Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...
Category: Describe Identity Concepts
Describe Identity Concepts – Understand Identity and Access Management Solutions
Describe Identity Concepts When describing how users access Microsoft 365 services, the identity and authentication processes are the key concepts to understand. In this section, you will learn three core identity models (as well as some sub-features of each) and how they work in the context of Microsoft 365. The three models are as follows: ...
Synchronized Identity with Pass-Through Authentication – Understand Identity and Access Management Solutions
Synchronized Identity with Pass-Through Authentication Pass-through authentication is an authentication method that, like standard synchronized identity, replicates user account information to Azure AD. However, in the default pass-through authentication configuration, no password hashes are synchronized. Instead, password validation happens in the on-premises environment. After this option is configured, AAD Connect Setup installs an authentication agent ...
Microsoft 365 User Portal – Describe the Analytics Capabilities of Microsoft 365
Microsoft 365 User Portal The Microsoft 365 user portal (https://portal.office.com) features access to all of the Microsoft 365 apps that a user is licensed to use. The Microsoft 365 portal highlights the most recently accessed documents on the dashboard, as shown in Figure 6.5: Figure 6.5 – Microsoft 365 user portal dashboard Other features of ...
Actions – Describe the Analytics Capabilities of Microsoft 365
Actions New to the Adoption Score tooling, Adoption Score actions can be used to help guide users toward getting better use out of the Microsoft 365 services. For example, your organization might have a recommended action to encourage people to use @ mentions in Outlook messages. You can click on the recommended action to view ...
Teams Admin Center – Describe the Analytics Capabilities of Microsoft 365
Teams Admin Center The Microsoft Teams admin center (TAC) has many Teams- specific usage reports, including information about calling statistics, meetings, user, and device data. Teams usage reports can be accessed by navigating to the Teams admin center (https://admin.teams.microsoft.com) and selecting Analytics & reports > Usage reports, as shown in Figure 6.14: Figure 6.14 – ...
Describe the Zero-Trust Model – Describe Zero Trust Principles for Microsoft 365
Describe the Zero-Trust Model Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat. However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported ...
Assume Breach – Describe Zero Trust Principles for Microsoft 365
Assume Breach This final piece of the zero-trust model stresses that the design of the network, security, and other access controls should treat every attempt as hostile. As an administrator or architect approaching security with this design philosophy, you may choose to segment your network and application resources, require specific device or network configurations, and ...
Role Management – Describe Zero Trust Principles for Microsoft 365
Role Management Permissions allow organizations to provide certain individuals with elevated access so that they can perform specific operations in the service. A common strategy that is shared across different Microsoft 365 admin centers is Role-Based Access Control (RBAC). RBAC will allow—under the minimum level of permissions needed—users (categorized by roles) to execute their tasks ...
Audit Retention Policies – Describe Zero Trust Principles for Microsoft 365
Audit Retention Policies As mentioned in the previous section, audit logs have a default retention period: users with E3 licenses are enabled for 90-day retention, and users with E5 licenses are enabled for up to a year’s retention. With the Microsoft Purview compliance center, you can create retention policies to govern how long the audit ...