The 4 Dimensions of Service Management</title><link>http://kb.njit.io/docs/frameworks/itil/the-4-dimensions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/the-4-dimensions/</guid><description>&lt;p>The objective of an organization is to create value for its stakeholders, and this is achieved through the provisioning and consumption of services. To ensure that the Service Value System (SVS) functions properly and efficiently, organizations must consider all aspects of their behavior. In ITIL 4, these are represented by the Four Dimensions of Service Management.&lt;/p>
&lt;p>Failing to address all four dimensions adequately can result in services becoming undeliverable, or failing to meet expectations of quality or efficiency.&lt;/p></description></item><item><title>The 7 Practices</title><link>http://kb.njit.io/docs/frameworks/prince2/the-7-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/the-7-practices/</guid><description>&lt;p>The seven practices provide detailed guidance on &lt;em>how&lt;/em> the PRINCE2 principles should be put into practice. In earlier versions they were referred to as &amp;lsquo;Themes&amp;rsquo; but have been renamed to &amp;lsquo;Practices&amp;rsquo; to better reflect the need for their consistent application rather than being viewed as static topics. Like other elements of PRINCE2, the application of these practices should be tailored to the specific context and complexity of the project.&lt;/p>
&lt;p>These practices collectively form the control framework of PRINCE2. They are not merely areas of interest but active management disciplines through which the project manager and the Project Board ensure the project remains aligned with its objectives (Business Case, Quality, Plans), effectively manages uncertainty (Risk, Change), monitors performance against baselines (Progress), and maintains the necessary structure for governance (Organisation). They are the mechanisms that operationalize the principles and enable the structured control central to the PRINCE2 philosophy.&lt;/p></description></item><item><title>2.1) Identity Lifecycle</title><link>http://kb.njit.io/docs/m365-consulting/2.1-identity-lifecycle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/2.1-identity-lifecycle/</guid><description>&lt;h2 id="1-source-of-authority-soa--synchronization">1. Source of Authority (SoA) &amp;amp; Synchronization &lt;a href="#1-source-of-authority-soa--synchronization" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Golden Rule of Hybrid:&lt;/strong> In a directory-synchronized environment Active Directory (On-Premises) is the Source of Authority.
&lt;ul>
&lt;li>You cannot edit synced attributes (Name, Manager, Department, ProxyAddresses) directly in Entra ID or the M365 Admin Center. You must modify them on-premises and wait for the sync (or force it).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Sync Engines:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Entra Connect Sync (formerly AAD Connect):&lt;/strong> The legacy/standard engine. Syncs every 30 minutes. Requires an on-premises server.&lt;/li>
&lt;li>&lt;strong>Entra Cloud Sync:&lt;/strong> The modern, lightweight agent. Syncs every 2 minutes. Used for disconnected forests or simpler topologies.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Hard vs. Soft Match:&lt;/strong> When resolving duplicate accounts, understand how Entra ID matches on-premises AD users to cloud users.
&lt;ul>
&lt;li>&lt;strong>Soft Match:&lt;/strong> Matches based on &lt;code>UserPrincipalName&lt;/code> or &lt;code>Primary SMTP Address&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Hard Match:&lt;/strong> Matches based on &lt;code>SourceAnchor&lt;/code> (usually the on-premises &lt;code>ObjectGUID&lt;/code> converted to a Base64 string called &lt;code>ImmutableID&lt;/code> in Entra).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-the-jml-process-joiners-movers-leavers">2. The JML Process (Joiners, Movers, Leavers) &lt;a href="#2-the-jml-process-joiners-movers-leavers" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Joiners (Onboarding):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Flow:&lt;/strong> HR System -&amp;gt; Active Directory -&amp;gt; Entra ID -&amp;gt; Licensing Group -&amp;gt; Mailbox/OneDrive Provisioned.&lt;/li>
&lt;li>&lt;strong>Licensing:&lt;/strong> Never assign licenses directly to the user. Add the user to an Entra ID Security Group configured for Group-Based Licensing.&lt;/li>
&lt;li>&lt;strong>Pre-Provisioning:&lt;/strong> M365 services (like Exchange and OneDrive) do not fully provision until the user is licensed &lt;em>and&lt;/em> the backend service registers the license. Do not panic if a mailbox isn&amp;rsquo;t instantly available after sync.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Movers (Transitions):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Access Accumulation:&lt;/strong> The biggest security risk. When users change departments, they often retain their old access.&lt;/li>
&lt;li>&lt;strong>Mitigation:&lt;/strong> Rely on &lt;strong>Dynamic Security Groups&lt;/strong> based on the &lt;code>Department&lt;/code> or &lt;code>Title&lt;/code> attribute so access is automatically revoked when HR updates the title.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Leavers (Offboarding):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Standard Enterprise Workflow:&lt;/strong>
&lt;ol>
&lt;li>Reset password / scramble on-premises.&lt;/li>
&lt;li>Block Sign-in (Entra ID).&lt;/li>
&lt;li>Revoke active refresh tokens (Force Sign-out).&lt;/li>
&lt;li>Wipe corporate data from personal devices (Intune App Protection) or wipe corporate devices.&lt;/li>
&lt;li>Convert to Shared Mailbox and remove M365 license (to free up the license pool while retaining data).&lt;/li>
&lt;li>Move user to a disabled OU on-premises (which either syncs as disabled or drops them from sync, depending on scoping rules).&lt;/li>
&lt;/ol>
&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-identity-governance--entitlement-management-requires-entra-id-p2">3. Identity Governance &amp;amp; Entitlement Management (Requires Entra ID P2) &lt;a href="#3-identity-governance--entitlement-management-requires-entra-id-p2" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Access Packages:&lt;/strong> Used to bundle resources (SharePoint sites, Teams, Entra Groups, Enterprise Apps) into a single requestable package.&lt;/li>
&lt;li>&lt;strong>Access Reviews:&lt;/strong> Automated campaigns asking managers or resource owners to attest to whether users still need access to a specific group or application. Crucial for auditing privileged access.&lt;/li>
&lt;li>&lt;strong>Privileged Identity Management (PIM):&lt;/strong>
&lt;ul>
&lt;li>Standard users should have zero standing access to admin roles (e.g., Global Admin, Exchange Admin).&lt;/li>
&lt;li>PIM requires admins to &amp;ldquo;elevate&amp;rdquo; their access just-in-time (JIT) for a set duration (e.g., 4 hours), requiring MFA and a ticket number for auditing.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="4-dynamic-groups--attributes">4. Dynamic Groups &amp;amp; Attributes &lt;a href="#4-dynamic-groups--attributes" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Rule Syntax:&lt;/strong> Used heavily for automated licensing and app deployment.
&lt;ul>
&lt;li>&lt;em>Example:&lt;/em> &lt;code>(user.department -eq &amp;quot;Sales&amp;quot;) -and (user.accountEnabled -eq true)&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Processing Delay:&lt;/strong> Dynamic group membership is not instant. In a large tenant, it can take anywhere from a few minutes to several hours to recalculate after an attribute change.&lt;/li>
&lt;/ul>
&lt;h2 id="5-essential-powershell-cmdlets-microsoft-graph">5. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href="#5-essential-powershell-cmdlets-microsoft-graph" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-MgGraph -Scopes &amp;quot;User.ReadWrite.All&amp;quot;, &amp;quot;Directory.ReadWrite.All&amp;quot;&lt;/code>&lt;/li>
&lt;li>&lt;strong>Troubleshooting Sync/Attributes:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgUser -UserId user@domain.com -Property OnPremisesSyncEnabled, OnPremisesImmutableId, UserPrincipalName&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Offboarding Actions:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Update-MgUser -UserId user@domain.com -AccountEnabled:$false&lt;/code> (Block Sign-in)&lt;/li>
&lt;li>&lt;code>Revoke-MgUserSignInSession -UserId user@domain.com&lt;/code> (Kills active sessions across all devices/apps)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Group Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgGroup -Filter &amp;quot;groupTypes/any(c:c eq 'DynamicMembership')&amp;quot;&lt;/code> (Lists all dynamic groups)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>2.2) Conditional Access</title><link>http://kb.njit.io/docs/m365-consulting/2.2-conditional-access/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/2.2-conditional-access/</guid><description>&lt;h2 id="1-architecture--core-concepts">1. Architecture &amp;amp; Core Concepts &lt;a href="#1-architecture--core-concepts" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The CA Engine:&lt;/strong> Conditional Access is the zero-trust policy engine of Entra ID. It evaluates &lt;em>Signals&lt;/em> (Who, What, Where, Risk), makes a &lt;em>Decision&lt;/em> (Block, Grant, Require MFA/Compliance), and applies &lt;em>Enforcement&lt;/em>.&lt;/li>
&lt;li>&lt;strong>Evaluation Logic:&lt;/strong>
&lt;ul>
&lt;li>Policies are evaluated &lt;em>simultaneously&lt;/em>, not hierarchically.&lt;/li>
&lt;li>&lt;strong>Block trumps all.&lt;/strong> If Policy A grants access and Policy B blocks access, the user is blocked.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Licensing:&lt;/strong> Requires Entra ID P1 (minimum) or P2 (for risk-based policies like Identity Protection).&lt;/li>
&lt;/ul>
&lt;h2 id="2-enterprise-baseline-policies-the-must-haves">2. Enterprise Baseline Policies (The &amp;ldquo;Must-Haves&amp;rdquo;) &lt;a href="#2-enterprise-baseline-policies-the-must-haves" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Block Legacy Authentication:&lt;/strong> Blocks protocols that cannot prompt for MFA (e.g., POP, IMAP, older Office clients). This is the single most critical security policy.&lt;/li>
&lt;li>&lt;strong>Require MFA for All Users:&lt;/strong> Targets &amp;ldquo;All Users&amp;rdquo; and &amp;ldquo;All Cloud Apps.&amp;rdquo; (Always utilize exclusions for break-glass accounts).&lt;/li>
&lt;li>&lt;strong>Require MFA for Azure Management:&lt;/strong> Specifically targets the &amp;ldquo;Microsoft Azure Management&amp;rdquo; app to protect the Azure Portal and PowerShell interfaces.&lt;/li>
&lt;li>&lt;strong>Device Compliance / Hybrid Joined:&lt;/strong> For accessing sensitive apps (or all of M365), require the device to be marked as compliant in Intune OR be Hybrid Entra ID Joined.&lt;/li>
&lt;li>&lt;strong>Risk-Based Policies (If Entra ID P2 is active):&lt;/strong> Require MFA or password change when User Risk or Sign-in Risk is detected as Medium/High.&lt;/li>
&lt;/ul>
&lt;h2 id="3-governance-exclusions--safety-nets">3. Governance, Exclusions &amp;amp; Safety Nets &lt;a href="#3-governance-exclusions--safety-nets" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Emergency Access (&amp;ldquo;Break-Glass&amp;rdquo;) Accounts:&lt;/strong>
&lt;ul>
&lt;li>Create at least two cloud-only, highly privileged accounts (e.g., &lt;code>bg-admin1@tenant.onmicrosoft.com&lt;/code>).&lt;/li>
&lt;li>Exclude these accounts from &lt;em>all&lt;/em> Conditional Access policies to prevent tenant-wide lockouts if MFA or federation fails.&lt;/li>
&lt;li>Monitor these accounts aggressively via Log Analytics / Sentinel alerts.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Service Accounts &amp;amp; Exclusions:&lt;/strong>
&lt;ul>
&lt;li>Never use &amp;ldquo;All Users&amp;rdquo; without a dedicated exclusion group (e.g., &lt;code>CA-Exclusions-MFA&lt;/code>).&lt;/li>
&lt;li>Service accounts that cannot perform MFA must be excluded but should be locked down via other signals (e.g., Named Locations / Trusted IPs).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Report-Only Mode:&lt;/strong>
&lt;ul>
&lt;li>&lt;em>Always&lt;/em> deploy new CA policies in Report-Only mode first.&lt;/li>
&lt;li>Let it run for 7-14 days to monitor the Sign-in logs and ensure it doesn&amp;rsquo;t break legitimate business processes before flipping to &amp;ldquo;On.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="4-session-controls--granular-security">4. Session Controls &amp;amp; Granular Security &lt;a href="#4-session-controls--granular-security" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Sign-in Frequency:&lt;/strong> Forces a user to re-authenticate after a specified period (e.g., 90 days for standard users, 1 hour for risky sign-ins or specific portal access).&lt;/li>
&lt;li>&lt;strong>Persistent Browser Session:&lt;/strong> Controls whether users can remain signed in after closing and reopening their browser. Often set to &amp;ldquo;Never persistent&amp;rdquo; for shared devices.&lt;/li>
&lt;li>&lt;strong>App Enforced Restrictions:&lt;/strong> Integrates with SharePoint Online and Exchange Online to provide limited, web-only access (blocking downloads) when users log in from unmanaged (BYOD) devices.&lt;/li>
&lt;/ul>
&lt;h2 id="5-troubleshooting--diagnostics">5. Troubleshooting &amp;amp; Diagnostics &lt;a href="#5-troubleshooting--diagnostics" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The &amp;ldquo;What If&amp;rdquo; Tool:&lt;/strong> Your primary testing sandbox. Input a specific user, app, IP address, and device state to see exactly which policies &lt;em>would&lt;/em> apply and why.&lt;/li>
&lt;li>&lt;strong>Entra ID Sign-in Logs:&lt;/strong>
&lt;ul>
&lt;li>Navigate to the specific failed sign-in event, click the &lt;strong>Conditional Access&lt;/strong> tab.&lt;/li>
&lt;li>Look for the policy marked &lt;strong>Failure&lt;/strong>.&lt;/li>
&lt;li>Drill down into the &amp;ldquo;Show Details&amp;rdquo; pane to see exactly which signal (e.g., missing MFA, non-compliant device, blocked location) triggered the failure.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Continuous Access Evaluation (CAE):&lt;/strong> Understand that CAE allows Entra ID to revoke access tokens in near real-time (e.g., within minutes of a password reset or location change) rather than waiting for the standard 1-hour token expiration.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoft-graph">6. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href="#6-essential-powershell-cmdlets-microsoft-graph" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-MgGraph -Scopes &amp;quot;Policy.ReadWrite.ConditionalAccess&amp;quot;&lt;/code>&lt;/li>
&lt;li>&lt;strong>Policy Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgIdentityConditionalAccessPolicy&lt;/code> (Lists all CA policies and their states)&lt;/li>
&lt;li>&lt;code>Get-MgIdentityConditionalAccessPolicy -ConditionalAccessPolicyId &amp;lt;ObjectID&amp;gt;&lt;/code> (View specific policy configurations, useful for backing up policy JSONs)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>2.3) Authentication</title><link>http://kb.njit.io/docs/m365-consulting/2.3-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/2.3-authentication/</guid><description>&lt;h2 id="1-hybrid-authentication-topologies">1. Hybrid Authentication Topologies &lt;a href="#1-hybrid-authentication-topologies" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Password Hash Synchronization (PHS) + Seamless SSO:&lt;/strong> The Microsoft-recommended standard for 90% of enterprises. Syncs a hash of the on-premises AD password hash to Entra ID. Provides cloud-auth resilience even if on-premises domain controllers go down.&lt;/li>
&lt;li>&lt;strong>Pass-Through Authentication (PTA):&lt;/strong> Validates passwords directly against on-premises Active Directory via lightweight agents. Used when strict security policies prohibit any form of password hash leaving the on-premises network.&lt;/li>
&lt;li>&lt;strong>Federation (e.g., AD FS, Ping, Okta):&lt;/strong> Entra ID redirects the authentication request to a third-party Identity Provider (IdP).
&lt;ul>
&lt;li>&lt;em>Consultant Note:&lt;/em> Many large organizations are actively migrating &lt;em>away&lt;/em> from AD FS to PHS/Seamless SSO to reduce infrastructure overhead and mitigate on-premises vulnerabilities.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-mfa--modern-authentication-methods">2. MFA &amp;amp; Modern Authentication Methods &lt;a href="#2-mfa--modern-authentication-methods" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Authentication Methods Policy:&lt;/strong> Microsoft has deprecated the legacy per-user MFA portal and legacy SSPR policies. All authentication methods must be managed centrally via the &lt;strong>Entra ID &amp;gt; Security &amp;gt; Authentication methods&lt;/strong> blade.&lt;/li>
&lt;li>&lt;strong>Method Hierarchy (Weakest to Strongest):&lt;/strong>
&lt;ol>
&lt;li>&lt;em>SMS / Voice Call:&lt;/em> Highly susceptible to SIM swapping. Strongly advocate for deprecation.&lt;/li>
&lt;li>&lt;em>Microsoft Authenticator (Push):&lt;/em> &lt;strong>Number Matching&lt;/strong> is now mandatory globally to prevent MFA fatigue attacks.&lt;/li>
&lt;li>&lt;em>Phishing-Resistant MFA:&lt;/em> FIDO2 Security Keys (YubiKey) and Windows Hello for Business (WHfB). The gold standard for privileged administrative accounts.&lt;/li>
&lt;/ol>
&lt;/li>
&lt;li>&lt;strong>System-Preferred Multifactor Authentication:&lt;/strong> Enable this tenant-wide. If a user has both SMS and the Authenticator app registered, Entra ID will automatically prompt them with the most secure method available.&lt;/li>
&lt;/ul>
&lt;h2 id="3-self-service-password-reset-sspr--registration">3. Self-Service Password Reset (SSPR) &amp;amp; Registration &lt;a href="#3-self-service-password-reset-sspr--registration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Combined Registration:&lt;/strong> Users register for both MFA and SSPR in a single workflow (&lt;code>aka.ms/mfasetup&lt;/code>).&lt;/li>
&lt;li>&lt;strong>SSPR Configuration:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Targeting:&lt;/strong> Target a specific Entra ID Security Group before rolling out to &amp;ldquo;All Users.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>Methods Required:&lt;/strong> The enterprise standard is requiring &lt;strong>2 methods&lt;/strong> to reset a password (e.g., Authenticator App + Mobile App Code).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Password Writeback:&lt;/strong> If the organization is hybrid (using Entra Connect), Password Writeback must be enabled in the sync engine so cloud resets are written back to on-premises Active Directory.&lt;/li>
&lt;/ul>
&lt;h2 id="4-legacy-authentication-a-prime-attack-vector">4. Legacy Authentication (A Prime Attack Vector) &lt;a href="#4-legacy-authentication-a-prime-attack-vector" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>What it is:&lt;/strong> Older protocols (POP3, IMAP4, SMTP Auth, older Office 2013 clients) that cannot interpret Modern Authentication (OAuth 2.0) and therefore bypass MFA.&lt;/li>
&lt;li>&lt;strong>Remediation:&lt;/strong>
&lt;ul>
&lt;li>Exchange Online has disabled Basic Auth at the tenant level, but it can still be a risk in other areas.&lt;/li>
&lt;li>Explicitly block legacy auth via Conditional Access.&lt;/li>
&lt;li>&lt;em>Exception:&lt;/em> SMTP Auth is often still required for on-premises multi-function printers or legacy application relay. Restrict SMTP Auth to specific service accounts and lock those accounts down by IP address in Conditional Access.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="5-troubleshooting--diagnostics">5. Troubleshooting &amp;amp; Diagnostics &lt;a href="#5-troubleshooting--diagnostics" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Sign-in Logs (The Source of Truth):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Interactive vs. Non-Interactive:&lt;/strong> Interactive means the user physically typed a password or clicked an MFA prompt. Non-interactive means a client app used a refresh token to get a new access token seamlessly.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Common Error Codes to Memorize:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>50126:&lt;/strong> Invalid username or password (Check if the password recently changed on-premises and hasn&amp;rsquo;t synced, or if PTA agents are down).&lt;/li>
&lt;li>&lt;strong>500121:&lt;/strong> User didn&amp;rsquo;t complete the MFA prompt (This error can appear if the user hasn&amp;rsquo;t completed setting up MFA).&lt;/li>
&lt;li>&lt;strong>50074:&lt;/strong> Strong authentication is required and the user did not pass the MFA challenge (A Conditional Access policy may have blocked the seamless token and forced an interactive MFA prompt).&lt;/li>
&lt;li>&lt;strong>For more:&lt;/strong> &lt;a href="https://learn.microsoft.com/en-us/entra/identity-platform/reference-error-codes" rel="external" target="_blank">https://learn.microsoft.com/en-us/entra/identity-platform/reference-error-codes&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Entra ID Protection (Risk-Based Auth):&lt;/strong> If the tenant has Entra ID P2, users flagged with &amp;ldquo;High User Risk&amp;rdquo; (e.g., leaked credentials found on the dark web) can be forced to securely reset their password via SSPR before logging in.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoft-graph">6. Essential PowerShell Cmdlets (Microsoft Graph) &lt;a href="#6-essential-powershell-cmdlets-microsoft-graph" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-MgGraph -Scopes &amp;quot;UserAuthenticationMethod.ReadWrite.All&amp;quot;, &amp;quot;AuditLog.Read.All&amp;quot;&lt;/code>&lt;/li>
&lt;li>&lt;strong>Manage User Authentication Methods:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgUserAuthenticationMethod -UserId user@domain.com&lt;/code> (Lists registered methods)&lt;/li>
&lt;li>&lt;code>New-MgUserAuthenticationPhoneMethod -UserId user@domain.com -phoneType &amp;quot;mobile&amp;quot; -phoneNumber &amp;quot;+1 5555555555&amp;quot;&lt;/code> (Pre-populate phone numbers for users, though Authenticator app is preferred).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Troubleshooting Password Sync:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgUser -UserId user@domain.com -Property LastPasswordChangeDateTime&lt;/code> (Check when Entra ID thinks the password was last changed).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>Overview of the ISO 27001 Controls</title><link>http://kb.njit.io/docs/frameworks/iso27001/overview-of-controls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso27001/overview-of-controls/</guid><description>&lt;p>The Controls, listed in Annex A of ISO 27001 fall into the four groups which are derived from and aligned with Clauses 5 to 8. They are:&lt;/p>
&lt;ul>
&lt;li>Organisational controls&lt;/li>
&lt;li>People controls&lt;/li>
&lt;li>Physical controls&lt;/li>
&lt;li>Technological controls&lt;/li>
&lt;/ul>
&lt;p>The following is a brief overview of controls in these groups.&lt;/p>
&lt;h2 id="5-organisational-controls">5) Organisational controls &lt;a href="#5-organisational-controls" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>This group consists of 37 controls designed to enable effective management of information security risks. It includes controls related to risk management, incident response planning, information security policies, and the clear definition and assignment of roles and responsibilities.&lt;/p></description></item><item><title>Scrum in relation to Agile</title><link>http://kb.njit.io/docs/frameworks/scrum/in-relation-to-agile/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/scrum/in-relation-to-agile/</guid><description>&lt;p>It is important to know that Scrum is an implementation of Agile principles. While Scrum is indeed a framework (a structured approach with defined roles, artifacts, and processes) Agile however is not. Agile is more of an ideology to adopt and as such, it&amp;rsquo;s not something that you &amp;ldquo;do&amp;rdquo;, but instead Agile shapes the way that you &amp;ldquo;do&amp;rdquo;.&lt;/p>
&lt;p>Here&amp;rsquo;s a link to &lt;a href="https://agilemanifesto.org/" rel="external" target="_blank">the official Agile Manifesto&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>. There is not much to it, just 4 values and 12 principles.&lt;/p></description></item><item><title>The 7 Processes</title><link>http://kb.njit.io/docs/frameworks/prince2/the-7-processes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/the-7-processes/</guid><description>&lt;p>Each process is designed to achieve a specific objective, taking defined inputs (information or products) and transforming them through a series of activities into defined outputs. These processes provide the framework within which the PRINCE2 principles are upheld and the themes are actively applied. There are seven distinct processes in the PRINCE2 model.&lt;/p>
&lt;p>The flow between these processes follows a logical progression, often visualized in process model diagrams. A typical project starts pre-project, moves into Starting Up a Project (SU), which triggers Directing a Project (DP) by the Project Board. DP authorizes Initiating a Project (IP). Once initiated, the project moves into delivery stages, cycling between Controlling a Stage (CS) and Managing Product Delivery (MP), with Managing a Stage Boundary (SB) occurring between stages. Finally, Closing a Project (CP) concludes the lifecycle. Detailed diagrams sometimes use color-coding to indicate frequency: blue for processes run once per project (like SU, IP, CP), green for once per stage (like SB), and orange/red for processes run multiple times within a stage (like CS, MP, DP activities).&lt;/p></description></item><item><title>The Service Value System (SVS)</title><link>http://kb.njit.io/docs/frameworks/itil/service-value-system/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/service-value-system/</guid><description>&lt;p>The ITIL Service Value System (SVS) represents how the various components and activities of the organization work together to facilitate value creation through IT-enabled services. It maps how demand and opportunity are transformed into tangible value for stakeholders.&lt;/p>
&lt;p>The SVS ensures that the organization continually co-creates value with all stakeholders through the use and management of products and services. The key inputs to the SVS are &lt;strong>opportunity&lt;/strong> and &lt;strong>demand&lt;/strong>, and the output of the SVS is &lt;strong>value&lt;/strong>.&lt;/p></description></item><item><title>The seven principles of auditing</title><link>http://kb.njit.io/docs/frameworks/iso19011/seven-principles-of-auditing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso19011/seven-principles-of-auditing/</guid><description>&lt;p>The seven principles of auditing are:&lt;/p>
&lt;ol>
&lt;li>&lt;strong>Integrity&lt;/strong>: the foundation of professionalism.&lt;/li>
&lt;/ol>
&lt;p>Auditors and those managing audit programmes should perform their work ethically, honestly and responsibly. They should only undertake activities if competent to do so. They should work in an impartial manner and be on the look out for influences that may affect their judgement.&lt;/p>
&lt;ol start="2">
&lt;li>&lt;strong>Fair presentation&lt;/strong>: the obligation to report truthfully and accurately.&lt;/li>
&lt;/ol>
&lt;p>The findings of an audit should truthfully and accurately represent what was witnessed during the audit. When a bad example was witnessed, was that in contrast to 10 good examples or 100? Significant obstacles and diverging opinions between the audit team and the entity being audited should be reported.&lt;/p></description></item><item><title>3.1) Data Loss Prevention</title><link>http://kb.njit.io/docs/m365-consulting/3.1-data-loss-prevention/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/3.1-data-loss-prevention/</guid><description>&lt;h2 id="1-deployment-strategy-the-crawl-walk-run-approach">1. Deployment Strategy (The &amp;ldquo;Crawl, Walk, Run&amp;rdquo; Approach) &lt;a href="#1-deployment-strategy-the-crawl-walk-run-approach" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Never Start in Enforcement:&lt;/strong> Implementing a block policy on day one will halt business operations and generate immediate escalations. Always follow the phased rollout:
&lt;ol>
&lt;li>&lt;strong>Test it out (Audit Only):&lt;/strong> Silently gathers data to show you the baseline of what users are sharing.&lt;/li>
&lt;li>&lt;strong>Test it out with Policy Tips:&lt;/strong> Audits the data but displays a warning to the user (e.g., &amp;ldquo;This email contains sensitive data&amp;rdquo;), educating them without blocking the action.&lt;/li>
&lt;li>&lt;strong>Turn it on right away (Enforcement):&lt;/strong> Actively blocks or encrypts the data.&lt;/li>
&lt;/ol>
&lt;/li>
&lt;li>&lt;strong>Scoping:&lt;/strong> Policies should ideally be scoped to specific locations (Exchange, SharePoint, OneDrive, Teams, Endpoints). Avoid massive &amp;ldquo;All Locations&amp;rdquo; policies with complex rules, as they are notoriously difficult to troubleshoot.&lt;/li>
&lt;/ul>
&lt;h2 id="2-classifying-the-data-what-are-we-protecting">2. Classifying the Data (What are we protecting?) &lt;a href="#2-classifying-the-data-what-are-we-protecting" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Sensitive Information Types (SITs):&lt;/strong> Microsoft provides hundreds of out-of-the-box SITs.
&lt;ul>
&lt;li>&lt;em>Local Contexts:&lt;/em> For example, if you are Australian, familiarize yourself with &lt;strong>Australia Tax File Number (TFN)&lt;/strong>, &lt;strong>Australia Medicare Number&lt;/strong>, and &lt;strong>Australia Passport Number&lt;/strong>.&lt;/li>
&lt;li>&lt;em>Custom SITs:&lt;/em> Built using Regular Expressions (Regex) + Keywords + Proximity (e.g., finding a 9-digit number &lt;em>within 50 characters&lt;/em> of the word &amp;ldquo;Account&amp;rdquo;).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Exact Data Match (EDM):&lt;/strong> Used to prevent false positives. Instead of looking for &lt;em>any&lt;/em> credit card, EDM hashes an export of your actual customer database and only triggers a block if it sees a credit card belonging to a known customer.&lt;/li>
&lt;li>&lt;strong>Trainable Classifiers:&lt;/strong> Machine learning models trained on hundreds of sample documents to recognize a &lt;em>type&lt;/em> of document (e.g., Source Code, Resumes, Legal Agreements) regardless of specific keywords.&lt;/li>
&lt;/ul>
&lt;h2 id="3-policy-rules--the-user-experience">3. Policy Rules &amp;amp; The User Experience &lt;a href="#3-policy-rules--the-user-experience" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Conditions &amp;amp; Exceptions:&lt;/strong> The most common enterprise condition is: &lt;code>Content contains [SIT]&lt;/code> AND &lt;code>Content is shared [Outside my organization]&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Confidence Levels &amp;amp; Instance Counts:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>High Confidence:&lt;/strong> Requires the data pattern, a keyword, and validation (like a checksum).&lt;/li>
&lt;li>&lt;strong>Instance Count:&lt;/strong> Set thresholds. (e.g., 1-4 credit cards = send a warning. 5+ credit cards = hard block and alert the security team).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>User Overrides &amp;amp; Business Justifications:&lt;/strong> When moving to enforcement, configuring &amp;ldquo;Allow user to override&amp;rdquo; is critical. It shifts the liability to the user. They must type a reason (e.g., &amp;ldquo;Approved by client&amp;rdquo;) which is logged for the compliance team, preventing the IT Helpdesk from becoming a bottleneck.&lt;/li>
&lt;/ul>
&lt;h2 id="4-endpoint-dlp-securing-the-local-device">4. Endpoint DLP (Securing the Local Device) &lt;a href="#4-endpoint-dlp-securing-the-local-device" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Onboarding:&lt;/strong> Devices must be onboarded to Microsoft Purview (usually done silently via Intune configuration profiles) to read endpoint signals.&lt;/li>
&lt;li>&lt;strong>Capabilities:&lt;/strong> Endpoint DLP extends protection beyond the browser. It allows you to block users from:
&lt;ul>
&lt;li>Copying sensitive files to USB drives.&lt;/li>
&lt;li>Printing sensitive documents.&lt;/li>
&lt;li>Copying sensitive text to the clipboard.&lt;/li>
&lt;li>Uploading files to unsanctioned cloud storage (e.g., blocking upload to personal Google Drive via Edge/Chrome).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="5-alerts-triage--permissions">5. Alerts, Triage &amp;amp; Permissions &lt;a href="#5-alerts-triage--permissions" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Role-Based Access Control (RBAC):&lt;/strong> Being a Global Admin or SharePoint Admin does &lt;em>not&lt;/em> grant you access to read the contents of a DLP violation. You must be explicitly assigned the &lt;strong>Compliance Data Administrator&lt;/strong> or &lt;strong>Information Protection Investigator&lt;/strong> role to view the source item in the Content Explorer.&lt;/li>
&lt;li>&lt;strong>Alert Fatigue:&lt;/strong> Bundle alerts to prevent overwhelming the SOC. Configure rules to send an alert only when a specific volume is reached (e.g., &amp;ldquo;Send an alert when 5 activities occur within 60 minutes&amp;rdquo;).&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-exchangeonlinemanagement--security--compliance">6. Essential PowerShell Cmdlets (ExchangeOnlineManagement / Security &amp;amp; Compliance) &lt;a href="#6-essential-powershell-cmdlets-exchangeonlinemanagement--security--compliance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;em>Note: You must connect to the Security &amp;amp; Compliance center specifically, which is nested within the Exchange module.&lt;/em>&lt;/li>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-IPPSSession&lt;/code>&lt;/li>
&lt;li>&lt;strong>Policy Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-DlpCompliancePolicy&lt;/code> (Lists the high-level policies)&lt;/li>
&lt;li>&lt;code>Get-DlpComplianceRule&lt;/code> (Lists the granular rules nested inside the policies)&lt;/li>
&lt;li>&lt;code>Get-DlpSensitiveInformationType -Identity &amp;quot;Australia Tax File Number (TFN)&amp;quot;&lt;/code> (View the configuration of a specific SIT)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>3.2) Information Protection</title><link>http://kb.njit.io/docs/m365-consulting/3.2-information-protection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/3.2-information-protection/</guid><description>&lt;h2 id="1-taxonomy--deployment-strategy">1. Taxonomy &amp;amp; Deployment Strategy &lt;a href="#1-taxonomy--deployment-strategy" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Taxonomy:&lt;/strong> An enterprise should have a simple, universally understood taxonomy. The industry standard is usually four to five tiers: &lt;em>Public&lt;/em>, &lt;em>General/Internal&lt;/em>, &lt;em>Confidential&lt;/em>, and &lt;em>Highly Confidential&lt;/em> (often with sub-labels for specific departments or projects).&lt;/li>
&lt;li>&lt;strong>Publishing vs. Creating:&lt;/strong> Creating a label defines what it &lt;em>does&lt;/em> (encrypts, watermarks). Publishing a label via a Label Policy determines &lt;em>who&lt;/em> can see it and use it.&lt;/li>
&lt;li>&lt;strong>Default Labels:&lt;/strong> Applying a default label (e.g., &lt;em>General/Internal&lt;/em>) to all new emails and documents is the most effective way to baseline tenant security. Ensure this is deployed via policy to a pilot group before tenant-wide enforcement.&lt;/li>
&lt;li>&lt;strong>Mandatory Labeling:&lt;/strong> Forcing users to choose a label before saving a document or sending an email. Often paired with a default label, but requires users to actively downgrade or upgrade the classification.&lt;/li>
&lt;/ul>
&lt;h2 id="2-item-level-vs-container-level-labels">2. Item-Level vs. Container-Level Labels &lt;a href="#2-item-level-vs-container-level-labels" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;em>This is the most common point of confusion for stakeholders. You must clearly differentiate these.&lt;/em>&lt;/p></description></item><item><title>3.3) Data Lifecycle</title><link>http://kb.njit.io/docs/m365-consulting/3.3-data-lifecycle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/3.3-data-lifecycle/</guid><description>&lt;h2 id="1-the-core-mechanisms-policies-vs-labels">1. The Core Mechanisms: Policies vs. Labels &lt;a href="#1-the-core-mechanisms-policies-vs-labels" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;em>This is another critical distinction to explain to stakeholders, similar to Information Protection.&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Retention Policies:&lt;/strong>
&lt;ul>
&lt;li>Applied at the &lt;strong>container level&lt;/strong> (e.g., an entire Exchange mailbox, a SharePoint site, all Teams chats).&lt;/li>
&lt;li>Broad and invisible to the end user.&lt;/li>
&lt;li>&lt;em>Example:&lt;/em> &amp;ldquo;Retain all employee OneDrive data for 7 years after they leave, then silently delete it.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Retention Labels:&lt;/strong>
&lt;ul>
&lt;li>Applied at the &lt;strong>item level&lt;/strong> (a specific Word document or email).&lt;/li>
&lt;li>Visible to the user (can be selected from a dropdown in Office apps).&lt;/li>
&lt;li>&lt;strong>Records Management:&lt;/strong> Labels can declare a document as a &amp;ldquo;Record.&amp;rdquo; Once marked as a Record, the document is locked and cannot be edited or deleted by &lt;em>anyone&lt;/em> (including Global Admins) until the retention period expires.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-the-principles-of-retention-the-conflict-engine">2. The Principles of Retention (The Conflict Engine) &lt;a href="#2-the-principles-of-retention-the-conflict-engine" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;em>In an enterprise, a single document might be subject to multiple conflicting policies (e.g., a 7-year HR retain policy, but a 3-year IT auto-delete policy). &lt;a href="https://learn.microsoft.com/en-us/purview/retention-flowchart" rel="external" target="_blank">Microsoft uses a strict hierarchy to resolve this&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>:&lt;/em>&lt;/p></description></item><item><title>Documented information requirements for ISO 27001</title><link>http://kb.njit.io/docs/frameworks/iso27001/documented-information/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso27001/documented-information/</guid><description>&lt;p>The term &amp;quot;Documented information&amp;quot; is used within ISO 27001:2022 27 times. There is no one correct way to manage your documented information but the following are some key documents you would be expected to maintain.&lt;/p>
&lt;table class="collapse-1280">
&lt;thead>
&lt;tr>&lt;td style="min-width:100px">Document&lt;/td>&lt;td>Description&lt;/td>&lt;td>Notes&lt;/td>&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
	&lt;td class="bold-1280">ISMS Manual&lt;/td>
	&lt;td>A document for defining the scope of the ISMS, who relevant stakeholders are, their needs, and who is responsible for what within the ISMS.&lt;/td>
	&lt;td>
		&lt;p>This is ideal for holding documented information pertaining to:&lt;/p></description></item><item><title>Project Roles and Responsibilities</title><link>http://kb.njit.io/docs/frameworks/prince2/roles-and-responsibilities/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/roles-and-responsibilities/</guid><description>&lt;p>In PRINCE2 a single individual might hold multiple roles (especially in smaller projects), or a single role might be shared by several people, provided accountability is clear and conflicts of interest are avoided. The primary goal is absolute clarity on who is responsible for what, ensuring effective decision-making and communication within a structured framework.&lt;/p>
&lt;h2 id="project-management-team-structure">Project Management Team Structure &lt;a href="#project-management-team-structure" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>PRINCE2 typically defines four levels within and around the project management structure:&lt;/p></description></item><item><title>The 34 Management Practices</title><link>http://kb.njit.io/docs/frameworks/itil/management-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/management-practices/</guid><description>&lt;p>In previous versions of ITIL, the framework heavily emphasized &amp;ldquo;processes.&amp;rdquo; ITIL 4 shifted this focus to &lt;strong>Management Practices&lt;/strong>. A practice is defined as a set of organizational resources designed for performing work or accomplishing an objective. This change reflects the fact that delivering services requires more than just a process flow; it requires considering all Four Dimensions of Service Management (People, Information/Technology, Partners, and Value Streams/Processes).&lt;/p>
&lt;p>The 34 ITIL management practices are grouped into three distinct categories:&lt;/p></description></item><item><title>The audit process for ISO 19011</title><link>http://kb.njit.io/docs/frameworks/iso19011/audit-process/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/iso19011/audit-process/</guid><description>&lt;h2 id="stage-1-initiate-the-audit">Stage 1: Initiate the audit &lt;a href="#stage-1-initiate-the-audit" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Before doing anything else a team leader needs to be appointed to own and run the audit process. With the team leader chosen the audit team needs to reach out to the client to understand the context of the auditee. At a minimum the following needs to be established:&lt;/p>
&lt;ul>
&lt;li>The objective: Why is the audit being done?&lt;/li>
&lt;li>The scope: What are the boundaries of the audit? (e.g. are only specific locations or specific activities being audited?)&lt;/li>
&lt;li>The criteria: What requirements are the team auditing against?&lt;/li>
&lt;/ul>
&lt;p>Before starting the audit get confirmation in writing that the above has been approved by upper management.&lt;/p></description></item><item><title>4.1) Defender for Office 365</title><link>http://kb.njit.io/docs/m365-consulting/4.1-defender-for-office-365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/4.1-defender-for-office-365/</guid><description>&lt;h2 id="1-safe-links--safe-attachments-the-core-shields">1. Safe Links &amp;amp; Safe Attachments (The Core Shields) &lt;a href="#1-safe-links--safe-attachments-the-core-shields" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Safe Links:&lt;/strong> Provides time-of-click verification of URLs in emails, Teams messages, and Office apps.
&lt;ul>
&lt;li>&lt;strong>URL Rewriting:&lt;/strong> URLs are wrapped in a Microsoft prefix. If a site is later identified as malicious, the user is blocked from visiting even if they click the link hours or days after receipt.&lt;/li>
&lt;li>&lt;strong>Advanced Settings:&lt;/strong> Ensure &amp;ldquo;Wait for URL scanning to complete before delivering the message&amp;rdquo; is enabled for high-security environments.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Safe Attachments:&lt;/strong> Uses a virtual sandbox environment (detonation chamber) to open attachments and check for malicious behavior before delivery.
&lt;ul>
&lt;li>&lt;strong>Dynamic Delivery:&lt;/strong> The recommended setting for user experience. It delivers the body of the email immediately with a placeholder attachment while scanning occurs, replacing the placeholder once the file is cleared.&lt;/li>
&lt;li>&lt;strong>Block vs. Replace:&lt;/strong> Avoid &amp;ldquo;Monitor&amp;rdquo; in production; use &amp;ldquo;Block&amp;rdquo; to prevent delivery entirely or &amp;ldquo;Replace&amp;rdquo; to deliver the message without the malicious file.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-anti-phishing--impersonation-protection">2. Anti-Phishing &amp;amp; Impersonation Protection &lt;a href="#2-anti-phishing--impersonation-protection" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Impersonation Detection:&lt;/strong> Specifically protects high-profile users (C-Suite) and internal domains.
&lt;ul>
&lt;li>&lt;strong>User Impersonation:&lt;/strong> Protects against look-alike names (e.g., &amp;ldquo;John Doe&amp;rdquo; using a personal Gmail account).&lt;/li>
&lt;li>&lt;strong>Domain Impersonation:&lt;/strong> Protects against look-alike domains (e.g., &lt;code>cont0so.com&lt;/code> vs &lt;code>contoso.com&lt;/code>).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Mailbox Intelligence:&lt;/strong> Uses AI to learn a user&amp;rsquo;s frequent contacts. It triggers alerts if an email arrives from a sender who looks like a frequent contact but is not.&lt;/li>
&lt;li>&lt;strong>Safety Tips:&lt;/strong> Enable visual cues in Outlook (e.g., &amp;ldquo;This sender is new to you&amp;rdquo; or impersonation warnings) to provide real-time user education.&lt;/li>
&lt;/ul>
&lt;h2 id="3-automated-investigation-and-response-air">3. Automated Investigation and Response (AIR) &lt;a href="#3-automated-investigation-and-response-air" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Playbook:&lt;/strong> When a high-confidence phish or malware is detected, Defender can trigger an automated investigation.&lt;/li>
&lt;li>&lt;strong>Investigation Steps:&lt;/strong> The system automatically analyzes the message, identifies other recipients of the same &amp;ldquo;campaign,&amp;rdquo; and checks if the user clicked the link or downloaded the file.&lt;/li>
&lt;li>&lt;strong>Remediation Actions:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Pending Approval:&lt;/strong> AIR will suggest actions (e.g., &amp;ldquo;Soft delete 15 messages,&amp;rdquo; &amp;ldquo;Block the sender,&amp;rdquo; &amp;ldquo;Reset user&amp;rsquo;s password&amp;rdquo;).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="4-threat-explorer--campaign-discovery">4. Threat Explorer &amp;amp; Campaign Discovery &lt;a href="#4-threat-explorer--campaign-discovery" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Threat Explorer:&lt;/strong> The primary hunting tool. Use it to search for all emails from a specific sender IP, sender domain, or containing a specific URL/File Hash.&lt;/li>
&lt;li>&lt;strong>Campaign Views:&lt;/strong> Aggregates individual phishing attempts into &amp;ldquo;Campaigns.&amp;rdquo; This allows you to see the scope of an attack and determine if it was targeted (spear-phishing) or a broad broadcast.&lt;/li>
&lt;li>&lt;strong>Message Header Analysis:&lt;/strong> Accessible directly within the portal. Check the &lt;code>X-MS-Exchange-Organization-PCL&lt;/code> (Probability Level) and &lt;code>SCL&lt;/code> (Spam Confidence Level) to determine why a message was or wasn&amp;rsquo;t blocked.&lt;/li>
&lt;/ul>
&lt;h2 id="5-attack-simulation-training">5. Attack Simulation Training &lt;a href="#5-attack-simulation-training" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Purpose:&lt;/strong> Proactively test user vulnerability to phishing.&lt;/li>
&lt;li>&lt;strong>Templates:&lt;/strong> Use real-world harvested payloads (e.g., &amp;ldquo;Password Reset,&amp;rdquo; &amp;ldquo;HR Policy Update&amp;rdquo;) to simulate attacks.&lt;/li>
&lt;li>&lt;strong>Outcome-Based Learning:&lt;/strong> Automatically assign mandatory training modules (e.g., &amp;ldquo;How to spot a phish&amp;rdquo;) to users who fail the simulation by clicking or providing credentials.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-security--compliance">6. Essential PowerShell Cmdlets (Security &amp;amp; Compliance) &lt;a href="#6-essential-powershell-cmdlets-security--compliance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-IPPSSession&lt;/code>&lt;/li>
&lt;li>&lt;strong>Safe Links Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-SafeLinksPolicy&lt;/code> (Lists policies)&lt;/li>
&lt;li>&lt;code>Get-SafeLinksRule&lt;/code> (Lists the scoping/priorities of the rules)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Safe Attachment Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-SafeAttachmentPolicy&lt;/code>&lt;/li>
&lt;li>&lt;code>Get-SafeAttachmentRule&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Investigative Cmdlets:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MalwareFilterPolicy&lt;/code> (Review the anti-malware settings)&lt;/li>
&lt;li>&lt;code>Get-PhishFilterPolicy&lt;/code> (Review impersonation and anti-phish settings)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>4.2) Defender for Endpoint (MDE)</title><link>http://kb.njit.io/docs/m365-consulting/4.2-defender-for-endpoint-mde/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/4.2-defender-for-endpoint-mde/</guid><description>&lt;h2 id="1-onboarding--sensor-health">1. Onboarding &amp;amp; Sensor Health &lt;a href="#1-onboarding--sensor-health" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Onboarding Methods:&lt;/strong> In an enterprise environment, use Intune (Configuration Profiles) or Group Policy for automated deployment. Local scripts are available for testing but should be avoided for production scale.&lt;/li>
&lt;li>&lt;strong>Sensor Health Monitoring:&lt;/strong> Regularly check the &amp;ldquo;Device Inventory&amp;rdquo; for devices in an &amp;ldquo;Inactive&amp;rdquo; or &amp;ldquo;No sensor data&amp;rdquo; state. This usually indicates connectivity blocks to MDE backend URLs or the &lt;code>SENSE&lt;/code> service being disabled.&lt;/li>
&lt;li>&lt;strong>Offboarding Governance:&lt;/strong> When a device is decommissioned, it must be offboarded to prevent it from negatively impacting the organization&amp;rsquo;s exposure score. Note that offboarding scripts have a 30-day expiration period for security reasons.&lt;/li>
&lt;/ul>
&lt;h2 id="2-attack-surface-reduction-asr">2. Attack Surface Reduction (ASR) &lt;a href="#2-attack-surface-reduction-asr" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>ASR Rules:&lt;/strong> Implement rules to close common entry points for malware (e.g., &amp;ldquo;Block credential stealing from the Windows local security authority subsystem&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Phased Rollout:&lt;/strong> Always deploy ASR rules in &lt;strong>Audit Mode&lt;/strong> first. Use the &amp;ldquo;Attack Surface Reduction&amp;rdquo; report in the Defender portal to identify potential business-critical software that would be blocked before switching to &lt;strong>Enforcement Mode&lt;/strong>.&lt;/li>
&lt;li>&lt;strong>Exclusions:&lt;/strong> Manage ASR exclusions at the policy level rather than globally to maintain a tight security posture.&lt;/li>
&lt;/ul>
&lt;h2 id="3-vulnerability-management-tvm">3. Vulnerability Management (TVM) &lt;a href="#3-vulnerability-management-tvm" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Exposure Score:&lt;/strong> Monitor this real-time metric to understand the organization&amp;rsquo;s current risk level relative to the threat landscape.&lt;/li>
&lt;li>&lt;strong>Security Recommendations:&lt;/strong> Focus on &amp;ldquo;Top Security Recommendations&amp;rdquo; which are prioritized based on active exploits in the wild and the business impact on the tenant.&lt;/li>
&lt;li>&lt;strong>Software Inventory:&lt;/strong> Use the inventory to track end-of-life (EOL) software and missing patches across Windows, macOS, and Linux endpoints.&lt;/li>
&lt;/ul>
&lt;h2 id="4-detection--response-edr">4. Detection &amp;amp; Response (EDR) &lt;a href="#4-detection--response-edr" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Alert Triage:&lt;/strong> MDE correlates related alerts into a single &lt;strong>Incident&lt;/strong>, providing a full story of the attack chain. Prioritize incidents over individual alerts.&lt;/li>
&lt;li>&lt;strong>Live Response:&lt;/strong> A command-line console used to remotely collect forensic data, run scripts, or remediate threats on a compromised endpoint in real-time.&lt;/li>
&lt;li>&lt;strong>Automation Levels:&lt;/strong> Configure &amp;ldquo;Device Groups&amp;rdquo; with specific automation levels (e.g., &amp;ldquo;Full - remediate threats automatically&amp;rdquo;) to allow AIR (Automated Investigation and Response) to resolve known threats without manual intervention.&lt;/li>
&lt;/ul>
&lt;h2 id="5-next-generation-protection-antivirus">5. Next-Generation Protection (Antivirus) &lt;a href="#5-next-generation-protection-antivirus" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Cloud-Delivered Protection:&lt;/strong> Must be enabled to provide near-instant protection against new and emerging malware that hasn&amp;rsquo;t been seen by local signatures yet.&lt;/li>
&lt;li>&lt;strong>Tamper Protection:&lt;/strong> A critical tenant-wide setting that prevents malicious apps (or local admins) from disabling Microsoft Defender antivirus or EDR sensors.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-windows-defender-module">6. Essential PowerShell Cmdlets (Windows Defender Module) &lt;a href="#6-essential-powershell-cmdlets-windows-defender-module" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Client Status:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MpComputerStatus&lt;/code> (Verify if real-time protection and MDE sensor are active)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Configuration Review:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MpPreference&lt;/code> (View current exclusions and scan schedules)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Diagnostic Logging:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MpThreatDetection&lt;/code> (Review a history of threats detected on the local machine)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Connectivity Troubleshooting:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Start-Process &amp;quot;C:\Program Files\Windows Defender\MpCmdRun.exe&amp;quot; -ArgumentList &amp;quot;-ValidateEdgeConnectivity&amp;quot;&lt;/code> (Validates that the device can reach MDE cloud service endpoints)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>4.3) Defender for Cloud Apps (CASB)</title><link>http://kb.njit.io/docs/m365-consulting/4.3-defender-for-cloud-apps-casb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/4.3-defender-for-cloud-apps-casb/</guid><description>&lt;h2 id="1-cloud-discovery--shadow-it">1. Cloud Discovery &amp;amp; Shadow IT &lt;a href="#1-cloud-discovery--shadow-it" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Discovery Logs:&lt;/strong> Ingest traffic logs from network firewalls, proxies, or Defender for Endpoint to identify which cloud apps are being used across the organization.&lt;/li>
&lt;li>&lt;strong>Risk Score:&lt;/strong> Each discovered app is assigned a score (1–10) based on over 90 risk factors (e.g., regulatory compliance like GDPR/HIPAA, data encryption at rest, and legal terms).&lt;/li>
&lt;li>&lt;strong>Sanctioning vs. Unsanctioning:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Sanctioned:&lt;/strong> Apps approved for corporate use; often integrated via API for deeper visibility.&lt;/li>
&lt;li>&lt;strong>Unsanctioned:&lt;/strong> Apps explicitly blocked. Integration with Defender for Endpoint allows for automatic blocking of these URLs on managed devices.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-conditional-access-app-control-session-controls">2. Conditional Access App Control (Session Controls) &lt;a href="#2-conditional-access-app-control-session-controls" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Reverse Proxy:&lt;/strong> Redirects user traffic through Defender for Cloud Apps in real-time when accessing web applications. This is triggered via a Conditional Access policy with the &amp;ldquo;Use Conditional Access App Control&amp;rdquo; session setting.&lt;/li>
&lt;li>&lt;strong>Real-Time Actions:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Block Download:&lt;/strong> Allow users to view sensitive data in the browser but prevent them from downloading it to an unmanaged device.&lt;/li>
&lt;li>&lt;strong>Protect on Download:&lt;/strong> Automatically apply a Purview sensitivity label (encryption) to a file as it is downloaded from a cloud app.&lt;/li>
&lt;li>&lt;strong>Monitor Activity:&lt;/strong> Log every action taken within a third-party app (e.g., Salesforce, AWS, or Slack) for audit purposes.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-app-governance--oauth-permissions">3. App Governance &amp;amp; OAuth Permissions &lt;a href="#3-app-governance--oauth-permissions" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>OAuth App Inventory:&lt;/strong> Tracks which third-party applications have been granted permissions to access M365 data (e.g., &amp;ldquo;Read your mail&amp;rdquo; or &amp;ldquo;Access your files&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Permission Triage:&lt;/strong> Identify &amp;ldquo;high-privilege&amp;rdquo; apps that have not been used in 90 days or apps from unverified publishers.&lt;/li>
&lt;li>&lt;strong>App Governance Add-on:&lt;/strong> Provides advanced machine learning to detect anomalous app behavior, such as an app suddenly downloading a massive volume of data or sending thousands of emails.&lt;/li>
&lt;/ul>
&lt;h2 id="4-information-protection--dlp-integration">4. Information Protection &amp;amp; DLP Integration &lt;a href="#4-information-protection--dlp-integration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>API Connectors:&lt;/strong> Connect Defender for Cloud Apps directly to third-party clouds (Google Workspace, Box, Dropbox) to scan for sensitive data at rest.&lt;/li>
&lt;li>&lt;strong>File Policies:&lt;/strong> Create policies to automatically apply sensitivity labels or remove public sharing links if a file containing PII is detected in a non-Microsoft cloud environment.&lt;/li>
&lt;li>&lt;strong>Unified Labels:&lt;/strong> Defender for Cloud Apps natively reads Microsoft Purview sensitivity labels, ensuring a consistent data protection policy regardless of where the file is stored.&lt;/li>
&lt;/ul>
&lt;h2 id="5-threat-detection--anomaly-policies">5. Threat Detection &amp;amp; Anomaly Policies &lt;a href="#5-threat-detection--anomaly-policies" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Impossible Travel:&lt;/strong> Detects when a user signs in from two geographically distant locations in a timeframe that is physically impossible.&lt;/li>
&lt;li>&lt;strong>Ransomware Detection:&lt;/strong> Identifies patterns of high-volume file deletions or encryptions within cloud storage.&lt;/li>
&lt;li>&lt;strong>Activity Policies:&lt;/strong> Custom alerts for specific administrative actions, such as &amp;ldquo;Multiple failed login attempts to a sanctioned app&amp;rdquo; or &amp;ldquo;Creation of a new global admin in a third-party cloud.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoft-graph--api">6. Essential PowerShell Cmdlets (Microsoft Graph &amp;amp; API) &lt;a href="#6-essential-powershell-cmdlets-microsoft-graph--api" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>
&lt;p>&lt;em>Note: Most CASB management is performed via the portal or the Cloud App Security API. Management via the Microsoft Graph PowerShell SDK is the modern standard for automation.&lt;/em>&lt;/p></description></item><item><title>4.4) Defender for Identity &amp; XDR</title><link>http://kb.njit.io/docs/m365-consulting/4.4-defender-for-identity-and-xdr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/4.4-defender-for-identity-and-xdr/</guid><description>&lt;h2 id="1-defender-for-identity-mdi--on-premises-security">1. Defender for Identity (MDI) &amp;amp; On-Premises Security &lt;a href="#1-defender-for-identity-mdi--on-premises-security" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Sensor:&lt;/strong> Installed directly on Domain Controllers and AD FS servers. It parses network traffic (RPC, LDAP, Kerberos) and Windows Events to detect threats that bypass traditional logs.&lt;/li>
&lt;li>&lt;strong>Detection Categories:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Reconnaissance:&lt;/strong> Enumeration of users/groups, DNS reconnaissance, and SMB session enumeration.&lt;/li>
&lt;li>&lt;strong>Lateral Movement:&lt;/strong> Pass-the-Ticket, Pass-the-Hash, and malicious service creation.&lt;/li>
&lt;li>&lt;strong>Domain Dominance:&lt;/strong> Skeleton Key, Golden Ticket, and Malicious Data Protection API (DPAPI) requests.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Identity Security Posture (ISPM):&lt;/strong> Integrated into Microsoft Secure Score to identify legacy protocols (NTLMv1), unsecure account attributes, and clear-text password exposures.&lt;/li>
&lt;/ul>
&lt;h2 id="2-microsoft-defender-xdr-unified-correlation">2. Microsoft Defender XDR (Unified Correlation) &lt;a href="#2-microsoft-defender-xdr-unified-correlation" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Incident View:&lt;/strong> Automatically correlates isolated alerts from Defender for Endpoint, Office 365, Identity, and Cloud Apps into a single &lt;strong>Incident&lt;/strong>. This reduces alert fatigue by grouping the &amp;ldquo;story&amp;rdquo; of an attack (e.g., Phish -&amp;gt; Compromised User -&amp;gt; Lateral Movement -&amp;gt; Data Exfiltration).&lt;/li>
&lt;li>&lt;strong>Signal Sharing:&lt;/strong> Enabling &amp;ldquo;Microsoft Defender XDR integration&amp;rdquo; allows different workloads to share signals. For example, if a device is marked as &amp;ldquo;High Risk&amp;rdquo; by MDE, Entra ID can automatically block that user&amp;rsquo;s sign-in via Conditional Access.&lt;/li>
&lt;li>&lt;strong>The Unified Portal:&lt;/strong> Centralizes all security operations (security.microsoft.com), replacing the legacy per-product admin centers.&lt;/li>
&lt;/ul>
&lt;h2 id="3-automated-investigation-and-response-air">3. Automated Investigation and Response (AIR) &lt;a href="#3-automated-investigation-and-response-air" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Cross-Product Playbooks:&lt;/strong> When an incident triggers, AIR executes playbooks that span workloads. It can simultaneously quarantine an email (O365), isolate a device (Endpoint), and disable a compromised user (Identity).&lt;/li>
&lt;li>&lt;strong>Evidence &amp;amp; Entity Center:&lt;/strong> Provides a unified list of all files, processes, URLs, and accounts involved in an investigation, allowing for a &amp;ldquo;one-click&amp;rdquo; remediation across the entire environment.&lt;/li>
&lt;li>&lt;strong>Action Center:&lt;/strong> The single pane of glass for approving or auditing all automated remediation actions.&lt;/li>
&lt;/ul>
&lt;h2 id="4-advanced-hunting-kql">4. Advanced Hunting (KQL) &lt;a href="#4-advanced-hunting-kql" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Schema:&lt;/strong> Use Kusto Query Language (KQL) to query raw data across all Defender workloads.
&lt;ul>
&lt;li>&lt;code>IdentityLogonEvents&lt;/code>: Tracks all authentication attempts across on-prem and cloud.&lt;/li>
&lt;li>&lt;code>IdentityDirectoryEvents&lt;/code>: Tracks changes to AD objects (e.g., group membership changes, password resets).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Proactive Hunting:&lt;/strong> Go beyond alerts by searching for &amp;ldquo;Indicators of Attack&amp;rdquo; (IoA) that haven&amp;rsquo;t triggered a formal alert yet, such as suspicious PowerShell execution patterns or unusual cross-domain traffic.&lt;/li>
&lt;/ul>
&lt;h2 id="5-microsoft-sentinel-integration">5. Microsoft Sentinel Integration &lt;a href="#5-microsoft-sentinel-integration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The SIEM/SOAR Connection:&lt;/strong> While Defender XDR handles the Microsoft stack, Sentinel provides the broader view (firewalls, third-party clouds, multi-vendor logs).&lt;/li>
&lt;li>&lt;strong>Defender XDR Connector:&lt;/strong> Use the bi-directional sync connector to ensure that closing an incident in Sentinel also closes it in the Defender portal, and vice versa.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell--diagnostic-tools">6. Essential PowerShell &amp;amp; Diagnostic Tools &lt;a href="#6-essential-powershell--diagnostic-tools" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>MDI Sensor Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Test-MdiSensorApiConnection.ps1&lt;/code>: (Bundled with the sensor) Validates that the Domain Controller can reach the MDI cloud service.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>KQL Query Example (Advanced Hunting Portal):&lt;/strong>


 
 &lt;pre tabindex="0">&lt;code class="language-kql" data-lang="kql">// Find users who had a failed logon followed by a successful one from a different IP
IdentityLogonEvents
| where ActionType == &amp;#34;LogonFailed&amp;#34;
| join kind=inner (IdentityLogonEvents | where ActionType == &amp;#34;LogonSuccess&amp;#34;) on AccountObjectId
| where IPAddress != IPAddress1&lt;/code>&lt;/pre>
&lt;/li>
&lt;li>&lt;strong>Microsoft Defender for Identity Health:&lt;/strong> Monitor the &amp;ldquo;Health Issues&amp;rdquo; tab in the portal specifically for &amp;ldquo;Packet fragmentation&amp;rdquo; or &amp;ldquo;Dropped events&amp;rdquo; which indicate the DC is overloaded or the sensor is misconfigured.&lt;/li>
&lt;/ul></description></item><item><title>Continual Improvement</title><link>http://kb.njit.io/docs/frameworks/itil/continual-improvement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/itil/continual-improvement/</guid><description>&lt;p>Just as project management frameworks require tailoring to fit the environment, ITIL 4 recognizes that IT service management cannot be static. Organizations must continually adopt and adapt the framework, their services, and their operating models to meet evolving business demands, technological advancements, and external pressures. This adaptability is driven by the concept of &lt;strong>Continual Improvement&lt;/strong>.&lt;/p>
&lt;p>Continual Improvement happens at all levels of the organization, from strategic executive decisions down to the operational activities of individual teams. It applies to all Four Dimensions of Service Management and all activities within the Service Value Chain.&lt;/p></description></item><item><title>Tailoring PRINCE2</title><link>http://kb.njit.io/docs/frameworks/prince2/tailoring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/frameworks/prince2/tailoring/</guid><description>&lt;h2 id="why-tailor">Why Tailor? &lt;a href="#why-tailor" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>The primary reason for tailoring is to ensure that the project management method applied is appropriate for the project&amp;rsquo;s specific circumstances. Applying the full PRINCE2 methodology rigidly, without adaptation (&amp;lsquo;robotically&amp;rsquo;), can lead to unnecessary bureaucracy, especially for smaller or simpler projects. Conversely, insufficient application on complex or high-risk projects can lead to a loss of control. Tailoring aims to strike the right balance, providing adequate governance and control without overburdening the project team, thus making the application of PRINCE2 efficient and relevant.&lt;/p></description></item><item><title>5.1) Microsoft Intune (Endpoint Management)</title><link>http://kb.njit.io/docs/m365-consulting/5.1-microsoft-intune/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/5.1-microsoft-intune/</guid><description>&lt;h2 id="1-compliance-vs-configuration-policies">1. Compliance vs. Configuration Policies &lt;a href="#1-compliance-vs-configuration-policies" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Compliance Policies:&lt;/strong> Define the &amp;ldquo;security floor&amp;rdquo; for a device (e.g., &amp;ldquo;Must have BitLocker enabled,&amp;rdquo; &amp;ldquo;Must be at a specific OS version&amp;rdquo;).
&lt;ul>
&lt;li>&lt;strong>The Signal:&lt;/strong> Compliance status is the primary signal sent to Entra ID.&lt;/li>
&lt;li>&lt;strong>Conditional Access Integration:&lt;/strong> If a device fails a compliance check, Conditional Access can instantly block access to M365 data until the user remediates the issue.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Configuration Profiles:&lt;/strong> The primary tool for managing settings (the &amp;ldquo;GPO of the cloud&amp;rdquo;).
&lt;ul>
&lt;li>&lt;strong>Settings Catalog:&lt;/strong> The modern, preferred interface for finding and configuring thousands of Windows, macOS, and iOS settings.&lt;/li>
&lt;li>&lt;strong>Administrative Templates:&lt;/strong> Familiar ADMX-backed settings for Windows and Office.&lt;/li>
&lt;li>&lt;strong>Conflict Resolution:&lt;/strong> If two profiles configure the same setting with different values, the setting enters a &amp;ldquo;Conflict&amp;rdquo; state and is not applied. Compliance policies, however, do not &amp;ldquo;conflict&amp;rdquo;—if any policy marks a device non-compliant, it is non-compliant.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-device-enrollment--windows-autopilot">2. Device Enrollment &amp;amp; Windows Autopilot &lt;a href="#2-device-enrollment--windows-autopilot" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Enrollment Spectrum:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>BYOD (Registered):&lt;/strong> Users add a &amp;ldquo;Work or School account.&amp;rdquo; Best for Mobile Application Management (MAM).&lt;/li>
&lt;li>&lt;strong>Corporate (Joined):&lt;/strong> Device is fully managed by the organization.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Windows Autopilot:&lt;/strong> A collection of technologies used to set up and pre-configure new devices, getting them ready for productive use.
&lt;ul>
&lt;li>&lt;strong>Hardware Hash:&lt;/strong> The unique identifier required to register a device for Autopilot.&lt;/li>
&lt;li>&lt;strong>Deployment Profiles:&lt;/strong> Control the Out-of-Box Experience (OOBE), such as skipping privacy settings or forcing a &amp;ldquo;Standard&amp;rdquo; vs. &amp;ldquo;Administrator&amp;rdquo; user account.&lt;/li>
&lt;li>&lt;strong>Enrollment Status Page (ESP):&lt;/strong> Displays the installation progress of critical apps and profiles before the user reaches the desktop.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-mobile-application-management-mam-vs-mdm">3. Mobile Application Management (MAM) vs. MDM &lt;a href="#3-mobile-application-management-mam-vs-mdm" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>MAM-WE (Without Enrollment):&lt;/strong> Allows IT to protect corporate data &lt;em>inside&lt;/em> specific apps (Outlook, Teams, OneDrive) without managing the entire personal device.&lt;/li>
&lt;li>&lt;strong>App Protection Policies (APP):&lt;/strong> The core of MAM. Use these to:
&lt;ul>
&lt;li>Prevent &amp;ldquo;Save As&amp;rdquo; to personal storage (local phone or personal Dropbox).&lt;/li>
&lt;li>Restrict &amp;ldquo;Copy/Paste&amp;rdquo; between corporate and personal apps.&lt;/li>
&lt;li>Require a separate PIN or biometric to open corporate apps.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>App Configuration Policies:&lt;/strong> Pre-configure app settings (e.g., the corporate mail server URL) so the user doesn&amp;rsquo;t have to enter them manually.&lt;/li>
&lt;/ul>
&lt;h2 id="4-endpoint-security-integration">4. Endpoint Security Integration &lt;a href="#4-endpoint-security-integration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Security Baseline:&lt;/strong> Pre-configured groups of Windows settings recommended by Microsoft security teams. Use these as a starting point rather than building from scratch.&lt;/li>
&lt;li>&lt;strong>Defender for Endpoint Plug-in:&lt;/strong> Intune is the primary deployment engine for the MDE sensor. Use the &amp;ldquo;Endpoint Security&amp;rdquo; blade to manage Antivirus, Firewall, and EDR settings centrally.&lt;/li>
&lt;li>&lt;strong>Remote Actions:&lt;/strong> Essential for incident response. Use the Intune portal to:
&lt;ul>
&lt;li>&lt;strong>Retire:&lt;/strong> Removes corporate data and management (best for BYOD offboarding).&lt;/li>
&lt;li>&lt;strong>Wipe:&lt;/strong> Factory resets the device (best for lost/stolen corporate hardware).&lt;/li>
&lt;li>&lt;strong>Sync:&lt;/strong> Forces the device to check in immediately for new policies.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="5-troubleshooting--lifecycle">5. Troubleshooting &amp;amp; Lifecycle &lt;a href="#5-troubleshooting--lifecycle" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The &amp;ldquo;Company Portal&amp;rdquo; App:&lt;/strong> The user-facing side of Intune. Users go here to install optional apps and check their device&amp;rsquo;s compliance status.&lt;/li>
&lt;li>&lt;strong>Intune Management Extension (IME):&lt;/strong> A background service on Windows that handles the execution of PowerShell scripts and the installation of Win32 apps.&lt;/li>
&lt;li>&lt;strong>Log Analysis:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Local Logs:&lt;/strong> Check &lt;code>C:\ProgramData\Microsoft\IntuneManagementExtension\Logs&lt;/code> for Win32 app and script failures.&lt;/li>
&lt;li>&lt;strong>Portal Logs:&lt;/strong> Use &amp;ldquo;Troubleshooting + support&amp;rdquo; to see a per-user view of every policy and app deployment status.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoftgraphintune">6. Essential PowerShell Cmdlets (Microsoft.Graph.Intune) &lt;a href="#6-essential-powershell-cmdlets-microsoftgraphintune" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Connect-MgGraph -Scopes &amp;quot;DeviceManagementManagedDevices.ReadWrite.All&amp;quot;, &amp;quot;DeviceManagementConfiguration.ReadWrite.All&amp;quot;&lt;/code>&lt;/li>
&lt;li>&lt;strong>Inventory &amp;amp; Discovery:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Get all devices for a user:&lt;/strong> &lt;code>Get-MgUserManagedDevice -UserId user@domain.com&lt;/code>&lt;/li>
&lt;li>&lt;strong>Find devices by OS:&lt;/strong> &lt;code>Get-MgDeviceManagementManagedDevice -Filter &amp;quot;contains(osVersion, '10.0.19041')&amp;quot;&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Management Actions:&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Trigger a Sync:&lt;/strong> &lt;code>Invoke-MgDeviceManagementManagedDeviceSyncDevice -ManagedDeviceId &amp;lt;ID&amp;gt;&lt;/code>&lt;/li>
&lt;li>&lt;strong>Retire a Device:&lt;/strong> &lt;code>Invoke-MgDeviceManagementManagedDeviceRetire -ManagedDeviceId &amp;lt;ID&amp;gt;&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Autopilot Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-MgDeviceManagementWindowsAutopilotDeviceIdentity&lt;/code> (Lists registered Autopilot devices)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>5.2) Microsoft Copilot</title><link>http://kb.njit.io/docs/m365-consulting/5.2-microsoft-copilot/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/5.2-microsoft-copilot/</guid><description>&lt;h2 id="1-architecture--the-oversharing-risk-the-1-priority">1. Architecture &amp;amp; The &amp;ldquo;Oversharing&amp;rdquo; Risk (The #1 Priority) &lt;a href="#1-architecture--the-oversharing-risk-the-1-priority" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Golden Rule of Copilot:&lt;/strong> Copilot &lt;em>never&lt;/em> bypasses existing permissions. It utilizes the Microsoft Graph and Semantic Index to surface data, meaning it can only read what the user executing the prompt explicitly has access to.&lt;/li>
&lt;li>&lt;strong>The Oversharing Crisis:&lt;/strong> If a tenant has historically relied on &amp;ldquo;security by obscurity&amp;rdquo; (e.g., HR files stored on a public SharePoint site but the link was never shared), Copilot will find them and use them to answer user prompts.&lt;/li>
&lt;li>&lt;strong>Remediation Strategy:&lt;/strong> Before deploying Copilot, you must execute a &amp;ldquo;Data Readiness&amp;rdquo; assessment. Use SharePoint Advanced Management (SAM) or Purview Data Access reports to identify and lock down sites with excessive &amp;ldquo;Everyone except external users&amp;rdquo; permissions or broad sharing links.&lt;/li>
&lt;/ul>
&lt;h2 id="2-licensing--versions">2. Licensing &amp;amp; Versions &lt;a href="#2-licensing--versions" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Microsoft Copilot (formerly Bing Chat Enterprise):&lt;/strong> Free with E3/E5 licenses. Provides AI chat grounded in the public web, but with Commercial Data Protection (prompts are not saved, data is not used to train the model, Microsoft cannot see the data).&lt;/li>
&lt;li>&lt;strong>Microsoft 365 Copilot:&lt;/strong> The paid enterprise add-on. This version is grounded in the tenant&amp;rsquo;s Microsoft Graph data (emails, chats, SharePoint files) and integrates directly into the M365 desktop apps (Word, Excel, PowerPoint, Teams).&lt;/li>
&lt;li>&lt;strong>Prerequisites:&lt;/strong> Users must be on the &amp;ldquo;Current Channel&amp;rdquo; or &amp;ldquo;Monthly Enterprise Channel&amp;rdquo; for M365 Apps. Copilot relies heavily on OneDrive; if a user does not have OneDrive provisioned or enabled, their Copilot experience in desktop apps will break.&lt;/li>
&lt;/ul>
&lt;h2 id="3-administration--governance-controls">3. Administration &amp;amp; Governance Controls &lt;a href="#3-administration--governance-controls" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Web Grounding Toggle:&lt;/strong> In the M365 Admin Center, you can control whether Microsoft 365 Copilot is allowed to query the public web (Bing) to supplement its answers, or if it must &lt;em>only&lt;/em> use internal Graph data. (Highly regulated industries often disable web grounding).&lt;/li>
&lt;li>&lt;strong>Plugin &amp;amp; Extension Management:&lt;/strong> Copilot&amp;rsquo;s capabilities can be extended via Microsoft Teams apps and custom plugins. The enterprise standard is to block all third-party plugins by default via the Integrated Apps portal, requiring a security review before enabling them for Copilot.&lt;/li>
&lt;li>&lt;strong>Semantic Index:&lt;/strong> A backend capability that maps relationships between users and data. It is enabled at the tenant level. Without it, Copilot&amp;rsquo;s ability to find relevant internal documents drops significantly.&lt;/li>
&lt;/ul>
&lt;h2 id="4-security--purview-integration">4. Security &amp;amp; Purview Integration &lt;a href="#4-security--purview-integration" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Sensitivity Labels (Information Protection):&lt;/strong> Copilot natively respects Purview Sensitivity Labels.
&lt;ul>
&lt;li>If a user prompts Copilot to summarize a Word document labeled &amp;ldquo;Highly Confidential,&amp;rdquo; the generated response in the chat will also be marked as &amp;ldquo;Highly Confidential.&amp;rdquo;&lt;/li>
&lt;li>If a document&amp;rsquo;s label restricts the &amp;ldquo;Extract&amp;rdquo; usage right, Copilot will refuse to summarize or read that document.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Data Loss Prevention (DLP):&lt;/strong> Copilot interactions are audited. You can configure Endpoint DLP policies to prevent users from copying/pasting sensitive Copilot responses into unsanctioned applications.&lt;/li>
&lt;/ul>
&lt;h2 id="5-adoption--stakeholder-management">5. Adoption &amp;amp; Stakeholder Management &lt;a href="#5-adoption--stakeholder-management" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Managing Expectations:&lt;/strong> Stakeholders often treat Copilot like a search engine. A Consultant must educate them that it is a &lt;em>reasoning&lt;/em> engine. It hallucinates, and its outputs require human verification.&lt;/li>
&lt;li>&lt;strong>Prompt Engineering Framework (The 4 Pillars):&lt;/strong> &lt;a href="https://support.microsoft.com/en-au/topic/learn-about-copilot-prompts-f6c3b467-f07c-4db1-ae54-ffac96184dd5" rel="external" target="_blank">Teach users how to structure requests&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>. A good prompt requires:
&lt;ol>
&lt;li>&lt;strong>Goal:&lt;/strong> What do you want? &lt;em>(e.g., &amp;ldquo;Draft an email&amp;rdquo;)&lt;/em>&lt;/li>
&lt;li>&lt;strong>Context:&lt;/strong> Why do you need it? &lt;em>(e.g., &amp;ldquo;To update the marketing team on the Q3 delays&amp;rdquo;)&lt;/em>&lt;/li>
&lt;li>&lt;strong>Expectation:&lt;/strong> How should it look? &lt;em>(e.g., &amp;ldquo;Make it a bulleted list and keep the tone professional&amp;rdquo;)&lt;/em>&lt;/li>
&lt;li>&lt;strong>Source:&lt;/strong> What data should it use? &lt;em>(e.g., &amp;ldquo;Based on the attached /ProjectStatus.docx&amp;rdquo;)&lt;/em>&lt;/li>
&lt;/ol>
&lt;/li>
&lt;li>&lt;strong>High-Value Quick Wins:&lt;/strong> Point delivery teams to the highest ROI features first: Teams Meeting Recap (summarizing action items from a transcript), drafting Word documents based on PowerPoint presentations, and summarizing unread email threads in Outlook.&lt;/li>
&lt;/ul></description></item><item><title>5.3) Power Platform</title><link>http://kb.njit.io/docs/m365-consulting/5.3-power-platform/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/5.3-power-platform/</guid><description>&lt;h2 id="1-environment-strategy">1. Environment Strategy &lt;a href="#1-environment-strategy" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Default Environment:&lt;/strong> Every tenant has one. It cannot be deleted or disabled. Every user with a license is an Environment Maker.
&lt;ul>
&lt;li>&lt;strong>Best Practice:&lt;/strong> Rename it (e.g., &amp;ldquo;[Company Name] - Personal Productivity&amp;rdquo;) and set the expectation that this is for personal non-critical apps.&lt;/li>
&lt;li>&lt;strong>Shared Environment, Private Items:&lt;/strong> Everyone has &amp;ldquo;entry&amp;rdquo; to the environment and the permission to create their own resources, however, for other standard users to see an item, you must explicitly share it with them.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Dedicated Environments (Prod/Dev/Test):&lt;/strong> Create dedicated environments for departmental or enterprise-grade solutions.
&lt;ul>
&lt;li>&lt;em>Managed Environments:&lt;/em> Provides extra governance features (e.g., sharing limits, usage insights, data policies) but requires every user accessing an app in that environment to have a Premium license.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Dataverse:&lt;/strong> The underlying database. Environments can be created with or without a Dataverse database. Enterprise apps usually require Dataverse for relational data storage and granular security roles.&lt;/li>
&lt;/ul>
&lt;h2 id="2-power-platform-data-loss-prevention-dlp">2. Power Platform Data Loss Prevention (DLP) &lt;a href="#2-power-platform-data-loss-prevention-dlp" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connector Categorization:&lt;/strong> Connectors are grouped into three buckets within a DLP policy:
&lt;ol>
&lt;li>&lt;strong>Business:&lt;/strong> Data can be shared between these connectors (e.g., SharePoint, Outlook, Dataverse).&lt;/li>
&lt;li>&lt;strong>Non-Business (General):&lt;/strong> Data can be shared between these, but &lt;em>not&lt;/em> with connectors in the Business bucket.&lt;/li>
&lt;li>&lt;strong>Blocked:&lt;/strong> Connectors that are entirely disabled for use (e.g., Twitter, Facebook, personal Dropbox).&lt;/li>
&lt;/ol>
&lt;/li>
&lt;li>&lt;strong>Policy Scoping:&lt;/strong> Policies can be applied to &amp;ldquo;All Environments,&amp;rdquo; &amp;ldquo;Multiple Environments,&amp;rdquo; or &amp;ldquo;Exclude Specific Environments.&amp;rdquo;
&lt;ul>
&lt;li>&lt;em>Strategy:&lt;/em> Apply a highly restrictive &amp;ldquo;Tenant-Wide&amp;rdquo; policy and create less restrictive policies for specific, sanctioned &amp;ldquo;Project&amp;rdquo; environments.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-licensing--capacity">3. Licensing &amp;amp; Capacity &lt;a href="#3-licensing--capacity" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Standard vs. Premium:&lt;/strong>
&lt;ul>
&lt;li>&lt;em>Standard:&lt;/em> Included with M365 E3/E5. Covers basic connectors (SharePoint, OneDrive, Excel, Outlook).&lt;/li>
&lt;li>&lt;em>Premium:&lt;/em> Required for &amp;ldquo;Premium&amp;rdquo; connectors (SQL, HTTP, Azure DevOps), On-premises Gateways, and Dataverse.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>License Types:&lt;/strong>
&lt;ul>
&lt;li>&lt;em>Per User:&lt;/em> User can run unlimited apps.&lt;/li>
&lt;li>&lt;em>Per App:&lt;/em> User can run one specific app in one environment (assigned to the environment&amp;rsquo;s capacity).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Capacity:&lt;/strong> Power Platform storage is shared across the tenant and split into &lt;strong>Database&lt;/strong> (Dataverse tables), &lt;strong>File&lt;/strong> (attachments/images), and &lt;strong>Log&lt;/strong> (audit trails).&lt;/li>
&lt;/ul>
&lt;h2 id="4-the-center-of-excellence-coe-starter-kit">4. The Center of Excellence (CoE) Starter Kit &lt;a href="#4-the-center-of-excellence-coe-starter-kit" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Purpose:&lt;/strong> A Microsoft-provided collection of components (Power Apps, Flows, and Power BI) designed to help admins move beyond reactive management.&lt;/li>
&lt;li>&lt;strong>Inventory:&lt;/strong> Automatically crawls the tenant to identify every App and Flow, who created them, and how often they are used.&lt;/li>
&lt;li>&lt;strong>Compliance Flow:&lt;/strong> Can automatically email makers of &amp;ldquo;orphaned&amp;rdquo; apps (where the owner has left the company) or apps that violate naming conventions, asking them to provide a business justification or the app will be deleted.&lt;/li>
&lt;/ul>
&lt;h2 id="5-on-premises-data-gateways">5. On-Premises Data Gateways &lt;a href="#5-on-premises-data-gateways" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Function:&lt;/strong> Allows Power Apps and Power Automate to securely access data residing on-premises (e.g., SQL Server, File Shares, SAP).&lt;/li>
&lt;li>&lt;strong>Management:&lt;/strong> Gateways are installed on an on-premises server. Admins must manage the &amp;ldquo;Gateway Cluster&amp;rdquo; to ensure high availability.&lt;/li>
&lt;li>&lt;strong>Security:&lt;/strong> Users must have their own credentials to the data source; the gateway does not bypass the underlying data source&amp;rsquo;s permissions.&lt;/li>
&lt;/ul>
&lt;h2 id="6-essential-powershell-cmdlets-microsoftpowerappsadministrationpowershell">6. Essential PowerShell Cmdlets (Microsoft.PowerApps.Administration.PowerShell) &lt;a href="#6-essential-powershell-cmdlets-microsoftpowerappsadministrationpowershell" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Connection:&lt;/strong> &lt;code>Add-PowerAppsAccount&lt;/code>&lt;/li>
&lt;li>&lt;strong>Environment Discovery:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-AdminPowerAppEnvironment&lt;/code> (Lists all environments)&lt;/li>
&lt;li>&lt;code>Get-AdminPowerApp -EnvironmentName &amp;lt;ID&amp;gt;&lt;/code> (Lists all apps in a specific environment)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>DLP Management:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Get-AdminDlpPolicy&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Ownership Reassignment:&lt;/strong>
&lt;ul>
&lt;li>&lt;code>Set-AdminPowerAppOwner -AppId &amp;lt;AppID&amp;gt; -EnvironmentName &amp;lt;EnvID&amp;gt; -NewOwner &amp;lt;UserUPN&amp;gt;&lt;/code> (Critical for offboarding/orphaned apps)&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description></item><item><title>6.1) ITIL Fundamentals</title><link>http://kb.njit.io/docs/m365-consulting/6.1-itil-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/6.1-itil-fundamentals/</guid><description>&lt;h2 id="1-incident-vs-problem-management-the-break-fix-boundary">1. Incident vs. Problem Management (The Break-Fix Boundary) &lt;a href="#1-incident-vs-problem-management-the-break-fix-boundary" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Do not treat every recurring outage as a standalone emergency. As a Consultant, you are expected to elevate the operation from reactive firefighting to proactive root-cause resolution.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Incident Management:&lt;/strong> The goal is to restore normal service operations as quickly as possible. Workarounds are entirely acceptable here. &lt;em>(e.g., &amp;ldquo;The user&amp;rsquo;s Teams desktop app is crashing; clear the cache and have them use Teams on the Web so they can join their current meeting.&amp;rdquo;)&lt;/em>&lt;/li>
&lt;li>&lt;strong>Problem Management:&lt;/strong> The goal is to identify the root cause of one or more Incidents to prevent them from happening again. &lt;em>(e.g., &amp;ldquo;Why are 50 users experiencing Teams desktop crashes after the latest Intune deployment? We need to analyze the deployment logs and correct the packaging.&amp;rdquo;)&lt;/em>&lt;/li>
&lt;li>&lt;strong>The Consultant Pivot:&lt;/strong> When you see Helpdesk logging the same Incident multiple times, step in, declare a &amp;ldquo;Problem,&amp;rdquo; and lead the root cause analysis.&lt;/li>
&lt;/ul>
&lt;h2 id="2-navigating-change-management-the-cab">2. Navigating Change Management (The CAB) &lt;a href="#2-navigating-change-management-the-cab" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Never walk into a Change Advisory Board (CAB) meeting with a &amp;ldquo;we&amp;rsquo;ll figure it out&amp;rdquo; attitude. You are dealing with business-critical M365 infrastructure. You must accurately classify your changes and prepare the necessary documentation.&lt;/p></description></item><item><title>6.2) Issue Ownership</title><link>http://kb.njit.io/docs/m365-consulting/6.2-issue-ownership/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/6.2-issue-ownership/</guid><description>&lt;h2 id="1-the-definition-of-ownership">1. The Definition of &amp;ldquo;Ownership&amp;rdquo; &lt;a href="#1-the-definition-of-ownership" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>In a senior role, &amp;ldquo;owning&amp;rdquo; an issue does not mean you have to personally execute every fix. It means you own the &lt;em>resolution lifecycle&lt;/em>. You are the primary shield protecting the role owner from operational noise.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>The Consultant Mindset:&lt;/strong> You are the investigator, the communicator, and the triage engineer. You only pass the baton when a definitive architectural or financial boundary is hit.&lt;/li>
&lt;li>&lt;strong>The &amp;ldquo;Black Hole&amp;rdquo; Avoidance:&lt;/strong> Stakeholders escalate when they feel ignored. Ownership means proactively communicating the status (&amp;ldquo;I have reproduced the issue and am analyzing the Entra logs&amp;rdquo;) even if you don&amp;rsquo;t have the fix yet.&lt;/li>
&lt;/ul>
&lt;h2 id="2-the-triage-boundary-own-vs-escalate">2. The Triage Boundary (Own vs. Escalate) &lt;a href="#2-the-triage-boundary-own-vs-escalate" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Establish clear rules of engagement for what you resolve independently versus what requires the role owner.&lt;/p></description></item><item><title>6.3) The Escalation Framework</title><link>http://kb.njit.io/docs/m365-consulting/6.3-the-escalation-framework/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/6.3-the-escalation-framework/</guid><description>&lt;h2 id="1-the-trigger-conditions">1. The Trigger Conditions &lt;a href="#1-the-trigger-conditions" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Do not escalate simply because a problem is difficult; escalate because a boundary has been crossed. The four definitive triggers for escalating to the role owner are:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Architecture/Security Boundary:&lt;/strong> The solution requires bypassing a baseline Conditional Access policy, changing a tenant-wide sharing setting, or modifying global identity sync rules.&lt;/li>
&lt;li>&lt;strong>Financial Boundary:&lt;/strong> The solution requires purchasing net-new licenses (e.g., Entra ID P2, Teams Premium, Power Apps Premium) or Azure consumption resources.&lt;/li>
&lt;li>&lt;strong>Systemic Outage:&lt;/strong> A core service degradation affecting a significant portion of the environment (after verifying the Microsoft Service Health Dashboard).&lt;/li>
&lt;li>&lt;strong>Political Deadlock:&lt;/strong> A highly-ranked stakeholder refuses the compliant alternative after you have clearly documented the technical and compliance risks.&lt;/li>
&lt;/ul>
&lt;h2 id="2-the-standardized-escalation-template">2. The Standardized Escalation Template &lt;a href="#2-the-standardized-escalation-template" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Never forward a messy, 15-reply email chain to the role owner with a note saying &amp;ldquo;Thoughts?&amp;rdquo; Package the escalation into a concise, easily digestible format that forces a decision.&lt;/p></description></item><item><title>6.4) Managing Ambiguity</title><link>http://kb.njit.io/docs/m365-consulting/6.4-managing-ambiguity/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/6.4-managing-ambiguity/</guid><description>&lt;h2 id="1-the-consultants-mindset">1. The Consultant&amp;rsquo;s Mindset &lt;a href="#1-the-consultants-mindset" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>In an enterprise, &amp;ldquo;lack of documentation&amp;rdquo; can be the default state, not an exception. You are being paid for your ability to operate in the gray.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>The Rule of Assumption:&lt;/strong> Assume every bizarre, seemingly illogical configuration was put there for a specific, urgent business reason at the time. Do not tear down a fence until you know why it was built, see &lt;a href="https://www.google.com/search?q=Chesterton’s+Fence" rel="external" target="_blank">Chesterton’s Fence&lt;svg width="16" height="16" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">&lt;path fill="currentColor" d="M14 5c-.552 0-1-.448-1-1s.448-1 1-1h6c.552 0 1 .448 1 1v6c0 .552-.448 1-1 1s-1-.448-1-1v-3.586l-7.293 7.293c-.391.39-1.024.39-1.414 0-.391-.391-.391-1.024 0-1.414l7.293-7.293h-3.586zm-9 2c-.552 0-1 .448-1 1v11c0 .552.448 1 1 1h11c.552 0 1-.448 1-1v-4.563c0-.552.448-1 1-1s1 .448 1 1v4.563c0 1.657-1.343 3-3 3h-11c-1.657 0-3-1.343-3-3v-11c0-1.657 1.343-3 3-3h4.563c.552 0 1 .448 1 1s-.448 1-1 1h-4.563z"/>&lt;/svg>&lt;/a>.&lt;/li>
&lt;li>&lt;strong>Investigation over Escalation:&lt;/strong> Never escalate a ticket to the role owner stating, &amp;ldquo;I don&amp;rsquo;t know what this does.&amp;rdquo; Escalate by stating, &amp;ldquo;I have traced this undocumented configuration to X, and it appears to impact Y. Should we decommission it?&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h2 id="2-forensic-discovery-your-hidden-documentation">2. Forensic Discovery (Your &amp;ldquo;Hidden&amp;rdquo; Documentation) &lt;a href="#2-forensic-discovery-your-hidden-documentation" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>When SharePoint wikis and IT portals are empty, the Microsoft 365 backend logs become your source of truth.&lt;/p></description></item><item><title>7.1) The Consultant Muscle</title><link>http://kb.njit.io/docs/m365-consulting/7.1-the-consultant-muscle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/7.1-the-consultant-muscle/</guid><description>&lt;h2 id="1-the-intake-framework-uncovering-the-why">1. The Intake Framework (Uncovering the &amp;ldquo;Why&amp;rdquo;) &lt;a href="#1-the-intake-framework-uncovering-the-why" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Golden Rule:&lt;/strong> Users ask for &lt;em>solutions&lt;/em> (e.g., &amp;ldquo;I need a custom Power Automate flow to break inheritance on 500 folders&amp;rdquo;). A good Consultant must uncover the &lt;em>requirement&lt;/em> (e.g., &amp;ldquo;We need to securely share specific documents with different external vendors&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>The Triage Questions:&lt;/strong> Before reviewing any technical solution, establish:
&lt;ol>
&lt;li>&lt;strong>Data Classification:&lt;/strong> What is the sensitivity of the data being handled? (Dictates the required Purview labels and sharing restrictions).&lt;/li>
&lt;li>&lt;strong>Audience &amp;amp; Lifecycle:&lt;/strong> Who is the audience (Internal vs. B2B Guests), and when does this project end? (Dictates identity lifecycle and M365 Group expiration).&lt;/li>
&lt;li>&lt;strong>Supportability:&lt;/strong> Who owns this when the project is over? If it requires custom code (e.g., SPFx, complex Power Apps), is there an internal developer team to maintain it?&lt;/li>
&lt;/ol>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-evaluating-requests-against-existing-governance">2. Evaluating Requests Against Existing Governance &lt;a href="#2-evaluating-requests-against-existing-governance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Strategy Alignment Check:&lt;/strong> You are there to enforce the &lt;em>existing&lt;/em> strategy, not invent a new one. Filter requests through these baseline questions:
&lt;ul>
&lt;li>&lt;em>Is this out-of-the-box (OOTB)?&lt;/em> Always default to native M365 capabilities before approving third-party apps or custom development.&lt;/li>
&lt;li>&lt;em>Does it bypass security controls?&lt;/em> (e.g., Requests for service accounts that bypass MFA, or requests to disable DLP for a specific executive).&lt;/li>
&lt;li>&lt;em>Does it scale?&lt;/em> (e.g., Manually managing item-level permissions works for 10 files, but fails for 10,000. Pivot the user to a metadata-driven approach or separate Document Libraries).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="3-constructive-pushback-the-art-of-the-compliant-no">3. Constructive Pushback (The Art of the Compliant &amp;ldquo;No&amp;rdquo;) &lt;a href="#3-constructive-pushback-the-art-of-the-compliant-no" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>The Framework (Acknowledge -&amp;gt; State Risk -&amp;gt; Provide Alternative):&lt;/strong> Never issue a flat &amp;ldquo;No.&amp;rdquo;
&lt;ul>
&lt;li>&lt;em>Example Request:&lt;/em> &amp;ldquo;We need a shared mailbox for 50 people.&amp;rdquo;&lt;/li>
&lt;li>&lt;em>Acknowledge:&lt;/em> &amp;ldquo;I understand the team needs a central place to receive and manage these generic inquiries.&amp;rdquo;&lt;/li>
&lt;li>&lt;em>State Risk:&lt;/em> &amp;ldquo;However, adding 50 people to a single shared mailbox will cause severe Outlook performance issues, sync delays, and lacks an audit trail of who replied to what.&amp;rdquo;&lt;/li>
&lt;li>&lt;em>Provide Alternative:&lt;/em> &amp;ldquo;To align with our M365 standards, we should set this up as a Microsoft Teams shared channel or a Group-connected Team site, which is designed for large-scale collaboration.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Depersonalize the Decision:&lt;/strong> Reference the policy, not your personal opinion. Use phrases like, &amp;ldquo;To align with the organization&amp;rsquo;s Zero Trust framework&amp;hellip;&amp;rdquo; or &amp;ldquo;Based on the enterprise M365 architectural guardrails&amp;hellip;&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h2 id="4-practical-translation-for-delivery-teams">4. Practical Translation for Delivery Teams &lt;a href="#4-practical-translation-for-delivery-teams" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Avoid &amp;ldquo;Policy Parroting&amp;rdquo;:&lt;/strong> Do not just send delivery teams a link to a 50-page governance PDF.&lt;/li>
&lt;li>&lt;strong>Provide the &amp;ldquo;How-To&amp;rdquo;:&lt;/strong> Translate the governance into actionable, step-by-step configurations.
&lt;ul>
&lt;li>&lt;em>Bad:&lt;/em> &amp;ldquo;Ensure your new SharePoint site complies with the external sharing policy.&amp;rdquo;&lt;/li>
&lt;li>&lt;em>Good:&lt;/em> &amp;ldquo;When provisioning this site, you must run &lt;code>Set-PnPTenantSite -SharingCapability ExistingExternalUserSharingOnly&lt;/code> and assign the &amp;lsquo;Confidential&amp;rsquo; sensitivity label to the connected M365 Group.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Standardized Templates:&lt;/strong> If you notice delivery teams repeatedly asking the same questions, create a 1-page standard operating procedure (SOP) or a PowerShell snippet they can reuse.&lt;/li>
&lt;/ul></description></item><item><title>7.2) Constructive Pushback</title><link>http://kb.njit.io/docs/m365-consulting/7.2-constructive-pushback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/7.2-constructive-pushback/</guid><description>&lt;h2 id="1-the-core-framework-ara">1. The Core Framework (ARA) &lt;a href="#1-the-core-framework-ara" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>When pushing back against a misaligned request, never use a flat &amp;ldquo;No&amp;rdquo; or cite personal preference. Rely on the &lt;strong>Acknowledge -&amp;gt; Risk -&amp;gt; Alternative (ARA)&lt;/strong> framework to remain collaborative while strictly enforcing governance.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Acknowledge:&lt;/strong> Validate the underlying business requirement. Users don&amp;rsquo;t want to break the rules; they just want to solve a workflow problem.&lt;/li>
&lt;li>&lt;strong>Risk (Objective):&lt;/strong> Cite the specific enterprise constraint (Security, Governance, Scale, or Cost) that blocks their proposed solution. Depersonalize it (&amp;ldquo;The framework requires&amp;hellip;&amp;rdquo; not &amp;ldquo;I won&amp;rsquo;t let you&amp;hellip;&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Alternative (Compliant):&lt;/strong> Pivot immediately to the native Microsoft 365 solution that solves their business problem within the guardrails.&lt;/li>
&lt;/ul>
&lt;h2 id="2-common-m365-scenarios--phrasing-templates">2. Common M365 Scenarios &amp;amp; Phrasing Templates &lt;a href="#2-common-m365-scenarios--phrasing-templates" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>&lt;strong>Scenario A: The &amp;ldquo;VIP Exemption&amp;rdquo; Request&lt;/strong>&lt;/p></description></item><item><title>7.3) Advising</title><link>http://kb.njit.io/docs/m365-consulting/7.3-advising/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/7.3-advising/</guid><description>&lt;h2 id="1-the-translation-framework-policy-vs-practice">1. The Translation Framework (Policy vs. Practice) &lt;a href="#1-the-translation-framework-policy-vs-practice" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>Delivery teams (Project Managers, Business Analysts, Developers) often view governance as a roadblock because it is written in abstract compliance terms. Your role is to serve as the translator.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>The Anti-Pattern:&lt;/strong> &amp;ldquo;Your proposed solution violates the Data Handling Standard v2.4. Please revise.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>The Consultant Pattern:&lt;/strong> &amp;ldquo;Because this project handles PII, the Data Handling Standard requires us to use a dedicated SharePoint site with the external sharing slider set to &amp;lsquo;New and Existing Guests,&amp;rsquo; combined with a 90-day access review policy. Here is how we configure that.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>The Goal:&lt;/strong> Never make the delivery team guess what the compliant solution looks like.&lt;/li>
&lt;/ul>
&lt;h2 id="2-building-the-pre-approved-menu-architectural-patterns">2. Building the &amp;ldquo;Pre-Approved Menu&amp;rdquo; (Architectural Patterns) &lt;a href="#2-building-the-pre-approved-menu-architectural-patterns" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;p>To avoid designing bespoke solutions for every request, mentally categorize M365 collaboration needs into standardized, pre-approved patterns. When advising, you are simply helping them select the right pattern from the menu.&lt;/p></description></item><item><title>7.4) RAID/RAAIDD Logs</title><link>http://kb.njit.io/docs/m365-consulting/7.4-raid-raaidd-logs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://kb.njit.io/docs/m365-consulting/7.4-raid-raaidd-logs/</guid><description>&lt;h2 id="1-the-definitions">1. The Definitions &lt;a href="#1-the-definitions" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>RAID (Project Baseline):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Risk:&lt;/strong> Potential future events that could negatively impact the project (e.g., &amp;ldquo;The upcoming Microsoft API deprecation might break the custom script&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Action:&lt;/strong> Immediate tasks or activities required to maintain momentum.&lt;/li>
&lt;li>&lt;strong>Issue:&lt;/strong> Current, active blockers that are preventing progress (e.g., &amp;ldquo;The production sync is currently failing&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Decision:&lt;/strong> Formal choices made by stakeholders (e.g., &amp;ldquo;The Steering Committee approved the use of PHS over PTA&amp;rdquo;).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>RAAIDD (The Enterprise Expansion):&lt;/strong>
&lt;ul>
&lt;li>&lt;strong>Assumption:&lt;/strong> Facts or conditions taken as true without immediate proof (e.g., &amp;ldquo;Assuming all user devices are already Hybrid-Joined&amp;rdquo;).&lt;/li>
&lt;li>&lt;strong>Dependency:&lt;/strong> External factors the project requires to succeed (e.g., &amp;ldquo;The Intune rollout depends on the network team opening firewall port 443&amp;rdquo;).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h2 id="2-raid-logs-as-a-consultants-shield">2. RAID Logs as a Consultant’s &amp;ldquo;Shield&amp;rdquo; &lt;a href="#2-raid-logs-as-a-consultants-shield" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Decision Tracking:&lt;/strong> Every time a stakeholder chooses a non-standard or &amp;ldquo;Option B&amp;rdquo; path (see 6.3), it must be logged. This creates an audit trail that prevents the Consultant from being held liable for security or performance issues resulting from that choice.&lt;/li>
&lt;li>&lt;strong>Managing Assumptions:&lt;/strong> As a contractor, you often operate with limited initial data. Explicitly logging Assumptions (e.g., &amp;ldquo;Assuming the client has E5 licenses for this Purview feature&amp;rdquo;) allows you to immediately flag a &lt;strong>Risk&lt;/strong> or &lt;strong>Issue&lt;/strong> if that assumption is later proven false.&lt;/li>
&lt;li>&lt;strong>Impact of Dependencies:&lt;/strong> In the M365 ecosystem, dependencies are often external (e.g., the Microsoft roadmap or third-party IdPs). Highlighting these early ensures the project timeline reflects reality, not just the delivery team&amp;rsquo;s optimism.&lt;/li>
&lt;/ul>
&lt;h2 id="3-m365-specific-raid-examples">3. M365 Specific RAID Examples &lt;a href="#3-m365-specific-raid-examples" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Risk:&lt;/strong> &amp;ldquo;Users might experience Outlook sync delays during the first 48 hours of the shared mailbox migration.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>Issue:&lt;/strong> &amp;ldquo;Conditional Access Policy &amp;lsquo;CA001&amp;rsquo; is blocking legitimate logins from the New York office.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>Assumption:&lt;/strong> &amp;ldquo;Assuming the on-premises Active Directory schema is at the minimum required version for Entra Connect.&amp;rdquo;&lt;/li>
&lt;li>&lt;strong>Dependency:&lt;/strong> &amp;ldquo;Completion of the Exchange Hybrid setup is dependent on the firewall team publishing the on-premises EWS endpoint.&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h2 id="4-best-practices-for-maintenance">4. Best Practices for Maintenance &lt;a href="#4-best-practices-for-maintenance" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Centralization:&lt;/strong> Never keep the log in a private document. Use a &lt;strong>Microsoft List&lt;/strong> within the project’s Team site to ensure real-time visibility and collaborative ownership.&lt;/li>
&lt;li>&lt;strong>Weekly Rhythm:&lt;/strong> Review the log during every status meeting. Focus on converting &lt;strong>Risks&lt;/strong> into &lt;strong>Actions&lt;/strong> (mitigation) and closing &lt;strong>Issues&lt;/strong> to prevent them from becoming &lt;strong>Decisions&lt;/strong> (accepting the status quo).&lt;/li>
&lt;li>&lt;strong>The Handover Value:&lt;/strong> A comprehensive RAID log is the single most important artifact for a clean offboarding. It ensures the role owner understands not just &lt;em>what&lt;/em> is configured, but the historical context of the risks that were identified and the decisions that were made.&lt;/li>
&lt;/ul>
&lt;h2 id="5-essential-tools-for-raid-management">5. Essential Tools for RAID Management &lt;a href="#5-essential-tools-for-raid-management" class="anchor" aria-hidden="true">&lt;i class="material-icons align-middle">link&lt;/i>&lt;/a>&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Microsoft Lists:&lt;/strong> The industry standard for RAID logs. Use the &amp;ldquo;Issue Tracker&amp;rdquo; template as a baseline and customize it with &amp;ldquo;Decision&amp;rdquo; and &amp;ldquo;Risk&amp;rdquo; columns.&lt;/li>
&lt;li>&lt;strong>Microsoft Planner:&lt;/strong> Ideal for the &lt;strong>Action&lt;/strong> and &lt;strong>Issue&lt;/strong> portions of the log to assign specific tasks to delivery team members with due dates.&lt;/li>
&lt;li>&lt;strong>Power BI:&lt;/strong> For large-scale enterprise projects, use Power BI to visualize the &amp;ldquo;Risk Heatmap&amp;rdquo; and &amp;ldquo;Issue Aging&amp;rdquo; to report to executive stakeholders.&lt;/li>
&lt;/ul></description></item></channel></rss>