Book Image

Mastering Office 365 Administration

By : Thomas Carpe, Nikkia Carter, Alara Rogers
Book Image

Mastering Office 365 Administration

By: Thomas Carpe, Nikkia Carter, Alara Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (20 chapters)
Title Page
Packt Upsell
Contributors
Preface
10
Administering Yammer
Index

Summary


In this chapter, we reviewed all the varying capabilities of the Security & Compliance admin center (https://protection.office.com). We went over permissions, and how to set up the Security & Compliance center so your security team can get the best use from it by using Service assurance tools. We walked through Alerts, including what's provided out of the box, adding new ones, and how to manage them. We looked at labels and other tools for document classification, and we discussed how these inturn feed into and empower data leak prevention policies. We explored research tools such a Content search, Audit logs, and the new-and-improved eDiscovery center. We detailed some real-life use cases where these tools can be useful in day-to-day situations that come up in IT. Finally, we looked at reporting capabilities, including the SecurityScore card. With this information in hand, you should now have a well-rounded understanding of what's available and any additional work that may...