Book Image

Mastering Office 365 Administration

By : Thomas Carpe, Nikkia Carter, Alara Rogers
Book Image

Mastering Office 365 Administration

By: Thomas Carpe, Nikkia Carter, Alara Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (20 chapters)
Title Page
Packt Upsell
Contributors
Preface
10
Administering Yammer
Index

Data loss prevention


Data loss prevention, sometimes also known as data leak prevention, is an industry term for technologies and strategies designed to protect proprietary or sensitive information from a variety of threats both inside and outside your organization. This not only includes hackers, but also employees both past and present—whether their intentions are well-meaning or nefarious.

DLP policy

Policies are the core area of the DLP subsection, though others will appear if you have EMS plans. As such, there's a little dashboard here that will show you some reports about policies and policy matches:

DLP policy page

Because we've only just created our first label in the previous topic, we don't yet have any DLP matches. However, we'd like to match for internal documents under certain circumstances and take appropriate action.

For example, we want to identify when internally labeled documents are shared externally, or when they are sent in email to someone outside the organization. In these...