Team Insights – Describe the Analytics Capabilities of Microsoft 365

Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...

Read More

Synchronized Identity with Cloud Authentication – Understand Identity and Access Management Solutions

Synchronized Identity with Cloud Authentication With a synchronized identity model, you are essentially configuring your organization’s directory objects to be replicated in Azure AD. This includes several properties such as first and last names, email addresses, office information, manager reporting configurations, physical addresses, and phone numbers, among others. You have the option to configure this ...

Read More

Describe the Reports Available in the Admin Centers – Describe the Analytics Capabilities of Microsoft 365

Describe the Reports Available in the Admin Centers Part of your role as an administrator may be either to drive utilization of Microsoft 365 services or to provide reports or supporting documentation to organizational change management individuals who are responsible for helping end users adopt Microsoft 365 services. The Microsoft 365 admin center provides reports ...

Read More

Actions – Describe the Analytics Capabilities of Microsoft 365

Actions New to the Adoption Score tooling, Adoption Score actions can be used to help guide users toward getting better use out of the Microsoft 365 services. For example, your organization might have a recommended action to encourage people to use @ mentions in Outlook messages. You can click on the recommended action to view ...

Read More

Describe the Zero-Trust Model – Describe Zero Trust Principles for Microsoft 365

Describe the Zero-Trust Model Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat. However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported ...

Read More

Assume Breach – Describe Zero Trust Principles for Microsoft 365

Assume Breach This final piece of the zero-trust model stresses that the design of the network, security, and other access controls should treat every attempt as hostile. As an administrator or architect approaching security with this design philosophy, you may choose to segment your network and application resources, require specific device or network configurations, and ...

Read More

Role Management – Describe Zero Trust Principles for Microsoft 365

Role Management Permissions allow organizations to provide certain individuals with elevated access so that they can perform specific operations in the service. A common strategy that is shared across different Microsoft 365 admin centers is Role-Based Access Control (RBAC). RBAC will allow—under the minimum level of permissions needed—users (categorized by roles) to execute their tasks ...

Read More

Endpoints – Describe Zero Trust Principles for Microsoft 365

Endpoints Endpoints play an important role throughout the entire Microsoft 365 security conversation. Microsoft 365 allows services to be accessed from a myriad of clients and device types, such as web, desktop, and mobile devices. As an administrator, you should plan which devices users will be allowed to access Microsoft 365 services from, whether devices ...

Read More

Apps – Describe Zero Trust Principles for Microsoft 365

Apps Applications provide both a method for individuals to accomplish tasks as well as an avenue for attackers. A zero-trust deployment model for applications includes the following: •   Managing application access policies: You can use Microsoft Defender for Cloud Apps to determine whether applications are performing risky behaviors (such as downloading or uploading data abnormally) ...

Read More

Sharing End User Controls – Describe Zero Trust Principles for Microsoft 365

Sharing End User Controls Sharing can be done by almost all clients. Supported clients include the following: Outlook sharing is particularly interesting because it allows users to attach files to email messages as cloud attachments, thus automatically sharing those files out of their OneDrive personal storage. Endusers can even configure the permissions the recipients can ...

Read More