Book Image

Mastering Office 365 Administration

By : Thomas Carpe, Nikkia Carter, Alara Rogers
Book Image

Mastering Office 365 Administration

By: Thomas Carpe, Nikkia Carter, Alara Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (20 chapters)
Title Page
Packt Upsell
Contributors
Preface
10
Administering Yammer
Index

Search & investigation


This section is all about finding certain types of content or behaviors. It can be useful for monitoring ongoing policy compliance and responding to incidents as needed. Subsections include Content search, Audit log search, eDiscovery (which is basically Content search by another name), and Productivity app discovery.

Content search

Content search replaces much of the functionality that was formerly only available through the eDiscovery center in SharePoint Online. With it, you can specify queries for specific keywords and other criteria, to help you identify potentially sensitive or inappropriate disclosure of information.

Over the years, we've used Content search and eDiscovery tools to help security officers (sometimes named FSOs) and their organizations with a variety of security-related matters. For example, some businesses subject to ITAR regulations (including foreign companies doing business with the US federal government) may be required to track emails between...