Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...
Category: Describe the Zero-Trust Model
Cloud Identity – Understand Identity and Access Management Solutions
Cloud Identity Cloud identity is the simplest identity model. It’s the same form of identity you typically use when you sign up for other consumer cloud services or access retail and personal banking sites. Microsoft Entra ID(formerly Azure Active Directory and generally shortened to Azure AD, or AAD), the cloud-based directory service equivalent of on-premises ...
Federated Identity – Understand Identity and Access Management Solutions
Federated Identity In a similar way to the Azure AD pass-through authentication, federated identity processes the identity validation in the on-premises environment. Federated identity requires directory objects to be synchronized to Azure AD. AAD Connect provides a mechanism to configure federated identity directly for both Active Directory Federation Services (AD FS) and PingFederate, a third-party ...
Microsoft 365 User Portal – Describe the Analytics Capabilities of Microsoft 365
Microsoft 365 User Portal The Microsoft 365 user portal (https://portal.office.com) features access to all of the Microsoft 365 apps that a user is licensed to use. The Microsoft 365 portal highlights the most recently accessed documents on the dashboard, as shown in Figure 6.5: Figure 6.5 – Microsoft 365 user portal dashboard Other features of ...
Teams Admin Center – Describe the Analytics Capabilities of Microsoft 365
Teams Admin Center The Microsoft Teams admin center (TAC) has many Teams- specific usage reports, including information about calling statistics, meetings, user, and device data. Teams usage reports can be accessed by navigating to the Teams admin center (https://admin.teams.microsoft.com) and selecting Analytics & reports > Usage reports, as shown in Figure 6.14: Figure 6.14 – ...
Assume Breach – Describe Zero Trust Principles for Microsoft 365
Assume Breach This final piece of the zero-trust model stresses that the design of the network, security, and other access controls should treat every attempt as hostile. As an administrator or architect approaching security with this design philosophy, you may choose to segment your network and application resources, require specific device or network configurations, and ...
Role Management – Describe Zero Trust Principles for Microsoft 365
Role Management Permissions allow organizations to provide certain individuals with elevated access so that they can perform specific operations in the service. A common strategy that is shared across different Microsoft 365 admin centers is Role-Based Access Control (RBAC). RBAC will allow—under the minimum level of permissions needed—users (categorized by roles) to execute their tasks ...
Credential Management – Describe Zero Trust Principles for Microsoft 365
Credential Management Credentials confirm a user’s identity during the sign-in process. Besides a password, AAD supports different types of authentication challenges, such as MFA with certificates, security keys, and one-time passcodes. AAD already includes a password policy that is adjusted to fit a company’s requirements. Using Azure AD Connect to configure hybrid identity, administrators can ...
Device Protection – Describe Zero Trust Principles for Microsoft 365
Device Protection Windows 10 and Windows 11 devices include several security features that administrators should consider during their device planning phase. In order to secure devices, you’ll want to evaluate both built-in technologies as well as components from the full Microsoft Defender suite. To fully protect devices, consider the following components: • Microsoft Defender for ...
Document Storage – Describe Zero Trust Principles for Microsoft 365
Document Storage Although documents can be accessed from almost all the services of the suite, Microsoft 365 has three primary interfaces (listed next) where users can store, share, and collaborate on files: The underlying storage component for all these interfaces is SPO. Documents stored in SPO (or any service that leverages SharePoint) are automatically indexed, ...