Book Image

Mastering Office 365 Administration

By : Thomas Carpe, Nikkia Carter, Alara Rogers
Book Image

Mastering Office 365 Administration

By: Thomas Carpe, Nikkia Carter, Alara Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (20 chapters)
Title Page
Packt Upsell
Contributors
Preface
10
Administering Yammer
Index

Threat management


In this section, we will cover threat management Dashboard, Review, and Policy.

Dashboard

Threat management | Dashboardshows trends in current cybersecurity threats, so you can educate yourself about the risks, who's vulnerable, and what actions you should take to protect yourself. This screen presents you with at a glance information regarding any recently identified malware or phishing attacks, security trends, targeted users in your organization, user email behaviors, and self-reported user incidents. (Because with E5 plans we didn't have any malware incidents, our screenshot was pretty boring.)

Note

Teach your users how to self-report when they receive a suspected phishing scam or malware. It's a lot more effective than relying on the system of using an Is this a real email? reply.

Review

This section is largely a rehash of the same tiles we saw in the dashboard, including links to incident reports—assuming you have had any.

Each of the tiles here are interesting in that there...