Sub-categories: Decision Trees
Employee Access & Permissions Management
Understanding the Access Request
- Activate alerts
Alert Check
- Validate
If Not Required
- No Alerts Needed
Inform caller alerting is not required
- Proceed
Continue process |
- Configure Alerts
Enable behavioral and anomaly-based alert rules
- Confirm
Validate alert triggers generated during test
- Proceed
Add alert-policy record |
- Duration Prompt
Ask for start/end date
- Approval
Confirm manager acknowledges temporary nature
- Assign
Apply temporary access
- Proceed
Set auto-expiration |
- Permission Type
Ask: “What level of access is needed? (read, edit, manage, admin)”
- If Admin-Level Access
Privilege Validation
- If Not Supported
No admin tier exists
- Explain
Inform caller admin roles not available
- Stop
Provide alternative lower-level role guidance |
- Approval Checks
Confirm compliance and system-owner approval
- Assign
Route request to privileged-access workflow
- Proceed
Confirm assignment once approved |
- If Edit Access
Justification Check
- Manager Approval
Confirm approval documentation
- Assign
Apply edit permissions
- Proceed
Note in access-change log |
- Explain
Inform caller edit access cannot be granted
- Stop
Request updated justification |
- If Manage-Level Access
Role Alignment
- If Not Aligned
Not eligible
- Explain
User role does not qualify for manage-level access
- Stop
Escalate if exception needed |
- Approval Workflow
Confirm manager + system owner approval
- Assign
Apply manage permissions
- Proceed
Update central permission catalog |
- If Read Access
Validate
- Assign
Apply read-only permissions
- Proceed
Document addition in audit log |
- If Not Valid
Excessive request
- Explain
Inform caller read-only doesn’t match need
- Stop
Request correct permission level |
- Validate requirement
If Not Required
- Cloud Privilege Not Needed
Inform caller no cloud admin privileges apply
- Proceed
Continue privileged-access provisioning |
- Assign Cloud Role
Grant approved cloud RBAC role
- Confirm
Validate cloud console access
- Proceed
Log cloud provisioning |
- Apply MFA enhancements
MFA Requirement Check
- Validate
If Not Required
- No MFA Enhancement
Inform caller elevated MFA is not required
- Proceed
Continue workflow |
- Activate Enhanced MFA
Enable required MFA controls (tokens, app, hardware key)
- Confirm
Validate MFA registration
- Proceed
Add MFA enforcement documentation |
- Apply monitoring
Identify Required Controls
- Validate controls
If No Controls Identified
- No Monitoring Required
Inform caller that no additional monitoring applies
- Proceed
Continue privileged-access completion |
- Enable Logging
Configure session logging for privileged activity
- Confirm
Validate logging is active
- Proceed
Document monitoring activation |
- Check requirement
If Not Required
- No Server Admin Needed
Inform caller server/local admin role is not needed
- Proceed
Continue workflow |
- Validate requirement
If Required
- Assign Local/Server Admin
Add user to server/local admin groups
- Confirm
Validate system reflects new rights
- Proceed
Document assignment |
- Confirm permission level
Permission Type Prompt
- Ask for required permission tier
If Manage-Level Access
- Validate admin rights
Privilege Review
- Approval Requirement
Confirm security, compliance, and system-owner approval
- Proceed
Route to privileged-access workflow |
- Validate manage rights
Role Fit Check
- Approval Workflow
Confirm manager & system owner approval
- Proceed
Assign manage-level permissions |
- Assign Permissions
Apply HR standard access package
- Policy Enforcement
Enable HR confidentiality rules
- Proceed
Route to additional-permissions evaluation |
- Load IT baseline
Validate Sub-Role
- Assign Permissions
Apply Dev toolchain (Git, IDE, DevOps permissions)
- Security Policy
Assign code-repository restrictions
- Proceed
Route to additional-permissions evaluation |
- Assign Permissions
Apply Tier-1 IT tools & support queues
- Security Policy
Enforce IT-staff MFA and admin controls
- Proceed
Move to additional-permissions review |
- Load Ops baseline
Validate Role
- Assign Permissions
Apply field-device access, mobile tools
- Compliance Settings
Apply field security controls
- Proceed
Move to additional-permissions review |
- Assign Permissions
Apply back-office Ops groups
- Compliance Settings
Apply data-handling restrictions
- Proceed
Continue to additional access checks |
- Assign privileged roles
Identify Approved Role
- Check approvals
If No Role Identified
- Missing Role
Inform caller request lacks a defined privileged role
- Stop
Await updated request |
- Review approval details
If Valid Role Identified
- Locate Privileged Group
Identify AD group or application admin role
- Provision
Add user to specified privileged group
- Confirm
Validate membership update
- Proceed
Document provisioning |
- Conflict Response
Inform caller request violates SOD policy
- Stop
Route request to compliance remediation |
- Validate SOD
If No Conflict
- Clear of Conflicts
Proceed with request
- Proceed
Continue privileged-access evaluation |
- Document Results
Log all retained, changed, or removed permissions
- Notify Manager
Provide summary to requester/manager
- Proceed
Close revalidation workflow |
- Missing Review
Identify permissions still needing validation
- Correct
Complete outstanding items
- Stop
Re-run final review after completion |
- Validate record
If Not Approved
- Security Review Needed
Inform caller IT Security must approve request
- Stop
Hold request until security review completes |
- Security Clearance
Document security approval
- Proceed
Continue to compliance routing |
- Validate
If Not Required
- No Review Scheduling
Inform caller periodic review reminders not required
- Proceed
Continue to final step |
- Validate requirement
If Required
- Enable Review Reminders
Schedule periodic recertification tasks
- Confirm
Validate reminder scheduling
- Proceed
Add recertification note |
- Validate
If Not Required
- No SIEM Routing
Inform caller SIEM routing not required
- Proceed
Continue monitoring setup |
- Enable SIEM Ingestion
Forward logs/events to SIEM
- Confirm
Validate ingestion and parsing
- Proceed
Record SIEM activation |
- Validate mailbox
If Not Available
- Error
Identify reason (license, sync delay, quota)
- Remediate
Apply or adjust license
- Stop
Retry mailbox provisioning |
- MFA Enrollment
Ensure MFA is enabled or scheduled for first login
- If MFA Ready
Confirm SSO readiness
- Access Validation
Test login if possible
- Proceed
Add SSO readiness to summary |
- Error
Troubleshoot attribute mismatch
- Correct
Update AD fields manually
- Stop
Retry sync and revalidate |
- Access Confirmation
Confirm each system reflects expected permissions
- Documentation
Add systems to provisioning summary
- Proceed
Move to requester notification |
- Prepare Notification
Compile confirmation details
- Notify Requester
Send manager and requester provisioning confirmation
- Proceed
Mark new user setup complete |
- Missing components
Identify missing system
- Troubleshoot
Resolve system-specific error
- Stop
Re-run audit once fixed |
- Validate Manager Identity
Ask: “Can you confirm your name and reporting relationship to the user?”
- Manager Check
Validate manager in HRIS
- If Not Verified
Unauthorized
- Explain
Inform caller only verified managers may initiate offboarding
- Stop
Escalate to HR or IT Security |
- If Verified
Confirm Offboarding Type
- Proceed
Begin appropriate offboarding workflow |
- Validate HR Transfer Event
Ask: “Is there a documented transfer in HRIS?”
- HRIS Check
Confirm role change exists in system
- If Not Found
Missing Transfer Record
- Explain
HR must finalize transfer before access changes
- Stop
Wait for HR update |
- Validate Contract End
Ask: “Has the contract reached its end date?”
- Contract Check
Validate contract status in vendor system
- If Ended
Confirm Badge/Asset Return
- Proceed
Begin contractor deactivation |
- If Not Ended
Invalid timing
- Explain
Offboarding cannot occur before contract end
- Stop
Request updated end date |
- Accept Necessity
Confirm least-privilege is met
- Proceed
Continue compliance checks |
- Validate privilege need
If Privilege Not Required
- Decline Elevated Access
Inform caller that standard access can fulfill request
- Stop
Route to normal access modification |
- Confirm urgency
Urgency Review
- Approval Check
Manager approval required
- Proceed
Route to expedited processing |
- If Not Valid
Not approved
- Explain
Inform caller urgent access cannot be granted
- Stop
Convert request to standard processing |
- Confirm Manager Approval
Ask: “Do you have documented manager approval for this change?”
- If Approved
Review Approval
- Identify Reason
Ask the employee to clarify purpose
- Proceed
Route to access-add/remove workflow |
- If Not Approved
Missing approval
- Explain
Inform employee manager approval is required
- Stop
Request manager to submit authorization |
- Identify HR Event
Ask: “Was this triggered by a role change, promotion, transfer, or job update?”
- If Event Not Found
No HR correlation
- Explain
Inform caller HR must finalize record
- Stop
Wait for updated HRIS event |
- Confirm necessity
Assess whether new access supports job duties
- Manager Confirmation
Verify manager agrees with justification
- Proceed
Route to processing workflow |
- Validate HR Record
Ask: “Is the user included in the latest HR termination file?”
- HRIS Check
Verify user termination status in HRIS
- If Found
Confirm Effective Date
- Proceed
Begin deactivation workflow |
- If Not Found
No HR Confirmation
- Explain
Inform caller HR must list user in termination file
- Stop
Request HR to update termination record |
- Attempt Verification
Ask caller for name, department, and role
- Directory Lookup
Attempt to locate caller in internal directory
- If Found But No Authority
Authorization Failure
- Explain
Inform caller they lack authority to request access
- Stop
Require manager or HR to submit request |
- If Not Found
Identity Failure
- Explain
Inform caller identity cannot be verified
- Stop
Forward ticket to IT Security |
- Confirm Authorization
Ask: “Has your manager approved this access?”
- If Yes
Request Proof
- Validate authenticity
Compare approval against manager email domain
- Identify HR Event
Ask: “Was this triggered by a hire, transfer, or termination?”
- HRIS Event Lookup
Check event details in HR system
- If Event Found
Validate effective date
- Effective Date Review
Confirm event has reached effective window
- Inform HR
Advise caller the event has not yet processed
- Stop
Wait for HRIS update and re-trigger |
- Validate System Trigger
Ask: “Is this request generated from our standard automation tool?”
- Workflow Metadata Check
Verify automation tag in ticket or logs
- If Invalid
Trigger Mismatch
- Explain
Inform caller automation record is incomplete
- Stop
Escalate to IT workflow administrator |
- Validate training
If Not Completed
- Training Needed
Inform caller training must be completed before privileged access
- Stop
Direct requestor to training path |
- Training Verified
Approve training requirement
- Proceed
Continue compliance alignment |
- Begin identity mapping
SSO Directory Sync
- Assign SSO Group
Add user to baseline authentication group
- MFA Required
Ensure user is enrolled in MFA or set to prompt at first login
- Proceed
Complete SSO activation |
- SSO Error
Troubleshoot attribute mismatch
- Correct
Update AD fields manually if required
- Stop
Retry sync once corrected |
- Authentication Failure
Identify failure type (password sync, SSO block, license issue)
- Remediate
Address issue with AD/SSO
- Stop
Retry credential validation after fix |
- Credentials Working
Confirm new hire can sign in at start date
- Finalize
Mark account creation complete
- Proceed
Move to baseline access setup |
- Populate required fields
Set Department
- Attribute Issue
Correct required fields
- Stop
Retry provisioning once fixed |
- Proceed
Continue with mailbox creation |
- Start AD provisioning
Username Generation
- Follow naming convention
Check Username Availability
- Conflict
Adjust format (add number or middle initial)
- Proceed
Generate unique username and continue |
- Account Creation Process
Create AD profile with required attributes
- Proceed
Enable account and set initial properties |
- Assign M365/Exchange license type
If License Available
- Mailbox Creation
Provision mailbox in correct region
- Policy Assignment
Apply email policies (retention, security)
- Proceed
Confirm mailbox creation completed |
- Validate category
If Not Regulated
- No Compliance Review Needed
Inform caller compliance involvement not required
- Proceed
Continue to final routing |
- Revoke MFA
Disable MFA methods, reset tokens, revoke device trust
- Confirm
Ensure MFA access is fully removed
- Proceed
Add MFA disable to audit log |
- Validate MFA enrollment
If Not Enrolled
- No MFA
Inform caller user was not enrolled in MFA
- Proceed
Continue with system disables |
- Validate assignment
If Not Assigned
- No Shared Access
Inform caller no shared accounts are tied to user
- Proceed
Continue with offboarding workflow |
- Revoke Shared Access
Remove credentials or group membership
- Confirm
Ensure user no longer has shared-account access
- Proceed
Update shared-access log |
- Disable Integrated Accounts
Trigger deactivation through automation workflows
- Confirm
Ensure integration state updates to disabled
- Proceed
Log integrated-system disable |
- Validate through IAM
If Not Found
- No Integrated Access
Inform caller no integrated access exists
- Proceed
Continue to final disable verification |
- Disable VPN access
Disable VPN Profile
- Validate presence
If Not Assigned
- No VPN Access
Inform caller VPN access was not provisioned
- Proceed
Continue with next system disables |
- Remove VPN Access
Disable VPN profile and revoke certificates/tokens
- Confirm
Validate connection is blocked
- Enable session recording
Session Recording Check
- Validate
If Not Required
- No Recording Needed
Inform caller session recording is not needed
- Proceed
Continue monitoring setup |
- Validate requirement
If Required
- Configure Session Recording
Enable session-capture agent or platform control
- Confirm
Validate recording is functioning
- Proceed
Add entry to monitoring log |
- Enforce enhanced MFA
MFA Enforcement Check
- Validate
If Not Required
- No Enhanced MFA
Inform caller standard MFA is sufficient
- Proceed
Continue monitoring setup |
- Validate requirement
If Required
- Apply Enhanced MFA
Enable hardware keys, authenticator enforcement, or conditional access
- Confirm
Validate MFA registration
- Proceed
Record MFA enforcement |
- Documentation
Record all data-handling actions
- Notify
Inform manager/HR that data ownership transfer is complete
- Complete
Close data-handling stage |
- Identify Missing
Determine which systems still require data handling
- Address
Complete outstanding transfers/archives
- Stop
Re-run final review once complete |
- Validate OneDrive content
If No OneDrive Content Exists
- No OneDrive Data
Inform caller no OneDrive data exists for handling
- Proceed
Continue to next storage system |
- Check for admin role
If No Privileged Role Identified
- Not Privileged Access
Inform caller request does not meet privileged-access criteria
- Stop
Route request to standard access workflow |
- Capture Business Justification
Ask: “What task requires this elevated access?”
- Validate
Confirm justification aligns with IT policy
- Proceed
Continue compliance alignment |
- Approval Criteria Met
Mark justification as validated
- Proceed
Route request to approval workflow |
- Criteria Not Met
Inform caller request does not qualify for privileged access
- Stop
Close request or reroute based on policy |
- Documentation Review
Ensure all removals captured in offboarding log
- Notify
Inform manager/HR that privileged access is fully revoked
- Complete
Close privileged-access deactivation |
- Identify Missing
Determine remaining entitlements requiring removal
- Correct
Remove outstanding access
- Stop
Re-run final privileged-access check |
- Final verification
Final Monitoring Review
- Monitoring Incomplete
Identify missing monitoring items
- Correct
Complete outstanding monitoring tasks
- Stop
Re-run final monitoring review |
- Monitoring Complete
Mark monitoring activation as finished
- Notify
Inform IT Security and requester
- Complete
Close privileged-access monitoring setup |
- Validate presence
If No Items Found
- No App-Level Data
Inform caller no application-level ownership exists
- Proceed
Continue to final review |
- Handle calendars owned by the user
Calendar Ownership Check
- Identify calendar ownership
If Calendar Exists
- Transfer Calendar Ownership
Reassign ownership to manager or new role owner
- Confirm
Validate visibility and permissions |
- Validate calendar existence
If No Calendar Exists
- No Calendar Transfer
Inform caller no owned calendars detected
- Proceed
Continue to application data handling |
- Handle mailbox content
Mailbox Check
- Identify content
If No Transfer Needed
- No Mailbox Action
Inform caller no mailbox content requires transfer
- Proceed
Continue to shared resource handling |
- Identify file ownership
If Archive Needed
- Archive Files
Move file-share content to long-term storage
- Confirm
Validate archive completion |
- Validate presence of files
If No Files Found
- No File Share Content
Inform caller no file share data exists
- Proceed
Continue to mailbox handling |
- Handle SharePoint-owned document libraries
SharePoint Ownership Check
- No SharePoint Transfer
Inform caller no SharePoint ownership exists
- Proceed
Continue to file share review |
- Transfer Site Ownership
Assign new site owner/manager
- Confirm
Validate successor access and permissions |
- Provision AD admin roles
AD Provisioning
- Validate role type
If Not AD Role
- Skip AD Provisioning
Inform caller this step does not apply
- Proceed
Continue to next role category |
- Add to AD Group
Assign role in AD admin group
- Confirm
Validate AD membership replication
- Proceed
Log AD provisioning |
- Validate application access level
If App Admin Required
- Assign App Admin Role
Apply elevated role inside application
- Confirm
Validate app role assignment
- Proceed
Add application provisioning note |
- Validate requirement
If Not Required
- Skip App Role Provisioning
Inform caller no elevated app role needed
- Proceed
Continue to next stage |
- Identify HR Event
Promotion/transfer/role change
- If Not Found
Missing event
- Explain
Inform caller HR must update record
- Stop
Wait for HR record update |
- Urgency Check
Ask: “Immediate removal required?”
- Standard Removal
Remove access per standard offboarding schedule
- Proceed
Document in HRIS/IT logs |
- Remove access from user
Determine Reason
- Validate Manager
Manager Identity Check
- If Not Verified
Unauthorized
- Explain
Inform caller manager validation failed
- Stop
Escalate to IT Security |
- Approval
Confirm manager authority
- Confirmed
Proceed with removal
- Proceed
Apply access removal |
- Remove access safely
Check Dependencies
- Safe Removal
Revoke access in system
- Confirm
Ensure user still has required remaining rights
- Proceed
Log completion |
- No Privileged Access
Inform caller no privileged roles exist for removal
- Proceed
Continue to next access-removal category |
- Privileged Access Removal
Remove user from privileged groups
- Confirm
Verify role membership no longer includes user
- Document
Add privileged-access removal to offboarding log |
- Remove Group Access
Remove user from all listed groups
- Confirm
Validate removal propagated
- Proceed
Document group removals |
- No Group Memberships
Inform caller no groups require removal
- Proceed
Move to next entitlement category |
- Remove Elevated Role
Revoke admin/manager roles and downgrade as needed
- Confirm
Validate permissions updated in app
- Proceed
Add app-role removal to offboarding record |
- Remove Local Admin
Remove user from local Administrators group
- Confirm
Validate user no longer appears in local admin lists
- Proceed
Record local-admin removal |
- No Local Admin Access
Inform caller user has no local admin assignments
- Proceed
Continue deactivation steps |
- Remove emergency access
Check Break Glass Accounts
- No Break Glass Access
Inform caller no emergency access exists
- Proceed
Continue entitlement processes |
- Revoke Emergency Access
Disable emergency account or rotate credentials
- Confirm
Verify emergency access fully disabled
- Proceed
Add emergency-access removal to log |
- Remove service accounts tied to the user
Identify Service Accounts
- Transfer or Disable Service Account
Assign new owner or disable account per policy
- Confirm
Validate owner change or disable completion
- Proceed
Add to offboarding audit log |
- No Service Accounts
Inform caller no service account associations exist
- Proceed
Continue with entitlement cleanup |
- Remove shared mailbox access
Identify Shared Mailboxes
- Check permission list
If Not Found
- No Shared Mailbox Access
Inform caller no shared mailboxes are assigned
- Proceed
Continue with privileged-access review |
- Remove Shared Mailbox Rights
Remove Full Access / Send As / Send On Behalf
- Confirm
Validate access removed per mailbox
- Proceed
Add mailbox removal to offboarding log |
- Verify User
Ask for username/employee ID
- Identity Check
Validate identity in AD/HRIS
- If Verified
Determine Reason
- Align
Confirm new role no longer requires access
- Proceed
Remove system access |
- Validate approval
If Not Approved
- Missing Manager Approval
Inform caller manager approval is required
- Stop
Wait for manager approval before continuing |
- Capture Approval
Document manager approval in request system
- Proceed
Route to IT Security review |
- Validate approvals
If Missing Approvals
- Approvals Incomplete
Inform caller which approvals are pending
- Stop
Hold until missing approvals are obtained |
- Approvals Confirmed
Mark request as fully approved
- Proceed
Route to provisioning workflow |
- Validate Incident
Ask: “Is this removal tied to a confirmed security incident?”
- Incident Check
Verify incident ticket with Security Team
- If Confirmed
Confirm Severity
- Proceed
Begin emergency deactivation |
- Explain
Request security confirmation before proceeding
- Stop
Wait for incident verification |
- Validate Inactivity
Ask: “Has the user exceeded the authorized inactivity window?”
- Inactivity Review
Verify login history and account status
- If Not Confirmed
Not Eligible
- Explain
User does not meet inactivity requirements
- Stop
Keep account active |
- Compliant
Inform manager no compliance issues detected
- Proceed
Retain access and finalize revalidation |
- Provisioning Complete
Mark provisioning as finished
- Notify
Inform requester and IT Security
- Complete
Close provisioning stage |
- Provisioning Incomplete
Identify missing steps
- Correct
Complete outstanding provisioning
- Stop
Re-run final verification |
- Identify regulation scope
If Not Regulated
- No Regulatory Restrictions
Inform caller system is not regulated
- Proceed
Continue privileged-access validation |
- Validate resignation events
Identify Trigger
- Validate Documentation
Ask: “Is there a written resignation notice from the employee?”
- Doc Check
Verify authenticity of submitted resignation
- If Not Valid
Missing Documentation
- Explain
Inform caller written notice is required
- Stop
Request resignation documentation |
- Validate system owner approval when required
Check System Owner Requirement
- Validate requirement
If Required
- No Owner Approval Needed
Inform caller owner approval is not applicable
- Proceed
Continue to IT Security Review |
- Verify System Owner Approval
Ask: “Has the system owner approved this request?”
- Verify System Owner Approval
Ask: “Has the system owner approved this request?”
- Identify Missing
Determine which accounts still need deactivation
- Correct
Disable remaining accounts
- Stop
Re-run final verification after completion |
- Validate Documentation
Ensure all steps recorded in offboarding log
- Notify Requester
Inform manager/HR that all accounts are disabled
- Proceed
Close system-disable workflow |
- Verify group membership before provisioning
Check Existing Entitlements
- Validate assignment
If Not a Member
- Eligible for Provisioning
Proceed with privilege assignment
- Proceed
Continue provisioning workflow |
- No Action Required
Inform caller user already has this privilege
- Proceed
Document confirmation |
- Validate authority
If Not Authorized
- Unauthorized Request
Inform caller only managers/system owners may request privileged access
- Stop
Request proper authorization |
- Accept Requester
Proceed to justification validation
- Proceed
Continue process |
IT Support
Account Access
- YES
Treat this as an application incident, collect examples, and escalate to the app team.
- NO
Handle as a user-specific issue and focus on profile, permissions, or configuration.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Review shared-device configuration and ensure profiles are properly separated.
- NO
Investigate profile corruption or unauthorized access and document findings.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check the incident management system, confirm a major incident, and provide status updates.
- NO
Treat this as an isolated issue and proceed with one-user troubleshooting steps.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Focus on the user device’s network settings, drivers, and Wi‑Fi profile; rejoin the network.
- NO
Check access point or site-wide issues; involve the network operations team for broader impact.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Troubleshoot the local client profile (Outlook, mobile app), including profile repair and cache reset.
- NO
Check mailbox status, licensing, and any account restrictions; escalate if the mailbox appears disabled.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Focus on VPN client configuration, certificates, and credentials, then re-test access.
- NO
Check general connectivity, DNS, and firewall rules; involve the network team if many users are affected.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Reinstall or reconfigure the printer for the affected application and confirm test output.
- NO
Check printer connectivity/queue, drivers, and permissions; attempt printing to an alternate device.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check the RDP profile, credentials, and allowed session limits; then retest connection.
- NO
Investigate DNS, VPN, firewall, and host availability; open an infrastructure ticket if needed.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Add or adjust login scripts or GPO settings to make the mapping persistent.
- NO
Check credentials, UNC path, and share permissions, then retest mapping.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Focus on application-side or account-based causes and gather error details.
- NO
Clear cache/cookies, reset the affected browser, or reinstall as needed.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Follow formal change management, including risk assessment and rollback planning.
- NO
Handle this as a standard service request with minimal risk and standard approval.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Investigate the specific share permissions and recent changes; confirm group membership.
- NO
Check domain connectivity, profile status, and overall authentication; involve identity team if needed.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check for propagation delays and ask the user to log off/on and retry.
- NO
Request or adjust license assignment and confirm once the change is active.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Re-add or repair the profile and verify permissions are correctly applied.
- NO
Confirm delegation in the directory system; update access rights and have the user re-login.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Review and, if policy allows, grant temporary or scoped admin access.
- NO
Deny the request and propose alternate workflows or IT-performed changes.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Capture any error messages, collect logs, and attempt a manual update repair or reinstall.
- NO
Schedule a restart and maintenance window, then retry updates and monitor status.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Confirm deprovisioning steps are complete and logs are captured for audit.
- NO
Escalate any remaining active access for urgent review and closure.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Identify and update any saved credentials on all devices/apps, then unlock the account.
- NO
Check for brute-force or suspicious activity, reset the account, and enforce a secure new password.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Validate PIN or card and verify the correct printer queue is selected.
- NO
Help configure secure printing and provide brief user training on the workflow.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Initiate a restore request, set expectations for recovery time, and track to completion.
- NO
Explain backup limitations and explore local copies or alternative data sources.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Update records with current user, location, and status information.
- NO
Escalate as a potentially missing asset and initiate investigation procedures.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Force a policy or inventory sync and re-check the compliance dashboard.
- NO
Rebuild inventory/agent data and escalate to endpoint engineering if still misreported.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Apply or sync the proper policies, then re-check app access and email configuration.
- NO
Help enroll the device, verify compliance posture, and distinguish corporate vs personal ownership.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Schedule replacement and plan data migration with the user.
- NO
Continue troubleshooting but note the upcoming need for replacement.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Troubleshoot display, cables, and peripherals; test with an external monitor if applicable.
- NO
Check the power supply and outlet; document and arrange depot or onsite hardware service.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Document the device ID and confirm compliance in the management console.
- NO
Run encryption health checks, attempt repair, or re-enroll the device as needed.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Run a full scan, isolate detected threats, and document remediation steps for the ticket.
- NO
Update or reinstall the client, then run a full scan; escalate to security if infection persists.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check device audio/video settings and in-app configuration, then run a test meeting.
- NO
Review meeting links, calendar integration, and service-status pages for known incidents.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Verify LMS access, resend links, and confirm completion tracking is correct.
- NO
Open a ticket with the LMS owner and provide temporary guidance to the user.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Guide the user to install via the catalog, confirm licensing, and verify the app launches successfully.
- NO
Validate licensing and approval; submit or track an installation request through the proper workflow.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check that application’s known issues, logs, and resource usage; involve the application owner as needed.
- NO
Investigate OS performance, hardware health, and background processes impacting overall system speed.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Check storage quota, sync conflicts, and selective sync settings.
- NO
Re-sign in, reset, or reinstall the sync client and then re-evaluate the issue.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Move on to other application-related causes once time is verified.
- NO
Correct time settings, sync with domain or NTP, and retest the reported issue.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Update the user with progress and any relevant ETA from that group.
- NO
Assign or re-route the ticket to the proper resolver group based on category.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Guide the user to clear cache or try another browser/device, confirm URL, and verify basic network connectivity.
- NO
Check for local network issues, VPN requirements, or SSO outages; escalate if the issue appears system-wide.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Provide packing and label instructions and record the expected return date.
- NO
Arrange courier pickup or coordinate an alternative return process.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Explain password history and complexity rules and help select a compliant password.
- NO
Check for system errors and attempt a compliant reset; escalate if policy behavior seems incorrect.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Assign a higher priority/severity and communicate accelerated response expectations.
- NO
Maintain standard SLA priority and provide any available workarounds.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Walk the user through the self-service reset portal and verification steps, then confirm successful login.
- NO
Verify identity, perform an admin-assisted reset, and ensure MFA or recovery options are updated.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Guide on cleanup/archiving and request additional storage if policy allows.
- NO
Investigate other causes such as corruption or sync failures and run diagnostics.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Confirm directory updates and propagation, then have the user log off/on and test again.
- NO
Submit or modify an access request and escalate to security/identity for group updates.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Troubleshoot the specific device or app (time sync, notifications, connectivity) and re-test MFA.
- NO
Verify contact details, reset MFA registration, or switch the user to a backup MFA method.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Explain policy, document risk, and recommend approved alternatives.
- NO
Evaluate risk and, if justified, guide them through any exception process.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Apply standard remote setup checks, tools, and security validations.
- NO
Explain support limitations for personal devices and outline what IT can still assist with.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Follow the article, confirm resolution, and document usage in the ticket.
- NO
Flag the gap and propose or create a new knowledge article when appropriate.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Route the request for approval based on data sensitivity and role requirements.
- NO
Request additional justification or escalate to the manager/security team for clarification.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Use the approved golden image and automated provisioning tools.
- NO
Engage engineering for a custom build and document any deviations from standard.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Follow the documented incident response playbook and record actions taken.
- NO
Validate the source; if still suspicious, escalate to the security operations team.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Initiate recovery through appropriate backup or restore processes.
- NO
Explain recovery limitations and reinforce future best practices for storage.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
- YES
Verify mailboxes, groups, and licenses are active; confirm the user can log in successfully.
- NO
Open follow-up tasks for any missing items such as email, access, or hardware provisioning.
- YES
Classify the ticket as high priority or severity and communicate accelerated response expectations to the user.
- NO
Maintain standard priority and proceed with normal troubleshooting and status updates.
- YES
Document the steps already taken and move to advanced diagnostics or escalate to the next support tier.
- NO
Guide the user through the standard initial troubleshooting steps and record the results in the ticket.
New Business Qualification
Lead Qualification
- YES
Co-create a shared plan and define success metrics with the group.
- NO
Schedule cross-functional conversations to surface misalignment and resolve it.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Provide relevant case studies and arrange reference calls where appropriate.
- NO
Emphasize demos, pilots, and proof-of-value in place of references.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Highlight the support tiers and SLAs that best match their expectations.
- NO
Escalate to sales leadership or success if expectations exceed what we can deliver.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Loop in legal early and allocate time for redlines and negotiations.
- NO
Set expectations on limits to contract changes and what must remain standard.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Emphasize cloud security, reliability, and agility when they’re comfortable.
- NO
Discuss any available on-prem/hybrid options or consider disqualifying if we cannot meet requirements.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Present performance benchmarks and stories of similar scaled customers.
- NO
Clarify product scale limits and options for future upgrades or add-ons.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Focus on migration, switching costs, and clearly document improvement areas.
- NO
Position our solution as complementary or phased in alongside the incumbent.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Design a tightly scoped pilot with clear success metrics and exit criteria.
- NO
Move directly toward a proposal or agreement if they prefer to skip a pilot.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Proceed to commercial negotiation using standard terms and options.
- NO
Explore pilots, shorter terms, or special approvals for non-standard contracts.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Engage in deeper needs analysis and confirm their influence on the buying process.
- NO
Work to identify and gain access to the economic buyer or key influencers.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Advance aggressively with appropriate resources and leadership visibility.
- NO
Place the opportunity into nurture or lower priority while gathering more information.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Build a bundle that improves value and simplifies the buying decision.
- NO
Limit initial scope to the highest-impact product with an expansion path.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Confirm top-priority integrations and sequence the rest in phases.
- NO
Propose launching with a minimal viable integration set and adding more later.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Provide security documentation and coordinate subject-matter expert discussions.
- NO
Clarify the minimum documentation they need and set realistic timelines.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Show admin controls, granular roles, and audit features in our platform.
- NO
Discuss process-level governance or third-party add-ons if native control is limited.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Confirm supported languages and adapt materials where possible.
- NO
Discuss roadmap and limits; avoid over-promising on localization.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Show API capabilities, documentation, and reference architectures.
- NO
Clarify constraints and propose alternative integration methods where possible.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Showcase our partners, integrations, and community ecosystem.
- NO
Focus more on core product strengths and outcomes than ecosystem breadth.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Leverage them for internal selling, discovery, and adoption planning.
- NO
Work to build a champion or reconsider resource investment if none emerges.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Move forward with full discovery and solution mapping that matches their scale.
- NO
Consider small-business or entry-level offerings, or disqualify if there is no viable fit.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Map their requirements to our certifications, controls, and documentation.
- NO
Clarify any gaps and whether they can accept compensating controls or reduced scope.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Treat as a core opportunity with full presales and success support.
- NO
Handle as a smaller deal, bundle with others, or route to a lighter-touch channel.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Propose scalable architecture and tiered pricing that supports their growth.
- NO
Consider higher-end or custom solutions, or clarify performance limitations early.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Highlight compatible integrations and low-friction deployment paths.
- NO
Discuss workarounds, middleware, or rule out the opportunity if integration is too complex.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Recommend the appropriate tier and consider upsell options based on roadmap.
- NO
Evaluate enterprise/custom tiers or suggest alternative vendors if misaligned.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Align product tiers and commercial options with the stated budget range.
- NO
Explore budget constraints, ROI, and potential funding sources before proceeding.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Differentiate our approach based on lessons learned from prior tools.
- NO
Educate on category basics and demonstrate value via discovery and demos.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Align roles, compensation, and communication plans with the partner.
- NO
Proceed with a direct motion and confirm that no channel conflict exists.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Map hosting regions and options to their policy requirements.
- NO
Explain limitations and evaluate whether exceptions or reduced scope are acceptable.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Align SKUs or tiers to their budgeting style (seats, usage, etc.).
- NO
Explain our model clearly and consider phased or pilot-based pricing if needed.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Emphasize rapid time-to-value and measurable ROI in our approach.
- NO
Avoid over-committing resources; consider nurture or educational content instead.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Highlight long-term partnership potential and a proactive success plan.
- NO
Clarify expectations and decide whether this is a strategic fit worth pursuing.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Proceed with standard pricing, support coverage, and SLAs.
- NO
Explain geographic limitations, potential partner options, or any service restrictions.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Confirm storage, performance expectations, and any growth plans.
- NO
Discuss archiving, tiered storage, or enterprise-level pricing for large volumes.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Tailor demos, proposals, and success metrics to that specific use case.
- NO
Help refine the use case and confirm whether our solutions still align before advancing.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Estimate rapid onboarding and lower services cost; highlight ease of rollout.
- NO
Flag as complex and involve solutions or architecture early in the cycle.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Differentiate with our strengths and address competitive gaps transparently.
- NO
Educate the prospect on the broader category and our unique value before others enter.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Proceed with standard qualification and product alignment focused on their industry.
- NO
Flag as non-core, manage expectations, and assess whether special handling or disqualification is appropriate.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Position our core value propositions and relevant customer stories.
- NO
Consider adjacent solutions, partners, or politely disengage if we cannot solve the core problem.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Factor long-term value into pricing and customer success planning.
- NO
Clarify that this is a limited or one-time engagement and adjust expectations.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Plan around approvals, legal review, and vendor onboarding steps.
- NO
Clarify process steps, identify potential blockers, and adjust timelines.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Map milestones and resources to their target dates and commit to a mutual plan.
- NO
Clarify urgency and impact; avoid over-investing in low-priority or vague timelines.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Plan for post-implementation reviews and expansion opportunities.
- NO
Treat it as a standalone sale and manage expectations accordingly.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Engage sponsors in key milestones and business reviews to reinforce value.
- NO
Encourage them to identify a sponsor and highlight risk without sponsorship.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Consider incentives for longer-term agreements and expansion milestones.
- NO
Structure flexible, shorter terms with clear value delivery and limited risk.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Include training offerings and timelines in the commercial discussion.
- NO
Provide self-paced resources and light-touch enablement only.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Design a multi-team rollout plan and governance model.
- NO
Focus on a single-team deployment first and plan cross-team expansion later.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Include services scope, responsibilities, and timelines in the proposal.
- NO
Focus on self-service or low-touch onboarding options aligned with their capabilities.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Highlight reliability, SLAs, and support suited for critical workloads.
- NO
Position it as complementary or non-critical and adjust pricing expectations.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.
- YES
Include change management considerations and stakeholder enablement in the plan.
- NO
Position the solution as incremental improvement with minimal disruption.
- YES
Advance the opportunity as a strong fit and invest in tailored discovery and solution mapping.
- NO
Treat this as exploratory, carefully manage expectations, and consider routing to a lighter-touch or alternate path.
- YES
Prepare a targeted proposal or demo aligned to the confirmed needs and buying process.
- NO
Schedule additional discovery to clarify problem, budget, and timing before committing significant resources.