Multi-select Taxonomy Search
- UNIVERSAL
- *Workflow Stages
- Initiation
- Processing & Verification
- Claiming & Locking
- Rejection & Re-Routing
- Completion
- Suspension & Resumption
- Final Closure
- AI Skill Manager
- A/B Testing & Experimentation
- Academic & Research
- Accounts Payable Management
- Accounts Receivable Management
- Accreditation & Institutional Compliance
- Active Directory Integration
- ADA & Section 508 Accessibility
- Agile & Scrum Facilitation
- Agile Coaching & Transformation
- AI Acceptable Use Policy
- AI Budget & Token Cost Controls
- AI Output Approval Workflow Rules
- AI Output Confidence Scoring
- AI Persona & Expertise Framing
- Subject Matter Expert (SME) Persona
- AI Prompt Manager — Budget & Cost Controls
- AI Prompt Manager — Compliance & Governance Fields
- AI Prompt Manager — Condition SQL Patterns
- AI Prompt Manager — Delivery Methods
- AI Prompt Manager — Prompt Template Design
- AI Prompt Manager — Response Caching
- AI Prompt Manager — Scheduling & Following Chains
- AI Prompt Manager — System Prompt Design
- AI Prompt Manager — Trigger Event Types
- AI Prompt Manager — Write-Back Patterns
- AI Skill Manager — External Export Packaging
- AI Skill Manager — Index & Retrieval Configuration
- AI Skill Manager — Module Architecture
- AI Skill Manager — Retrieval Bucket Priority Model
- AI Vector Index — Embedding & Re-indexing
- AI Vector Index — Security Model Inheritance
- AI Vector Index Architecture
- AI-Generated Code Security Review
- Alternative URL & Federation Patterns
- Alumni & Development Relations
- Anti-Bribery & Anti-Corruption (FCPA)
- Anti-Money Laundering (AML) & KYC
- Approval Workflow Routing
- Arabic
- Architecture Evolution & Migration
- Artificial Intelligence & Machine Learning
- Asset Management — Real Estate
- Athletics Administration
- Attribute Generator Rules
- Attribute HTML Cleaner Rules
- Audiences — Anonymous vs Authenticated Handling
- Audit Trail Requirements
- Backlog Management
- Board Governance — Nonprofit
- Board Member & Director
- Board Package
- Brand Management
- Budget & Appropriations
- Budget Management & Forecasting
- Bulk vs Incremental Transfer Behavior
- Bullet Point Brief
- Business Continuity & Disaster Recovery
- Business Development
- Business Intelligence & Reporting
- CAN-SPAM & Email Marketing Compliance
- Capital Markets & Investor Relations
- Carbon Accounting & Reporting
- Care Coordination & Case Management
- Case Study
- CCPA — California Consumer Privacy Act
- Centralpoint — AI Integration Layer
- AI Prompt Manager — Module Architecture
- Centralpoint — Content & Module Architecture
- Module Configuration XML Structure
- Centralpoint — CpScripting & Templating
- CpScript Syntax Rules & Tag Format
- Centralpoint — Data Cleaner & Governance
- Data Cleaner Overview & Architecture
- Centralpoint — Delivery & Communication
- Email Broadcast — Configuration & Scheduling
- Centralpoint — Developer & Integration Tools
- Web API — ReadResults & ReadDetails
- Centralpoint — Event & Automation Engine
- Data Triggers — When/If/Do Architecture
- Centralpoint — Forms & Workflow
- Form Architecture & ff-container Structure
- Centralpoint — Learning & Engagement
- LMS — Course Design & Configuration
- Centralpoint — Platform History & Architecture
- Platform Version History (v8.0 — v8.11)
- Centralpoint — Security & Identity
- Audiences — Architecture & Design Patterns
- Change Management
- Channel & Partner Management
- Chief Compliance Officer (CCO)
- Chief Data Officer (CDO)
- Chief Financial Officer (CFO)
- Chief Human Resources Officer (CHRO)
- Chief Information Officer (CIO)
- Chief Legal Officer / General Counsel
- Chief Marketing Officer (CMO)
- Chief of Staff
- Chief Operating Officer (COO)
- Chief Revenue Officer (CRO)
- Chief Technology Officer (CTO)
- Client Relationship Management — Legal
- Clinical & Medical
- Clinical Quality & Patient Safety
- Clinical Research & Trials
- Cloud Infrastructure & DevOps
- Coach & Mentor Persona
- Communication & Style Skills
- Compensation & Benefits Design
- Competitive Analysis
- Competitive Intelligence
- Competitor & Political Deflection
- Compliance Officer
- Compliance Officer Persona
- Concise & Direct (Executive Summary Style)
- Consent & Privacy Compliance
- Constituent Services
- Content Strategy & Marketing
- Context Assembly & RAG Patterns
- Contract Management & Lifecycle
- Contract Negotiation — Operations
- Contract Negotiation — Sales
- Conversational & Employee Facing
- COPPA — Children's Online Privacy Protection
- Corporate & Transactional Law
- Corporate Communications
- Corporate Controller
- Corporate Governance & Secretary
- Corporate Social Responsibility (CSR)
- Cost Accounting & Variance Analysis
- Court & Judicial Administration
- CpScript — Column Binding (Attribute Fields)
- CpScript — Column Binding (Standard Fields)
- CpScript — Date & Time Formatting
- CpScript — Escape Patterns (cpsys_Apos, Brackets)
- CpScript — FormState & Form Data
- CpScript — Image & File Rendering
- CpScript — Literal Scripting & Conditional Filters
- CpScript — Navigation & SiteMap Scripts
- CpScript — Placeholders & ItemContent
- CpScript — Random String & System Constants
- CpScript — Taxonomy & Audience Context
- CpScript — UserInfo & Session Context
- Creative Direction & Design
- Credential & Secret Exposure Prevention
- Credit Risk Management
- Criminal Law
- Crisis Communications
- Cross-Site Scripting (XSS) Prevention
- CSAT & Quality Management
- Curriculum Design & Development
- Custom Delimiters & Text Qualifiers
- Customer Experience & Service
- Customer Experience Strategy
- Customer Journey Mapping
- Customer Loyalty & Retention Programs
- Customer Service Representative Persona
- Customer Success Management
- Customer Support Management
- Cybersecurity & Information Security
- Data & Analytics
- Data Strategy & Governance
- Data Broadcast — Configuration & Distribution
- Data Classification Standards
- Data Engineering & Analytics Engineering
- Data Governance
- Records Retention Schedules & Policies
- Data Lineage & Provenance
- Data Quality Standards
- Data Residency & Sovereignty
- Data Science & Predictive Modeling
- Data Transfer Scheduling & Process Log
- Data Triggers — Bulk Transfer Silent Behavior
- Data Triggers — Chaining & Sequencing
- Data Triggers — Condition Builder Logic
- Data Triggers — Delete Event Patterns
- Data Triggers — IDataTrigger Custom Code Interface
- Data Triggers — Insert Event Patterns
- Data Triggers — Update Event Patterns
- Data Triggers — Z Delivery — Email
- Data Triggers — Z Delivery — Field Write-Back
- Data Triggers — Z Delivery — In-Portal Notification
- Data Triggers — Z Delivery — SMS via Twilio
- Data Triggers — Z Delivery — Webhook & Outbound Push
- Data Visualization & Dashboard Design
- Database Administration
- DataSource — Empty Item Content
- DataSource — Filtering (QueryString, Taxonomy, User, Date)
- DataSource — Item Content Binding Patterns
- DataSource — Sorting, Pagination & Export
- DataSource — SQL SELECT Command Patterns
- DataSource — Standard vs Attribute Field Binding
- DataSource — Template Content & ItemContent Placeholder
- Deal Desk & Pricing
- Deduplication Governance Rules
- Deduplication Rules & Merge Logic
- Demand Generation & Lead Management
- Deployment & Update Patterns
- Developer Relations & Community
- Digital Marketing & SEO
- Disposition & Destruction Certification
- Diversity, Equity & Inclusion (DEI)
- Document Generation from Form Submissions
- Donor Relations & Stewardship
- Dutch
- eCommerce Operations & Management
- Economic Development
- Education
- K-12 School Administration
- Email Broadcast — Audience Targeting
- Email Broadcast — CAN-SPAM Compliance
- Email Broadcast — Click Tracking & Bounce Management
- Email Broadcast — CpScripting in Body
- Email Broadcast — Linked AI Prompt Output
- Email Communication
- Email Formatting — Mobile Responsive Design
- Email Formatting — Outlook-Safe HTML Templates
- Email Marketing
- Emergency Management
- Empathetic & Supportive
- Employee Relations
- Employee Wellness & Benefits Programs
- Employment & Labor Law
- Employment Law
- Encryption & Certificate Management
- English — United Kingdom
- Enterprise Account Management
- Enterprise Architecture
- Environmental Compliance
- Environmental Health & Safety (EHS)
- Escalation & Human-in-the-Loop Rules
- Escalation Management
- ESG & Sustainability
- ESG Disclosure & Reporting (GRI, SASB, TCFD)
- Ethics & Code of Conduct
- Event Marketing & Management
- EventBrite Webhook Integration
- Excel Integration
- Executive Dashboard Design
- Executive Summary
- Executive Vice President
- Export Controls & Trade Compliance
- External API Credential Handling
- External Audit & Assurance
- Facilitator & Moderator Persona
- Facilities Management
- Faculty & Staff Development
- FAQ Format
- Feature Definition & User Stories
- Feature Introduction Timeline
- FERPA — Family Educational Rights & Privacy
- Field Map XML & Processing Tab
- Field Sales & Territory Management
- Finance & Accounting
- Financial Planning & Analysis (FP&A)
- Financial Aid Management
- Financial Reporting & Period Close
- Financial Services
- Financial Systems & ERP Management
- FINRA & SEC Financial Services Compliance
- FitBit & Wellness Integration
- Fleet Management
- Following — Multi-Threaded Fan-Out Patterns
- Following — Subscription & Pipeline Architecture
- Form Field Types — FormHiddenField & System Auto-Population
- Form Field Types — FormListBox & FormRadioButtonList
- Form Field Types — FormTaxonomy & FormAudience
- Form Field Types — FormTextBox & FormEditor
- Form Field Types — FormUpload & FormSignature
- Form Validation Patterns
- Formal & Diplomatic
- Format Conversion — PDF to Word
- Format Conversion — Word to HTML
- Format Conversion — Word to OOXML
- FormState Retrieval & Serialization
- Form-to-Module Field Mapping
- French
- FTC — Advertising Standards & Endorsements
- Full 477-Script Reference Library
- Fundraising & Development
- Gamification — Badges & Milestone Achievements
- Gamification — Knowledge Leader Rankings
- Gamification — Points & Activity Quantification
- GenericEnhanced Module Patterns
- German
- GLBA — Gramm-Leach-Bliley Financial Privacy
- Go-to-Market Planning
- Governance Skills
- AI Behavioral Governance
- Hallucination Prevention & Honest Unknown Response
- AI Orchestraional
- Government & Public Sector
- Municipal Government Administration
- Grant Management & Reporting
- Grant Writing & Grant Management
- Grant Writing & Research Funding
- Guardrail Conflict Resolution
- Health Plan Administration
- Healthcare Compliance — HIPAA & Joint Commission
- Help Desk & End User Support
- Help Desk & Ticket Management
- Higher Education Administration
- Hindi
- HIPAA — Health Insurance Portability & Accountability
- Hospital Administration
- HR Analytics & People Reporting
- HTML Cleaner Rules
- Human Resources & People Operations
- HR Strategy & Business Partnership
- Impact Measurement & Reporting
- Indexing vs Ingestion Strategy
- Industry Skills
- Healthcare
- Clinical Documentation Specialist
- Information Technology
- Innovation Management
- Inside Sales & Sales Development (SDR/BDR)
- Installation & Server Configuration
- Instructional Technology & eLearning
- Insurance & Risk Finance
- Insurance Underwriting & Claims
- Intellectual Property Law
- Intellectual Property Management
- Internal Audit
- Internal Communications
- Inventory & Loss Prevention
- Inventory Management
- Investment Management & Portfolio Analysis
- IP Manager & Authorization
- Issue Brief
- IT Compliance & Audit
- IT Project Management
- IT Service Management (ITSM)
- Italian
- ITAR & Export Controls
- Jailbreak & Prompt Injection Defense
- Japanese
- Journalist & Investigator Persona
- Journalistic & News Writing
- Keyword Generator Rules
- Knowledge Base Management
- Korean
- KPI & OKR Framework Design
- Lab Management
- Labor Relations & Union Management
- Language & Localization
- Lean Manufacturing & Continuous Improvement
- Learning & Development
- Lease Administration
- Legal & Compliance
- Legal & Regulatory
- Legal Billing & Matter Management
- Legal Hold Management
- Legal Memo
- Legal Services
- Legislative & Policy Analysis
- Litigation Management
- Litigation Practice
- LMS — Assessment & Scoring
- LMS — Compliance Tracking & Reporting
- LMS — Course & Question Import Format
- LMS — Role-Based Course Assignment
- Logistics & Distribution
- Maintenance & Reliability Engineering
- Managing Director
- Mandarin Chinese — Simplified
- Mandarin Chinese — Traditional
- Manufacturing
- Production Planning & Scheduling
- Market Research & Consumer Insights
- Marketing & Communications
- Marketing Strategy & Leadership
- Marketing & Persuasive
- Marketing Analytics & Attribution
- Marketplace Management (Amazon, eBay)
- Master Data Management
- Master Management Console Architecture
- Medical Coding & Billing (ICD-10, CPT)
- Meeting Minutes
- Mergers & Acquisitions (M&A)
- Module & Field Access Whitelist Enforcement
- Module Designer — Action EXT with Wizard
- Module Designer — Actionable EXT Grid
- Module Designer — Standard
- Mortgage & Lending Operations
- Multi-Site & Tenant Architecture
- Multi-Tenant Architecture
- Navigation & SiteMap Architecture
- Network & Systems Administration
- Neutral Analyst Persona
- Nonprofit
- Nonprofit Executive Leadership
- Numbered Procedure / SOP
- Nursing Leadership
- Occupational Skills
- Executive Leadership
- Chief Executive Officer (CEO)
- Offboarding & Separation
- Office 365 & Microsoft Graph Integration
- Onboarding & Orientation Design
- OOXML Word Manipulation
- Open Source Management
- Operations & Supply Chain
- Operations Strategy & Management
- Organizational
- Organizational Development
- OSHA & Workplace Safety Reporting
- Output Disclaimer Requirements
- Output Format & Structure
- Paralegal & Legal Operations
- Parks & Recreation Administration
- Password Policy & Retention
- Patent & IP Development
- Patient Communication & Education
- Payroll & HRIS Administration
- Payroll Management
- PCI-DSS — Payment Card Industry Data Security
- Peer Collaborator Persona
- Performance & Caching Architecture
- Performance Management
- Pharmacy Management
- PII & Confidentiality Enforcement
- PII Redaction — Email & Phone
- PII Redaction — Financial Account Numbers
- PII Redaction — Medical & Health Identifiers
- PII Redaction — SSN & Tax ID
- Placeholder Variables & Dynamic Injection
- Plain Language & Public Facing
- Plant Operations Management
- Platform & Marketplace Operations
- Platform Skills
- Centralpoint — Data Aggregation & Transformation
- Data Transfer & Ingestion — Overview
- Policy Document
- Population Health Management
- Portfolio Management
- Portuguese — Brazil
- Portuguese — Portugal
- Presentation Talking Points
- President & General Manager
- Press Release
- Pricing Strategy & Promotions
- Privacy Officer & Data Protection Officer (DPO)
- Private Equity & Venture Capital
- Process Improvement & Lean / Six Sigma
- Process Log & Process Monitor
- Procurement & Strategic Sourcing
- Product Analytics & Metrics
- Product Management
- Product Strategy & Vision
- Product Marketing
- Product Requirements & PRD Writing
- Program Management
- Program Management — Nonprofit
- Project & Program Management
- Project Reporting & Status Communications
- Prompt Chaining & Pipeline Design
- Property Management
- Public Records & FOIA Compliance
- Public Relations & Media Relations
- Public Works & Infrastructure
- PWA Push Notification Patterns
- QA & Software Testing
- Quality Assurance & Control
- Quality Control & Six Sigma
- Real Estate
- Commercial Real Estate Management
- Real Estate & Space Planning
- Real Estate Development
- Real Estate Law
- Regulatory & Legal Compliance
- GDPR — General Data Protection Regulation
- Regulatory Affairs
- Regulatory Agency Management
- Regulatory Compliance — FINRA, SEC, OCC
- Research & Innovation
- R&D Strategy & Management
- Research Administration
- Resource Planning & Capacity
- Re-Submit All Module Records Pattern
- Retail & eCommerce
- Retail Banking & Branch Operations
- Revenue Cycle Management
- Revenue Operations (RevOps)
- RFP / RFQ Response
- Risk Management — Project
- Roadmap Planning & Prioritization
- Role & Audience Reclassification by Content
- Roles — RBAC Configuration
- Russian
- Safety & OSHA Compliance — Manufacturing
- SailPoint Integration
- Sales & Business Development
- Sales Strategy & Leadership
- Sales Analytics & Forecasting
- Sales Engineering & Pre-Sales
- Scheduled Task Configuration
- Scope Boundary Enforcement
- SDK — Centralpoint.Utilities Namespace
- SDK — Centralpoint.Web Namespace
- SDK — Centralpoint.Web.UI Namespace
- Security Guardrails
- SELECT-Only SQL Enforcement
- Self-Service & Chatbot Strategy
- Sensitive Data Handling Protocols
- Sensitive Record Access Control
- Shadow AI Prevention
- SMARTLINKS & Keyword Aliases
- SMS & Short Message
- SMS & Text Alert — Twilio Integration
- Social Impact Measurement
- Social Media — Inbound Monitoring & Aggregation
- Social Media — Outbound Publishing Patterns
- Social Media — Sentiment Threshold Triggers
- Social Media Management
- Social Post — Facebook
- Social Post — LinkedIn
- Social Post — Twitter / X
- Software Development & Engineering
- Solutions Architecture
- Source Connector — Access Database
- Source Connector — Active Directory
- Source Connector — Centralpoint to Centralpoint
- Source Connector — Custom Provider & Web API
- Source Connector — Excel & Delimited Files
- Source Connector — File Path & Network Drive Spidering
- Source Connector — ODBC & OLEDB
- Source Connector — Office 365 & OneDrive
- Source Connector — RSS & Atom Feeds
- Source Connector — SharePoint
- Source Connector — SQL & Oracle
- Source Connector — XML (ReadXML & CpCollection)
- SOX — Sarbanes-Oxley Financial Controls
- Spanish — Latin America
- Spanish — Spain
- Special Education Administration
- Sprint Planning & Retrospectives
- SSO & SAML Configuration
- Stakeholder Management
- Standard Fields vs XQuery Attributes
- Standard Operating Procedure
- Startup Operations & Growth
- State & Local Regulatory Requirements
- Statistical Analysis
- Status Report — RAG Format
- Store Operations Management
- Student Services & Academic Advising
- Supply Chain — Manufacturing
- Supply Chain Management
- Supply Chain Sustainability
- Survey Design & Analysis
- Tableau Charts Integration
- Talent Acquisition & Recruiting
- Tax Management & Strategy
- Taxonomy Architecture & Hierarchy Design
- Taxonomy Generator Rules
- Technical & Developer Audience
- Technical Documentation
- Technical Writer Persona
- Technology Industry
- Telehealth & Digital Health
- Term Transformation & Standardization
- Third-Party LLM Usage Rules
- Threshold & Match Scoring
- Treasury & Cash Management
- Trusted Advisor Persona
- Universal DataSource — AI SQL Generation
- Universal DataSource — Architecture & Shell
- Universal DataSource — SQL Validation & Security
- Universal DataSource — Visualization Types
- User Research & Usability
- User Research & UX Design
- Vendor & License Management
- Vendor Management & Relations
- Visual Merchandising
- Voice of Customer & NPS Programs
- Volunteer Management
- Vulnerability Protection & Security Headers
- Wealth Management & Financial Advisory
- Web API — Custom C# Methods
- Web API — Security Modes & Access Tokens
- Web API — Syndication & Outbound Push
- Web API — UpsertData & DeleteData
- Web API — User Management Methods
- White Paper
- Word Add-In Integration
- Workflow Email Templates — Body & ApprovalBody
- Workforce Planning & Headcount
- WW Universal Dynamic Module Designer
- Document Types (Basic)
- Agreement
- Attestation
- Complaint
- Confidentiality
- Contract
- FAQ
- Glossary Term
- Notice
- Press Release
- Proposal
- RFP
- Waiver
- File Types (Extended)
- Archives
- 7-Zip Archive
- Allen‑Bradley Archive
- Apple Archive
- BZip2
- CAB Archive
- Comic Book 7z
- Comic Book Archive
- Comic Book RAR
- Comic Book Tar
- DaVinci Resolve Archive
- ECW Compressed Raster
- GZip (.gz)
- GZip (.tgz)
- Java Archive (.ear)
- Java Archive (.war)
- KNIME Workflow Archive
- LZ4 Archive
- macOS App Bundle (.dmg)
- NumPy Zip Archive
- RAR Archive
- RAR5 Archive
- TAR Archive
- Unix Archive
- XCF GIMP Archive
- XZ
- ZIP Archive (.zip)
- ZIP Archive (.zipx)
- Zstandard Archive
- Audio
- AAC / M4A Audio (.aac)
- AAC / M4A Audio (.m4a)
- AIF Audio
- AIFF Audio
- ALAC Audio
- AMR Audio
- APE Audio
- Audible Audio
- DSD Audio DFF
- DSD Audio DSF
- FLAC Audio
- M4B Audiobook
- MapInfo MID
- MP3 Audio
- OGG Audio
- OPUS Audio
- RealAudio Stream
- SoundFont (.sf2)
- SoundFont (.sfz)
- Ultrasound Raw RF Data
- WAV Audio
- WMA Audio
- CAD
- ACIS SAT Model
- ANSYS Database
- ArchiCAD Archive
- AutoCAD Drawing (.dwg)
- AutoCAD Drawing (.dxf)
- AutoCAD Plot Style
- AutoCAD Plot Style (Alt)
- AutoCAD Template
- BDF Biosignal
- CATIA Part
- Creo Parametric Part
- FreeCAD Document
- Fusion 360 Archive
- Gerber Drill
- Gerber PCB Layer
- IFC BIM Model
- IGES CAD (.iges)
- IGES CAD (.igs)
- Inventor Assembly
- Inventor Drawing
- Inventor Part
- JT CAD
- KiCad PCB
- MicroStation Design
- Nastran Binary Output
- Navisworks Cache
- Navisworks File
- NX Part
- OBJ 3D Model
- OpenDocument Database
- OpenSCAD Model
- Parasolid Model
- Parasolid Model (Binary)
- Revit Template
- Rhino 3D Model
- SCADA Historian Archive
- SketchUp Model
- SolidWorks File (.sldasm)
- SolidWorks File (.slddrw)
- SolidWorks File (.sldprt)
- STEP CAD (.step)
- STEP CAD (.stp)
- STEP XML AP242
- STL 3D Model
- Tekla Extension Package
- Documents
- AbiWord Document
- AppleWorks Document
- Cerner Millennium Document
- DjVu Document (.djv)
- DjVu Document (.djvu)
- Lotus Word Pro Document
- Markdown
- Microsoft Word
- Microsoft Word Document
- Microsoft Word OpenXML Document
- Microsoft Works Document
- Microsoft WSDL Document
- Office Document Imaging
- OpenDocument Chart
- OpenDocument Formula
- OpenDocument Graphics
- OpenDocument Template (.otp)
- OpenDocument Template (.ots)
- OpenDocument Template (.ott)
- OpenDocument Text
- PageMaker Document (Legacy)
- Pages Document
- PDF
- PDF/A Document
- Plain Text
- Rich Text Format
- Scribus Document
- WordStar Document
- XPS Document (.oxps)
- XPS Document (.xps)
- Images
- 3DHISTECH Slide
- Affinity Photo
- Aperio Whole-Slide Image
- Apple Disk Image Compressed
- Apple Live Photo
- Apple Time Machine Backup (.sparseimage)
- AVIF Image
- BMP Image
- Canon RAW (.cr2)
- Canon RAW (.cr3)
- Canon Raw Scan
- Canon ScanGear Settings
- Cineon Image
- DDS Image
- Disk Image (raw)
- DNG Raw Scan
- DPX Image
- Epson Scan File
- GeoTIFF
- GIF Image
- GIMP Image
- GoPro RAW Photo
- Hamamatsu NanoZoomer Slide
- Hasselblad RAW Photo
- HEIC Image
- HEIF Image
- HP Scan File
- ICO Icon
- Illustrator (.ai)
- Illustrator (.eps)
- Inkscape SVG
- ISO Disk Image
- JBIG Image
- JBIG2 Image
- JBIG2 Image (Alt)
- JPEG 2000 Codestream
- JPEG 2000 Image
- JPEG Image
- JPEG XL Image
- JPEG-LS Image
- Kodak RAW Photo
- Krita Image
- Leica Image File
- Leica RAW Photo
- Leica Whole-Slide Image
- MetaImage Header
- MetaImage Volume
- Microsoft WIM Image
- Minolta Raw
- Nikon RAW
- Nikon RAW Photo (Legacy)
- Olympus RAW
- Olympus RAW Photo (Alt)
- OpenEXR Image
- Panasonic RAW
- PBM Image
- Pentax Raw
- Pentax RAW Photo (Alt)
- PGM Image
- Photoshop
- Photoshop Brush Preset
- Photoshop Large Document
- Photoshop Style
- PNG Image
- PNM Image
- PPM Image
- Radiance HDR Image
- RAW Photo (Generic)
- Samsung RAW Photo
- Scanner Profile
- Scanner Profile (Alt)
- ScanSnap Profile
- Sinar RAW Photo
- Sony RAW
- Sony RAW Photo (Alt)
- Sony RAW Photo (Old)
- TGA Image
- TIFF Image
- VueScan Scan File
- WebP Image
- WSQ Fingerprint Scan
- Presentations
- Apple Keynote
- Google Slides Shortcut
- Keynote Presentation
- Microsoft PowerPoint
- Microsoft PowerPoint Add-in
- Microsoft PowerPoint Macro
- Microsoft PowerPoint Macro-Enabled Slide
- Microsoft PowerPoint Macro-Enabled Slide Show
- Microsoft PowerPoint Macro-Enabled Template
- Microsoft PowerPoint OpenXML Add-in
- Microsoft PowerPoint OpenXML Presentation
- Microsoft PowerPoint OpenXML Slide
- Microsoft PowerPoint Presentation
- Microsoft PowerPoint Slide
- Microsoft PowerPoint Slide Show (.pps)
- Microsoft PowerPoint Slide Show (.ppsx)
- Microsoft PowerPoint Template (.pot)
- Microsoft PowerPoint Template (.potx)
- OpenDocument Presentation
- Spreadsheets
- CSV
- Delta Lake Table Log
- Excel/CSV Import Temp
- Executable (Windows) (.exe)
- Executable (Windows) (.msi)
- Hudi Table Metadata
- Iceberg Table Metadata
- Lotus 1-2-3 Spreadsheet
- Lotus 1-2-3 Spreadsheet (Alt)
- Microsoft Excel
- Microsoft Excel Add-in
- Microsoft Excel Binary Workbook
- Microsoft Excel Macro
- Microsoft Excel Macro-Enabled Template
- Microsoft Excel OpenXML Add-in
- Microsoft Excel OpenXML Spreadsheet
- Microsoft Excel Spreadsheet
- Microsoft Excel Template (.xlt)
- Microsoft Excel Template (.xltx)
- Microsoft Excel Workspace
- Microsoft Works Spreadsheet
- Numbers Spreadsheet
- OpenDocument Spreadsheet
- OS/2 Executable
- Raster Attribute Table
- Snowflake Worksheet
- SPSS Portable File
- Stata Portable File
- Tableau Data Source
- Tableau Packaged Data Source
- Tableau Workbook (.twb)
- Tableau Workbook (.twbx)
- TSV
- Unix Mount Table
- Videos
- 3GPP Video 3G2
- 3GPP Video 3GP
- ARRI RAW Video
- ASF Video
- AVI Video
- AVS Video
- BINK Video
- BRAW Video
- DivX Video
- DV Video
- DVCPRO HD Video
- DVCPRO Video
- F4V Flash MP4 Video
- FLV Video
- GXF Broadcast Video
- H.261 Video Bitstream
- H.263 Video Bitstream
- HEVC Video
- IVF Video Container
- MKV Video
- MOV Video
- MP2 Video
- MP4 Video (.m4v)
- MP4 Video (.mp4)
- MPE MPEG Video
- MPEG Program Stream
- MPEG Video MPEG
- MPEG Video MPG
- MPEG-2 Transport (Alt)
- MPEG-2 Video Elementary Stream
- MTS AVCHD Video (.m2ts)
- MTS AVCHD Video (.mts)
- MXF Video
- Ogg Media
- OGV Video
- QuickTime Movie
- RED RAW Video
- RM RealMedia Video
- RMVB RealMedia Variable Bitrate
- TypeScript (.ts)
- WebM Video
- WMV Video
- YUV Raw Video
- Retention Policy
- GDPR SENSITIVE
- Criminal / legal history term (dictionary-driven)
- Domestic abuse / violence / safety risk
- Financial distress / bankruptcy / debt
- Legal trouble / criminal allegations
- Sexual assault / harassment
- Stalker / doxxing / threat terms
- GDPR SPECIAL
- Biometric identifiers (finger/retina/voice)
- Biometric identifiers (fingerprint/face/iris/voice)
- Gender identity / trans or intersex status terms
- Immigration / citizenship status terms
- Intimate / sexual life references
- Minor / child status markers
- Political affiliation / ideology terms
- Race / ethnicity (context-anchored)
- Racial / ethnic identity terms (broad)
- Relationship status / breakup / infidelity
- Religious affiliation / belief terms
- Sex work / escorting / monetized intimacy
- Sexual orientation / LGBTQ+ identity terms
- HARRASSMENT
- Christmas vacation speech example
- High-severity slur dictionary (seed)
- Swear words
- HEALTH
- Account number (bank/utility/etc.)
- Advanced flag: quasi-identifier combo risk
- Advanced flag: signature / quoted block name pass
- Age > 89 / very old age mention
- All dates except year (DOB, admit/discharge, death, etc.)
- API key / access token / bearer token
- Appointment / encounter / visit ID
- Bank routing number (ABA)
- Certificate / license number (provider/patient)
- Claim / authorization / referral number
- Court / legal case ID
- Credit card number (issuer-aware)
- Crypto wallet address
- DEA number
- Driver’s license number
- Driver's license (alphanumeric state formats)
- Eating disorder behavior cues
- Email address
- Employer / workplace name (contextual)
- Facility unit / room / bed code
- Genetic data / DNA / ancestry tests
- Health plan beneficiary/member ID
- International bank account number (IBAN)
- Interpreter / translation case ID
- IP address
- Medical device implant / UDI / serial
- Medical record number (MRN)
- Medicare / Medicaid ID variants
- Mental health diagnosis terms (broad)
- Minor relationship cue + name boost
- National provider identifier (NPI)
- Neurodivergence / developmental terms (expanded)
- OAuth/JWT token
- Obfuscated email address
- Other unique identifying code / characteristic
- Partial identifier (last 4 digits)
- Passport number
- Password / passcode / PIN
- Policy / group / subscriber number
- Pregnancy / fertility / abortion terms
- Prescription / Rx number
- Provider signature block
- Psychiatric medication names (common)
- Relative name with relationship cue
- School / university name (contextual)
- Self-harm / suicidal ideation indicators
- Sensitive condition (dictionary-driven)
- Session / cookie / token ID (generic)
- Social media handle / username
- Social Security Number (SSN)
- Structured header/footer ID line
- Substance use / addiction (private-life framing)
- Suicide attempt / hospitalization context
- Taxpayer ID / EIN
- Therapy / counseling / psychiatrist references
- Username / user ID
- Workers' comp / disability claim ID
- Topics
- Food
- American
- Chinese
- French
- Italian
- Cheese
- Mariana Sauce
- Béchamel sauce
- Neapolitan Ragu
- Pasta
- Spices
- Music
- Country
- Rock-N-Roll
- British Invasion
- The Beatles
- George Harrison
- John Lennon
- Paul McCartney
- Ringo Starr
- Presidents
- File Types (Basic)
- Adobe/PDF
- Image/GIF
- Image/JPG
- IMG/PSD
- MS/Access
- MS/Excel
- MS/Outlook Email
- MS/Powerpoint
- MS/Word
- NWD (CAD)
- Viseo File
- Locations
- Afghanistan
- Alabama
- Alaska
- Albania
- Algeria
- American Samoa
- Angola
- Anguilla
- Antarctica
- Antigua and Barbuda
- Argentina
- Arizona
- Arkansas
- Armenia
- Aruba
- Australia
- Austria
- Azerbaijan
- Bahamas (the)
- Bahrain
- Bangladesh
- Barbados
- Belarus
- Belgium
- Belize
- Benin
- Bermuda
- Bhutan
- Bolivia
- Bonaire, Sint Eustatius and Saba
- Bosnia and Herzegovina
- Botswana
- Bouvet Island
- Brazil
- British Indian Ocean Territory
- British Virgin Islands
- Brunei Darussalam
- Bulgaria
- Burkina Faso
- Burundi
- Cabo Verde
- California
- Cambodia
- Cameroon
- Canada
- Cayman Islands
- Central African Republic (the)
- Chad
- Chile
- China
- Christmas Island
- Cocos (Keeling) Islands
- Colombia
- Colorado
- Comoros
- Congo
- Congo (the)
- Connecticut
- Cook Islands (the)
- Costa Rica
- Côte d'Ivoire
- Croatia
- Cuba
- Curaçao
- Cyprus
- Czechia
- Delaware
- Denmark
- Djibouti
- Dominica
- Dominican Republic (the)
- Ecuador
- Egypt
- El Salvador
- Equatorial Guinea
- Eritrea
- Estonia
- Eswatini
- Ethiopia
- Falkland Islands
- Faroe Islands (the)
- Fiji
- Finland
- Florida
- France
- French Guiana
- French Polynesia
- French Southern Territories (the)
- Gabon
- Gambia (the)
- Georgia
- Germany
- Ghana
- Gibraltar
- Greece
- Greenland
- Grenada
- Guadeloupe
- Guam
- Guatemala
- Guernsey
- Guinea
- Guinea-Bissau
- Guyana
- Haiti
- Hawaii
- Heard Island and McDonald Islands
- Holy See
- Honduras
- Hong Kong
- Hungary
- Iceland
- Idaho
- Illinois
- India
- Indiana
- Indonesia
- Iowa
- Iran (Islamic Republic of)
- Iraq
- Ireland
- Isle of Man
- Israel
- Italy
- Jamaica
- Japan
- Jersey
- Jordan
- Kansas
- Kazakhstan
- Kentucky
- Kenya
- Kiribati
- Kuwait
- Kyrgyzstan
- Lao People's Democratic Republic (the)
- Latvia
- Lebanon
- Lesotho
- Liberia
- Libya
- Liechtenstein
- Lithuania
- Louisiana
- Luxembourg
- Madagascar
- Maine
- Malawi
- Malaysia
- Maldives
- Mali
- Malta
- Marshall Islands (the)
- Martinique
- Maryland
- Massachusetts
- Mauritania
- Mauritius
- Mayotte
- Mexico
- Michigan
- Micronesia
- Minnesota
- Mississippi
- Missouri
- Moldova
- Monaco
- Mongolia
- Montana
- Montenegro
- Montserrat
- Morocco
- Mozambique
- Namibia
- Nauru
- Nebraska
- Nepal
- Netherlands (the)
- Nevada
- New Caledonia
- New Hampshire
- New Jersey
- New Mexico
- New York
- New Zealand
- Nicaragua
- Niger
- Nigeria
- Niue
- Norfolk Island
- North Carolina
- North Dakota
- North Korea
- Northern Mariana Islands
- Norway
- Ohio
- Oklahoma
- Oman
- Oregon
- Pakistan
- Palau
- Palestine
- Panama
- Papua New Guinea
- Paraguay
- Pennsylvania
- Peru
- Philippines (the)
- Pitcairn
- Poland
- Portugal
- Puerto Rico
- Qatar
- Republic of North Macedonia
- Réunion
- Rhode Island
- Romania
- Russian Federation (the)
- Rwanda
- Saint Barthélemy
- Saint Helena, Ascension and Tristan da Cunha
- Saint Kitts and Nevis
- Saint Lucia
- Saint Martin
- Saint Pierre and Miquelon
- Saint Vincent and the Grenadines
- Samoa
- San Marino
- Sao Tome and Principe
- Saudi Arabia
- Senegal
- Serbia
- Seychelles
- Sierra Leone
- Singapore
- Sint Maarten (Dutch part)
- Slovakia
- Slovenia
- Solomon Islands
- Somalia
- South Africa
- South Carolina
- South Dakota
- South Georgia and the South Sandwich Islands
- South Korea
- South Sudan
- Spain
- Sri Lanka
- Sudan (the)
- Suriname
- Svalbard and Jan Mayen
- Sweden
- Switzerland
- Syrian Arab Republic
- Taiwan
- Tajikistan
- Tanzania, United Republic of
- Tennessee
- Texas
- Thailand
- Timor-Leste
- Togo
- Tokelau
- Tonga
- Trinidad and Tobago
- Tunisia
- Turkey
- Turkmenistan
- Turks and Caicos Islands (the)
- Tuvalu
- Uganda
- Ukraine
- United Arab Emirates
- United Kingdom
- United States Minor Outlying Islands
- United States of America
- Uruguay
- Utah
- Uzbekistan
- Vanuatu
- Venezuela
- Vermont
- Viet Nam
- Virgin Islands
- Virginia
- Wallis and Futuna
- Washington
- West Virginia
- Western Sahara
- Wisconsin
- Wyoming
- Yemen
- Zambia
- Zimbabwe
- Years
- 1960
- 1961
- 1963
- 1964
- 1965
- 1966
- 1967
- 1968
- 1969
- 1970
- 1971
- 1972
- 1973
- 1974
- 1975
- 1976
- 1977
- 1978
- 1979
- 1980
- 1981
- 1982
- 1983
- 1984
- 1985
- 1986
- 1987
- 1988
- 1989
- 1990
- 1991
- 1992
- 1993
- 1994
- 1995
- 1996
- 1997
- 1998
- 1999
- 2000
- 2001
- 2002
- 2003
- 2004
- 2005
- 2006
- 2007
- 2008
- 2009
- 2010
- 2011
- 2012
- 2013
- 2014
- 2015
- 2016
- 2017
- 2018
- 2019
- 2020
- 2021
- 2022
- 2023
- 2024
- 2025
- 2026
- 2027
- Workflow Types
- Document Review
- Draft
- Under Review
- Approved
- Published
- Initiation
- Processing & Verification
- Claiming & Locking
- Rejection & Re-Routing
- Completion
- Suspension & Resumption
- Final Closure
- Workflow Event Types
- Approved
- Assigned
- Closed
- Comment
- Initialized
- OnHold
- Rejected
- Reopened
- Resumed
- Routed
- Workflow Status
- Cancelled
- Completed
- In Progress
- On Hold
- ADAM Multimedia Encyclopedia
- AI Prompt Management
- AI Governance
- Category
- Alert / Notification
- Analysis
- Behavioral Compliance
- Chat
- Classification
- Coaching
- Content Generation
- Customer Success
- Data Governance
- Deduplication
- Document Generation
- Executive Leadership
- External Data Monitor
- Facilities / Operations
- Field Sales
- Finance / CFO
- Guardrail / Safety
- Help Desk / Support
- HR / People Ops
- Onboarding
- Partner Channel
- Procurement
- Product Management
- Q&A
- QA / Testing
- Report Narrative
- Risk & Compliance
- Solutions Architecture
- Summarization
- Channel / Audience
- Compliance Officer
- Customer
- Employee
- Executive
- Partner
- Public
- Delivery Method
- Chart / Dashboard Render
- Chat Response
- Conditional Write Routing
- Data Broadcast
- Email
- External System Write
- Field Write-back
- Governance Rule Assignment
- Metadata Enrichment
- Module-to-Module Transfer
- NLS Search Enrichment
- Page / Record Display
- Portal Notification
- PWA Push
- Response Cache
- SMS / Text
- Social Media Outbound
- Taxonomy Write
- Webhook
- Library Tier
- Client Custom
- Client-Authored
- Oxcyon Core
- Risk Level
- Triage/Routing
- Trigger Source
- External Data Feed
- Form Submission
- Inbound API / Web Service
- Page / Record Load
- Pipeline Step
- Record Delete
- Record Insert
- Record Update
- Scheduled / Batch
- Social Listening
- User Chat / NLS Search
- Alert Categories
- Add your global alert categories here (delete this record)
- Blog
- CRM
- Budget Calendar
- Quarter 01
- Quarter 02
- Quarter 03
- Quarter 04
- Competitive Landscape
- Competitor 01
- Competitor 02
- Competitor 03
- Industry Vertical
- Banking
- Distribution
- Government
- Healthcare
- Manufacturing
- NPO
- Lead Sources
- Google
- Referral
- Capterra
- Gartner
- Software Advice
- Upsell
- Website
- Opportunity Type(s)
- Custom Integration
- Data Migration, Mining
- Document Management
- Enterprise CMS Portal
- Intranet
- Public Website(s)
- Opportunity Value
- 0 - $5000
- $6000 - $25,000
- $25,001 - $50,000
- $50,001 - $75,000
- $75,001 - $100,000
- $100,001 - $200,000
- $250,000+
- Sales Representative
- James Kekic
- James Venus
- John Hunter
- Kevin Michnicki
- Sales Stage
- Need to Book
- Demo Scheduled
- Demonstration Completed
- Interest Level 01
- Interest Level 02
- Interest Level 03
- Demo Done
- Timeframe
- Immediate
- Next 30 Days
- Next 60 Days
- Next 90 Days
- Next 120 Days
- Next 180 Days
- Follow Up
- Ready to Close
- Won or Lost
- Closed - Lost
- Closed - Won! (CLIENT)
- Title
- CEO
- CIO
- CTO
- Marcom
- CXO
- HR
- CFO
- CMO
- Decision Trees
- Employee Access & Permissions Management
- Activate alerts
- Ask: “Should privileged activity trigger behavioral or anomaly alerts?”
- Activate behavioral and anomaly alerts
- Ask: “Should privileged activity trigger behavioral or anomaly alerts?”
- Validate alert requirement
- Add new access or permissions to an existing user
- Ask: “Can you confirm the username or employee ID?”
- Verify identity in AD/HRIS
- Confirm Active Status
- If Active
- Begin adding requested permissions
- Apply new access in system |
- Verify in AD/HRIS
- Invalid request
- Inform caller user cannot be located
- Request correct employee info |
- Ask: “Do you have manager/system-owner approval for this access?”
- Confirm documentation
- Authorization
- If Valid
- Apply access in requested system
- Unauthorized
- Inform caller approval is required
- Request manager submission |
- Ask: “Does this access require prerequisite systems or training?”
- Prerequisite Check
- If Completed
- Proceed with additional access
- Missing training
- Inform caller prerequisite must be completed
- Request completion before assignment |
- Ask: “Is this access permanent or temporary?”
- Duration Prompt
- Scope Review
- Excessive risk
- Inform caller permanent access is not allowed
- Escalate for exception approval |
- If Aligned
- Apply access permanently
- Update user’s long-term access profile |
- Ask: “Which system or application needs additional access?”
- Permission Type
- If Admin-Level Access
- If Not Supported
- Validate system supports admin tier
- If Edit Access
- Ask: “Why does the user need edit capabilities?”
- If Not Justified
- If Manage-Level Access
- If Not Aligned
- Validate user’s role supports management functions
- If Read Access
- Ensure read-only is sufficient for job role
- If Not Valid
- Apply elevated cloud platform permissions
- Ask: “Does this request include elevated cloud platform permissions (Azure, AWS, GCP)?”
- Validate requirement
- Cloud Privilege Not Needed
- Apply elevated permissions within cloud platforms
- Ask: “Does this request include elevated cloud platform permissions (Azure, AWS, GCP)?”
- Validate cloud privilege level
- Apply MFA enhancements
- Ask: “Does this privileged role require enhanced MFA?”
- Apply MFA enhancements required for privileged accounts
- Ask: “Does this privileged role require enhanced MFA?”
- Validate MFA enforcement policy
- Apply monitoring
- Ask: “Which monitoring controls are required for this privileged role?”
- Apply monitoring required for privileged accounts
- Ask: “Which monitoring controls are required for this privileged role?”
- Validate controls (session logging, alerts, MFA, SIEM)
- Apply server-level or local admin rights
- Ask: “Does the user need local admin or server-level admin rights?”
- Check requirement
- Validate requirement
- Assign Local/Server Admin
- Assign additional application or system access beyond baseline
- Ask: “Is this access permanent or temporary?”
- Define duration
- Ask for start/end dates
- Confirm manager acknowledgment of temporary access
- Assign time-bound permissions
- Set auto-expiration in system |
- Validate scope
- Ensure permanent access aligns with job duties
- Assign Access
- Excessive permission risk
- Inform caller permanent access is not allowed
- Escalate to executive or system owner |
- Ask: “What business purpose requires these additional permissions?”
- Compare request against job description
- Authorization Check
- If Approved
- Verify request aligns with data-security policies
- Assign additional permissions |
- Insufficient justification
- Inform caller the request is not supported
- Request revised justification from manager |
- Ask: “Which specific system or application needs additional access assigned?”
- Attempt clarification
- Ask caller for more details
- System cannot be validated
- Inform caller system cannot be found
- Request system owner to formally identify application |
- Ask caller to provide screenshot, link, or system owner name
- Identify system
- If Found
- Continue with permission-level validation |
- Confirm permission type
- Ask permission level
- Validate edit rights
- Confirm user needs to add/update content
- Invalid request
- Inform caller edit permissions cannot be assigned
- Confirm user needs to add/update system content
- Confirm manager approval
- Assign edit-level access |
- Ask: “Is this read, edit, manage, or admin-level access?”
- Validate read-only requirement
- Ensure read-only aligns with job duties
- Confirm manager approval
- Assign read-only permissions |
- If not aligned, inform caller
- Request updated justification |
- Ask: “Which system needs additional access?”
- Confirm permission level
- Ask for required permission tier
- Validate admin rights
- Confirm system has admin tier
- No admin role available
- Inform caller admin roles do not exist for the system
- Confirm system has administrative role
- Validate manage rights
- Ensure role qualifies
- Access not permitted
- Inform caller this level requires higher role
- Ensure role qualifies to manage users/content
- Assign default access based on user’s department
- Ask: “Which department will the new hire be working in?”
- Retrieve Finance baseline profile
- Load Finance baseline permissions
- Confirm role matches Finance profile
- Mismatch
- Inform caller Finance baseline doesn’t match job role
- Request updated HR job role for verification |
- Load Finance baseline permissions (ERP read, shared drives, reporting tools)
- Confirm role matches Finance profile
- Retrieve HR baseline profile
- Load HR baseline permissions
- Confirm role matches HR baseline
- Mismatch
- Inform caller HR baseline does not match role
- Request manager confirmation |
- Load HR baseline permissions (HRIS access, documents share, onboarding tools)
- Confirm role matches HR baseline
- Retrieve IT baseline profile
- Load IT baseline
- Ask sub-role
- Invalid
- Inform caller IT needs correct sub-role
- Request manager clarification |
- Ask: “Is this a support tech, developer, engineer, or analyst?”
- Load IT baseline (ticketing system, admin tools, knowledge base)
- Ask: “Is this a support tech, developer, engineer, or analyst?”
- Retrieve Ops baseline profile
- Load Ops baseline
- Confirm if field ops or internal ops
- Load Ops baseline (inventory system, workflow tools)
- Confirm if field ops or internal ops
- Retrieve Sales baseline profile
- Load Sales baseline
- Ask: “Is the user assigned to a specific territory or region?”
- Missing territory
- Inform caller territory is required
- Request manager to provide territory assignment |
- Load Sales baseline (CRM, shared drives, sales dashboards)
- Ask: “Is the user assigned to a specific territory or region?”
- Unable to assign baseline
- Inform caller baseline package cannot be determined
- Request HR/manager to confirm department classification |
- Assign privileged roles
- Ask: “Which privileged role has been approved for provisioning?”
- Assign privileged roles approved for the user
- Ask: “Which privileged role has been approved for provisioning?”
- Check for conflict-of-interest restrictions
- Ask: “Does this request introduce separation-of-duties risk?”
- Validate duties (e.g., same user approving & administering)
- Validate SOD
- Complete final least-privilege audit
- Ask: “Have all permissions been reviewed for necessity, justification, and compliance?”
- Document Results
- Missing Review
- Conduct IT security risk review
- Ask: “Has IT Security reviewed this request for risk alignment?”
- Validate record
- Validate security review record
- Configure periodic access review reminders
- Ask: “Does this privileged role require scheduled access review audits?”
- Validate
- Validate requirement
- Configure SIEM ingestion
- Ask: “Must privileged activity be forwarded to the SIEM?”
- Configure SIEM ingestion for privileged activity
- Ask: “Must privileged activity be forwarded to the SIEM?”
- Validate SIEM ingestion requirement
- Confirm access alignment following job movement
- Ask: “Which permissions or systems are impacted by the user’s new job role?”
- Ask: “Is the user’s current job role different from the role originally assigned to these permissions?”
- Assess Relevance
- If Not Required
- Confirm with HR or manager
- Route permission to removal workflow |
- If Required
- Document role-based justification
- Retain permissions and log alignment |
- Confirm all accounts and permissions were successfully created
- Ask: “Has the Active Directory account provisioned successfully?”
- Validate AD account in directory
- Issue found
- Identify if creation failed due to attributes or sync
- Correct AD attributes
- Retry AD creation before continuing |
- Verify group assignments
- Confirm baseline and additional groups applied
- Ask: “Has the mailbox successfully created and synced?”
- Validate Exchange/M365 mailbox availability
- License Validity
- If Valid
- Apply retention, spam, and security policies
- Add mailbox to completion summary |
- Validate mailbox
- Ask: “Has the user synced to the SSO provider?”
- Validate user appears in SSO directory
- Validate user in SSO directory
- Ask: “Have all additional systems applied the user’s permissions?”
- Validate additional permissions
- Identify failing system
- Determine reason (license, role, sync delay)
- Correct then re-run provisioning
- Validate additional system provisioning logs
- Conduct verification audit
- Ensure all required accounts (AD, Email, SSO, apps) are active
- Ensure all required accounts are active
- Prepare message
- Include AD, email, SSO, baseline access, additional access
- Send Notification
- If Sent Successfully
- Mark provisioning ticket as resolved
- Include relevant details
- Missing Info
- Inform caller manager email not listed
- Request HR or department admin to provide contact |
- Confirm inactive or unused permissions should be removed
- Ask: “Which permissions show no recent usage?”
- Ask: “Has the user accessed this permission or system within the allowed usage timeframe?”
- Removal Candidate
- If Confirmed
- Revoke permission
- Document unused-permission removal |
- Confirm inactive or unused permissions should be retained
- Ask: “Which permissions show no recent usage?”
- Ask: “Has the user accessed this permission or system within the allowed usage timeframe?”
- Confirm legitimacy of a manager-initiated request
- Ask: “What initiated this offboarding request?”
- Validate Manager Identity
- Manager Check
- If Not Verified
- If Verified
- Ask: “Is this termination, resignation, or internal transfer?”
- Confirm offboarding for internal transfers
- Ask: “What initiated this offboarding request?”
- Validate HR Transfer Event
- HRIS Check
- If Found
- Ask: “Is this a cross-department transfer or within the same department?”
- Begin role-based deactivation and re-provisioning |
- If Not Found
- Confirm offboarding from contractor/vendor management
- Ask: “What initiated this offboarding request?”
- Validate Contract End
- Contract Check
- If Ended
- Ask: “Have badges and other assets been collected?”
- If Not Ended
- Confirm permissions remain appropriate after a project finishes
- Ask: “Which project-based permissions or temporary roles need to be reviewed?”
- Ask: “Has the project or temporary assignment ended?”
- Assess Necessity
- If Not Needed
- Remove project-based access
- If Still Needed
- Validate continued project-related need
- Retain access but flag for next review cycle |
- Confirm role meets least-privilege compliance
- Ask: “Is privileged access the minimum required to complete the task?”
- Compare task requirement vs. privilege scope
- Validate privilege need
- Confirm that user’s current access matches minimum required privileges
- Ask: “Which permissions or systems need to be revalidated for least-privilege review?”
- Ask: “Is the user’s current job role still the same?”
- Assess Necessity
- If Not Required
- Confirm with manager to validate removal
- Route permission to removal workflow |
- If Required
- Ensure permission remains justified
- Retain permission and document review |
- Confirm the access change request is legitimate and properly authorized
- Ask: “Is this access needed immediately or on a future date?”
- Confirm urgency
- Ensure emergency justification is valid
- If Not Valid
- Ask: “Who submitted this request for access changes?”
- Confirm Manager Approval
- If Approved
- Validate approval via email or ticket
- If Not Approved
- Confirm reason
- Ask about requirement
- Invalid audit claim
- Inform caller request cannot be categorized as audit-driven
- Reclassify as standard access request before proceeding |
- Ask: “Is this access change required due to an audit finding or compliance requirement?”
- Validate Documentation
- If Valid
- Determine if immediate remediation is required
- Route to removal/addition accordingly |
- Identify HR Event
- HRIS Review
- If Event Found
- Confirm requested changes match HR update
- Route to access-add/remove review |
- If Event Not Found
- Verify manager identity
- Validate information
- Authorization Issue
- Inform caller only verified managers can request access changes
- Escalate to IT Security |
- Validate name and reporting structure in HRIS
- Identify Reason
- If Valid Reason
- Ensure manager has provided written approval
- Route to access-add/remove evaluation |
- Ask: “Why is this access change needed?”
- Check job description alignment
- Check role alignment
- Excessive permission risk
- Inform caller justification does not match job duties
- Request updated justification or deny request |
- Confirm the legitimacy and source of the offboarding trigger
- Ask: “What initiated this offboarding request?”
- Validate HR Record
- HRIS Check
- If Found
- Ask: “What is the official termination date?”
- If Not Found
- Confirm the request originated from an authorized and legitimate source
- Ask: “Who submitted this access request?”
- Attempt Verification
- Directory Lookup
- If Found But No Authority
- If Not Found
- Confirm Authorization
- If No
- Inform employee manager approval is required
- Request manager to submit authorization |
- If Yes
- Ask employee to provide approval email or ticket
- Validate authenticity
- If Valid
- Route to access-level review |
- Identify HR Event
- HRIS Event Lookup
- If Event Found
- Effective Date Review
- If Valid
- Ensure HRIS→IT event sync completed
- If Event Not Found
- Validate System Trigger
- Workflow Metadata Check
- If Invalid
- If Valid
- Confirm automation corresponds to HR or system event
- Ensure trigger matches expected workflow
- Treat request as system-authorized |
- Verify manager identity
- Confirm name and reporting structure in HRIS
- Identity mismatch
- Inform caller you cannot process unauthorized requests
- Escalate to IT Security for identity verification |
- Validate reason for request
- Ask manager: “What is the purpose of this access?”
- Confirm documented approval exists
- Verify approval in ticket or email
- Confirm user training & certification requirements
- Ask: “Has the user completed required privileged-access security training?”
- Validate training
- Validate training records
- Create new user accounts across identity systems
- Ask: “Can you confirm the new hire’s start date and department?”
- Validate new hire exists in HRIS
- Confirm spelling of first/last name
- Ensure legal name matches HR record
- Search for existing AD profile
- Missing record
- Inform caller HR must finalize the employee record
- Request HR to correct data before continuing |
- Begin identity mapping
- Ensure AD attributes sync to SSO
- Assign SSO Group
- SSO Error
- Confirm authentication readiness
- Attempt first login to ensure account is active
- Authentication Failure
- Credentials Working
- Populate required fields
- Assign department based on HR record
- Assign manager field in AD
- Ensure fields meet AD schema requirements
- Start AD provisioning
- Follow naming convention
- Ensure username is not already in use
- Follow naming convention (first initial + last name)
- Ensure username is not already in use
- Start mailbox provisioning
- Assign M365/Exchange license type
- Licensing Block
- Inform caller there are no licenses remaining
- Request purchasing to add licenses |
- Mailbox Creation
- Determine if compliance team approval is required
- Ask: “Does this request involve a regulated system (SOX, HIPAA, PCI)?”
- Validate category
- No Compliance Review Needed
- Validate system category
- Confirm Compliance Approval Needed
- If Approved
- Document compliance approval
- Complete approval routing |
- If Not Approved
- Inform caller compliance approval is required
- Await compliance decision |
- Determine which system or application access is being requested
- Ask: “Which system or application does the user need access to?”
- Determine privilege type
- Ask: “Is this standard access, elevated access, or administrative access?”
- Ensure privilege tier exists for this system
- Privilege denied
- Inform caller privileged roles do not exist for this system
- Direct caller to system owner for alternatives |
- Proceed
- Provide categories
- Ask: “Is it related to Finance, HR, Collaboration, Operations, IT Tools, or Development?”
- Insufficient info
- Inform caller you cannot proceed without knowing the system
- Request manager to specify system name |
- Offer list of systems in that category
- Ask caller to pick the correct one
- Move to access-level determination |
- Request folder path
- Ask: “Can you provide the exact folder path or screenshot?”
- Check security group ownership
- Confirm purpose for access
- Ensure access aligns with job duties
- Route to access-level review |
- Invalid path
- Inform caller the folder cannot be located
- Request confirmation from folder owner |
- Separate requests
- Validate each requested system independently
- Confirm combined access need
- Ask: “Are these part of a project or cross-functional role?”
- Create grouped access ticket bundle |
- Identify failing system
- Inform caller which system(s) are not recognized
- Require corrected system list |
- Validate name
- Check system against approved enterprise application list
- Confirm correct system variant (cloud, legacy, module-specific)
- Ask: “Is this for the full application or a specific module?”
- Name Not Recognized
- Inform caller system name does not match internal catalog
- Request screenshot or documentation for clarification |
- Disable access to key applications
- Ask: “Which application accounts need to be disabled?”
- Validate user account in application
- Disable App Access
- Confirm
- If Successful
- Add application disable to removal log |
- Validate user in application
- No Account
- Inform caller no account exists in that application
- Continue with additional systems |
- Disable core identity accounts after offboarding trigger
- Ask: “Can you confirm the username or employee ID for AD deactivation?”
- Verify user in AD
- AD Disable Action
- Confirm
- If Successful
- Add AD disable step to log |
- Invalid User
- Inform caller AD account cannot be located
- Request correct identifier |
- Disable email mailbox and block email login
- Ask: “Does the user have an active mailbox?”
- Validate mailbox
- No Mailbox
- Inform caller no mailbox exists to disable
- Continue to next system disable step |
- Validate mailbox exists in Exchange/M365
- Mailbox Disable
- License Removal
- If Successful
- Document mailbox disable |
- Disable multi-factor authentication (MFA)
- Ask: “Is the user enrolled in MFA?”
- Validate enrollment in MFA provider
- Validate MFA enrollment
- Disable shared-account or generic account access tied to user
- Ask: “Was the user assigned access to any shared or generic accounts?”
- Validate assignment
- Validate assignment logs
- Disable SSO/IdP access for the user
- Ask: “Is the user visible in the SSO directory?”
- Validate SSO identity
- Missing SSO Record
- Inform caller SSO directory does not list the user
- Request confirmation of correct username |
- Validate user presence in SSO provider
- SSO Disable Action
- Confirm
- If Successful
- Add SSO disable to audit log |
- Disable user accounts across integrated subsystems
- Ask: “Does the user have access through integrated or downstream systems?”
- Validate access via provisioning tool or IAM system
- Disable Integrated Accounts
- Validate through IAM
- Disable VPN access
- Ask: “Does the user have VPN or remote access assigned?”
- Validate presence
- Validate presence in VPN system
- Enable session recording
- Ask: “Does this role require privileged session recording?”
- Enable session recording for privileged actions
- Ask: “Does this role require privileged session recording?”
- Validate requirement
- Configure Session Recording
- Enforce enhanced MFA
- Ask: “Does this privileged role require enhanced MFA?”
- Enforce enhanced MFA for privileged accounts
- Ask: “Does this privileged role require enhanced MFA?”
- Ensure all data transfers completed
- Ask: “Have all data sources been transferred or archived?”
- Documentation
- Identify Missing
- Ensure all user files are archived or transferred
- Ask: “Which systems contain the user’s files or owned content?”
- Review OneDrive, SharePoint, File Shares
- OneDrive Handling
- If Archive Needed
- Move OneDrive content to long-term archive repository
- Validate archive storage completion |
- Validate OneDrive content
- Ensure all user files are archived or transferred before deletion
- Ask: “Which systems contain the user’s files or owned content?”
- Review OneDrive, SharePoint, File Shares, Local Drives
- OneDrive Handling
- If Transfer Needed
- Reassign OneDrive ownership to manager or successor
- Validate new owner has access |
- Ensure request meets business, security, and compliance requirements
- Ask: “Which privileged access is being requested?”
- Check for admin role
- Identify admin role (Domain Admin, Local Admin, App Admin)
- Capture Business Justification
- Final justification compliance decision
- Ask: “Does the request satisfy business, security, and compliance requirements?”
- Approval Criteria Met
- Criteria Not Met
- Final privileged-access verification
- Ask: “Have all privileged roles and shared-mailbox rights been removed?”
- Documentation Review
- Identify Missing
- Final verification
- Ask: “Have all required monitoring controls been implemented successfully?”
- Final verification of monitoring setup completion
- Ask: “Have all required monitoring controls been implemented successfully?”
- Handle application-level data
- Ask: “Which business applications contain user-owned tasks, workflows, or dashboards?”
- Handle application-level data (task ownership, workflows, dashboards)
- Ask: “Which business applications contain user-owned tasks, workflows, or dashboards?”
- Validate presence of assignable items
- Handle calendars owned by the user
- Ask: “Did the user own or manage any shared calendars?”
- Identify calendar ownership
- Transfer Calendar Ownership
- Validate calendar existence
- Handle mailbox content
- Ask: “Does the mailbox contain messages needing transfer (workflows, approvals, project communications)?”
- Handle mailbox content (email ownership, project threads, approvals)
- Ask: “Does the mailbox contain messages needing transfer (workflows, approvals, project communications)?”
- Identify folders requiring reassignment
- Handle shared network drive files
- Ask: “Did the user store files on mapped network drives or department file shares?”
- Identify file ownership
- Identify folder paths owned or modified by user
- File Share Processing
- If Transfer Needed
- Move files into manager/successor’s folder
- Validate receiving party access |
- Validate presence of files
- Handle SharePoint-owned document libraries
- Ask: “Did the user own or manage SharePoint sites or document libraries?”
- Validate site/document library ownership
- Validate user’s role in each identified site
- Identify the correct permission tier for the user
- Ask: “Is the user requesting standard, elevated, or administrative access?”
- Identify admin type
- Ask: “Is this for system administration, user management, or configuration?”
- Check if application supports admin role
- Admin role confirmed
- Check additional security requirements (MFA, logging)
- Route to privileged-access workflow |
- Unsupported role
- Inform caller admin access does not exist for this system
- Refer to system owner for alternative access options |
- Identify reason
- Ask: “Is this temporary or permanent access?”
- No permanent justification
- Inform caller permanent elevated access is not allowed
- Require executive-level approval |
- Time-Bound Access
- Ask: “What dates should this access begin and end?”
- Confirm manager approval for temporary privilege
- Route to temporary access provisioning |
- Provide clarification
- Explain: “Standard = use; elevated = manage content; admin = configure system”
- Confirm selected level
- Assign standard baseline package
- Validate business justification
- Route to elevated-access workflow |
- Validate privileged requirements
- Route to privileged-access workflow |
- Validate job role
- Compare job role to standard access package
- Role mismatch
- Inform caller custom review is required
- Escalate to role owner for decision |
- Standard role confirmed
- Assign baseline read/use privileges
- Verify no elevated permissions included
- Route to access provisioning |
- Validate purpose
- Ask: “Why does the user require elevated permissions?”
- Business Need Confirmed
- Confirm manager approval
- Validate approval email/ticket
- Route to elevated-access workflow |
- No valid justification
- Inform caller elevated permissions cannot be granted
- Request updated justification or deny request |
- Initial evaluation of the submitted access request
- Ask: “Is the user a new hire, existing employee, contractor, or vendor?”
- Validate contractor engagement
- Check contract details
- Contractor invalid
- Direct caller to vendor management to update contract record |
- Confirm contract dates and vendor assignment
- Contractor approved
- Confirm contractor only needs minimal/time-bound access
- Initiate contractor-access workflow |
- Validate employee's active status
- Confirm employee is active in HRIS
- Approve identity
- Ask: “Is this for promotion, transfer, or additional responsibilities?”
- Route to access-change workflow |
- Conflict found
- Escalate to HR to resolve status mismatch |
- Validate HR-provided new hire record
- Confirm start date and department
- Approve new-hire identity
- Assign baseline access package
- Initiate new-hire provisioning |
- HR data mismatch
- Request HR to correct hire record before continuing |
- Validate vendor authorization
- Confirm vendor company and statement of work
- Vendor approved
- Apply vendor-limited access rules
- Initiate vendor-access workflow |
- Vendor cannot be validated
- Escalate to procurement/vendor management |
- Provision AD admin roles
- Ask: “Does this request involve an Active Directory privileged role?”
- Provision AD-based admin roles
- Ask: “Does this request involve an Active Directory privileged role?”
- Validate if role is AD-based
- Provision application-level admin roles
- Ask: “Does provisioning require admin access within a specific application?”
- Validate application access level
- Validate requirement
- Skip App Role Provisioning
- Remove access and document completion
- Access Check
- If Failure
- Identify failure cause (sync delay, role cache, permissions mismatch)
- Resolve the failure
- Retry removal after correction |
- If Successful
- Document removal in ticket and audit logs
- Send confirmation to requester
- Remove access based on least-privilege alignment
- Ask: “Does current role still require this permission?”
- Justification Review
- If Confirmed
- Revoke system permissions
- Note change in audit log |
- Not removal candidate
- Inform caller access is still required
- Keep permissions unchanged |
- Remove access based on role update
- Ask: “Why is access being removed?”
- Identify HR Event
- HRIS Validation
- If Found
- Ensure requested removal matches new role
- If Not Found
- Remove access based on termination-related events
- Ask: “Is the user still employed?”
- Urgency Check
- If Yes
- Disable access across all systems
- Log termination removal |
- Standard Removal
- Remove access for account cleanup
- Ask system name
- Determine Reason
- If Audit Finding
- Audit Prompt
- If Valid
- Remove access per audit directive
- Document in compliance log |
- Validate Audit Proof
- Invalid audit request
- Inform caller audit evidence is required
- Request proper audit directive |
- Remove access from user
- Ask: “Why is access being removed?”
- Validate Manager
- If Not Verified
- Verify manager in HRIS
- Remove access safely
- Ask: “Does this access depend on or impact other systems?”
- Remove access safely without impacting system function
- Ask: “Does this access depend on or impact other systems?”
- Impact Review
- If Removing Affects Other Systems
- Inform caller of system impact
- Remove access with caution & document dependency note |
- Remove all elevated or administrative rights
- Ask: “Which privileged or admin roles are assigned to this user?”
- Validate privileged-group membership
- Remove all elevated or administrative rights assigned to user
- Ask: “Which privileged or admin roles are assigned to this user?”
- Validate presence in privileged groups (Domain Admin, Local Admin, Security Groups)
- Privileged Access Removal
- Remove distribution group/role-based group memberships
- Ask: “Is the user a member of any distribution lists or role-based access groups?”
- Check AD group memberships
- Validate group assignments
- Remove elevated access inside applications
- Ask: “Which applications assigned the user elevated roles (admin, supervisor, configurator)?”
- Validate elevated-role assignment
- Remove elevated access inside applications (admin consoles, reporting, dashboards)
- Ask: “Which applications assigned the user elevated roles (admin, supervisor, configurator)?”
- Validate app role assignment
- Remove elevated workstation/local machine rights
- Ask: “Was the user added as a local admin on any workstation or server?”
- Check workstation group membership
- Remove elevated workstation/local rights
- Ask: “Was the user added as a local admin on any workstation or server?”
- Check workstation/group listings
- Remove emergency access
- Ask: “Was the user ever issued emergency or break-glass credentials?”
- Validate emergency assignment
- Remove emergency access ("break glass") accounts
- Ask: “Was the user ever issued emergency or break-glass credentials?”
- Validate emergency-access assignment
- Remove service accounts tied to the user
- Ask: “Was the user the owner or operator of any service accounts?”
- Validate service-account association
- Transfer or Disable Service Account
- Validate service-account linkage
- Remove shared mailbox access
- Ask: “Which shared mailboxes was the user assigned to?”
- Check permission list
- Validate presence in mailbox permission list
- Remove Shared Mailbox Rights
- Remove system or application access for an existing user
- Ask: “Which system or application needs access removed?”
- Verify User
- Identity Check
- If Verified
- Ask: “Why does this access need to be removed?”
- Validate identity
- Invalid user
- Inform caller user cannot be located
- Request correct employee info |
- Remove temporary access
- Ask: “Was this access temporary?”
- Check Expiration
- If Expired
- Remove expired temporary permissions
- Still needed
- Inform caller access cannot be removed early without approval
- Request manager authorization |
- Route privileged-access request through required approval chain
- Ask: “Has the user’s direct manager approved this request?”
- Validate approval
- Validate approval presence
- Validate approvals match internal controls
- Ask: “Have all required approvals been collected?”
- Validate approvals
- Validate manager, owner, security, and compliance (if required)
- Validate correctness of privileged or elevated access
- Ask: “Which privileged or elevated permissions are under review?”
- Ask: “Does the user’s role still justify privileged-level access?”
- Confirm Scope
- If Matched
- Keep privileged access active
- Record justification in privilege log |
- Privilege Removal
- If Confirmed
- Revoke elevated access
- Log removal in privileged-access audit |
- Validate emergency security-driven deactivation
- Ask: “What initiated this offboarding request?”
- Validate Incident
- Incident Check
- If Confirmed
- Ask: “Is immediate deactivation required?”
- If Not Confirmed
- Validate offboarding for long-term inactivity
- Ask: “What initiated this offboarding request?”
- Validate Inactivity
- Inactivity Review
- If Confirmed
- Document inactivity-based removal
- Begin deactivation workflow |
- If Not Confirmed
- Validate permissions against compliance rules
- Ask: “Do any permissions conflict with security, compliance, or audit rules?”
- Validate provisioning completion
- Ask: “Has all privileged role provisioning been completed successfully?”
- Provisioning Complete
- Provisioning Incomplete
- Validate regulatory constraints
- Ask: “Does this request fall under regulated systems?”
- Check system category
- Restriction Review
- If Not Eligible
- Inform caller they do not meet compliance requirements
- Route to compliance/security advisory |
- Identify regulation scope
- No Regulatory Restrictions
- Validate regulatory constraints (SOX, HIPAA, PCI, internal audit)
- Ask: “Does this request fall under regulated systems (finance, healthcare, cardholder data)?”
- Identify any regulatory system association
- Restriction Review
- If Eligible
- Allow request to move forward
- Validate resignation events
- Ask: “What initiated this offboarding request?”
- Validate Documentation
- Doc Check
- If Not Valid
- If Valid
- Ask: “What is the employee’s final working day?”
- Begin offboarding workflow |
- Validate system owner approval when required
- Ask: “Does the requested system require owner approval?”
- Validate requirement
- No Owner Approval Needed
- Verify System Owner Approval
- If Not Approved
- Inform caller owner approval is required
- Validate system-specific approval rules
- Verify System Owner Approval
- If Approved
- Document approval in privileged-access workflow
- Validate that security policies and compliance rules are met
- Ask: “Do any permissions conflict with security, compliance, or audit rules?”
- Conflict Validation
- If Confirmed
- Revoke conflicting permissions
- Document compliance-based removal |
- Verify all required accounts have been disabled
- Ask: “Have all required accounts (AD, SSO, email, apps) been disabled?”
- Identify Missing
- Validate Documentation
- Verify group membership before provisioning
- Ask: “Is the user already a member of this privileged group?”
- Validate assignment
- Eligible for Provisioning
- Validate current role assignments
- Verify requester identity & authority
- Ask: “Is the requester the user’s manager or a system owner?”
- Validate authority
- Validate role of requester
- IT Support
- Are multiple users affected in the same application module?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Are multiple users logging into this same device?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Are multiple users reporting the same issue or symptom?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Can other devices connect to the same Wi‑Fi network?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Can the user access email from webmail/OWA?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Can the user connect to any network resources without VPN?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Can the user print a test page from another application?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Can the user reach the remote host by ping or name?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the drive appear after manual mapping?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the issue occur in multiple browsers?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the requested change impact production systems?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the user have access to any shared drives or resources?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the user have an assigned license for the affected application?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the user see the shared mailbox in their mail client?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Does the user’s role legitimately require local admin rights?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Has the device been restarted after applying updates?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Has the user already left the organization?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Has the user recently changed their password?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is secure/pull printing already configured for the user?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the affected data covered by standard backup policies?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the asset tag found in the inventory system?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the device currently reporting as non-compliant?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the device enrolled in mobile device management (MDM)?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the device past its documented lifecycle date?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the device powering on with indicator lights or sounds?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the device reporting as encryption-compliant?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the endpoint protection client up to date and running?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the issue only with audio or video?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the issue related to mandatory IT or security training access?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the requested software available in the self-service catalog?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the slowness isolated to one application?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the sync client signed in with the correct account?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the system date and time accurate?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the ticket already assigned to the correct resolver group?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user able to reach the login page?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user able to ship or drop off the device?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user attempting to reuse an old or weak password?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user completely blocked from performing their job?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user enrolled in self-service password reset?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user exceeding documented storage limits?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user part of the correct security or access group?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user receiving MFA codes or prompts?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user requesting support for non-approved tools or services?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is the user working on a company-managed device?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is there a matching knowledge article for this issue?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is there a valid business justification documented for this access?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Is this a standard endpoint build scenario?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Was the alert generated by an approved security tool?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Was the data stored in approved/managed locations?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- Was the standard onboarding checklist completed?
- YES
- NO
- Is this issue blocking the user from performing critical work tasks?
- YES
- NO
- Have initial troubleshooting steps (reboot, reconnect, basic checks) already been completed?
- New Business Qualification
- Are key stakeholders aligned on the problem and desired outcome?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are strong customer references crucial to their decision?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are their support expectations aligned with our standard offerings?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are there unique legal or contract needs beyond standard terms?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are they comfortable with a cloud-based solution?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are they highly concerned about scaling over time?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are they looking to replace an incumbent solution?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are they open to a pilot or proof-of-concept?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are they open to our standard contract terms and duration?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Are we speaking with a decision maker or strong internal champion?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Based on current information, is win probability high?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Could multiple products or modules be bundled for higher value?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they need many integrations live at launch?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they require a formal security or vendor review?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they require governance and role-based access controls?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they require localization or additional language support?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they require robust API access or automation?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do they value a strong partner or integration ecosystem?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Do we have a committed internal champion?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does the company meet our minimum size or revenue thresholds?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does the customer require specific compliance such as HIPAA or SOC 2?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does the estimated deal size meet our minimum threshold?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does the expected usage volume match our product’s sweet spot?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does the prospect’s tech stack integrate well with our platform?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Does their need fit our standard entry or mid-tier product offerings?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Has a budget been allocated or clearly defined for this project?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Have they trialed similar tools or vendors before?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is a channel or implementation partner involved in the deal?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is data residency a strict requirement for them?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is our pricing model compatible with how they budget and buy?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the business pain significant and time-bound?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the customer aligned with our ideal success profile?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the customer operating in regions we fully support?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the expected data volume within standard product limits?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the primary use case clearly defined and agreed upon?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the proposed implementation relatively straightforward?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the prospect actively evaluating competitors?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the prospect’s business clearly within our target industries?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the prospect’s primary problem one that our products solve well?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is the solution likely to be renewed annually or expanded?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is their procurement process clearly understood?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is there a clear implementation timeline or compelling event driving urgency?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is there a clear path for future upsell or cross-sell?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is there executive sponsorship for this initiative?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Is there strong potential for multi-year or expansion revenue?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Will end users need structured training to be successful?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Will multiple departments or teams use the solution?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Will they require professional services or onboarding support?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Will this product be business-critical for them?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Will this solution introduce significant process change?
- YES
- NO
- Does this prospect match our ideal customer profile in terms of industry, size, and use case?
- YES
- NO
- Have we confirmed a clear problem, viable budget, and decision timeline (BANT)?
- Demo Site Related Types
- Data Sources
- Required for Design
- Routing & Clearance
- AI Assistant (Interstitical)
- AI RAG Integration
- Articles & Publishing
- Automated RFP Alerts
- Charts, Graphs Data Visualization
- Client (QC) Testing
- Comments & Edits (GenEnM)
- CRM
- Dashboard - Front End Content Management
- Demonstration Only
- Design Related
- Digital Signage (Monitor Display)
- DITA Drag and Drop Documents
- Document Retention Policy Management
- Dynamic Document (Filters by Tenants)
- Dynamic Document (Menu selector driven contents)
- Dynamic Document (Submits PRIOR to creation (using Data Cleaner)
- Dynamic Document Creation (Form to Document)
- E-Commerce
- Education Programs and Courses
- Email Broadcasting (Table in SQL)
- Email Exchange Integration
- Event Registration
- Forms & Workflow
- Functionality - General
- Functionality - Member Related
- Functionality - Workflow How To
- Language Translation (Google)
- Module (Details) View
- Multi-Part Data Mining Transfer
- Personalized Dashboard (Filters by Tenants)
- Personalized Dashboards (Not Filtered by Tenants)
- Policies and Procedures
- Project Management (Requirements)
- QA - Code Testing
- Reporting
- Tenants Filters
- This Site's Build Documentation
- User Reporting (All)
- User Reporting (Individual)
- Workflow
- Data Transfers
- Demonstration
- CSV
- Custom RSS format (RDF/Infowatch)
- Data Mining Rules
- Data Transfer (Data Cleaning)
- Data Transfer Demonstration
- Data Transfer from O365 (Cloud) -M/S Graph
- Data Transfer of Audiences
- Data Triage
- Database (SQL/Oracle/IBM)
- Demonstration - MS/Excel
- Email Broadcasting (Table in SQL)
- Excel (XLS)
- Export from Centralpoint
- File (Path) or Folder
- Files (Subfolders for Taxonomy)
- Import to Data Cleaner
- Importing from Audience to Data Cleaner
- Importing from Audiences to Locations
- Index or Ingest from SHAREPOINT
- Module to Module
- Moving Records between Two Centralpoint Sites
- Moving Records within a Centralpoint Site
- MS/Word Documents from File Path
- Multi-Part Data Mining Transfer
- Parsing files with Regular Expression(s)
- Parsing HTML from websites
- Parsing HTML from Word Docs
- Photo Gallery
- Pre-Configured & Uploaded Dataset
- Pre-Configured Generic Import
- Pre-Configured Routine
- Retention Policy Management
- RFPs (Importing from RSS)
- RSS/Atom Feed
- Screenscapes/Images
- Site Build (Dynamic Mapping)
- Site Build (Populating with Content)
- Site Build (USA)
- Site Build (World)
- Videos from Youtube
- Web API Export
- Workflow & Forms
- Zipped Files (Uploaded)
- DITA
- Agreements
- Asset
- Case Studies
- Company
- Customer Service
- Dashboard Items
- Definitions
- Design Elements
- Design Elements
- Documents
- Forms
- Geneology
- Human Resources
- Legal
- Live Data
- Page Templates
- Personalization
- Policies
- Policy
- Powerpoint
- Products
- Project Plan & SOW
- Research
- Sales
- SCORM Courses
- Scripts
- Server & Installation
- Services
- Videos
- Document Library
- MY EXCEL FILES
- MY PDF FILES
- MY POWERPOINT
- MY WORD
- E-Commerce Catalog
- Children
- Hot Deals
- Men's
- Women
- Education
- Human Resources (General)
- New Hire
- Orientation & Training
- Professional Development
- Branding, Usage Guidelines
- Diversity, Equity & Inclusion (DEI)
- Employee Data
- End of Employment
- Ethics
- Human Rights
- Information Security & Compliance
- Leadership
- Pay, Payroll & Benefits
- Regulatory Compliance
- Sexual Harassment
- Virtual employment
- Health Insurance
- Banking & Finance
- Anti-Money Laundering (AML) Awareness
- Bank Secrecy Act (BSA)
- Cybersecurity for Financial Institutions
- GLBA Privacy & Safeguards Rule
- Incident Response & Breach Notification
- PCI DSS Cardholder Data Security
- Third-Party Vendor Risk Management
- Compliance
- Cultural
- Racial Sensitivity
- Senior & Age Based
- FERC
- Energy & Utility Regulation
- Healthcare
- Best Practices
- Billing & Reimbursement Compliance
- Clinical Excellence
- Legal
- Manfucaturing Regulatory Compliance
- Patient Safety & Quality
- Privacy Regulatory Compliance
- Regulatory Compliance
- Safety
- Manufacturing
- Quality & Operational Excellence
- Quality Manufacturing
- Safety
- Water Utility
- Laboratory & Sampling Compliance
- Safety & Emergency Preparedness
- Wastewater & Environmental
- Water Quality & Treatment
- Email - Boilerplate Messages
- SALES RESPONSES
- SALES SUPPORT
- FREQUENTLY ASKED
- CLIENT CASE STUDIES
- TECHNICAL & RESEARCH
- PRODUCT
- HELP DESK
- REPORTING & LIVE DATA
- COMPLIANCE
- FINANCE
- MEDIA ASSETS
- MY POLICIES
- PERSONALIZATION
- PROPOSALS
- 中方“不可能对此无动于衷
- Events
- CME Conference
- Education
- Press Conference
- Events for the Public
- Private Events for Employees
- Form Types
- Content Management
- Days Off
- Bereavement
- Maternity
- Medical
- Paid Time Off
- Personal
- Vacation
- Dynamic Document Creation
- General
- Health Insurance
- HR
- Education
- Generic Enhanced A
- Generic Enhanced B
- Generic Enhanced C
- Generic Enhanced D
- Entertainment
- Food and Drinks
- General - Uncategorized
- Geography
- History
- People
- Science
- Sports
- Technology
- Generic Enhanced E
- Member Representative
- Account Locked or Suspended
- Forgot Password or Username
- Generic Enhanced F
- Generic Enhanced G
- Generic Enhanced H
- Generic Enhanced I
- Generic Enhanced J - Chunking
- Generic Enhanced K
- Generic Enhanced L
- Generic Enhanced M
- Action Memo
- Background
- BLUF
- Clearly explain the difference...
- How does recommendation align...
- Note differences in view...
- Recommended Action
- What additional resources...
- Briefing Checklist
- Key Objectives
- Strategic Arguments, if raised
- Talking Points
- Topic Titles
- Watch Out for, if raised
- Information Memo
- BLUF
- SBUInfoMemo
- SBUInfoMemo
- SUBJECT
- Invitation Memo
- Location
- Media/Press
- Possible Conflicts
- Recommendations
- Generic Enhanced N
- Generic Enhanced O
- Generic Enhanced P
- Generic Enhanced Q
- Generic Enhanced R
- Generic Enhanced S
- Generic Enhanced T
- Generic Enhanced U
- Generic Enhanced V
- Generic Enhanced W
- Generic Enhanced X
- About this Site
- Project Requirements
- WBS
- Generic Enhanced Y
- Generic Enhanced Z
- HealthDay News
- Help Files
- _Pending Submissions
- _Uncategorized
- Centralpoint Help
- Centralpoint News
- Centralpoint Q & A
- Downloading
- Master Help
- Master News
- Master Q & A
- Uber Help
- Uber News
- Uber Q & A
- Web Site Help
- Web Site News
- Web Site Q & A
- Integrations
- Adobe
- Advertising
- Analytics
- Barcodes & QR
- Business Intelligence & Charts
- CAD Files
- Collaboration
- Communications, Voice, SMS
- CRM Systems
- Databases
- E-Commerce & Payment
- Electronic Signature
- Email
- Event & TIcketing
- Forms
- Fullfillment
- Healthcare Content
- Healthcare Credentialing
- Healthcare EHR
- IoT & Sensors
- Microsoft
- RTF (Rich Formatting Text) Editors
- Shipping
- Social Media
- SSO & Authentication
- UX/UI Plug In
- Video
- Marketplace
- Directory A
- Directory B
- Directory C
- Directory D
- Media
- News
- Arms Control
- Homepage Slideshow
- Press Briefings
- Press Releases
- Required Reading
- Photo Galleries
- Implementation
- Nature / Wildlife
- Fish
- Freshwater
- Saltewater
- Fish
- Mammals
- Sharks
- Shell Fish
- Mammals
- Screen Shots
- Wonders of the World
- Policies
- Financial
- HR - Employment/General
- Operations
- Reusable Elements
- Boiler Plate
- Images
- Legal Approved
- Marketing Docs
- Templates
- Security
- Progressive Web Applications
- Forms
- Reporting
- Schedules
- Tools
- Retention Policy Types
- Accounting
- Corporate & Legal
- HR & Payroll
- Purchasing & Sales
- Shipping & Receiving
- RFPs (GenYY)
- Staff Directory
- Gender
- Job Title
- Administration
- Doctor
- Nurse
- Languages Spoken
- Plans
- Amerigroup
- Blue Cross Blue Shield
- Cigna
- Medical Mutual
- Metlife Health
- Super Blue Select
- UnitedHealth Group
- WellPoint
- Specialties
- Cardiology
- Neurology
- Oncology
- Staywell
- Staywell Content Types
- Staywell Service Lines
- Timesheet Tracking
- Expenses
- Health & Wellness
- Hours Worked
- Progress
- Wear-able Sensors
- Video