0% found this document useful (0 votes)
194 views114 pages

MS-900 Fundamentals

MS-900_Fundamentals

Uploaded by

Stefan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views114 pages

MS-900 Fundamentals

MS-900_Fundamentals

Uploaded by

Stefan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 114

© Copyright Microsoft Corporation. All rights reserved.

FOR USE ONLY AS PART OF MICROSOFT VIRTUAL TRAINING DAYS PROGRAM. THESE MATERIALS ARE NOT AUTHORIZED
FOR DISTRIBUTION, REPRODUCTION OR OTHER USE BY NON-MICROSOFT PARTIES.
Microsoft 365 Virtual
Training Day:
Fundamentals
Module 1: Discuss cloud concepts
Module 1
Agenda • Discuss cloud concepts
Lesson 1:
Discuss cloud concepts
Lesson 1 Introduction

After completing this lesson you'll be able to:

• Identify the benefits and considerations of using cloud services.

• Describe the different categories of cloud services.

• Describe the differences between types of cloud computing.


Private cloud

• Organizations create a cloud


environment in their datacenter.

• Organization is responsible for


operating the services they provide.

• Does not provide access to users


outside of the organization.

© Copyright Microsoft Corporation. All rights reserved.


Public cloud

• Owned by cloud services or hosting


provider.

• Provides resources and services to


multiple organizations and users.

• Accessed via secure network


connection (typically over the
internet).

© Copyright Microsoft Corporation. All rights reserved.


Hybrid cloud

Combines Public and Private clouds to allow applications to run in the


most appropriate location.

© Copyright Microsoft Corporation. All rights reserved.


Some Cloud Benefits

© Copyright Microsoft Corporation. All rights reserved.


Compare CapEx vs. OpEx
Capital Expenditure (CapEx)
• The up-front spending of money on physical infrastructure.
• Costs from CapEx have a value that reduces over time.
Operational Expenditure (OpEx)
• Spend on products and services as needed, pay-as-you-go
• Get billed immediately
Infrastructure as a Service (IaaS)
Build pay-as-you-go IT infrastructure by renting servers, virtual machines,
storage, networks, and operating systems from a cloud provider.
Platform as a Service (PaaS)
Provides environment for building, testing, and deploying software
applications; without focusing on managing underlying infrastructure.
Software as a Service (SaaS)
Users connect to and use cloud-based apps over the internet: for example,
Microsoft Office 365, email, and calendars.
Shared responsibility model
Module Summary
In this module, you have:

• Learned about the three different types of deployment models (public, private, and
hybrid) for cloud computing.

• Examined several of the benefits that cloud computing provides, such as high
availability, scalability, and geographic distribution.

• Compared the differences between capital expenses and operating expenses.

• Learned about the three different cloud service models (IaaS, PaaS, SaaS) and some
of the advantages of each.
Module 2: Describe Microsoft 365 core
services and concepts (Part 1 of 2)
• What is Microsoft 365

Module 2 (part 1) • Describe productivity solutions in Microsoft


Agenda 365

• Describe collaboration solutions in Microsoft


365
Lesson 1:

What is Microsoft 365?


Lesson 1 Introduction

After completing this lesson, you'll be able to:

• Describe how Microsoft 365 drives productivity and empowers workers.

• Describe the differences between Office 365, Microsoft 365, and Windows 365.

• Create a Microsoft 365 trial organization.


Drive productivity in the cloud

Microsoft 365 Ways to drive productivity in the cloud:

Be more productive Secure your organization with


from anywhere technology you can trust

© Copyright Microsoft Corporation. All rights reserved.


Enable hybrid and flexible work strategies

Microsoft 365 helps your organization meet the needs of workers:

Stay connected from anywhere in the world and at any time.

Secure sign-ins with multi-factor authentication (MFA) and built-in security features of
Microsoft 365 and Windows.

Manage your hybrid worker's devices from the cloud with security settings, allowed apps,
and to require compliance with system health.

Be collaborative and productive with online meetings, chat, shared workspaces, and tasks.
Office 365, Microsoft 365, and Windows 365

Evolution of Office 365 to Microsoft 365: Windows 365:


Evolving from Microsoft’s Business Windows 365 is a subscription service for
Productivity Online Suite (BPOS). organizations that allows you to create and
run PCs remotely.
Office 365 was designed to bring together its
existing online products to an always up-to-
date cloud service.
Microsoft 365 is a superset of Office 365 as it
includes everything you know in Office 365
and more.
Demo Explore Microsoft 365 tenant
Lesson 2:

Describe productivity solutions in Microsoft 365


Lesson 2 Introduction

After completing this lesson, you'll be able to:

• Describe how the core tools in Microsoft 365 can increase productivity.

• Describe how the Microsoft 365 Apps help people craft compelling content in real-time.

• Describe how the capabilities of the work management tools optimize operations.

• Describe the email and calendaring features with Microsoft Exchange.


Core productivity tools in Microsoft 365

Microsoft Teams Exchange

Microsoft 365 Apps Planner

OneDrive Project

SharePoint Bookings

Outlook To Do

© Copyright Microsoft Corporation. All rights reserved.


Microsoft 365 Apps increase productivity

Microsoft 365 Apps has the benefits of the cloud: Some of the applications in Microsoft 365 Apps:
• Work across multiple devices. Teams PowerPoint
• Work with apps that are always up to date. Word Outlook
• Work intelligently through connected experiences. Excel OneNote
Work management tools in Microsoft 365

Microsoft Project Microsoft Booking


Project is a powerful Bookings is a web-based
project management tool appointment scheduling
designed for more complex and management system.
work efforts.

Microsoft To Do
Microsoft Planner
To Do is an intelligent task
Planner is an intuitive,
management app that
collaborative task
makes it easy to plan and
management tool.
manage your day.
Business class email and calendaring with Microsoft Exchange

Microsoft Exchange Online is a hosted messaging solution.


It gives users access to email, calendar, contacts, and tasks all in one place

• Stay connected • Stay informed


• Customize your email • Simplified admin
• Collaborate • Stay secure
• Share your calendar
Lesson 3:

Describe collaboration solutions in Microsoft 365


Lesson 3 Introduction

After completing this lesson, you'll be able to:

• Describe how Teams helps people connect and collaborate to do their best work.

• Describe how Microsoft Viva helps organizations create thriving work cultures.

• Describe how the features of SharePoint and OneDrive provide a cohesive file-sharing experience.

• Describe how Yammer communities can help foster connections within your organization.
Collaboration workloads of Teams (1/2)
Teams comes with many features and functionalities to help your users connect and work together.

Teams and channels Chat and instant messaging Online meetings


Create teams and channels to Instantly connect to one team Collaborate through online
bring people together and get member or to an entire team in a meetings, webinars, live events, or
things done. group chat anywhere. audio and video conferencing.
Collaboration workloads of Teams (2/2)
Teams comes with many features and functionalities to help your users connect and work together.

Microsoft Teams Phone Extend Teams by using Security and compliance


collaborative apps
Transition calls from your home Teams is built on the same
Wi-Fi to your cellular service on Integrate tools you already know enterprise-level security,
the go, and then to your office Wi- or create custom applications to compliance, and manageability as
Fi, all from one number using help your team work better the rest of Microsoft 365 and
Teams Phone. together. Office 365.
Team collaboration in Microsoft Teams
Demo
Employee experience capabilities in Microsoft Viva (1/2)
Viva Connections Viva Insights
Keeps everyone in the workforce connected with Provides privacy-protected insights and actionable
with personalized news, communications, tasks, recommendations that help everyone in the
people and resources. organization work smarter and achieve balance.
Employee experience capabilities in Microsoft Viva (2/2)
Viva Topics Viva Learning
Focuses on knowledge and expertise. Information is Allows you to seamlessly integrate learning and
provided to employees through topic pages. building skills into your day. Employees can discover,
share, recommend, and learn from content libraries.
Exploring Microsoft Viva Insights and
Demo Learning
SharePoint and OneDrive promote collaboration

SharePoint OneDrive

Collaboration tool for creating websites, publishing Access, share, and collaborate on files from anywhere
content, and storing files
• Access files from all your devices
Helps organizations share and manage content,
• Manage files on the go
knowledge, and applications
• Seamless collaboration with files
Three main types of sites:
• Share inside or outside your organization
• Team sites
• Quickly find files that matter most
• Communication sites
• Protect your files with enterprise-grade security
• Hub sites

© Copyright Microsoft Corporation. All rights reserved.


Yammer helps communities connect and grow

• Leader engagement

• Modernize employee communication

• Knowledge sharing

• Engage your employees

• Powering communities in Microsoft 365


Module Summary

In this module, you have:


• Describe how Microsoft 365 drives productivity and empowers workers.
• Describe the differences between Office 365, Microsoft 365, and Windows 365.
• Describe how the core tools in Microsoft 365 can increase productivity.
• Describe how Teams helps people connect and collaborate to do their best work.
• Describe how Microsoft Viva helps organizations create thriving work cultures.
• Describe how the features of SharePoint and OneDrive provide a cohesive file-sharing experience.
• Describe how Yammer communities can help foster connections within your organization
Module 2: Describe Microsoft 365 core
services and concepts (Part 2 of 2)
• Describe endpoint modernization,
management concepts, and deployment
Module 2 (part 2)
options in Microsoft 365
Agenda
• Describe analytics capabilities in
Microsoft 365
Lesson 4:

Describe endpoint modernization, management concepts,


and deployment options in Microsoft 365
Lesson 4 Introduction

After completing this lesson, you'll be able to:

• Describe the modern management capabilities of Microsoft Endpoint Manager.

• Describe the different capabilities of Windows 365 and Azure Virtual Desktop.

• Describe the deployment and release models for Windows-as-a-Service.

• Describe the deployment and servicing methods for Microsoft 365 Apps.

© Copyright Microsoft Corporation. All rights reserved.


Endpoint management capabilities of Microsoft 365 (1 of 2)

Microsoft Endpoint Manager (MEM) lets you manage your users’ devices.
• Android and iOS mobile phones
• Windows and macOS PCs
• custom devices

MEM supports bring your own device and corporate-owned devices.

© Copyright Microsoft Corporation. All rights reserved.


Endpoint management capabilities of Microsoft 365 (2 of 2)

Microsoft Endpoint Manager includes the


following service and capabilities:
• Microsoft Intune
• Configuration Manager
• Co-management
• Desktop Analytics
• Windows Autopilot
• Azure Active Directory
• Endpoint Manager admin center

© Copyright Microsoft Corporation. All rights reserved.


Windows 365 and Azure Virtual Desktop
Windows 365 and Azure Virtual Desktop are both virtual desktop solutions.

Windows 365 Azure Virtual Desktop (AVD)

1 Windows 10 and Windows 11 personalised &


Windows 10 and Windows 11 personalised desktops multi-session desktops and remote app streaming
Management and deployment with familiar desktop tools Full control over management and deployment
Predictable per-user pricing Flexible consumption-based pricing
Optimised for simplicity Optimised for flexibility

© Copyright Microsoft Corporation. All rights reserved.


Deployment and release models for Windows-as-a-Service

Is a way to simplify the lives of IT pros and maintain a consistent Windows experience

Release Types Servicing Channels Deployment rings


Feature updates Windows Insider Program Preview
Quality updates General Availability Channel Limited
Long-term Servicing Channel Broad

Deployment methods for Manage


Windows Windows-as-a-Service
Modern Configuration Manager
Dynamic
Traditional

© Copyright Microsoft Corporation. All rights reserved.


Deployment methods for Microsoft 365 apps

Four methods to perform larger-scale deployments of Microsoft 365 Apps:


• Deploy from a local source with Configuration Manager
• Deploy from the cloud with the Office Deployment Tool (ODT)
• Deploy from a local source with the Office Deployment Tool (ODT)
• Self-install from the cloud

© Copyright Microsoft Corporation. All rights reserved.


Servicing methods for Microsoft 365 apps

Types of update channels for


Microsoft 365 Apps:
• Current Channel
• Monthly Enterprise Channel
• Semi-Annual Enterprise Channel

How updates are installed for


Microsoft 365 Apps:
Microsoft 365 Apps checks for
updates regularly, and they're
downloaded and installed automatically.

© Copyright Microsoft Corporation. All rights reserved.


Lesson 5:

Describe analytics capabilities in Microsoft 365


Lesson 5 Introduction

After completing this lesson, you'll be able to:

• Describe how Viva Insights help organizations build better work habits.

• Describe the capabilities of the Microsoft 365 admin center and user portal.

• Describe the reports available in the Microsoft 365 admin center and other admin centers.

© Copyright Microsoft Corporation. All rights reserved.


Describe the capabilities of Viva Insights

Personal Insights Manager Insights Organizational Insights


• Nudges • Organizational resilience
• Personal wellbeing
• Reflective Insights • Employee engagement
• Stay connected
• Action Plans • Improve agility
• Protect time
• Foster innovation
• Daily briefing
• Effective managers
• Effective meetings
• Operational effectiveness
• Accelerate change
• Transform meeting culture
• Increase customer focus
The Microsoft 365 admin center and Microsoft 365 user portal

Microsoft 365 admin center: Microsoft 365 user portal:


• Manage users by adding, deleting, or restoring users. • The Microsoft 365 user portal is designed
• Manage licenses by adding and removing license. for users to access their email, calendar,
• Manage a Microsoft 365 group by creating a group, and documents through Microsoft 365
deleting a group, and editing the name or description. apps like Office, Teams, Outlook, and more.
• Manage billing.

• View or create service requests.

• Manage global settings for apps.

• View activity reports and service health.

© Copyright Microsoft Corporation. All rights reserved.


The reports available in the Microsoft 365 admin center and
other admin centers
The two types of reports available in the
admin center:
• Adoption score
• Usage
Other admin centers with reports:
• Azure Active Directory
• Endpoint Manager
• Exchange
• Security & Compliance
• SharePoint
• Teams

© Copyright Microsoft Corporation. All rights reserved.


Demo Explore Microsoft 365 admin center
Module Summary

Now that you've completed this lesson, you should be able to:
• Describe the modern management capabilities of Microsoft Endpoint Manager.
• Describe the different capabilities of Windows 365 and Azure Virtual Desktop.
• Describe the deployment and release models for Windows-as-a-Service.
• Describe the deployment and servicing methods for Microsoft 365 Apps.
• Describe how Viva Insights helps organizations build better work habits.
• Describe the capabilities of the Microsoft 365 admin center and user portal.
• Describe the reports available in the Microsoft 365 admin center and other admin centers.

© Copyright Microsoft Corporation. All rights reserved.


Module 3: Demonstrate fundamental
knowledge of Microsoft 365 security and
compliance capabilities
• Describe security and compliance
concepts

Module 3 • Describe identity concepts


Agenda
• Describe threat protection with
Microsoft 365 Defender

• Describe the Service Trust Portal and


privacy with Microsoft
Lesson 1:

Describe security and compliance concepts


Lesson 1 Introduction

After completing this lesson, you'll be able to:

• Describe the defense in-depth security model.

• Describe the Zero Trust model.

• Describe the concepts of encryption and hashing.

• Describe some basic compliance concepts.


Defense in depth
Defense in depth uses a layered approach to security:
• Physical security such as limiting access to a datacenter to only authorized
personnel.

• Identity and access security controlling access to infrastructure and change


control.

• Perimeter security including distributed denial of service (DDoS) protection to


filter large-scale attacks before they can cause a denial of service for users.

• Network security can limit communication between resources using


segmentation and access controls.

• Compute layer security such as securing access to virtual machines either on-
premises or in the cloud by closing certain ports.

• Application layer security ensures that applications are secure and free of
security vulnerabilities.

• Data layer security controls access to business and customer data, and
encryption to protect data.
Confidentiality, Integrity, Availability (CIA)

CIA – The goals of a cybersecurity strategy.


• Confidentiality refers to the need to keep confidential
sensitive data such as customer information, passwords, or
financial data.
• Integrity refers to keeping data or messages correct.
• Availability refers to making data available to those who
need it.
Describe the Zero Trust model
The Zero Trust model has three principles:
verify explicitly, least privilege access, and
assume breach.
Six foundational pillars of the Zero Trust
model:
• Identities may be users, services or devices.
• Devices create a large attack serface as data flows.
• Applications are the way that data is consumed.
• Data should be classified, labeled, and encryped
• Infrastructure represents a threat vector.
• Networks should be segmented.
Describe Encryption

Encryption is the process of making data


unreadable and unusable to unauthorized
viewers.
There are two top-level types of encryption:
• Symmetric - uses the same key to encrypt and
decrypt the data
• Asymmetric - uses a public key and private key pair.
Encryption may protect data at rest, in use or
in transit.
Describe Hashing

• Hashing uses an algorithm to convert


text to a unique fixed-length value called
a hash.
• Hashing doesn't use keys, and the
hashed value isn't subsequently
decrypted back to the original.
• Hashing is used to store passwords.
Compliance concepts

Data residency - When it comes to compliance, data residency regulations govern the physical
locations where data can be stored and how and when it can be transferred, processed, or accessed
internationally.

Data sovereignty - the concept that data, particularly personal data, is subject to the laws and
regulations of the country/region in which it's physically collected, held, or processed.

Data privacy - Providing notice and being transparent about the collection, processing, use, and
sharing of personal data are fundamental principles of privacy laws and regulations.
Lesson 2:

Describe identity concepts


Lesson 2 Introduction

After completing this lesson, you'll be able to:

• Understand the difference between authentication and authorization.

• Describe the concept of identity as a security perimeter.

• Describe identity-related services.


Authentication and authorization

Authentication (AuthN)
Authentication is the process of proving that a person is
who they say they are. Authentication grants access.

Authorization (AuthZ)
Authorization determines the level of access or the
permissions an authenticated person has to your data
and resources.
Define Identity as the primary security perimeter

An identity may be associated with a user,


an application, a device, or something else.
Four pillars of an identity infrastructure:
• Administration
• Authentication
• Authorization
• Auditing
Modern authentication and the role of the identity provider
Modern authentication is an umbrella term for authentication and authorization methods between a
client and a server.

At the center of modern authentication is the role of the identity provider (IdP).

IdP offers authentication, authorization, and auditing services.

IdP enables organizations to establish authentication and authorization policies, monitor user behavior, and more.

A fundamental capability of an IdP and “modern authentication” is the support for single sign-on (SSO).

Microsoft Azure Active Directory is an example of a cloud-based identity provider.


The concept of directory services and Active Directory
A directory service stores directory data and makes it available to network users,
administrators, services, and applications.

Active Directory (AD) is a set of directory services developed by Microsoft as part of


Windows 2000 for on-premises domain-based networks.

Active Directory Domain Services (AD DS) stores information about members of the
domain, including devices and users, verifies their credentials, and defines their access
rights.
Azure Active Directory is the next evolution of identity and access management
solutions. It provides organizations with an Identity as a Service (IDaaS) solution for all
their apps across cloud and on-premises.
Concept of Federation

Federation enables the access of services


across organizational or domain boundaries
by establishing trust relationships between
the respective domain’s identity provider.

With federation, there's no need for a user


to maintain a different username and
password when accessing resources in other
domains.
Lesson 3:

Describe threat protection with Microsoft 365 Defender


Lesson 3 Introduction

After completing this lesson, you'll be able to:

• Describe the Microsoft 365 Defender service.

• Describe how Microsoft 365 Defender provides integrated protection against sophisticated

attacks.

• Describe and explore Microsoft 365 Defender portal.


Microsoft 365 Defender services

Microsoft 365 Defender suite protects:


• Identities with Microsoft Defender for
Identity and Azure AD Identity Protection
• Endpoints with Microsoft Defender for
Endpoint
• Applications with Microsoft Defender for
Cloud Apps
• Email and collaboration with Microsoft
Defender for Office 365
Microsoft Defender for Office 365
Microsoft Defender for Office 365 covers:

1 2 3 4
Threat protection Reports Threat investigation and Automated investigation
policies response capabilities and response capabilities

Microsoft Defender for Microsoft Defender for Microsoft Defender for


Office 365 Plan 1 Office 365 Plan 2 Office 365 availability
• Safe Attachments · Threat Trackers & Threat Explorer · Microsoft 365 E5
• Safe Links · Automated investigation & response (AIR) · Office 365 E5
• Safe Attachments for SharePoint, · Attack Simulator · Office 365 A5
OneDrive, & Microsoft Teams
· Proactively hunt for threats · Microsoft 365 Business Premium
• Anti-phishing protection · Investigate incidents and alerts
• Real-time detections
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect
endpoints.

© Copyright Microsoft Corporation. All rights reserved.


Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps is a
Microsoft Defender for Cloud Apps
comprehensive cross-SaaS solution that operates
functionality
as an intermediary between a cloud user and the
cloud provider.

What is a Cloud Access Security Broker and its Office 365 Cloud App Security is a subset of
four pillars -Visibility, Threat protection, Data Microsoft Defender for Cloud Apps that provides
security and Compliance. enhanced visibility and control for Office 365.

Enhanced Cloud App Discovery in Azure


The Defender for Cloud Apps framework
Active Directory
Demo Microsoft Defender for Cloud Apps
Microsoft Defender for Identity

Monitor and profile user behavior and activities

Protect user identities and reduce the attack surface

Identify suspicious activities and advanced attacks across the cyberattack kill-chain

Investigate alerts and user activities


Microsoft 365 Defender portal

The Microsoft 365 Defender portal combines The Microsoft 365 Defender navigation pane include
protection, detection, investigation, and these options and more:
response to email, collaboration, identity,
and device threats, in a central portal.

View the security health Incidents Hunting Action Threat Secure


of your organization. & alerts center analytics Score

Act to configure devices,


users, and apps.

Learning Email & Reports Permissions


Endpoints
Get alerts for suspicious activity. hub collaboration & roles
Demo The Microsoft 365 Defender portal
Lesson 4:

Describe the Service Trust Portal and privacy with Microsoft


Lesson 4 Introduction

After completing this lesson, you'll be able to:

• Describe the benefit of the Service Trust Portal.

• Describe Microsoft’s privacy principles.

• Describe Microsoft Priva.


The Service Trust Portal

• The Service Trust Portal provides information, tools, and other resources about Microsoft
security, privacy, and compliance practices.
• Sign in with your Microsoft cloud services account to access all the available
documentation.
• From the main menu, you access:
▪ Service Trust Portal, Compliance Manager, Trust Documents, Industries & Regions,
Trust Center, Resources, My Library and More
Demo Service Trust Portal
Microsoft's privacy principles
Strong legal protections: Respecting local
Control: Putting you, the customer, in
privacy laws and fighting for legal
control of your data and your privacy with
protection of privacy as a fundamental
easy-to-use tools and clear choices.
human right.

Transparency: Being transparent about No content-based targeting: Not using


data collection and use so that everyone email, chat, files, or other personal content
can make informed decisions. to target advertising.

Security: Protecting the data that's Benefits to you: When Microsoft does
entrusted to Microsoft by using strong collect data, it's used to benefit you, the
security and encryption. customer, and to make your experiences
better.
Microsoft Priva
Priva Privacy Risk Management
• Overview dashboard provides automatic updates
about your data with important trends.
• Data profile provides a snapshot view of the
personal data your organization stores in
Microsoft 365 and where it lives.
• Set up policies that identify privacy risks in your
Microsoft 365 environment and enable easy
remediation.

Priva Subject Rights Requests


Workflow, automation, and collaboration capabilities
to help search for subject data, review findings,
collect the appropriate files, and produce reports.
Module Summary
In this module, you have:
• Learned about the shared responsibility and the defense in-depth security models.
• Learned about the Zero-Trust model.
• Learned about the concepts of encryption and hashing.
• Learned basic compliance concepts.
• Learned about the difference between authentication and authorization.
• Learned the concept of identity as a security perimeter.
• Learned identity-related services.
• Learned about the threat protection with Microsoft 365 Defender
• Learned about the Service Trust Portal and privacy with Microsoft Priva.
Module 4: Demonstrate knowledge of
Microsoft 365 licensing, service and support
• Identify licensing options available in
Microsoft 365

Module 4 • Describe support offerings for Microsoft


Agenda 365 services

• Describe the service life cycle in


Microsoft 365
Lesson 1:

Identify licensing options available in Microsoft 365


Lesson 1 Introduction

After completing this lesson, you'll be able to:

• Describe the Cloud Solution Provider (CSP) pricing model for Microsoft cloud services.

• Describe the available base licensing and add-on licensing options for Microsoft 365.

• Describe the available billing frequency and methods of payment.


Pricing models for Microsoft cloud services

Cloud Solution Provider model Enterprise Agreements


• Microsoft partner program that provides • Designed for organizations that want to
the expertise and services you need license software and cloud services for a
through an expert CSP partner. minimum three-year period.
‒ The CSP manages your entire subscription, ‒ A single organization-wide agreement.
provide billing and technical support.
‒ 24x7 technical support, planning services,
‒ Provides a pay-as-you-go subscription model end-user and technical training, and unique
with per-user, per-month pricing. technologies with Software Assurance.
Billing and bill management options
Billing Account Options Bill Management
The Microsoft 365 admin center currently supports Microsoft 365 admin center allows you to:
the following type of billing accounts: • Upgrade, renew, reactivate or cancel subscriptions.
• Microsoft Online Services Program • View the number of purchased licenses
• Microsoft Products & Services Agreement (MPSA) • View a bill, invoice, and past billing statements.
Program
• Modify payment methods
• Microsoft Customer Agreement
• Modify your billing frequency
• Buy and manage other services or features
• Manage your billing notification emails and invoice
attachments
Available licensing and management options (1/2)
Subscription plans:

Microsoft 365 for home Microsoft 365 Business Microsoft 365 Enterprise
Bring the same great Designed for small and Designed for large organizations.
productivity benefits into medium-sized organizations. • 4 subscription tiers: Apps for
your personal and family Enterprise, E3, E5, F3
life.

Microsoft 365 Education Microsoft 365 for frontline workers Microsoft 365 Government
Designed for educational Designed to empower frontline workers Designed for government
institutions and has two and optimize frontline impact. institutions and has two
subscription plans for subscription plans.
faculty and students.
Available licensing and management options (2/2)

Licenses Types of add-ons


• The available subscription licenses (USLs): • Two types of add-ons:
‒ Full USLs ‒ Traditional add-ons
‒ Add-on USLs ‒ Standalone add-ons
‒ From SA USLs
‒ Step Up USLs
Demo User and billing management in the
Microsoft 365 admin center
Lesson 2:

Describe support offerings for Microsoft 365 services


Lesson 2 Introduction

After completing this lesson, you'll be able to:

• Describe service level agreements (SLAs) concepts.

• Describe support offerings available for Microsoft 365 and how to create a support request.

• Determine how to track the service health status by using the Microsoft 365 dashboard.

• Describe how organizations can provide feedback on Microsoft 365 services.


Explore support options for Microsoft 365 services
Your organization can get access to support in the following ways:

Community-based support FastTrack

Proactive Support Premier Support for Microsoft 365

Web chat, email, and phone support Support through a Microsoft Partner

Pre-sales support
Support requests in the Microsoft 365
Demo admin center
Explain service level agreement (SLAs) concepts

Microsoft’s Online Service Level Agreement introduces several concepts:


• Incident
• Uptime
• Downtime
• Claim
• Service credit
• Service level
• Uptime agreement
Identify how to track the service health status

View the health status of Microsoft 365 services:


• View health through the Microsoft 365 admin center

• Report an issue if your organization is experiencing a service issue

• Keep track of incidents and advisories

• Microsoft protects and keeps your organization’s data available through data storage
redundancy, monitoring data and preventative measures
Explore how organizations can share feedback on Microsoft
365 services
The following list describes the ways you can communicate directly with Microsoft:
• Feedback
• In-product experiences
• Windows Feedback Hub
• Microsoft Tech Community
• Microsoft Store
• UserVoice forums
Lesson 3:

Describe the service life cycle in Microsoft 365


Lesson 3 Introduction

After completing this lesson, you'll be able to:

• Describe the three phases of a product or services lifecycle.

• Describe the Modern Lifecycle Policy and what is covered.

• Describe the benefits of the Microsoft 365 Roadmap.


Private, public preview, and general availability releases

Private preview Public preview General availability (GA) End of support


In this phase, Microsoft In this phase, Microsoft After the public preview is Eventually, older products or
might release a product or typically releases public completed, Microsoft retired services can no
service to a limited number previews of products and releases the product or longer be supported, and
of users to test and evaluate services before their GA service. The product or these products and services
new features or functionality. release to receive feedback service becomes available to will reach the end of
from a broad range of users. all customers with formal support.
support, known as the
release version.
Modern Lifecycle Policy

Microsoft 365 is covered by the Modern Lifecycle Policy


Products and services governed by the Modern Lifecycle Policy are supported if the following criteria are
met:
• Customers stay current as per the servicing and system requirements published for the product or service.

• Customers must be licensed to use the product or service.

• Microsoft must currently offer support for the product or service.


Utilize the Microsoft 365 Roadmap portal to learn about
upcoming features
The roadmap also groups the features into three
update phases:
• In development
• Rolling out
• Launched
The following list describes what the Microsoft 365
Roadmap allows you to do:
• Search, filter and sort
• Download the features in development as a CSV file.
• View information about each update.
• Use the RSS feed to be notified of feature updates.
• Share the roadmap page or email features.
Module Summary
In this module, you have:
• Learned about pricing models for Microsoft cloud services
• Learned about the billing management and licensing options for Microsoft 365
• Learned about the various support options for Microsoft 365 services
• Learned about service level agreements (SLAs)
• Learned how to track the service health status
• Learned where organizations can provide feedback on Microsoft 365 services
• Learned about the phases of a product or services lifecycle
• Learned about the Modern Lifecycle Policy
• Learned about the Microsoft 365 Roadmap

You might also like