Microsoft 365

Ace your homework & exams now with Quizwiz!

Describe the Zero Trust model:

"trust no one, verify everything."

With the Cloud Solution Provider (CSP) model, who provides your subscription?

CSP Partner

Microsoft defender for cloud apps functionality:

-Cloud discovery -sanctioning and unsanctioning apps -app connectors -conditional access -policies

Types if add-ons:

-Traditional add-ons are linked to a specific subscription. If you cancel the subscription, the linked add-on is also canceled. -Standalone add-ons appear as a separate subscription on the Your products page within the Microsoft 365 admin center. They have their own expiration date and are managed the same way you would any other subscription

Microsoft Viva includes which four modules?:

-Viva Connections -Viva Insights -Viva Topics -Viva Learning

What is Microsoft 365 Education?

Available for educational institutions. Empowers educators to unlock creativity and promote teamwork while providing a safe experience in a single, affordable solution. Academic licenses can be tailored to fit any institution's needs, including productivity and security solutions for faculty, staff, and students.

What is Microsoft 365 Enterprise?

Designed for large organizations. Can connect and empower every employee, from the office to frontline workers, enhancing productivity and driving innovation. It provides enterprise-class services to organizations that want a productivity solution that includes robust threat protection, security, compliance, and analytics features.

What is Microsoft 365 user portal?:

Designed for users to access their email, calendar, and documents through Microsoft 365 apps like Office, Teams, Outlook, and more. Users can sign in with their email account and password through www.office.com. Only the apps the user has licenses for will appear. The portal allows for quick and easy viewing and editing of files saved online through OneDrive.

What is Microsoft 365 developer program?

Developer subscription that you can use to create your own sandbox and develop solutions. This program is independent of your production environment. The program includes 25 user licenses and lasts for 90 days. You can build Microsoft Teams apps, Office add-ins for Word, Excel, PowerPoint, or Outlook, or SharePoint add-ins, using Microsoft Graph, the SharePoint Framework, Power Apps, and more.

Which phase of a product is the release version?:

General Availability

What is OneDrive?:

Gives you secure access and file storage from anywhere.

How can your organization receive on-site support from Microsoft?

Premier support

Authentication is the process of doing what?

Verifying that a user or device is who they say they are.

Who is responsible for submitting a claim for service credit?

Your organization

Examples of Work management tools in Microsoft 365:

-Microsoft Project -Microsoft Planning -Microsoft Bookings -Microsoft To Do

Organizational Insights:

-Organizational resilience -Employee engagement. -Improve Agility -Foster Innovations -Effective Managers -Operational effectiveness -Accelerate Change -Transform Meeting Culture -Increase Customer Focus

Minimum amount of months Microsoft will give notice before ending support of a product:

12 months

What are Deployment Rings?:

A Deployment method used to separate devices into a deployment timeline. Microsoft has found that a ring-based deployment works well. Each "ring" comprises a group of users or devices that receive a particular update together. IT administrators set criteria to control delay time or completion that should be met before deployment to the next broader ring of devices or users can occur.

Describe the capabilities of Viva Insights:

Provides privacy-protected insights and actionable recommendations that help everyone in the organization work smarter and achieve balance.

Assymetric Encryption:

uses a public key and private key pair

Symmetric Encryption:

uses the same key to encrypt and decrypt the data

Which of the following Microsoft 365 subscription plans are appropriate for companies with under 300 employees?

Microsoft 365 Buisness

Which of the portals below can you go to view the current health status of your Microsoft 365 services and tenant?

Microsoft 365 admin center

Describe the core productivity tools in Microsoft 365:

-Collaborate from anywhere -Create content in real time -Create a cohesive file-sharing experience -Engage and inform your organization -Stay connected -Work smarter with business-class email and calendaring -Organize content-rich tasks -Stay on track effortlessly -Simplify scheduling to save time -Manage your to-do list

Microsoft To Do

-Focus and achieve your most important tasks with a daily to-do list called "My Day." -Utilize smart suggestions to add tasks, upcoming or overdue tasks. -Get an overview of what you achieved yesterday and tasks you didn't get to. -Create lists for any occasion and share lists with others. -Break down more complex tasks into subtasks. -Separate list of tasks generated from flagged Outlook emails. -Schedule reminders and repeatable tasks. -View your assigned tasks from Planner in To Do.

Six foundational pillars:

-Identities may be users, services, or devices. When an identity attempts to access a resource, it must be verified with strong authentication, and follow least privilege access principles. -Devices create a large attack surface as data flows from devices to on-premises workloads and the cloud. Monitoring devices for health and compliance is an important aspect of security. -Applications are the way that data is consumed. This includes discovering all applications being used, sometimes called Shadow IT because not all applications are managed centrally. This pillar also includes managing permissions and access. -Data should be classified, labeled, and encrypted based on its attributes. Security efforts are ultimately about protecting data, and ensuring it remains safe when it leaves devices, applications, infrastructure, and networks that the organization controls. -Infrastructure, whether on-premises or cloud based, represents a threat vector. To improve security, you assess for version, configuration, and JIT access, and use telemetry to detect attacks and anomalies. This allows you to automatically block or flag risky behavior and take protective actions. -Networks should be segmented, including deeper in-network micro segmentation. Also, real-time threat protection, end-to-end encryption, monitoring, and analytics should be employed

Main tasks that are done in the admin center:

-Manage users by adding, deleting, or restoring users. -Manage licenses by adding and removing license. -Manage a Microsoft 365 group by creating a group, deleting a group, and editing the name or description. -Manage billing. -View or create service requests. -Manage global settings for apps. -View activity reports. -View service health.

3 Deployment Groups:

-Preview is for planning and development. -The purpose of the preview ring is to evaluate the new features of the update. -Limited is for pilot and validation. -The purpose of the limited ring is to validate the update on representative devices across the network. -Broad is for wide deployment. -Once the devices in the limited ring have had a sufficient stabilization period, it's time for broad deployment across the network.

Two types of reports available in the admin center:

-Productivity score. The score in this report measures the work done in your organization compared to other organizations like yours. It provides metrics, insights and recommended actions you can take to help your organization use Microsoft 365 products and services efficiently. -Usage. View these reports by time period and Microsoft 365 product or service to understand how people in your organization are using the products and services. You can drill down into each product report to get more detailed insights about the activities within each product. For example, view the number of files stored within OneDrive and SharePoint, or the email and mailbox activity within Exchange.

Types of updates channels for Microsoft 365 Apps:

-Security updates, such as updates that help keep Office protected from potential malicious attacks. -Non-security updates (quality updates), such as updates that provide stability or performance improvements for Office.

Azure Virtual Desktop has the following capabilities:

-Set up a multi-session Windows Client deployment that delivers a full Windows experience with scalability. -Present Microsoft 365 Apps for Enterprise and optimize it to run in multi-user virtual scenarios. -Provide Windows 7 virtual desktops with free Extended Security Updates. -Bring your existing Remote Desktop Services (RDS) and Windows Server desktops and apps to any computer. -Virtualize both desktops and apps. -Manage desktops and apps from different Windows and Windows Server operating systems with a unified management experience. -Uses FSLogix profile container technology. -Dedicated to a single user or used by multiple users.

Shared Responsibility Model:

-Software as a Service (SaaS) -Platform as a Service (PaaS) -Infrastructure as a Service (IaaS) -On-premises datacenter

Microsoft 365 Capabilities:

-Stay Connected -Secure Sign ins -Manage your hybrid workers devices -Be just as collaborative and productive

Describe how Microsoft 365 Apps helps increase productivity:

-Work across multiple devices. -Work with apps that are always up to date. -Work intelligently through connected experiences.

Which admin center can you view activity reports of audit logs and sign-ins?

Azure Active Directory admin center

Exercise 2: Explore the Azure Active Directory admin center:

1. In the Microsoft 365 admin center, in the navigation pane, select Show all. 2. Under Admin centers, select Azure Active Directory. Notice that a new tab opens. 3. In the Azure Active Directory admin center, on the Dashboard, select Azure Active Directory from the navigation pane. 4. Under Manage, select Users. Notice the same user accounts from Office 365 are displayed. Close the All users blade by selecting X. 5. Under Manage, select Groups. Notice the same groups from Office 365 are displayed. Close the All groups blade by selecting X.

What is Viva?:

An employee experience platform that helps organizations create a thriving culture with engaged employees and inspiring leaders.

Why gather reports in the Microsoft 365 admin center?:

Gather insights on security and see how employees are using Microsoft 365 products and services through the available reports in the Microsoft 365 admin center. You need to have admin permissions to be able to view these types of reports. To access the admin center, go to admin.microsoft.com and sign in with your admin account. Alternatively, you can access the Microsoft 365 admin mobile app.

What is Microsoft 365 Home?

Exists to bring the same great productivity benefits into your personal and family life. Comes in two plans for family and personal use.

Software as a Service (SaaS):

Hosted and managed by the cloud provider, for the customer. It's usually licensed through a monthly or annual subscription. Microsoft 365, Skype, and Dynamics CRM Online are all examples of SaaS software. SaaS requires the least amount of management by the cloud customer. The cloud provider is responsible for managing everything except data, devices, accounts, and identities.

Manage Windows-as-a-Service

In Configuration Manager, you can view the state of WaaS in your environment. You can create servicing plans to form deployment rings and ensure that Windows systems are up to date when new builds are released. You can also view alerts when Windows clients are near end of support for the build version.

Which of the following best describes the concept of data sovereignty?:

Data, particularly personal data, is subject to the laws and regulations of the country/ region in which it's physically collected, held, or processed.

Configuration Manager manages on-premises infrastructure and Intune manages cloud-based functions.

True

Which relationship allows federated services to access resources?

Trust relationship

You're managing a project with people working in different locations. To improve collaboration and team work, you're encouraging more frequent and informal communication via online meetings and chat. Which Microsoft product is most suitable?:

Teams

Licenses

-Full USLs are for new customers who haven't previously purchased Microsoft products and services. • Add-on USLs are for on-premises software customers who want to add Microsoft 365 cloud products and services. • From SA USLS are for on-premises Software Assurance customers that want to transition to the cloud. • Step Up USLs are for customers who want to upgrade the level of their service

Responsibilities always retained by the customer organization include:

-Information and data -Devices (mobile and PCs) -Accounts and identities

Applications included in Microsoft 365 Apps:

-Teams -Word -Excel -PowerPoint -Outlook -OneNote

Microsoft privacy principles:

-control -transparency -security -strong legal protections -no content based targeting -benefits to you

3 phases in Microsoft 365 Roadmap:

-in development -rolling out -launched

Product or service lifestyle three phases:

-private review -public review -general availability

Cyber attack kill chain

-reconnaissance -compromised credentials -lateral movements -domain dominance

Option to deal with particular issue depends on:

-the tool or service where the issue has arisen -type of subscription your organization uses -the kind of support your organization needs

What is Yammer?:

An enterprise social network that allows people to engage and connect across the organization.

Microsoft Products & Services Agreement (MPSA):

Billing account created when your organization signs a MPSA volume licensing agreement to purchase software and online services.

Microsoft Customer Agreement:

Billing account created when your organization works with a Microsoft representative, authorized partner, or purchases independently.

Where is the best place to share ideas about how to improve a feature for Microsoft 365 products and services?

Create a post in the feedback web portal

Enterprise agreements:

Designed for organizations that want to license software and cloud services for s minimum three year period.

Federation:

Enables the access of services across organizational or domain boundaries by establishing trust relationships between the respective domains identity provider.

The Human Resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption at rest

Describe the shared responsibility model:

Identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer. The responsibilities vary depending on where the workload is hosted.

Encryption for data in transit:

It could be done by encrypting the data at the application layer before sending it over a network. HTTPS is an example of encryption in transit.

Which portal allows you to modify payment method and frequency of your Microsoft 365 subscription?

Microsoft 365 admin center

A lead admin for an organization is looking to protect against malicious threats posed by email messages, links (URLS). and collaboration tools. Which solution from the Microsoft 365 Defender suite is best suited for this purpose?:

Microsoft defender for office 365

Cloud solution provider model:

Microsoft partner program that provides expertise and services you need through an expert CSP partner.

You've recently been asked to manage a project that includes people from inside and outside your organization. You need to share files with everyone on the project. Which Microsoft product is most suitable?

OneDrive

What is Teams?:

Teams provides engaging and inclusive meetings and real-time messaging to connect with colleagues, wherever you are.

An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees?

The organization

Microsoft online services program:

This billing account is created when you sign up for s Microsoft 365 subscription directly.

Your organization is launching an important new product. You want to host a major online event to announce it to your industry. You'll have several people speaking plus videos. Which combination of Microsoft products should you use to host the event?

-Yammer -Teams -Stream

Defender for cloud apps framework:

-discover and control the use of Shadow It -protect against cyber threats and anomalies -protect your sensitive information anywhere in the cloud - assess your cloud apps' compliance

Microsoft defender for Office 365 covers these key areas:

-threat protection policies -threat investigation and response capabilities -reports -automated investigation and response capabilities

Cloud Access Security Broker (CASB):

-visibility -threat protection -data security -compliance

What is Microsoft 365?

A cloud-based subscription service that consists of an integrated portfolio of products like Office apps, Teams, Windows, world-class security, and more.

Encryption for data in use:

A common use case for encryption of data in use involves securing data in nonpersistent storage, such as RAM or CPU caches. This can be achieved through technologies that create an enclave (think of this as a secured lockbox) that protects the data and keeps data encrypted while the CPU processes the data.

What is Windows 365?

A subscription service for organizations that allows you to create and run PCs remotely. It's called a cloud PC, meaning Windows 365 securely streams your personalized Windows desktop, apps, settings, and content from the cloud to any device.

What is Microsoft 365 admin center?:

Designed for IT professionals and administrators to manage the organization's Microsoft 365 subscription. The admin center allows you to carry out various tasks, like managing users, viewing reports, and much more. Admins can also customize their home page by adding tile cards that point to apps, SharePoint sites, external sites, and more. This customization feature makes it easy for admins to find the relevant sites, apps, and resources to do their job.

What is Microsoft 365 for business?

Designed for small and medium-sized organizations. Can help your business improve cybersecurity, reduce costs, and empower employees to work from anywhere. It offers the full set of Office 365 productivity tools and includes security and device management features.

Encryption for data at rest:

Need encryption keys. Example a server

How are updates are installed for Microsoft 365 Apps?:

Microsoft 365 Apps checks for updates regularly, and they're downloaded and installed automatically. There aren't separate downloads for feature, security, or non-security updates. The updates are cumulative, so the most current update includes all the updates that have been previously released for that update channel. While updates are being downloaded, your users can continue to use Office apps. After they're downloaded, all the available updates for that update channel will install at the same time. If any Office apps are open, your users will be prompted to save their work and close the apps, so that the updates can finish installing.

How to be more secure with Microsoft 365?

Microsoft 365 Defender: Protect your organization against sophisticated cyberattacks Microsoft Secure Score: Get real-time analysis of your current security posture

The evolution of Office 365 to Microsoft 365

Microsoft 365 is a superset of Office 365 as it includes everything you know in Office 365 and more, such as Windows, Teams, and other cloud-based security and device management products and services.

How to be more productive with Microsoft 365?

Microsoft Viva: Easily transition from computer to mobile devices with innovative mobile apps enabling you to stay productive on the go.

Describe the deployment and release models for Windows-as-a-Service (WaaS):

Model is designed to make life simpler for both users and IT professionals. WaaS maintains a consistent and current Windows client experience for users.

Azure Virtual Desktop (AVD):

Modern and secure desktop and app virtualization solution on Azure. AVD allows users to connect to a Windows desktop running in the cloud. It's the only solution that delivers multi-session on Windows. AVD optimizes for Microsoft 365 Apps for Enterprise, simplifies management with Citrix and VMware, and supports Remote Desktop Service environments. AVD is optimized for flexibility with flexible consumption-based pricing.

Which type of reports are available to view in the Microsoft 365 admin center?

Productivity score and Usage.

Platform as a Service (PaaS):

Provides an environment for building, testing, and deploying software applications. The goal of PaaS is to help you create an application quickly without managing the underlying infrastructure. With PaaS, the cloud provider manages the hardware and operating systems, and the customer is responsible for applications and data.

Confidentiality, Integrity, Availability (CIA)

Series of mechanisms to slow the advance of an attack.

What is a benefit of single sign-on?

The user signs in once and can then access many applications or resources.

What is SharePoint?:

Lets you collaborate, share content, and coordinate your work within your organization.

Zero Trust guiding principles:

-Verify explicitly. Always authenticate and authorize based on the available data points, including user identity, location, device, service or workload, data classification, and anomalies. -Least privileged access. Limit user access with just-in-time and just-enough access (JIT/JEA), risk-based adaptive policies, and data protection to protect both data and productivity. -Assume breach. Segment access by network, user, devices, and application. Use encryption to protect data, and use analytics to get visibility, detect threats, and improve your security.

Windows 365 is available in two subscription offerings:

-Windows 365 Business is made specifically for smaller organizations (up to 300 seats) who want ready-to-use Cloud PCs with simple management options. -Windows 365 Enterprise is for larger organizations who want unlimited seats for creating Cloud PCs. It includes options to create custom Cloud PCs based on device images that you create, more management options, and full integration with Microsoft Endpoint Manager.

Modern deployment methods:

-Windows Autopilot allows IT professionals to customize the out-of-box experience (OOBE) to deploy apps and settings that are pre-configured for your organization. Users can go through the deployment process independently, without the need to consult their IT administrator. -In-place upgrade provides a simple, automated process that uses the Windows setup process to upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications. In-place upgrade requires the least IT effort, because there's no need for any complex deployment infrastructure.

3 Servicing Channels:

-Windows Insider Program provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. These features will be delivered as soon as possible during the development cycle through a process called flighting. This process will allow organizations to see exactly what Microsoft is developing and start their testing as soon as possible. Microsoft recommends that all organizations have at least a few devices enrolled in this program. -General Availability Channel provides new functionality with feature update releases annually. Organizations can choose when to deploy updates. This model is ideal for pilot deployments and testing of feature updates. It's also ideal for users such as developers who need to work with the latest features. -Long-term servicing channel is designed for specialist devices that don't run Office apps such as medical equipment or ATMs. This channel receives new features every two or three years.

How to set up and configure a Microsoft 365 E5 developer sandbox subscription?

1. On your Microsoft 365 E5 developer profile page, choose Set up E5 subscription. 2. Choose whether you want an instant sandbox or a configurable sandbox, select next then follow the steps. - The instant sandbox comes pre-provisioned with Microsoft Teams, SharePoint, Outlook, and Office. You get pre-installed data and can't customize your domain name. -The configurable sandbox is an empty sandbox that you must populate with sample data. This sandbox can take up to two days to provision. You can customize your domain name. 3. After the subscription is created, your subscription domain name and expiration date appear on your profile page. 4. On your profile page, choose Go to subscription and sign in with your user ID (for example, [email protected]) and the password that you specified for your developer subscription. 5. Use the app launcher to go to the Microsoft 365 admin center. 6. the admin center home page, choose Go to guided setup. It will take you to the Microsoft 365 E5 Developer Setup page.

Teams and Channels

1. Teams are a collection of people, content, and tools surrounding different projects and outcomes within an organization. It's designed to bring together a group of people who work closely to get things done. Teams can be created to be private to only invited users. Teams can also be public and open to anyone within the organization. A team has a limit of up to 10,000 simultaneous members. 2. Channels are dedicated sections within a team to keep conversations organized by specific topics, projects, disciplines, or whatever works for your team. It's a place where users can discuss and get hands-on with work. Channels facilitate features like tabs and make it possible for users to access and work on the same content. For instance, users in a team could have a channel with a tab for a specific report that they're all contributing to. Files that you share in a channel (on the Files tab) are stored in SharePoint. -Standard channels can be open to all team members. -Private channels are for selected team members. -Shared channels can select people both inside and outside the team.

Infrastructure as a Service (IaaS):

Requires the most management by the cloud customer. With IaaS, you're using the cloud provider's computing infrastructure. The cloud customer isn't responsible for the physical components, such as computers, the network, or the physical security of the datacenter. However, the cloud customer still has responsibility for software components such as operating systems, network controls, applications, and protecting data.

Microsoft Planner

-Add structure to task-based teamwork and organize the activities in your project by creating a plan. -Assign and manage tasks on a Kanban board using task cards and add those tasks to buckets. -Task cards populate with various information, such as due dates, status, priority, checklists, labels, and file attachments. -Receive notifications to stay on top of deadlines. -Monitor your team's progress with colorful visual cues and built-in status reporting. -Utilize the visuals such as the task board, charts page, and a schedule view to summarize the status of your entire plan and individual tasks. -Integrate with Teams by adding a "Tasks by Planner" tab, use @mentions in Word, Excel, and PowerPoint to assign tasks, and add your plans to your calendar in Outlook.

Four Pillars of an Identity infrastructure:

-Administration. Administration is about the creation and management/governance of identities for users, devices, and services. As an administrator, you manage how and under what circumstances the characteristics of identities can change (be created, updated, deleted). -Authentication. The authentication pillar tells the story of how much an IT system needs to know about an identity to have sufficient proof that they really are who they say they are. It involves the act of challenging a party for legitimate credentials. -Authorization. The authorization pillar is about processing the incoming identity data to determine the level of access an authenticated person or service has within the application or service that it wants to access. -Auditing. The auditing piller is about tracking who does what, when, where, and how. Auditing includes having in depth reporting, alerts, and governance of identities

Three primary update channels for Microsoft 365 Apps:

-Current Channel receives feature updates at least once a month, but there's no set schedule of one the updates are released. This channel also receives security and non-security updates around two or three times a month, including one on the second Tuesday of the month. Microsoft recommends this channel because it provides users with the newest Office features as soon as they're ready. -Monthly Enterprise Channel receives feature updates once a month, on the second Tuesday of the month. This monthly update can include feature, security, and non-security updates. Microsoft recommends this channel if you want to provide your users with new Office features once a month on a predictable release schedule. -Semi-Annual Enterprise Channel receives feature updates every six months, in January and July on the second Tuesday of the month. This update can include feature, security, and non-security updates. Microsoft recommends this channel only for those select devices in your organization where extensive testing is needed before rolling out new Office features.

Microsoft Bookings

-Define appointment types and details, manage staff schedules, set business hours, services, and pricing, and customize how appointments are scheduled through a web-based business-facing page. -Add buffer time between appointments for any required pre or post-appointment activities. -Create a booking page where your customers and clients can schedule and reschedule appointments on their own. -Share the booking page via a direct link, your Facebook page, and link embedding within your website. -Ensure customers receive proper confirmations and reminders with automatic appointment notifications through email and SMS. -Utilize the business-facing mobile app to view your appointments, access customer lists, and contact information, and make manual bookings on the go. -Integrate with Microsoft Teams or Skype for Business to support virtual appointments and Bookings calendar management through the Bookings app in Teams.

Microsoft 365 Defender suite protects:

-Identities with Microsoft Defender for Identity and Azure AD Identity Protection. Microsoft Defender for Identity uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious inside actions directed at your organization. • Endpoints with Microsoft Defender for Endpoint - Microsoft Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response. • Applications with Microsoft Defender for Cloud Apps - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution that brings deep visibility, strong data controls, and enhanced threat protection to your cloud apps. • Email and collaboration with Microsoft Defender for Office 365-Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URL), and collaboration tools

Microsoft Endpoint Manager (MEM)

-Microsoft Intune. Intune is a 100% cloud-based mobile device management (MDM) and mobile application management (MAM) provider for your apps and devices. It lets you control features and settings on Android, Android Enterprise, iOS/iPadOS, macOS, and Windows devices. It integrates with other services, including Azure Active Directory (Azure AD), mobile threat defenders, ADMX templates, Win32 and custom LOB apps, and more. Create and check for compliance, deploy apps, features, and settings to your devices using the cloud. -Configuration Manager. Configuration Manager is an on-premises management solution to manage desktops, servers, and laptops that are on your network or internet-based. You can cloud-enable it to integrate with Intune, Azure AD, Microsoft Defender for Endpoint, and other cloud services. Use Configuration Manager to deploy apps, software updates, operating systems, monitor compliance, act on clients in real time and more. -Co-management. Co-management combines your existing on-premises Configuration Manager investment with the cloud using Intune and other Microsoft 365 cloud services. You choose whether Configuration Manager or Intune is the management authority for the seven different workload groups. As part of Endpoint Manager, co-management uses cloud features, including conditional access. -Desktop Analytics. Desktop Analytics is a cloud-based service that integrates with Configuration Manager. It provides insight and intelligence for you to make more informed decisions about the update readiness of your Windows clients. The service combines data from your organization with data aggregated from millions of devices connected to the Microsoft cloud. It provides information on security updates, apps, and devices in your organization, and identifies compatibility issues with apps and drivers. -Windows Autopilot. Windows Autopilot sets up and pre-configures new devices, getting them ready for use. It's designed to simplify the lifecycle of Windows devices, for both IT and end-users, from initial deployment through end of life. You can use Autopilot to preconfigure devices, and automatically enroll devices in Intune. You can also integrate Autopilot with Configuration Manager and co-management for more complex device configurations (in preview). -Azure AD. Azure AD is used by Endpoint Manager for identity of devices, users, groups, and multi-factor authentication (MFA). Azure AD Premium, which may be an extra cost, has other features to help protect devices, apps, and data, including dynamic groups, auto-enrollment, and conditional access. -Endpoint Manager admin center. This admin center is a one-stop web site to create policies and manage your devices. It plugs-in other key device management services, including groups, security, conditional access, and reporting. This admin center also shows devices managed by Configuration Manager and Intune (in preview).

3 Types of deployment methods for Windows:

-Modern deployment methods embrace both traditional on-premises and cloud services to deliver a streamlined, cost effective deployment experience. These methods are recommended and are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and Microsoft Endpoint Configuration Manager. -Dynamic deployment methods enable you to configure applications and settings for specific use cases without having to deploy a new custom organization image to the device. -Traditional deployment methods use existing tools to deploy operating system images.

Traditional deployment methods:

-New computer, or also called bare metal, is when you deploy a new device or wipe an existing device and deploy with a fresh image. -Computer refresh, or also called wipe-and-load, is when you redeploy a device by saving the user state, wiping the disk, then restoring the user state. -Computer replace is when you replace an existing device with a new one. You replace the device by saving the user state on the old device and then restoring it to the new device.

Manager Insights:

-Nudges -Reflective Insights -Actions Plans

Personal Insights:

-Personal Wellbeing -Stay Connected -Protect Time -Viva Insights in Outlook add-in -Daily Briefing -Effective Meetings

Windows 365 Capabilities:

-Personalized Windows 365 Cloud PCs available across devices. -Stream your apps, data, content, and settings from the Microsoft cloud to any device and pick up where you left off. -Simple to deploy and manage from a single console. -Uses a local profile that is stored directly on the cloud PC. -Easily set up and scale Cloud PCs to fit your needs and securely support changing workforce needs and new business scenarios. -Native integration across Azure Active Directory, Microsoft Defender, Microsoft 365 applications, and Microsoft Endpoint Manager. -Windows 365 is provisioned for you once a license is assigned to you. -Dedicated to a single user.

Layers of Security:

-Physical -Identity and Access -Perimeter -Network -Compute -Application -Data

Extend Teams by using collaborative apps:

-Power BI in Teams can empower your organization to collaborate with data to deliver improved outcomes. -Power Apps can help you build apps to add directly into Teams by creating a tab. -Power Automate can help you automate tasks and processes all within Teams. -Dynamics 365 and Teams integration can provide high-level details of your customers to ensure you have helpful context and can be prepared in customer meetings. -Power Virtual Agents allows you to create chatbots that can be integrated into Teams. -Integrate with third-party partners and services for more capabilities within Teams, like ServiceNow or Salesforce. Integration with third-parties can be done through incoming and outgoing webhooks and connectors.

Microsoft Project

-Quickly kick off a project and assign tasks and schedules keeping team members and managers on the same page. -Automatically update the timeline through the powerful scheduling engine helping you reduce your time and effort. -Utilize the easy-to-use views such as grid views, -Kanban-style task boards, and timeline Gantt charts. -Integrate with Teams to enrich collaboration across the project. -Create stunning interactive dashboards in Power BI so you can visualize every aspect of the project at a glance. -Extensible with other platform apps and data because Project is built on the Power Platform.

How do Microsoft business email and calendaring work together?

-Stay connected. Microsoft 365 syncs emails, calendars, and contact information across your devices, keeping you up to date wherever you are. All you need is an internet connection for a hassle-free way of keeping in touch. If you lose your phone, you can delete data remotely so that your personal information stays secure. -Customize your email. Create a custom format, include images, and depending on where you live, use your own domain name. You can keep the emails you need, including images. -Collaborate. Create a public folder for shared access to provide an easy and effective way to collect, organize, and share information with other people in your workgroup or organization. Create a shared mailbox so users can access and send email messages and share a common calendar. Create distribution groups, which are a collection of two or more recipients that appears in the shared address book. When an email is sent to a distribution group, it's received by all members in the group. -Share your calendar. You may need to coordinate schedules with people in different organizations or with friends and family members so that you can work together on projects or plan social events. With Microsoft 365 and Office 365, administrators can set up different levels of calendar access in Exchange Online to allow businesses to collaborate with other businesses and to let users share their schedules with others. -Stay informed. Get rich insights about the people you're working with, inside and outside your organization, by connecting your LinkedIn and Microsoft 365 profiles. -Simplified admin. Set up new users, restore deleted accounts, and create custom scripts, and more. -Stay secure. Exchange has built-in anti-spam and anti-malware protection and customizable anti-spam and anti-malware policies. Defender for Office 365 can be enabled for added protection against advanced threats, like phishing, business email compromise, and malware attacks. Defender also provides spoof protection, and mailbox intelligence for all recipients.

Dynamic deployment methods:

-Subscription activation uses a subscription to switch from one edition of Windows to another when a licensed user signs into a device. For example, you can switch from Windows 10 Pro to Windows 10 Enterprise. -Azure Active Directory (Azure AD) joined with automatic mobile device management (MDM) enrollment automatically joins the device to Azure AD and is configured by MDM. The organization member just needs to provide their work or school user ID and password. -Provisioning package configuration uses the Windows Imaging and Configuration Designer (ICD) tool. This tool is used to create provisioning packages that contain all the configuration, settings, and apps that can be applied to devices.

SharePoint 3 types of sites:

-Team sites are collaboration sites to connect you and your team to share content and resources. Team sites provide file storage and sharing, co-authoring of documents, managing lists of information, workflow integration with Power Automate and file libraries. It can also be integrated with Microsoft Teams. -Communication sites are designed to broadcast information to other teams or to an entire organization. These sites are perfect for sharing company news, announcements, events, internal cross-company campaigns, status updates, and product launches. Use communication sites to engage and inform broad audiences. -Hub sites are used to organize families of team sites and communication sites together. It provides a connection point and central portal for these groups of related team or communication sites. Hub sites make it easier for users to discover related content such as news and other site activities.

With Windows client, there are two release types:

1. Feature updates add new functionality and are released twice a year. Because these updates are more frequent, they're smaller. There are many benefits: -There's less disruption and effort to apply new features. -Users are more productive with earlier access to new Windows features. -Users take less time to adapt to smaller changes. -The workload and cost impact of updating Windows is reduced. 2. Quality updates provide security and reliability fixes. These updates are issued once a month as non-security releases or combined security + non-security releases. Non-security releases allow IT admins to do an early validation of content. In addition, a cumulative update is released which includes all previous updates. There are a couple of benefits: -Identified security issues are fixed and deployed quickly, helping to keep devices secure. -Everyone receives security fixes regularly, keeping all devices aligned.

Exercise 1: Explore the Microsoft 365 admin center:

1. In the Microsoft 365 admin center, in the navigation pane, expand Users, and then select Active users. View the available user accounts. 2. Select the top user in the list by clicking their name. A blade opens that displays more details for the user account. Close the blade by selecting X in the upper right corner of the blade. 3. Expand Teams & groups, and then select Active teams & groups. View the active teams and groups. If you don't already have groups add one by selecting Add a group and follow the steps. 4.Select the top group in the list by clicking their name. A blade opens that displays more details for the group. Close the blade by selecting X in the upper right corner of the blade. 5. Expand Billing, and then select Licenses. At least one set of licenses should display. Select the license to view more details like the list of users who have this license assigned.

Exercise 3: Explore the Microsoft Teams admin center:

1. In the Microsoft 365 admin center, under Admin centers select the Teams admin center. Notice that a new tab opens. 2. In the Teams admin center, the dashboard shows cards for organization information, deployment status, recent activity, user searches, helpful links, and more. 3. Use the navigation pane on the left to manage settings for Teams, Users, Meetings, Locations, and more. 4. Admins can configure policies for Teams, including Meeting policies, Messaging policies, Update policies, and create Policy packages, and more. -Policies are used across the Microsoft Teams service to ensure the experience end-users receive conforms to the needs of the organization. -A policy package is a collection of predefined policies and settings. -Meeting policies control the features that are available to participants in meetings. -Messaging policies control which chat and channel messaging features are available to users. 5. Under Users, administrators can configure settings for Guest access and External access. -External access, formerly known as federation, lets Teams users communicate with users who are outside of your organization. -Guest access lets individuals outside your organization access teams and channels.

What is Viva Insights?:

A tool that provides data-driven, privacy-protected insights, and recommendations to improve productivity and wellbeing.

What are Servicing Channels?:

First way to separate users into deployment groups for feature and quality updates. There are three servicing channels. Each channel each provides different levels of flexibility for when these updates are delivered to client computers.

Exchange Online:

Give users the ability to communicate in email, access their calendar and store contacts, all in one place.

On-premises datacenters:

You have responsibility for everything from physical security to encrypting sensitive data.


Related study sets

BIO - Mindtap Ch 20, Chapter 18.1, Chapter 19, Chapter 16, Chapter 15, Chapter 14, Chapter 13, Chapter 12, Chapter 11, Chapter 10, Chapter 9, Chapter 8, Chapter 7, Chapter 5, Chapter 4, Chapter 3, Chapter 2, Chapter 1, Chapter 6

View Set

Exxm 2 Chapter 18 Fundamentals TxstBank

View Set

Alterations in Bowel Elimination

View Set

02.28.01 ( Relative Pronouns) Translate German to English

View Set

MKT 701 LSUS Exam 1 Practice Questions

View Set

Module 4: Tools of Discovery and Older Brain Structures

View Set