Sittadel Knowledge Base
Sittadel.com
IT Operations Guides
User Guides
Email Help
Webpage Help
Document Sharing Help
Sittadel Security How-To
IT Operations Guides
Entra ID
Intune
Microsoft 365 Defender
Purview
Security Operations Guides
Microsoft Tenant Foundation
Microsoft Collaboration Security
Microsoft Email Security
Microsoft Device Management
Microsoft Device Security
Microsoft Audit & Discovery
Microsoft Identity Security
Microsoft Defender for Endpoint
New to Sittadel?
General
macOS Onboarding
Windows Onboarding
Managed Security
Managed Email Security
Advanced Admin Procedures
Deploy MDE
Overview
Intune Deployment
Hands-On Deployment
RMM Tool Deployment
MECM/SCCM Deployment
GPO Deployment
Back to home
Sittadel Knowledge Base
IT Operations Guides
User Guides
Email Help
Webpage Help
Document Sharing Help
Sittadel Security How-To
IT Operations Guides
Entra ID
Intune
Microsoft 365 Defender
Purview
Security Operations Guides
Microsoft Tenant Foundation
Microsoft Collaboration Security
Microsoft Email Security
Microsoft Device Management
Microsoft Device Security
Microsoft Audit & Discovery
Microsoft Identity Security
Microsoft Defender for Endpoint
New to Sittadel?
General
macOS Onboarding
Windows Onboarding
Managed Security
Managed Email Security
Advanced Admin Procedures
Deploy MDE
Overview
Intune Deployment
Hands-On Deployment
RMM Tool Deployment
MECM/SCCM Deployment
GPO Deployment
IT Operations Guides
Manage IT operations in your organization with Sittadel processes.
Entra ID
Conditional Access Policy App Exemption Work Instruction
Conditional Access Policy User Exception Work Instruction
Group Membership Addition Work Instruction
Group Membership Removal Work Instruction
Tenant Collaboration External User Invitation Work Instruction
User Account Authentication Method Reset Work Instruction
User Account Deletion Work Instruction
User Account Disablement Work Instruction
User Account Failed Login Reporting Work Instruction
User Account Password Reset Work Instruction
User Device Deletion Work Instruction
User Failed Login Reporting Work Instruction
User License Assignment Work Instruction
User PIM Eligibility Addition Work Instruction
User PIM Eligibility Removal Work Instruction
Viewing Audit Logs Work Instruction
Viewing Sign-In Logs Work Instruction
Privilege Group Membership Review Procedure
User Login Failure Review Procedure
User Account Offboarding Procedure
User Account Review Procedure
Conditional Access Policy Creation Procedure
Conditional Access Policy Modification Procedure
User Session Revocation Work Instruction
See more
Intune
Device AutoPilot Reset Initiation Work Instruction
Device BitLocker Drive Unlock Work Instruction
Device BitLocker Key Rotation Initiation Work Instruction
Device Compliance Reporting Work Instruction
Device Configuration Reporting Work Instruction
Device Defender Intelligence Update Initiation Work Instruction
Device Delete Work Instruction
Device Fresh Start Initiation Work Instruction
Device Full Scan Initiation Work Instruction
Device Privilege Escalation Work Instruction
Device Quick Scan Initiation Work Instruction
Device Rename Work Instruction
Device Restart Initiation Work Instruction
Device Retire Initiation Work Instruction
Device Sync Initiation Work Instruction
Device Wipe Initiation Work Instruction
Device Application Creation Procedure
Device Application Modification Procedure
Device Attack Surface Reduction Rule Creation Procedure
Device Attack Surface Reduction Rule Modification Procedure
Device BitLocker Policy Modification Procedure
Device BitLocker Policy Creation Procedure
Device Compliance Policy Creation Procedure
Device Configuration Profile Creation Procedure
Device Compliance Policy Modification Procedure
Device Configuration Profile Modification Procedure
Device Controlled Folder Access Rule Creation Procedure
Device Controlled Folder Access Rule Modification Procedure
Device Defender Antivirus Rule Creation Procedure
Device Defender Antivirus Rule Modification Procedure
Device Defender Firewall Rule Creation Procedure
Device Defender Firewall Rule Modification Procedure
Device Reimaging Procedure
Device USB Access Policy Creation Procedure
Device USB Access Policy Modification Procedure
Corporate Device Offboarding Procedure
Personal Device Offboarding Procedure
Mobile Device Application Protection Policy Creation Procedure
Mobile Device Application Protection Policy Modification Procedure
See more
Microsoft 365 Defender
Defender Vulnerability Management Exception Creation Work Instruction
Defender Vulnerability Management Remediation Creation Work Instruction
Defender Vulnerability Reporting Work Instruction
Defender Web Filter URL Allow Work Instruction
Defender Web Filter URL Block Work Instruction
Defender Web Filter URL Reporting Work Instruction
O365 Admin Email Release & Allow Work Instruction
O365 Admin Email Release Work Instruction
O365 Email Domain Block Work Instruction
O365 Email File Allowance Work Instruction
O365 Email File Block Work Instruction
O365 Email Phishing Sender Allowance Work Instruction
O365 Email Policy Anti-Malware Exclusion Work Instruction
O365 Email Policy Anti-Phishing Exclusion Work Instruction
O365 Email Policy Anti-Spam Exclusion Work Instruction
O365 Email Policy Attachment Scanning Exclusion Work Instruction
O365 Email Policy Spoofed Sender Allowance Work Instruction
O365 Email Policy URL Scanning Exclusion Work Instruction
O365 Email URL Allowance Work Instruction
O365 Email URL Block Work Instruction
O365 Security Awareness Training Campaign Creation Work Instruction
O365 Security Awareness Simulation Campaign Creation Work Instruction
O365 Security DKIM Signature Addition Work Instruction
O365 Security Identify Held Malware Work Instruction
O365 Security Identify Held Spam & Phishing Work Instruction
O365 Security Identify User Submissions Work Instruction
Defender Web Filter Policy Creation Procedure
Defender Web Filter Policy Modification Procedure
O365 Email Anti-Malware Policy Creation Procedure
O365 Email Anti-Malware Policy Modification Procedure
O365 Email Anti-Phishing Policy Creation Procedure
O365 Email Anti-Phishing Policy Modification Procedure
O365 Email Anti-Spam Policy Creation Procedure
O365 Email Anti-Spam Policy Modification Procedure
O365 Email Attachment Scanning Policy Creation Procedure
O365 Email Attachment Scanning Policy Modification Procedure
O365 Email Link Scanning Policy Creation Procedure
O365 Email Link Scanning Policy Modification Procedure
O365 Inbound Email Allowance Procedure
O365 Outbound Email Allowance Procedure
O365 Inbound Email Blacklist Procedure
O365 Outbound Email Blacklist Procedure
Email Quarantine Management Procedure
Attack Simulation Procedure
Basic Security Awareness Training Procedure
Role-Based Security Awareness Training Procedure
Email Restricted Entity Management
Allowing High Volume Senders
Investigating External Traffic
Investigating Connector Configuration
Investigating Mail Delivery
Investigating Reply-All Impact
Investigating URL Clicks
Investigating Transport Rule Creation
Investigating Tenant Wide External Traffic
See more
Purview
DLP Email Reporting Work Instruction
DLP Policy Email Recipient Exclusion Work Instruction
DLP Policy Email Sender Exclusion Work Instruction
Data Classification Sensitive Info Type Creation Procedure
Data Classification Sensitive Info Type Modification Procedure
Data Classification Sensitivity Label Creation Procedure
Data Classification Sensitivity Label Modification Procedure
Data Classification Sensitivity Label Publication Creation Procedure
Data Classification Sensitivity Label Publication Modification Procedure
DLP Policy Modification Procedure
Data Retention Label Auto-Apply Policy Creation Procedure
Data Retention Label Auto-Apply Policy Modification Procedure
Data Retention Label Creation Procedure
Data Retention Label Modification Procedure
Data Retention Policy Creation Procedure
Data Retention Policy Modification Procedure
Purview Alert Policy Creation Procedure
Purview Alert Policy Modification Procedure
Audit Log Assurance Procedure
DLP Endpoint Setting Modification Procedure
See more