Microsoft365 Fundamentals
Microsoft365 Fundamentals
First Edition
C O U R S E I N T RO D U C T I O N
Microsoft 365 Fundamentals -
Course Introduction
The fundamentals of cloud computing and the Software as a Service (SaaS)
cloud model are covered in this course, focusing on Microsoft 365's cloud
service offerings. You will start by learning about the principles of cloud
computing, including an introduction to Microsoft cloud services. You will
learn about Microsoft Azure and look at how Microsoft 365 and Office 365
differ from one another. After that, you will thoroughly examine Microsoft
365, which will include a comparison of Microsoft on-premises services and
Microsoft 365 cloud services, a look at enterprise mobility in Microsoft 365,
and a look at how Microsoft 365 services support collaboration.
The course then examines how Microsoft 365 handles security, compliance,
privacy, and trust before reviewing subscriptions, licenses, invoicing, and
support for Microsoft 365.
User Profile
Prerequisites
Candidates must be familiar with the following to pass the MS-900:
Microsoft 365 Fundamentals Certification exam.
The choices that are open to you and the advantages that using
Microsoft's 365 Cloud Service products could bring you.
The approaches that need to be suggested to handle the
organization's frequent IT problems.
What could set it apart from other market competitors, are
Microsoft 365 Solutions.
Grouping together different Microsoft services and goods,
including Azure, Dynamics 365, and Microsoft 365.
Provision of services and cost-effective licensing optimization.
There are many organizational support possibilities.
C H A P T E R 0 1 : I N T RO D U C T I O N
TO M I C RO S O F T 3 6 5
Introduction
What is Cloud Computing?
Cloud Computing is storing data and accessing computers over the internet.
It is the delivery of different computing services like servers, software,
analytics, databases, and storage via the internet. Computing resources are
delivered on-demand through a cloud service platform with pay-as-you-go
pricing. The companies that are providing services are termed as “Cloud
Providers.” There is a number of cloud providers, with the major ones being
Amazon, Google, and Azure.
5. Security
The protection of their data is one of the main problems for any
organization regardless of its size and industry. Infringements of data
and other cyber-crimes can devastate a company's revenue, customer
loyalty, and positioning. Cloud provides many advanced security
features to strengthen the security of the overall company. It also
helps in protecting your data, application, and infrastructure.
Technical Terms
To understand Cloud Computing, you need to understand some technical
terms.
High Availability (HA) - It is the core of cloud computing. As we know, in traditional
server environments, companies own a number of hardware, and the workload is
limited to this hardware capacity. In case of extra load, capacity cannot be increased
whereas sometimes this hardware seems extra for the workload. In the cloud, you do
not own any hardware, and adding servers is just a click away. With this method, you
get high availability for your servers by replacing the failed server instantly with the
new one. HA depends on the number of VMs that you set up to eventually cover in case
one goes down
Fault Tolerance - For resilience in the cloud, fault tolerance is also an important factor.
Fault tolerance gives you zero downtime, meaning that if there is any fault from the
Azure side, then it is immediately mitigated by Azure itself
Disaster Recovery (DR) – This is used in case of any catastrophic disaster like a cyber-
attack. There is a plan in DR to recover your business from these critical systems or in
normal operation if such an event occurs. DR has designated time to recover and a
recovery point
Scalability - In cloud computing, scalability means adding or removing the resources in
an easy and quick way as per demand. It is important in such a situation where you do
not know the actual number of resources that are needed. Auto-scaling is an approach
for scalability depending on your requirement by defining the threshold
Elasticity - Elasticity is the capacity to dynamically extend or minimize network
resources to respond to autonomous working load adjustments and optimize the use of
resources. This can contribute to overall cost savings for services
Agility - Agility is the capability to adapt quickly and efficiently to changes in the
business environment. Agility also refers to the ability to quickly develop, test and
deploy business-led software applications. Instead of providing and managing services,
Cloud Agility lets them concentrate on other issues such as security, monitoring, and
analysis
Cloud providers take over both servers and code. Cloud providers host
and maintain the applications and underlying infrastructure for SaaS
and handle updates such as software upgrades and security patches.
Users link the app over the Internet, usually through their phone,
tablet, or PC through their web browser.
Microsoft 365
A cloud-based subscription service called Microsoft 365 includes a portfolio
of integrated goods like Office applications, Teams, Windows, top-notch
security, and more. Any size organization, including yours, may benefit from
Microsoft 365. It represents the workplace of the future. Whether at home,
in the office, out in the field, or on the go, these Microsoft 365 features help
enhance productivity, collaboration, and communication securely across
numerous devices. Microsoft 365 ensures a trustworthy, secure, and
contemporary experience for every employee at any time and everywhere
while integrating everyone into the digital revolution.
Microsoft 365 Apps offers the benefits of the cloud, allowing you to work
from anywhere, at any time, on any device, and be more productive.
Working across multiple devices
Working with up-to-date apps
Working inventively through connected experiences
Features of connected experiences:
Use built-in intelligence capabilities like Microsoft Editor and
Researcher to produce amazing documents and enhance your
writing
Excel may assist you in simplifying complex data and creating
simple spreadsheets and visuals
With sophisticated tools like Presenter Coach and PowerPoint
Designer, PowerPoint can help you produce professional
presentations that stand out effortlessly
Outlook allows you to manage your email, calendar, tasks, and
contacts all in one location
OneNote may assist you with your note-taking requirements by
arranging your notes into tabs and subsections, resulting in a
single digital notebook
Work Management Tools in
Microsoft 365
Your team is not productive if it is always managing tasks. In order to
concentrate on producing high-quality work on schedule, you and your team
need an effective procedure for managing that work. Through a suite of
specifically designed tools that add structure to all the components that go
into producing high-quality business results, such as tasks, status updates,
schedules, and projects, Microsoft 365 streamlines job management. Your
team will have more time to work together on the actual project if the work
process is handled more effectively.
Microsoft Project
Project is a strong project management application intended for more
complicated work initiatives. Microsoft's current cloud-based work and
project management option is Project for the Web. Project for the Web
offers easy, robust work management tools that can be tailored to most
needs and roles. Take on little undertakings as well as huge efforts.
Regardless of team size, project managers and team members may utilize
Project for the Web to plan and manage work involving dynamic scheduling,
subtasks, and/or dependent tasks.
Microsoft Planner
The Planner is an easy-to-use, collaborative task management application
that allows users to plan, organize, and accomplish task-based activities.
Planner allows teams to plan their work straightforwardly and visually. The
Planner is a web-based application accessible from anywhere and has a
mobile app for iOS and Android.
Microsoft Bookings
Bookings is an appointment scheduling and management system accessible
over the internet. Bookings make it easier to schedule and manage
appointments. It features a web-based booking calendar and interacts with
Outlook to optimize your staff's schedule and allow your clients to book at a
time that works best for them.
Microsoft To Do
To Do is a smart task management program that helps you plan and organize
your day. To Do is a better, more personal, and intuitive method for
individuals to remain organized and make the most of their days. It works
with Outlook and Planner and is powered by Office 365 Exchange Online. To
Do is accessible via iOS, Android, Windows, and the web. To Do encourages
you to do the most critical tasks you need to get done every day, whether
for work, school, or home.
Online Meetings
Meetings help teams share status updates, brainstorm ideas, and solve
issues. Microsoft Teams is designed to help you have more productive
meetings, collaborating through online meetings, webinars, live events, or
audio and video conferencing. Microsoft Teams has many features that help
your team quickly engage and improve how they work together through
meetings.
Viva Connections
Viva Connections was formed to keep everyone in the workforce connected.
Today, Microsoft 365 has many capabilities for employee communications
and engagement. We have SharePoint, Yammer, Teams, and Stream. Viva
Connections brings all of these capabilities into a company-branded app in
Teams. It is a gateway to the employee experience, with personalized news,
communications, tasks, people, and resources. It offers a single curated
employee destination that can be configured for specific roles like frontline
workers. Leaders can discuss and engage their employees, and employees
can easily access the tools and resources they need from one place.
Viva Insights
Viva Insights provides privacy-protected insights and actionable
recommendations that help everyone in the organization work smarter and
achieve balance. Viva Insights is accessed in Microsoft Teams. It uses
quantitative and qualitative data to empower individuals, managers, and
leaders to improve organizational productivity and wellbeing.
Viva Topics
Viva Topics focuses on knowledge and expertise. It uses Artificial
Intelligence (AI) to identify knowledge and experts and organizes them into
shared topics. Viva Topics helps address many companies' critical business
issues: providing users with information when needed. For example, new
employee hires need to learn much new information quickly and encounter
terms they know nothing about when reading company information. Viva
Topics brings knowledge to your users in the Microsoft 365 apps they use
daily.
Viva Learning
Viva Learning is a learning hub in Microsoft Teams that lets you seamlessly
integrate learning and building skills into your day. In Viva Learning, your
team can discover, share, advise, and learn from your organization's and
your partners' content libraries.
OneDrive
OneDrive is the underlying technology that powers the collaborative files
experience across Microsoft 365. OneDrive is a cloud-based service that
enables you to access, share, and collaborate on files from anywhere.
OneDrive lets users view files within a browser, share and find content, and
sync that content so they can access it offline. You can work with others
inside or outside your organization and terminate sharing whenever you
want. OneDrive also empowers your organization to control, secure, and
retain that content when necessary.
Endpoint Management
Capabilities of Microsoft 365
In today's workplace, IT departments support different devices configured
differently. Your organization might have Android and iOS mobile phones,
Windows and macOS PCs, and custom devices your users bring to
work. Microsoft 365 provides the tools and services to enable you to
simplify the management of all these devices through Microsoft Endpoint
Manager (MEM).
MEM is a secure and intelligent management solution that improves
productivity and collaboration with the familiar experiences users expect.
MEM allows IT to support diverse scenarios for Bringing Your Own Device
(BYOD) and corporate-owned devices. MEM helps you solve the device
management challenge in today's mobile and remote work environment.
Endpoint Manager mixes services you may know and already be using.
Windows 365
Windows 365 is a cloud-based service that automatically creates a new type
of Windows virtual machine, known as Cloud PCs, for your end-users.
Securely stream the full Windows experience, including apps, data, and
settings, from the Microsoft cloud to any personal or corporate device.
Windows 365 provides productivity, security, and collaboration benefits of
Microsoft 365. Windows 365 is optimized for simplicity with predictable per-
user pricing.
Release Types
With Windows client, there are two release types:
Feature updates add new functionality and are released twice a
year. Because these updates are more frequent, they are smaller.
Quality updates provide security and reliability fixes. These
updates are issued monthly as non-security
releases or combined security + non-security releases. Non-
security releases allow IT admins to do an early validation of
content.
Servicing Channels
Servicing channels are the first way to direct users into deployment groups
for a feature and quality updates. There are three servicing channels, and
each chain channel provides different levels of flexibility when these
updates are delivered to client computers.
Windows Insider Program lets organizations test and provide
feedback on features shipped in the next update. These features
will be delivered during the development cycle. This process will
allow organizations to see exactly what Microsoft is developing
and start testing as soon as possible. Microsoft recommends that
all organizations enroll at least a few devices in this program
General Availability Channel offers new functionality with
feature update releases annually. Organizations can choose when
to deploy updates. This model is ideal for pilot deployments and
testing of feature updates, and it is also ideal for users such as
developers who have to work with the latest features
A long-term servicing channel is designed for specialist devices
that do not run Office apps, such as medical equipment or ATMs.
This channel receives new features every two or three years
Deployment Rings
Deployment rings are a deployment method that separates devices into a
deployment timeline, and Microsoft has found that a ring-based deployment
works well. Each "ring" contains a group of users or devices that receive a
particular update.
As needed, Microsoft also provides each update channel with two other
types of updates that are updated on the 2nd Tuesday of every individual
month:
Security updates, such as updates that help keep Office
protected from potential malicious attacks
Non-security updates (quality updates), such as updates that
provide stability or performance improvements for Office
How Updates are installed for Microsoft 365
Apps
Microsoft 365 Apps regularly check for updates and are downloaded and
installed automatically. There are no separate downloads for feature,
security, or non-security updates. The updates are cumulative, so the most
current update includes all the updates that have been previously released
for that update channel. While updates are being downloaded, your users
can continue to use Office apps. After they are downloaded, all the updates
for that update channel will install simultaneously
Mind Map
CHAPTER 05: A NA LY T I C S
C A PA B I L I T I E S I N M I C RO S O F T
365
Introduction
Organizations adapting to hybrid work environments focus on encouraging
their employees to build better work habits. They want their staff to achieve
a balance between productivity and wellbeing. Microsoft Viva Insights gives
leaders, managers, and employees privacy-protected insights that help
everyone work smarter and thrive. Furthermore, the capabilities of the
Microsoft 365 admin center, like the activity reports, can help organizations
understand how people are adopting Microsoft 365 products and services.
These analytic tools gather data and use Artificial Intelligence (AI) to provide
actionable insights that help individuals and organizations do their best
work.
Personal Insights
Individuals can gain valuable insights to improve work patterns through
actionable recommendations from the personalized Viva Insights app in
Teams. For example, prepare for the day with a briefing email, protect time
for focused work, and mindfully disconnect after-hours.
Manager Insights
Manager insights can provide insight to foster a healthy and prosperous
team. Understand the work patterns that can lead to burnout and stress for
your teams, such as regular after-hours work, meeting overload, or too little
focus time. The Viva Insights App in Teams makes it easy for managers to
understand current team norms and take action to create positive change.
Organizational Insights
Viva Insights provide organizational views to senior business leaders, CEOs,
business unit leaders, and other department heads. These experiences in
the Viva Insights App in Teams show leaders an aggregated view of work
and collaboration patterns across their organizations. Leaders can see how
people protect personal time, stay connected, manage focus time, and
prioritize manager coaching.
Each specialist admin center gives you more options for that area, including
reports. The following list describes some of the other admin centers and
the reports available:
Azure Active Directory
Endpoint Manager
Exchange
Security & Compliance
SharePoint
Teams
Mind Map
CHAPTER 06: SECURITY AND
COMPLIANCE CONCEPTS
Introduction
Security and compliance have become dominant concerns as more business
data is accessed from locations outside the traditional corporate network. In
addition, organizations need to ensure they are compliant with industry and
regulatory requirements to ensure the protection and privacy of data.
This chapter introduces some critical security and compliance concepts. You
will learn about shared responsibility, defense-in-depth, and Zero Trust
models. You will be introduced to encryption and hashing as ways to protect
data. Lastly, you will learn about concepts that relate to compliance.
Defense in Depth
Each layer offers protection so that if one layer is breached, a subsequent
layer will remove an attacker getting unauthorized access to data.
Verify Explicitly
Verification and authentication of these data points are necessary: user
identity, location, device, service or workload, data classification, and
anomalies.
Assume Breach
Division of access should be conducted amongst the user, devices, and the
application. Analytics are used to promote security and detect threats, while
encryption protects all the data.
A security strategy that employs the three principles of the Zero Trust model
across the six foundational pillars helps companies deliver and enforce
security across their organization.
If an attacker receives a hard drive with encrypted data and does not have a
view of the encryption keys, they will be unable to view the data.
Hashing
Hashing utilizes an algorithm to convert text to a unique fixed-length value
called a hash. The same hash value is produced each time the exact text is
hashed using the same algorithm.
Compliance Concepts
Data has become more critical than ever. Organizations, institutions, and
entire societies generate and rely on data to function daily. The sheer scale
of data generated and the increasing reliance on it means that the privacy
and protection of that data have become pivotal. As organizations and
institutions move their data to service provider clouds, with data centers
worldwide, additional considerations come into play.
Identity Services
When users use an online service with no privacy criteria, the user requires
at least a username (the User ID) and password. Identity services include
authentication, authorization, and access management policies.
Suppose you want to spend the night in a hotel. The first thing you will do is
go to reception to start the "authentication process." After the receptionist
has verified you, you are given a keycard and can go to your room. Think of
the keycard as the authorization process. The keycard will only let you open
the doors and elevators you are permitted to access, such as your hotel
room.
Access Management
Access management is a critical part of any cloud infrastructure as it ensures
the restriction of access to services toward other users. It provides
confidentiality, integrity, and availability. This means that access to any
online application should be confidential for an unauthorized user and
immediately available to authorized users. Access management policies
should also be responsible for the following:
Authentication and Authorization: The user must be authenticated first, then
authorized for the particular application
Faraway from Unauthorized Users: Access management policies must be designed in
such a way that no unauthorized person can access the information.
The server checks the security token through its trust relationship with the
identity provider. The user or application accesses the required resources on
the server by using the security token and the information. In this case, the
token and the information it contains is stored and managed by the identity
provider, and the centralized identity provider supplies the authentication
service.
Single sign-on
Another essential capability of an identity provider and "modern
authentication" is the Single Sign-On (SSO) support. With SSO, the end-user
logs in once, and that request is used to view multiple applications or
resources. When you set up SSO between multiple identities providers, it is
called federation.
Multi-Factor Authentication
Multi-Factor Authentication (MFA) provides a layer-based authentication
using more than one form of authentication. This means that if attackers
compromise one, then they will still not be able to get in. MFA is
recommended as a default. It is a part of AAD that enables other ways to
authenticate users. MFA is needed in organizations that have a large
number of users, devices, and resources. To avoid any collapse, extra
security is required for protection and efficient throughput.
Active Directory
Active Directory (AD) is a group of directory services developed by Microsoft
as part of Windows 2000 for on-premises domain-based networks. Active
Directory Domain Services (AD DS) is the best-known service of this kind. It
stores information about domain members, containing devices and users,
verifies their credentials, and describes their view rights.
The growth of cloud services, SaaS applications, and personal devices being
used at work has resulted in the need for modern authentication and the
evolution of Active Directory-based identity solutions.
Concept of Federation
Federation lets the access of services across organizational or domain
boundaries by establishing trust relationships between the respective
domain's identity providers. With federation, users are not required to
maintain a different username and password when viewing resources in
other domains.
Conditional Access
By establishing conditions that must be satisfied before allowing access to a
piece of material, conditional access safeguards controlled content in a
system. If-then clauses are the most basic form of conditional access
restrictions. The completion of an activity is required for users to access a
resource.
Conditional Access Policies
Conditional Access policies might provide you greater control if your
company needs more precise sign-in security requirements. With
conditional access, you can design rules that respond to sign-in events and
demand further steps before allowing a user access to a service or
application.
Through the Azure AD Premium P2 license or licenses that contain it, such
Microsoft 365 E5, risk-based conditional access is allowed.
Mind Map
CHAPTER 08: T H R E AT
P ROT E C T I O N WITH
M I C RO S O F T 3 6 5 D E F E N D E R
Introduction
This chapter will teach you how Microsoft 365 Defender can help protect
your organization. You will explore each of the different Defender services
to understand how they can protect: Identity, Office 365, Endpoint, and
cloud apps. You will also explore the capabilities of the Microsoft 365
Defender portal, including Microsoft Secure Score, reports, and incident
management.
It offers a subset of the core Microsoft Defender for Cloud Apps features. It
also provides a reduced subset of the Microsoft Defender for Cloud Apps
discovery capabilities.
The incidents queue is a central location that lists each incident by severity.
Hunting
Advanced hunting is a query-based threat-hunting option that lets security
professionals explore up to 30 days of raw data. Advanced hunting queries
enable security professionals to proactively search for threats, malware, and
malicious activity across your endpoints, Office 365 mailboxes, and more.
Threat-hunting queries can be used to build custom detection rules. These
rules automatically check for and respond to suspected breach activity,
misconfigured machines, and other findings.
Threat Analytics
Threat analytics is our in-product threat intelligence solution from expert
Microsoft security researchers. It is designed to assist security teams in
tracking and responding to emerging threats. The threat analytics dashboard
highlights the most relevant reports to your organization. It includes the
latest threats, high-impact threats (threats with the most active alerts
affecting your organization), and high-exposure threats.
Secure Score
An indicator of a company's security posture is the Microsoft Secure Score,
one of the features in the Microsoft 365 Defender site. Your protection will
be better the higher the score. The security of an organization's Microsoft
365 identities, apps, and devices can be monitored and improved via a single
dashboard through the Microsoft 365 Defender site.
Using Secure Score, enterprises can:
Provide an update on their security posture.
By offering discoverability, visibility, direction, and control, their
security posture will be strengthened.
Identify benchmarks and important performance indicators
(KPIs).
Incidents Capabilities
Incidents are a group of correlated alerts made when a suspicious event is
found. Alerts are created from different devices, users, and mailbox entities.
They can come from many different domains. Microsoft 365 Defender
automatically aggregates these alerts.
Mind Map
CHAPTER 0 9 : S E RV I C E
T RU S T P O RTA L AND
P R I VAC Y AT M I C RO S O F T
Introduction
Organizations all across the world are very concerned about data protection
and compliance. Thanks to the Service Trust Portal launch, those striving to
support or safeguard users' right to privacy in Microsoft's online
environment may now rest comfortably.
Microsoft Cloud services are built on trust, security, and compliance. The
Microsoft Service Trust Portal provides various content, tools, and other
resources about Microsoft security, privacy, and compliance practices.
Trust Center
Trust Center is a shortcut to knowing everything that Microsoft does to
ensure you do not lose trust in Microsoft. With this, you have a link to learn
about security, privacy, GDPR, data location, compliance, and more. This link
lets you know more about security implementations, privacy
implementations, etc.
The Service Trust Portal offers information, tools, and other resources about
Microsoft security, privacy, and compliance practices.
Since the introduction of the Microsoft Network in 1994, Microsoft has been
addressing privacy concerns relating to cloud computing and online services.
Microsoft is still dedicated to keeping its customers' information private. We
are aware that trustworthy privacy measures are crucial to fostering cloud
computing's growth and enabling it to realize its full potential. Because of
this, we carefully considered data protection when developing Office 365,
working with a specialized team of privacy experts.
Privacy Principles
Microsoft privacy principles and standards provide our staff with a clear
framework to ensure that we manage data responsibly. These guidelines are
used to gather and use customer and partner information at Microsoft. We
have made significant investments to create an extensive privacy
governance program to put our values and standards into practice. In
addition to the hundreds of other employees who help ensure privacy
policies, processes, and technologies are used across all of Microsoft's
products and services, the company employs many full-time privacy
professionals.
Microsoft Priva
Privacy is critical for organizations and consumers today, and concerns
about managing private data are steadily increasing. Regulations and laws
impact people worldwide, setting rules for how organizations keep personal
data and giving people rights to operate personal data collected by an
organization.
Mind Map
CHAPTER 10: IDENTIFY
LICENSING OPTIONS
AVA I L A B L E IN M I C RO S O F T
365
Introduction
Microsoft 365 is available through various licensing models and home,
business, enterprise, and subscription plans. These options let you choose
the best model and plan for your management and operational needs. By
choosing the optimum subscription and license, you can be sure that the
functionality you need is in the most cost-effective package.
Your Microsoft 365 subscription is provided through a CSP partner who can
manage your entire subscription and provide billing and technical support.
The CSP partner will have admin privileges that will allow them to access
your tenant, and they will be able to support, configure and manage licenses
and settings directly. The CSP partner can provide extra consultancy and
advice to meet security and productivity targets. Furthermore, other
Microsoft cloud-based products and services can be added to your
subscription, such as Microsoft Azure services and Dynamics 365.
Enterprise Agreements
The Microsoft Enterprise Agreement (EA) is designed for organizations that
want to license software and cloud services for a minimum three-year
period. The Enterprise Agreement describes the best value to organizations
with 500 or more users or devices. One of the benefits of the Enterprise
Agreement is that it is manageable, giving you the flexibility to bring cloud
services and software licenses inside a single organization-wide agreement.
Another benefit is that your organization can get 24x7 technical support,
planning services, end-user and technical training, and unique technologies
with Software Assurance.
Microsoft Online Service Program: This billing account is created when you
immediately sign up for a Microsoft 365 subscription through the Microsoft
Online Services Program.
Group-based Licensing
According to the membership of a group, group-based licensing
automatically gives or removes licenses for a user account. Dynamic group
membership allows for adding or deleting group members based on user
account attributes like Department or Country.
Licensing Requirements
Each user who gains access to group-based licensing must own one of the
following licenses:
Azure AD Premium P1 and above subscription, whether it is paid
or trial
Microsoft 365 Business Premium, Office 365 Enterprise E3, Office
365 A3, Office 365 GCC G3, Office 365 E3 for GCCH, or Office 365
E3 for DOD and above, whether it is a paid-for or trial version.
Mind Map
CHAPTER 11: DESCRIBE
S U P P O RT OFFERINGS FOR
M I C RO S O F T 3 6 5 S E RV I C E S
Introduction
Support plays an important role in the cloud environment. As we have
learned, at least some portion of infrastructure management moves to the
cloud provider when we move to the cloud. When something goes wrong,
you must get the help you need to keep your applications available. It is also
important to understand what level of support is being provided for specific
services, in particular services that may be in previewing and not published
officially.
Microsoft is committed to helping you get the best out of your Microsoft
365 services. You can rely on easy-to-access support options with Microsoft
365 to help your organizations remain productive and efficient. Microsoft
365 services guarantee your organization's service level through Service
Level Agreements. When you need help using Microsoft 365, create or view
an existing support request through the Microsoft 365 admin center. Your
organization will also benefit from transparent service health status updates
on your Microsoft 356 products or services. Lastly, your organization can use
open feedback sharing to help improve products and services based on user
experience.
Your Microsoft Office 365 subscription includes basic technical help, which
you can request via the Microsoft Office 365 online site. You can buy
Microsoft Office 365 support plans directly from Microsoft or through
volume licensing programs for extra services and quicker response times.
Microsoft has various channels for you to submit feedback about Microsoft
365 products and services. For example, if you are using feedback from the
community feedback web portal, you can submit new feedback directly
within the web portal. Community feedback is publicly displayed within
different forums. You can participate in existing feedback by voting or
commenting on existing topics. Review your submitted feedback, impact,
and status by viewing official responses from the Microsoft product teams.
The following list defines the ways you can communicate directly with
Microsoft:
Feedback
In-product experiences
Windows Feedback Hub
Microsoft Tech Community
Microsoft Store
UserVoice forums
Mind Map
CHAPTER 12: DESCRIBE THE
S E RV I C E LIFE C YC L E IN
M I C RO S O F T 3 6 5
Introduction
Every product or service has a lifecycle, including those in Microsoft 365.
Microsoft envisions, designs, develops and tests everything internally. Once
these features, products, and services are mature enough, they are made
available to evaluate and test by users in a preview release. After the tests
succeed, the feature, product, or service is released and generally available.
Over time, as more product releases occur, older products and services can
no longer be supported, and they will reach the end of support. Your
organization can stay current on the feature, product, and service updates
and releases by using the Microsoft 365 Roadmap.
Public preview
In this phase, Microsoft typically releases public previews of products and
services before their GA release to receive suggestions from a wide range of
users. They are marked as previews and include beta or pre-release features
and services. Doing this allows users to explore and test upcoming
functionality. Users may also receive some limited support depending on the
product or service.
End of support
Eventually, older products or retired services can no longer be supported,
and they will reach the end of support. Once that happens, the product or
service will no longer receive updates or assisted support. Customers are
encouraged to shift to the latest version.
In this chapter, you will learn that Mobile Device Management manages all
popular mobile devices without joining them to an on-premises AD DS. To
manage a device with MDM, enroll it in your MDM solution. At Microsoft,
enrolling it in Intune or Basic Mobility and Security. After the device is
enrolled in MDM, you can still manage it through group policies and profiles
if you want. However, MDM provides more device management features
not available in on-premises AD DS, such as device compliance and
Conditional Access.
A business can ensure that only authorized individuals and devices have
access to confidential information by using a device management provider.
Similar to this, customers who know their smartphone satisfies their
organization's security criteria can feel at peace accessing work data from
their phone. You can question as a company, "What should we utilize to
secure our resources?"
Microsoft Intune
Microsoft is just one of many companies that utilize Intune to protect
confidential information that users access from both company-owned and
personal devices. Software update guidelines, installation statuses, and
device and app configuration standards are all part of Intune (charts, tables,
and reports). These tools support you in securing and managing data access.
An organization should first plan its MDM solution before deploying MDM,
enrolling devices in it, and managing device compliance. This section
examines the features of effective MDM planning, including the built-in
capabilities of mobile device management for Microsoft 365, a comparison
of Microsoft's two MDM solutions, policy settings for mobile devices, and
controlling email and document access.
After Basic Mobility and Security is set up and your users have enrolled, you
can manage the devices, block access, or even wipe a device if needed.
Introduction to Microsoft Intune
Microsoft Intune provides the core features within Basic Mobility and
Security, plus more advanced device management features. Intune is
Microsoft's gold-level standard for MDM solutions. It is not only a cloud-
based service; its focus extends beyond Mobile Device Management (MDM)
and includes Mobile Application Management (MAM).
Device Management - Intune enables an organization to control
how its devices are used, including mobile phones, tablets, and
laptops. It also enables people in your organization to use their
devices for school or work. Intune helps ensure that organization
data stays protected on personal devices and can isolate
organizational data from personal data
Application Management
Many organizations, such as Microsoft, use Intune to secure
proprietary data users access from their company-owned and personal
mobile devices. Intune helps organizations secure and monitor data
access by including:
Device and app configuration policies
Software update policies
Installation statuses (charts, tables, and reports)
MDM within Microsoft 365 Plans
Basic Mobility & Security is part of the Microsoft 365 plans, while Microsoft
Intune is a standalone product with specific Microsoft 365 plans.
Examine MDM Policy Settings in Microsoft 365
MDM policies and profiles are groups of settings that control features on
mobile devices. Whether related to encryption, passwords, security, email
management, or another fundamental issue, policies are the cornerstone of
MDM in an organization.
When organizations create policies or profiles, they can only deploy them by
assigning them to groups of users, and they cannot assign them directly to
individual devices or users. When policies are assigned to groups, the users
in those groups get an enrollment message on their devices. When they
have completed device enrollment, their devices are restricted by the
policies you have set up. You can then monitor policy deployment in the
MDM management tool.
Microsoft offers two solutions for managing devices with MDM: Basic
Mobility and Security and Microsoft Intune. Both solutions can manage
enrolled devices, but they offer different capabilities. Both solutions use
Microsoft 365 Endpoint Manager for administering their MDM solutions.
MDM Policy Settings in Basic Mobility and Security
The Basic Mobility and Security service enable organizations to create device
policies that help protect their company information on Microsoft 365 from
unauthorized access. An organization can apply policies to any mobile device
in the company where the user has an applicable Microsoft 365 license and
enrolled the device in Basic Mobility and Security.
MDM Policy Settings in Microsoft Intune
Organizations can manage the same settings in Microsoft Intune as in Basic
Mobility and Security, along with many other settings. These different
device settings that Intune can manage include:
Device enrollment and restrictions
Device compliance policies
Device configuration policies
Conditional Access
Software updates include Windows 10 update rings and update
policies for iOS
Apps deployment, app configuration policies, and app protection
policies
Policy and Security Configuration
Microsoft 365 includes default MDM policies based on Microsoft's digital
security requirements. These policies help ensure that corporate security is
maintained while also providing a good user experience. Their data on their
work devices is more secure when policies manage other users and devices
in the same environment. The following list provides examples of how these
policies affect the entire Microsoft 365 experience:
Security. The default policies enforce Microsoft corporate
compliance settings on mobile devices, such as password policy
and encryption settings
Messaging. The default policies for Exchange align policy settings
between Exchange ActiveSync (EAS) and MDM
Compliance. Microsoft took advantage of the default compliance
rules for mobile devices built into Configuration Manager.
Microsoft then created a configuration baseline for those CIs and
targeted the configuration baseline to the collection of mobile
devices
Using MDM policies, Microsoft 365
Organizations can define company policy using the Device Security policy in
Microsoft 365. They can control access to email, documents, and other
cloud apps by using Conditional Access policies. Compliance with company
policy is just one criterion that can be evaluated in a Conditional Access
policy. Organizations can also evaluate sign-in risk, device type, location, and
client apps.
Devices that are not enrolled in MDM cannot have their compliance
evaluated. However, organizations can still prevent access to mailboxes,
documents, and cloud apps from such devices. If a user tries to access their
mailbox from such a device, depending on how the policy is set up, they may
experience one of the following outcomes:
They are removed from accessing Microsoft 365 resources
They are, redirected to enroll the device in MDM
The user could have access, but Microsoft 365 would report a
policy violation
Mind Map
Deploy Mobile Device
Management
This section examines how to deploy Mobile Device Management in
Microsoft 365. Before organizations can start managing devices in Microsoft
365, they must first activate and configure MDM and then enroll their
devices. Organizations can activate Microsoft Intune by choosing the MDM
authority in Microsoft 365 Endpoint Manager. For Basic Mobility and
Security, they must run a link to activate it.
https://admin.microsoft.com/EAdmin/Device/IntuneInventory.aspx#
It takes some time for the service to start, after which you will receive an
email that explains the next steps for setting up Basic Mobility and Security.
These steps include:
1. Configure domains for Basic Mobility and Security. If you do not have a domain
associated with Microsoft 365 or are not managing Windows devices, you can skip this
step. Otherwise, you will need to add DNS records for the domain at your DNS host.
This step is complete if you have already added the records to set up your domain with
Microsoft 365.
After you add the records, the Microsoft 365 users who sign in on their
Windows device with an email that uses your domain are redirected to
enroll in Basic Mobility and Security.
2. Configure an Apple Push Notification Service (APNS) certificate for iOS devices. To
operate iOS devices like iPad and iPhones, you must first create an APNS certificate.
3. Set up multi-factor authentication. MFA helps secure users sign in to Microsoft 365 for
mobile device enrollment by requiring a second form of authentication.
4. Manage device security policies. Organizations should create and deploy device
security policies to help protect their Microsoft 365 data.
5. Make sure users enroll their devices. After you have created and deployed an MDM
policy, each licensed Microsoft 365 user in your organization will receive an enrollment
message the next time they sign in to Microsoft 365 if the policy applies to their device.
Microsoft Intune
Organizations must configure the MDM authority to set up Microsoft Intune
for device management. Device management in Intune is initially disabled,
and MDM authority is unknown. Before an organization can start enrolling
and managing devices, it must configure the MDM authority by selecting
one of three available options:
Intune MDM Authority - This option sets the MDM authority
solely to Microsoft Intune. Intune is a cloud-only MDM solution,
and it is managed by using a web browser. Microsoft
recommends that organizations select this deployment option
when using Intune
Configuration Manager MDM Authority - This option is referred
to as Hybrid MDM because it assumes the organization uses
Configuration Manager for managing on-premises devices. This
scenario integrates Intune's MDM capabilities into Configuration
Manager in the following manner:
It uses Configuration Manager's on-premises infrastructure
to administer content and manage the devices
None. This option indicates that no MDM Authority has been
chosen, and Intune can only manage devices if an MDM authority
is chosen.
Configure Domains for Mobile Device
Management
An organization can enable its users to enroll their Windows 10 devices in
Mobile Device Management (MDM) using the Autodiscover service.
Windows devices (Windows Phone 8.1 and 10 and Windows PCs 8.1 and 10)
have a UI built into the operating system to enroll a device for management.
The user enters a corporate email address that matches the User Principal
Name (UPN) set for user identity. The device tries to auto-discover the
enrollment server and start the enrollment process. If the Autodiscover
service is not configured, the device enrollment server will not be found. In
this case, the device presents a screen for the user to enter the server
address.
Intune's default setting allows users to enroll all supported device types.
Organizations can optionally configure enrollment restrictions by using the
following criteria:
A maximum number of devices that a user can enroll in
Device platforms that can be enrolled:
Android
Android work profile
iOS
macOS
Windows
Required operating system version for Android, iOS, macOS, and
Windows devices:
Minimum version
Maximum version
Restrict enrollment of personally owned devices.
Mind Map
Enroll Devices in Mobile Device
Management
Many devices today, such as Android, iOS, and Windows 10 S, cannot be
joined to on-premises AD DS. But to manage devices centrally, they must
trust the authority that defines configuration settings. In on-premises AD DS
environments, such authorities were domain controllers; in today's cloud
world, they are MDM authorities. You can manage a device only if it is
enrolled in MDM, and an enrolled device means that it trusts the MDM
authority, such as Intune or Basic Mobility and Security.
In this section, you will see the benefits of enrolling devices to MDM, how to
enroll Windows 10, Android, and iOS devices, and how to create enrollment
rules. And since Apple devices have their enrollment mechanism, you will be
introduced to enrolling Apple devices using the Apple Device Enrollment
Program (DEP).
The Company Portal app is not included on Android and iOS devices and is
available as a free app in the Google Play and Apple app stores. If you want
to enroll iOS devices, you must ensure that MDM is configured with a valid
Apple Push Notification Service (APNS) certificate. iPhones, iPad, and macOS
devices require an APNS certificate for secure communication with MDM,
even if MDM is Intune, MDM for Microsoft 365, or a third-party MDM
product.
But if the company provides employees with iOS devices that are part of the
Device Enrollment Program, users can enroll those devices in MDM by
completing the following steps:
1. Turn on your iOS device.
2. After you select your Language, link your device to WiFi.
3. On the Set-up iOS device screen, choose whether you want to:
For example, suppose such a policy is in place, and a user tries to access
company resources, such as their Exchange Online mailbox. In that case, the
user access will be blocked and redirected to enroll their device first. After
the user enrolls the device, they can access their mailbox.
The following diagram displays what happens when a user with a new
personal device tries to access Microsoft 365.
Enroll Devices Using the Device Enrollment
Manager Account
In many companies, users enroll company-owned devices to MDM
themselves. But there are scenarios where these same organizations prefer
to have a device already enrolled when a user receives it. For example, when
non-technical users use devices or if multiple users share the same device.
Every user can enroll only a limited number of devices to MDM. This limit
does not apply to the DEM. The DEM account is a particular user account
used to enroll devices. The features of this account include:
It can be used to enroll up to 1000 devices in MDM
It enables organizations to use Intune to manage large numbers
of mobile devices with a single user account
An organization can add multiple users to the DEM account to
give them special capabilities. Only users that have been assigned
an Intune license can be assigned to the DEM account
When a user enrolls a device, they are associated with that device. But when
a DEM account enrolls the device, no user is associated with the device, and
the device has no assigned user. Suppose an organization plans to bulk
enroll many devices at one time. In that case, it can specify the users who
will do the bulk enrollment as device enrollment managers on the Intune
view in the Azure portal.
Mind Map
CHAPTER 14: M I C RO S O F T
365 APPS
Introduction
Microsoft 365 Apps is a part of Office available through many Office 365
(and Microsoft 365) plans. It includes the applications you are familiar with.
You can use these applications to link with Office 365 (or Microsoft 365)
services.
The main difference is that Microsoft 365 Apps is updated regularly, as often
as monthly, with new features, unlike non-subscription versions of Office.
Microsoft 365 plans for home or business contain the robust Office desktop
apps you are familiar with.
With a subscription, you will have the updated features, fixes, and security
updates along with tech support at no added cost. You can select to pay for
your subscription monthly or yearly. The Microsoft 365 Family plan also
allows you to share these subscription benefits with up to 5 additional
people.
Most of the Microsoft 365 plans for businesses, schools, and non-profits
include fully updated desktop apps, but Microsoft also provides basic plans
with the online versions of Office, file storage, and email. You choose what
works best for you: Small business, Enterprise, School, or Non-profit.
Deployment differences
By default, Microsoft 365 Apps updates as one package. This
means that all Office apps are linked to the computer. But, you
can create the deployment to exclude or delete specific Office
applications
Because Microsoft 365 Apps uses a separate installation
technology, called Click-to-Run, there is an alternate way to apply
software updates. Microsoft 365 Apps are configured to install
updates from the Office CDN on the internet. But, you can form
Microsoft 365 Apps to install updates from a location within your
network, or you can control updates to Microsoft 365 Apps with
Microsoft Endpoint Configuration Manager
Microsoft 365 Apps also offers the ability to manage how often
users get feature updates. For example, users can have new
features to Microsoft 365 Apps as soon as they are ready or once
a month
Office 365 (and Microsoft 365) offers a web-based portal where
users can install Microsoft 365 Apps. If users are not local
administrators, you will have to install Microsoft 365 Apps for
them
Licensing differences
Users can have Microsoft 365 Apps on up to 5 different
computers with a single Office 365 license if a user can have
Microsoft 365 Apps installed on a computer in Office, on a laptop
to have when traveling, and on a home computer. Users can also
install it on up to five tablets and five phones
Microsoft 365 Apps is provided as a subscription. If you remove
your subscription, Microsoft 365 Apps goes into smaller
functionality mode. In smaller functionality mode, users can open
and view existing Office files but cannot use most of the other
Microsoft 365 apps' other features
To use Microsoft 365 Apps, a user should have an Office 365
account and have been dedicated to a license. If the user's license
or account is deleted, the user's installations of Microsoft 365
Apps go into smaller functionality mode
With Microsoft 365 Apps for enterprise, you can enable your teams to
collaborate easily across geographical boundaries. Give users the means to
securely share files, collaborate in real time, and simply interact with
coworkers.
Stay Connected
Utilize your iOS, Android, or Windows device from anywhere. From your
tablet or phone, you may send emails and view, edit, and share documents.
Power of AI
Utilize technologies you already know and the intelligent cloud to complete
more tasks. With the support of Microsoft 365 Apps for business, you can
write better in Word and Outlook, get insights in Excel, and make
presentations in PowerPoint.
Security
Protect your data and identities, recognize internal and external dangers
sooner, and make sure that third-party apps and macros work with
Microsoft 365 Apps for business.
The device that has not been used the most often is disabled immediately if
a user downloads Microsoft 365 Apps on more than 10 devices. On the
inactive device, Microsoft 365 Apps enter a reduced capability mode. Please
take note that, at this time, only Windows-based devices are supported for
this automatic deactivation.
Mind Map