Book Image

Mastering Office 365 Administration

By : Thomas Carpe, Nikkia Carter, Alara Rogers
Book Image

Mastering Office 365 Administration

By: Thomas Carpe, Nikkia Carter, Alara Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (20 chapters)
Title Page
Packt Upsell
Contributors
Preface
10
Administering Yammer
Index

Advanced threats


Many of you might not have this section available to you at all. Advanced Threat Protection is only offered by Microsoft on tenants where at least one of the accounts has an enterprise-grade license, so if all you have are Business Premium and front-line accounts, you won't see this section. An E5 license will come with Advanced Threat Protection; the service can be added ad hoc to an E1 or E3 plan for an additional fee, but can't be added to plans with Business in the name or front-line workers' plans.

Some of the services offered here apply to your entire organization; protections placed on SharePoint, OneDrive, and Teams will work for any member of your organization, whether they personally have ATP or not. However, email account protections apply only if the user account has ATP activated.

Reports for Advanced Threat Protection appear in the Security & Compliance center, so we'll refer to the Chapter 8, Understanding Security and Compliance for a discussion of those...