Sittadel Knowledge Base
Sittadel.com
I'm an Admin!
I'm a User!
Email Help
Webpage Help
Document Sharing Help
Sittadel Security How-To
I'm an Admin!
General
Entra ID
Intune
Microsoft 365 Defender
Purview
Microsoft 365 Admin Center
Exchange Admin Center
SharePoint Admin Center
Teams Admin Center
New to Sittadel?
General
macOS Onboarding
Windows Onboarding
Back to home
Sittadel Knowledge Base
I'm an Admin!
I'm a User!
Email Help
Webpage Help
Document Sharing Help
Sittadel Security How-To
I'm an Admin!
General
Entra ID
Intune
Microsoft 365 Defender
Purview
Microsoft 365 Admin Center
Exchange Admin Center
SharePoint Admin Center
Teams Admin Center
New to Sittadel?
General
macOS Onboarding
Windows Onboarding
I'm an Admin!
Resources for Administrators. Deliver trusted, user-friendly security.
General
Emergency Account Access Work Instruction
URL Comprehensive Check Work Instruction
URL Quick Check Work Instruction
Device Admin Quick Assist Install Procedure
Provide Administrative Assistance Procedure
Provide Enrollment Assistance Procedure
URL Check Procedure
See more
Entra ID
Admin Group Membership Addition Work Instruction
Admin Group Membership Removal Work Instruction
Conditional Access Policy App Exemption Work Instruction
Conditional Access Policy User Exception Work Instruction
Group Membership Addition Work Instruction
Group Membership Removal Work Instruction
Tenant Collaboration B2B Domain Removal Work Instruction
Tenant Collaboration Domain Addition Work Instruction
Tenant Collaboration Domain Removal Work Instruction
Tenant Collaboration External User Invitation Work Instruction
Tenant Collaboration Inbound B2B Domain Addition Work Instruction
Tenant Collaboration Outbound B2B Domain Addition Work Instruction
User Account Authentication Method Reset Work Instruction
User Account Deletion Work Instruction
User Account Disablement Work Instruction
User Account Failed Login Reporting Work Instruction
User Account Password Reset Work Instruction
User Device Deletion Work Instruction
User Failed Login Reporting Work Instruction
User License Assignment Work Instruction
User PIM Eligibility Addition Work Instruction
User PIM Eligibility Removal Work Instruction
Viewing Audit Logs Work Instruction
Viewing Sign-In Logs Work Instruction
Privilege Group Membership Review Procedure
User Login Failure Review Procedure
User Account Offboarding Procedure
User Account Review Procedure
Conditional Access Policy Creation Procedure
Conditional Access Policy Modification Procedure
User Session Revocation Work Instruction
See more
Intune
Defender Antivirus Extension Exclusion Work Instruction
Defender Antivirus Path Exclusion Work Instruction
Defender Antivirus Process Exclusion Work Instruction
Defender ASR All-Rule Exclusion Work Instruction
Defender ASR Per-Rule Exclusion Work Instruction
Defender Firewall Rule Disable Work Instruction
Defender Firewall Rule Enable Work Instruction
Device AutoPilot Reset Initiation Work Instruction
Device BitLocker Drive Unlock Work Instruction
Device BitLocker Key Rotation Initiation Work Instruction
Device Compliance Reporting Work Instruction
Device Configuration Reporting Work Instruction
Device Controlled Folder Access App Exclusion Work Instruction
Device Controlled Folder Access Folder Addition Work Instruction
Device Defender Intelligence Update Initiation Work Instruction
Device Delete Work Instruction
Device Fresh Start Initiation Work Instruction
Device Full Scan Initiation Work Instruction
Device Privilege Escalation Work Instruction
Device Quick Scan Initiation Work Instruction
Device Rename Work Instruction
Device Restart Initiation Work Instruction
Device Retire Initiation Work Instruction
Device Sync Initiation Work Instruction
Device Wipe Initiation Work Instruction
Mobile Device Selective Wipe Initiation Work Instruction
Device Application Creation Procedure
Device Application Modification Procedure
Device Attack Surface Reduction Rule Creation Procedure
Device Attack Surface Reduction Rule Modification Procedure
Device BitLocker Policy Modification Procedure
Device BitLocker Policy Creation Procedure
Device Compliance Policy Creation Procedure
Device Configuration Profile Creation Procedure
Device Compliance Policy Modification Procedure
Device Configuration Profile Modification Procedure
Device Controlled Folder Access Rule Creation Procedure
Device Controlled Folder Access Rule Modification Procedure
Device Defender Antivirus Rule Creation Procedure
Device Defender Antivirus Rule Modification Procedure
Device Defender Firewall Rule Creation Procedure
Device Defender Firewall Rule Modification Procedure
Device Reimaging Procedure
Device USB Access Policy Creation Procedure
Device USB Access Policy Modification Procedure
Corporate Device Offboarding Procedure
Personal Device Offboarding Procedure
Mobile Device Application Protection Policy Creation Procedure
Mobile Device Application Protection Policy Modification Procedure
See more
Microsoft 365 Defender
Defender for Endpoint Certificate IOC Ban Work Instruction
Defender for Endpoint Device App Execution De-Restriction Work Instruction
Defender for Endpoint Device App Execution Restriction Work Instruction
Defender for Endpoint Device De-Isolation Work Instruction
Defender for Endpoint Device Isolation Work Instruction
Defender for Endpoint Device Isolation Work Instruction
Defender for Endpoint File Hash IOC Ban Work Instruction
Defender for Endpoint IP IOC Ban Work Instruction
Defender for Endpoint URL IOC Ban Work Instruction
Defender Vulnerability Management Exception Creation Work Instruction
Defender Vulnerability Management Remediation Creation Work Instruction
Defender Vulnerability Reporting Work Instruction
Defender Web Filter URL Allow Work Instruction
Defender Web Filter URL Block Work Instruction
Defender Web Filter URL Reporting Work Instruction
O365 Admin Email Release & Allow Work Instruction
O365 Admin Email Release Work Instruction
O365 Email Domain Block Work Instruction
O365 Email File Allowance Work Instruction
O365 Email File Block Work Instruction
O365 Email Phishing Sender Allowance Work Instruction
O365 Email Policy Anti-Malware Exclusion Work Instruction
O365 Email Policy Anti-Phishing Exclusion Work Instruction
O365 Email Policy Anti-Spam Exclusion Work Instruction
O365 Email Policy Attachment Scanning Exclusion Work Instruction
O365 Email Policy Spoofed Sender Allowance Work Instruction
O365 Email Policy URL Scanning Exclusion Work Instruction
O365 Email URL Allowance Work Instruction
O365 Email URL Block Work Instruction
O365 Security Awareness Training Campaign Creation Work Instruction
O365 Security Awareness Simulation Campaign Creation Work Instruction
O365 Security DKIM Signature Addition Work Instruction
O365 Security Identify Held Malware Work Instruction
O365 Security Identify Held Spam & Phishing Work Instruction
O365 Security Identify User Submissions Work Instruction
Defender Endpoint Incident Response Procedure
Defender Endpoint Security Monitoring Procedure
Defender Vulnerability Management Procedure
Defender Web Filter Policy Creation Procedure
Defender Web Filter Policy Modification Procedure
O365 Email Anti-Malware Policy Creation Procedure
O365 Email Anti-Malware Policy Modification Procedure
O365 Email Anti-Phishing Policy Creation Procedure
O365 Email Anti-Phishing Policy Modification Procedure
O365 Email Anti-Spam Policy Creation Procedure
O365 Email Anti-Spam Policy Modification Procedure
O365 Email Attachment Scanning Policy Creation Procedure
O365 Email Attachment Scanning Policy Modification Procedure
O365 Email Link Scanning Policy Creation Procedure
O365 Email Link Scanning Policy Modification Procedure
O365 Inbound Email Allowance Procedure
O365 Outbound Email Allowance Procedure
O365 Inbound Email Blacklist Procedure
O365 Outbound Email Blacklist Procedure
Email Quarantine Management Procedure
Attack Simulation Procedure
Basic Security Awareness Training Procedure
Role-Based Security Awareness Training Procedure
See more
Purview
DLP Email Reporting Work Instruction
DLP Policy Email Recipient Exclusion Work Instruction
DLP Policy Email Sender Exclusion Work Instruction
Data Classification Sensitive Info Type Creation Procedure
Data Classification Sensitive Info Type Modification Procedure
Data Classification Sensitivity Label Creation Procedure
Data Classification Sensitivity Label Modification Procedure
Data Classification Sensitivity Label Publication Creation Procedure
Data Classification Sensitivity Label Publication Modification Procedure
DLP Policy Modification Procedure
Data Retention Label Auto-Apply Policy Creation Procedure
Data Retention Label Auto-Apply Policy Modification Procedure
Data Retention Label Creation Procedure
Data Retention Label Modification Procedure
Data Retention Policy Creation Procedure
Data Retention Policy Modification Procedure
Purview Alert Policy Creation Procedure
Purview Alert Policy Modification Procedure
Audit Log Assurance Procedure
DLP Endpoint Setting Modification Procedure
See more
Microsoft 365 Admin Center
Admin Center Purchasing Exchange Online Plan 2 Work Instruction
Admin Center User License Procurement Work Instruction
Admin Center User Licensure Removal Work Instruction
Exchange Admin Center
Exchange Message Trace Work Instruction
Email Connector Creation Procedure
Email Connector Modification Procedure
Email Delivery Investigation Response Procedure
Email Security Policy Troubleshooting Procedure
See more
SharePoint Admin Center
SharePoint Domain Collaboration Addition Work Instruction
SharePoint Domain Collaboration Removal Work Instruction
Allowing Document Collaboration Procedure
Allowing SharePoint Collaboration Procedure
Collaboration Allowance Procedure
See more
Teams Admin Center
Teams Domain Collaboration Addition Work Instruction
Teams Domain Collaboration Removal Work Instruction
Teams Domain Collaboration Policy Modification Procedure