Teams Admin Center The Microsoft Teams admin center (TAC) has many Teams- specific usage reports, including information about calling statistics, meetings, user, and device data. Teams usage reports can be accessed by navigating to the Teams admin center (https://admin.teams.microsoft.com) and selecting Analytics & reports > Usage reports, as shown in Figure 6.14: Figure 6.14 – ...
Category: Microsoft MS-900
Describe the Zero-Trust Model – Describe Zero Trust Principles for Microsoft 365
Describe the Zero-Trust Model Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat. However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported ...
Assume Breach – Describe Zero Trust Principles for Microsoft 365
Assume Breach This final piece of the zero-trust model stresses that the design of the network, security, and other access controls should treat every attempt as hostile. As an administrator or architect approaching security with this design philosophy, you may choose to segment your network and application resources, require specific device or network configurations, and ...
Role Management – Describe Zero Trust Principles for Microsoft 365
Role Management Permissions allow organizations to provide certain individuals with elevated access so that they can perform specific operations in the service. A common strategy that is shared across different Microsoft 365 admin centers is Role-Based Access Control (RBAC). RBAC will allow—under the minimum level of permissions needed—users (categorized by roles) to execute their tasks ...
Audit Logs – Describe Zero Trust Principles for Microsoft 365
Audit Logs Successful operations and governance strategies rely partially on being able to audit actions taken in the service. Adhering to zero trust principles means that all activities performed in the tenant are available for review. Microsoft 365 allows administrators to review activities that are performed either by users or administrators through the audit logs. ...
Audit Retention Policies – Describe Zero Trust Principles for Microsoft 365
Audit Retention Policies As mentioned in the previous section, audit logs have a default retention period: users with E3 licenses are enabled for 90-day retention, and users with E5 licenses are enabled for up to a year’s retention. With the Microsoft Purview compliance center, you can create retention policies to govern how long the audit ...
Credential Management – Describe Zero Trust Principles for Microsoft 365
Credential Management Credentials confirm a user’s identity during the sign-in process. Besides a password, AAD supports different types of authentication challenges, such as MFA with certificates, security keys, and one-time passcodes. AAD already includes a password policy that is adjusted to fit a company’s requirements. Using Azure AD Connect to configure hybrid identity, administrators can ...
Endpoints – Describe Zero Trust Principles for Microsoft 365
Endpoints Endpoints play an important role throughout the entire Microsoft 365 security conversation. Microsoft 365 allows services to be accessed from a myriad of clients and device types, such as web, desktop, and mobile devices. As an administrator, you should plan which devices users will be allowed to access Microsoft 365 services from, whether devices ...
Device Management – Describe Zero Trust Principles for Microsoft 365
Device Management Microsoft 365 allows administrators to manage devices that are used to connect to services. Administrators can enforce features and stipulations, such as requiring a password to unlock a device, ensuring that the device is not rooted or jailbroken, and selectively wiping company data from the device. The following two services are used to ...
Device Protection – Describe Zero Trust Principles for Microsoft 365
Device Protection Windows 10 and Windows 11 devices include several security features that administrators should consider during their device planning phase. In order to secure devices, you’ll want to evaluate both built-in technologies as well as components from the full Microsoft Defender suite. To fully protect devices, consider the following components: • Microsoft Defender for ...