MS-900: Microsoft 365 Fundamentals | Daljeet Randhawa | Skillshare

Playback Speed

  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

89 Lessons (4h 14m)

    • 2. Brief Overview

    • 3. Why this course

    • 4. Course Curriculum

    • 5. Prerequisites

    • 6. Module 1 - Cloud Concepts

    • 7. LESSON 1 - OVERVIEW

    • 8. IT Costs

    • 9. What is the cloud

    • 10. Traditional IT and Cloud Computing

    • 11. Hybrid Cloud

    • 12. Types of Cloud Services

    • 13. Cloud Computing Costs

    • 14. Lab Exercises

    • 15. OFFICE 365 WALKTHRU

    • 16. Practical Questions

    • 17. Practical Questions

    • 18. LESSON 2 - Microsoft 365 Services

    • 19. Office 365 and Microsoft 365 Comparison

    • 20. What is Microsoft 365

    • 21. Benefits of Microsoft 365

    • 22. Microsoft 365 vs Office365

    • 23. LAB DEMO - How to sign up for Office365

    • 24. LESSON 3 - Migrating to the cloud

    • 25. What cloud model should businesses choose

    • 26. Cloud only Model

    • 27. Hybrid Cloud Model

    • 28. Migration vs Co Existence

    • 29. Migration vs Co Existence Pt2

    • 30. Migration Considerations

    • 31. Migrating to Windows 10

    • 32. MODULE 1 REVIEW



    • 35. WINDOWS 10 - Intelligent Security

    • 36. WINDOWS 10 Flexible Management

    • 37. WINDOWS 10 Simplified Updates

    • 38. WINDOWS 10 Work Smarter


    • 40. EXCHANGE ONLINE cont'd

    • 41. EXCHANGE ONLINE cont'd

    • 42. Microsoft Teams

    • 43. Microsoft Intune

    • 44. Additional Microsoft Services

    • 45. Microsoft Planner

    • 46. StaffHub

    • 47. Office 365 Pro Plus

    • 48. Exchange Online vs On Premise

    • 49. Sharepoint Online vs On Premise


    • 51. Windows Analytics

    • 52. Readiness Toolkit for Office

    • 53. Desktop App Assure

    • 54. Assess and Optimize Your Network

    • 55. Windows 10 and Office Deployment

    • 56. Windows 10 Deployment

    • 57. Windows AutoPilot

    • 58. Windows 10 In Place Upgrade

    • 59. Windows 10 Subscription Activation

    • 60. Office 365 Pro Plus Demployment

    • 61. Office Deployment Tool

    • 62. Microsoft InTune

    • 63. DEMO Office 365 Deployment

    • 64. MODULE 3 - INTRO




    • 68. TIMELINE

    • 69. LESSON 1

    • 70. LESSON 2



    • 73. Why business environments need to protect devices and data

    • 74. How Microsoft 365 helps protect data in an organization

    • 75. WIP

    • 76. AIP

    • 77. Service Trust Portal and Compliance Manager

    • 78. DEMO Compliance Manager

    • 79. COMPLIANCE

    • 80. Retention and Sensitivity Labels

    • 81. Scenario Example

    • 82. Module 3 REVIEW

    • 83. Exam Questions

    • 84. MODULE 4 Pricing and Support

    • 85. Live Demo Licensing

    • 86. Manage Subscriptions

    • 87. Microsoft Service Health

    • 88. Practice Questions

    • 89. Conclusion

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels
  • Beg/Int level
  • Int/Adv level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.





About This Class

This course is intended to be a foundational basic entry into Microsoft's M365 offering. It covers the basics concerning the products around Microsoft 365 Suite. Essentially this is for those looking to get started in IT, and specifically those looking to get started working with and administering Microsoft 365 environments and deployments. This is the entry level knowledge required to pursue a role in M365 administration and prepares viewers for any of the four branches of M365 administration (Modern Desktop Admin, Teamwork Admin, Messaging Admin, and Security Admin).

Meet Your Teacher

Teacher Profile Image

Daljeet Randhawa

IT Pro with over 16 years of experience


Hello, I'm Daljeet.



My Qualifications:

Over 17 years of education and work experience in the IT industry

My Certifications:

Microsoft 365: Enterprise Administrator Microsoft 365: Security Administrator MCITP: Microsoft Certified IT Professional: Server 2008 R2 MCSE: Microsoft Certified Solutions Expert: Server 2016 Citrix Certified Administrator Network+, A+ ITILv3, HDI Computer Science Diploma (2003) See full profile

Class Ratings

Expectations Met?
  • Exceeded!
  • Yes
  • Somewhat
  • Not really
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.


1. INTRODUCTION: Hi, my name is del G Mandela. I'm part of the Delphi IT Academy and I'm going to be your instructor for the MS 900 Microsoft D6, D5 Fundamentals course. I'm a cloud architect, certified Microsoft professional with over 17 years of IT industry experience and have taught thousands of students. In this course. I'm gonna teach you cloud fundamental concepts with live demonstrations in the office you 65 in Azure portals. So you understand the theory behind the technology, along with plenty of exercises and practice exam questions that help you master what you learn. In a fun and engaging environment. You're going to learn and master the fundamentals of Microsoft cloud services. And only four hours. This course is made up of four modules. After starting with the basics of cloud computing, we will dive straight into the Microsoft D6, D5 services. After which, we will advance to the security and compliance module and finally finish off with the pricing and support module. Each module will be discussed in detail so you understand what Microsoft would like you to know in order to better understand its services and provide you with the prime knowledge to pass the analysts 900 exam. Aside from the hours of video content, The course is packed with bonuses, such as actual exam questions that will help you pass the exam. Live demos and lab exercises to a private Facebook group, and unlimited future access to update it course content. And finally, you also receive a certificate of completion from the Delphi IT Academy. We believe in the course so much that we provided 30-day money-back guarantee so you can enroll in the course stress-free. So are you ready? Take your career to the next step. What do you have to lose? Enroll right now and take the first step in becoming a Microsoft Cloud technology specialist. 2. Brief Overview: Welcome and thank you for purchasing the MS. 900 Microsoft D6, D5 Fundamentals course. My name is Doug Rand HAVA, and I'm part of the Delphi IT Academy. As you know. I promised to keep the course and the learning experience engaging, insightful, and as much as fine as possible. Let's take a moment to look at what you can expect from this course. Did you know that cloud computing is being used by just about every person or company on the Internet today in some shape or form. Most people use a cloud and never even think about it. So in this course you're going to learn how the Microsoft Cloud technology works. How utilizing it to its potential can help you and help your company in a variety of ways. You're gonna see these Microsoft D6, D5 services inaction. And next we'll talk a little bit about myself, my experience, why my, I am qualified to teach this course, followed by the course curriculum in more detail. Although this is an introductory course, it can get very detailed into different technologies. So don't worry, we'll take it step-by-step. And you're welcome to ask any questions and for which information now I'll share on how to get in touch with me or the group. But it's helpful if you come from somewhat of a technical background after you complete this course. And if you pass the exam, you can move into several other areas of study set as cloud security or cloud architecture. And as you know, there's no other prerequisites that are required to do the MS 900 exam. 3. Why this course: Firstly, I want to congratulate you for enrolling in this course. Aside from The reason you may have already enrolled in the course of outlines some of the core benefits of this course as follows. So by completing the course, you'll open doors to a world of opportunities with companies already in the cloud or moving towards the cloud as many companies are. And the Microsoft D6, D5 service model, you'll gain invaluable knowledge and lay the foundation to learn about becoming security or cloud administrator if you do want to pursue education and train in this field. And you can always go to an architect or enterprise level is nothing stopping you from moving up the chain. Preparing yourself for the MS 900 exam, this course will provide you the knowledge that you need to be able to pass that cores are that exam by going through the course material, including the videos, labs, and actual practical exam questions. And if you're not technical at all and you just want to get some basic knowledge about cloud computing in the Microsoft 365 services. This course is still for you. It'll help you understand cloud technology and the role Microsoft D6, D5 services play in it. So let me tell you a bit a little bit about myself and my qualifications. 4. Course Curriculum: Let's talk about the course curriculum. This course consists of four modules. Each module is broken down into several lessons. And at the beginning of each module, I'll provide a brief summary of each of the lessons and what you can expect to learn. Once you complete each module. There may be some practice exam questions where we see answers while we've made this made available as required. So we'll go to a module and I'll show you the questions that you'll, you can expect to see on the actual exam. So these are actual exam questions that we can practice from. And I'll give you a moment to guess your answer. And then we'll go, we'll look at the actual answer itself. And let's go to the Microsoft page for the course, the course outline. So this is exactly from the Microsoft site. And as you can see, we're going to go to the skills outline. And our course is structured based on what Microsoft wants you to learn from this course. So understanding cloud concepts, going to be the first module. And this discusses the cloud concept that fundamental concepts that around cloud technology. After that, we're gonna talk about Microsoft D6, D5, core services, and some of the services that, that are listed here we're gonna talk about in more detail. And third module is going to be about security compliance, privacy, and trust. So we're gonna talk about that. Understanding security and compliance, identity protection and management, unified endpoint protection and the Service Trust Portal and the compliance manager. And then finally, we'll finish off with the Microsoft D6, D5 pricing and support. This is a small module, so not much to discuss, but it's still an important one to understand some of the licensing and SLA agreements and what you can expect from support as well. And then finally, we'll do a module or a course review. And after that, I'll provide some of the more practice exam questions that you can expect to see on the exam itself. 5. Prerequisites: One of the most common questions anytime you go to learn anything new is that what are the prerequisites? What am I getting myself into? What do I need to know before I get started? Some type, some people might be a little nervous. They don't want to get in over their head and that's okay in this course, I'll tell you honestly, like I told you at the start, this is a fundamentals course. It's not serious. The whole point of this is fundamental. It's gonna be fun. You know, it's not going to be too, too intense, too detailed. We are going to understand some of the fundamental technologies. And they might be a little bit complicated, but to be honest, they're going to be at a very high level. We're now gonna go into too much detail. So going back to the topic, there's no prerequisites. Use need to be interested in cloud computing and you start to have a passion for it. And you know, you can stem from this into other courses as well. So if you have some knowledge about computers and networks and storage, that's great. This course is going to be really, really good for you, really easy for you. And if you'd have no knowledge about the stuff, that's still okay. It's a 10-inch industrial introductory course. And you're going to learn a lot and you're still going to have fun. And you know, you're going to use this fundamental knowledge to help you move into other areas of cloud computing. Just on that topic of moving into other areas. Let's talk a little bit about the learning paths. So as you can see, these are the different Microsoft 365 certifications. So from fundamentals associated to expert, you can always take this fundamental knowledge and apply it to other Microsoft. So certifications, like Azure certifications, it'll help you in that direction. Or if you're just here for general knowledge, you can use this knowledge to take your career to other cloud service providers like AWS or Google Cloud. The fundamental knowledge of cloud computing is still the same. So the information you'll learn here, you can always take this in advance and grow from it. 6. Module 1 - Cloud Concepts: Did you know that cloud computing is being used just about every person or company on the Internet today. In some shape or form. Most people use a cloud and never even think about it. In this module, you're going to learn about cloud fundamentals. And by knowing the basics of cloud competing, I'll lead you down the pathway to learn about the different microscopy 65 cloud services. So essentially less than one, we're going to talk about the Cloud, what it is computing cause different models. Less than two is going to be, move out a little bit more specifically to Microsoft through 65 services, Azure services on the high level. And then we'll then move on to lesson three on migrating to the cloud and how businesses can choose the best cloud model and the different types of cloud models out there. How Infrastructure as a Service works, for example, networking, security storage, how it all works together. Platform as a service, what it is, how it works, and then compared to infrastructure as a service. And then finally, how Software as a Service makes your life so much easier. By the end of the module, you'll truly understand the different types of cloud computing concepts. You'll see them in action through the live demos. And you'll feel comfortable with cloud computing in general. 7. LESSON 1 - OVERVIEW: So what can you expect to learn from the lesson one of module one? What is the cloud? What is the difference between traditional IT, which is on-premise hardware and software, and infrastructure versus cloud computing, will talk about the different cloud computing costs. How businesses can save money by going to switching to the Cloud. Business benefits of using cloud computing. And finally, demos and labs in questions throughout this lesson. The cloud enables users to access the same files and applications from any device. Because the computing and storage I, she takes place on servers in a data center. Microsoft datacenters in specific Instead of locally on users devices. This is why as user, for example, can log in to their Instagram account or their Facebook account. And even if their phone breaks, the can still find the old account and place that resides in that datacenter on that hard drive. Would their photos, videos, conversation, history all intact? It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive. 8. IT Costs: For businesses, switching to cloud computing removes some of the IT costs and overhead. For instance, they no longer need to update and maintain their own servers as a cloud vendor, they using will do that for them. This especially makes an impact for small businesses that may not have been able to afford their own internal infrastructure or internal staffing. But now can outsource the infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate it in internationally. Because employees and customers can access their files and applications from any location. So it makes the employees mobile. It makes them and their employee workforce scalable and provides mobility for their employees. So a lot of benefits in that sense. For example, let's take health care companies for, as an example. They're using the cloud to develop more personalized treatments for patients. Financial companies are using the cloud to power real-time fraud detection and prevention. Video game makers are using the cloud to deliver online games to millions of players around the world. With cloud competing, your businesses can become more agile like I, like, I like we discussed. You can reduce costs, scale instantly deployed globally in minutes. How computing gives you instant access to a broad range of technologies. You can innovate faster, build nearly anything you can imagine from infrastructure services such as compute, storage and databases. 9. What is the cloud: So let's recap. What is cloud computing? Cloud computing is a delivery of computing services, servers, stories, databases, networking software, all pack is into one and storage and that stays in your datacenter. Cloud computing enables you to basically rent these services from a cloud service provider, also known as a CSP. So you're essentially renting the services are boring these services from the CSP for a certain amount. When you choose to use the Cloud, you shift these responsibilities to the cloud service provider so you can focus on other things such as your business class. Sorry, Computing Services enables you to run your own web apps, databases, virtual machines, and other type of competing in the cloud instead on local hardware in your office that, you know you have to maintain, you have to spend money for staffing, for patching, for monitoring. So a lot goes into it. Communication services provides communicate and between users. Examples include Microsoft Exchange Online and Microsoft teams where you can talk to anyone from anywhere in the world that has a data connection. Exchange online, email, Calendar, Contacts sharing, instant messaging, audio, video calls, screen sharing. These are all the different type of services that are available in the communication services. Field. Productivity services allows users to work and collaborate. And example is offered through 65, which provides a collaboration platform for the entire organization. Search services. It provides you with search functionality and custom application. It can provide a search engine Datastore is that can be accessed via an API. For example. An example could be Azure Search storage services. So by storing data in the cloud, any user or device can access it from anywhere in the world. 10. Traditional IT and Cloud Computing: Let's talk a bit about the differences between traditional IT and cloud computing. A private cloud hosting solution, also known as an internal or enterprise cloud, resides on the company's intranet or hosted data center where all your data's protected behind the firewall. This can be a great option for accompanies who have inexpensive datacenter because they can use their current infrastructure. How the main drawback people see with the private cloud is that management, maintenance and updating of data center is a responsibility of the company like we discussed earlier. Over time, it's expected that your servers will need to be replaced, which can get very expensive. On the other hand, private clouds offering an increased level of security that, that show very few share. So a good way to look at it is that your on-premise environment is also known as a private cloud. The private cloud also includes more flexibility, improved security, high scalability like we discussed. And let's also discuss some of the reasons teams move away. Companies or small businesses move away from the private cloud. You have to purchase the hardware. That's inexpensive cost for startups. So you know, for small businesses, maintenance is inexpensive cost staffing, application licensing. So the private cloud really requires IT skills and expertise that can be really hard to find in today's day and age. On the other hand, with the public cloud, you really have no local hardware to manage or keep up to date. Everything runs on your cloud service providers hardware. This means that the IT infrastructure, the hardware, the servers, software. It's all located in somewhere else other than New York data center or your office or network closet or anywhere that you know, you could, you could store your equipment. There are two variants of a public cloud as well. There's a shared public cloud, which is where many companies share common resources, such as email. So within the same cloud service providers environment. So each company is only aware of its own cloud service accounts, also known as a tenant. So the CSP, who manages this multi-tenant environment is aware of the different accounts running within the same cloud. So they have essentially look at it this way. If you have one datacenter and you have one rack, and you have two companies sitting on the same rack. The two companies will never know that their data sitting in the same rack. But the CSP, the cloud service provider, knows this and he knows that they're two separate entities in two separate tenants. So this is what's called a shared public cloud. A dedicated public cloud, as typically for enterprise organizations, will require a dedicated physical infrastructure that's reserved only for their use, such as an on-demand sandbox environment, for example. So the cost is going to be high for the dedicated public cloud. But the, some of the advantages could be lower and lower costs. So you still don't need to purchase hardware software. It's going to be higher than the shared Cloud obviously, but that's what I meant, but it's going to be lower costs in a sense that you're not going to be purchasing your own hardware and having to maintain it. And there's really no limit to scalability. So the on-demand services or resources are available to beat to meet your business needs. There's high reliability. So there's a vast network of servers that ensure against the failures. 11. Hybrid Cloud: A hybrid cloud combines public and private clouds, allowing you to run your applications in the most appropriate location. So for example, you could host a website in the public cloud, which is, which is a datacenter that Microsoft has. Their service is hosted on. Link it to a highly secure database hosted in your private cloud or on-premise data center or network closet or office. And the hybrid cloud deployment that will provide failover capabilities between local resources that you manage and resources in other regions. So this is helpful when you have some things that can't be put on the cloud. Organizations implement the hybrid cloud deployments for a variety of reasons. The most common include protecting, protecting the sensitive data. So if you have to be in compliance for certain compliances and you know, you wouldn't need to protect that sensitive data like medical records at you. You'd want to use this, this option, extending capabilities of on-premise systems. So if you have applications that run on old hardware, recently you worked at a place where there's still using Windows Server 2003. And they can get rid of it because the application that's core to their business runs on that server. So in this case, you keep the old system running, running locally. However, were whatever's feasible, afraid for the company, and connect it to the public cloud for authorization or storage. Another example is reducing data protection costs. So you want to implement public-key infrastructure or information rights management for local data protection. But doing so would be expensive. Instead, you can enable these features from the cloud. And they'll protect both through cloud and your on-premise documents and data. Some of the advantages of hybrid cloud, our control. So organizations still maintains a private infrastructure. So your data is still in the office. And you have control over that data. You can take advantage vantage of additional resources in the public cloud when you need them. And it's cost-effective. So with the ability to scale to the public cloud, you know, you pay for the extra computing power only when needed. But this would be a good option for companies that are unsure if certain applications will run in the cloud or if they need to be compliant and keep that data in house in a hybrid cloud. And in the future, if you ever really want to scale or if you want to move fully to the cloud, you have that option. 12. Types of Cloud Services: Okay, so this one we're gonna talk about the different types of cloud services. Cloud computing has three major categories. It's important to understand them because they're referencing conversations, documentation, training. So the first one we're gonna talk about is infrastructure as a service. It's, it aims to provide you with complete control over the hardware that runs your applications. But instead of having to purchase hardware such as servers and routers and storage devices. With IES, you rent this service given the hardware costs and it wouldn't be recommended for organizations looking to minimize server and Application Maintenance Costs. Platform as a Service provides in like an environment for buying, building, testing software applications. So it wouldn't be recommended, as well as a cloud model for organizations that are looking to deploy services such as exchange online. That's already fully developed. The really the goal of pass is to help you create an application as quickly as possible without having to worry about managing the underlying infrastructure. For example, when deploying a web application using pass, you'll have to install an operating system, web server or human system updates. So that's past. Software as a Service is centrally hosted and managed for the end customer. It's usually based on an architecture where one version of the application is used for all customers and runs on demand through either Remote Desktop service or web browser. This software is typically license through monthly or annual subscription and does not require deployment of unwinding maintenance. So for example, Microsoft D6, D5, OneDrive, OneDrive for Business, Microsoft Outlook on the web Exchange Online. These are all software as a service subscription. And I'll Frank's Exchange Online is also a SaaS, even when integrated with an on-premise Exchange server in a hybrid cloud model. So think about these service categories as layers. One way to really understand these categories is layers on top of each other. For example, pass adds a layer on top of IRS by providing a level of abstraction. The abstraction and has the benefit of hiding the details that you might not care about. So you can get to the coding. For example. However, one cost of that is that you have less control over the underlying hardware. We'll take this pizza as a service as an example. So as you can see, traditional on-premise environment, they have their own server that having no equipment, everything is in-house and the store. And we'll take this Pizza Survey, put Pete's service as an example. They have their own dining table soda of in fire, it solved. There's part of their asset inventory made at home. Then if we move on to iOS, there's certain things that are in-house and certain things that are outsourced. So pizza dough, tomato sauce toppings and cheese. It's, you know, taken bake. Whereas the dining table and everything else is still in-house. Platform as a service, you have less in-house and more outsourced. So pizza delivery, for example. And then software as a service, you have everything outsourced. That's basically going to the store and buying the pizza and you don't have to worry about anything else or selling the pizza rather. So you don't manage anything. The vendor and manages all the, all these services to provide the actual final product to the customer. So I hope that, that example helps. 13. Cloud Computing Costs: Let's take a look at some of the cloud computing costs. We're gonna differentiate between capital expenditures and operating expenditures. Capital expenditures are the costs associated with buying or upgrading physical hardware such as servers and network equipment. It also includes real estate, such as buildings or data center space, depending on the size of the company. Typically the physical resources are amortize over several years. Instead of deducting the full cost of the equipment in the first year, basically deduct a portion of it each year so that you can kinda see over a period of time what your total capital expenditure for running this IT infrastructure would be. On the other hand, you have operating expenses. These are the cost that the organization incurs while performing normal business operations, includes the electricity consumed, cost of employees, office space, Internet connections. And basically management is responsible for managing the operating expenses without significantly affecting the organization's operations and without investing a lot of money in the capital expenditure sign. So you said that have some of the operating expenses in capital expenditure. But with the Cloud solution or cloud competing clause, you're only going to have these operating expenses. Somewhat the costs associated with an on-premise data centers shift it to the cloud service provider. So instead of thinking about physical hardware data center costs, cloud computing has a different setup costs. So for accounting purposes, is leasing a cloud-based server. So if you lease a server II or use the cloud, the cost is usually based on a per pay use model. This goes with any CSP. The other cost is when you pay, when you use the pay per use model, you have to actively manage your subscriptions. So you must ensure that users do not miss the misuse the cloud. So while making sure provisioned accounts are actually being used and not waste it. So you have to have someone managing that. So there's certain roles and Microsoft services where you have the billing administrator, you have a Service Administrator. So you do have to give that responsibility to certain users. So you have to factor that in as well. And you can always see that yourself. He train yourself to understand what these rules mean and what their responsibilities are for those roles. Cloud competing can bill in many ways on the number of users or CPU usage, storage costs. However, billing categories can also include allocated RAM, IO operations per second storage space. So if you are connecting a datacenter to the cloud, or connecting to clouds together, identify how much data needs to be transferred so that you can determine the amount of bandwidth you'll need. And also don't forget to plan for backup traffic to and from the cloud in a replication between datacenters and or the datacenter and the Cloud for a data recovery purposes. So these are all different in different ideas that you have to keep in mind when considering the costs of an on-premise infrastructure versus a cloud infrastructure. 14. Lab Exercises: So we finally made it to the end of Lesson one. Let's go through the lab exercise, which is the obviously 65 portal walk-through. And also the practice exam questions that you can expect to see on an actual exam. So the couple of these questions are, are taking from the edge of the exam. And just wanted to point out that I'll be sharing the entire package of the exam questions with this course. So you're welcome to go ahead and practice with those questions, either through the slides that we go through or by at the end of the course. So let's walk through the portal access. 15. OFFICE 365 WALKTHRU: So let's start with the main page. This is where you have different tiles that represent areas that are available from the menu options on the left. Now you've got users billing service, health domains, and others. You can edit this by the way, it doesn't have to stay looking like this. And the best way to edit it, you come down here and press Add. You'll get options of adding things to your page. So let's go into here and what I want to see the support stuff. So I'm gonna click on Support. Alright, so that I've added that to it now. Now from here, you can then go round and you can actually manipulate and say, yeah, I want to move this up here. And how about domains? Let's move this a little bit closer in. Once you're done, put everything where you want it to be. You click Save and voila. There's your main homepage with all the tiles arranged just the way you like it. Okay, let's move on now to users. So we've got users here under users, we've got active users. These are people that you've added and given a license to to utilize the services within Office three, within your office 36510. And you can also add non unlicensed users. And when would you do that? Well, best-practice on, on a set-up like this is to have regular users, even for yourself, to interact with the system on a daily basis. You would also then set up a global admin as an unlicensed user so that if there are any difficulties, that's the user account you'll use to go in and manage the system. Contacts. Contacts are people that are going to be external to your Tenet. The nice thing about this, when you add a contact, this contact will show up in your Gauss. So if you're an Outlook and you want to, anyone to send a message to somebody. When you click on the two, it'll bring up your gal. Not only will it include licensed users within your tenant, but it'll also include contacts, which is a great help. Next, you'll have guest users. Those are people that you give permission to access resources on a temporary basis. And then down here you have deleted users. Now, when you remove a user from your tenants, that user's information will stay in there for about 14 to 30 days. When I say stay in there, I mean, their mailbox data will stay. If for some reason you change your mind and you want to bring that user back, you would highlight them, click Restore, and everything would come back within that 14 day period. Okay, let's move on to the next section, groups. Now under Groups, the first subsection here, this is where you're going to be able to create things like distribution list in Office 365 groups. They are a little bit different. Distribution lists are really made for distributing email messages to the entire group. Instead of having to send a message to each individual member, you just send it to the group and Exchange Online will disburse it to all the members of the group. Office 365 groups goes a little bit beyond that, and it's a little bit beyond this particular presentation. But basically it allows you to do a lot more than just distribute e-mail. The other section within here is shared mailboxes. And this is a great feature for small businesses. Because shared mailboxes don't require a license. So you can have several different shared mailboxes representing HR, sales, production, research, and development. And the only thing you would need is a licensed user linked to those shared mailboxes so that user can monitor the mailbox and see the messages that are coming and going within that mailbox. It's a great feature available to small businesses and can make you look like a very large corporate. So a big fish in a big pond, so to speak. Okay, let's next move to resources. Now here you have rooms and equipment sites and public website. We'll start with Rooms and Equipment. Now, rooms and equipment are exactly what it implies. Rooms or equipment that you as a company make available to your employees for them to use. Now, obviously you can't have two people using the same piece of equipment at the same time, are the same room at the same time for different functions or different reasons. So by setting up rooms and equipment accounts, you can actually use Office 365 to manage the schedule for the various rooms and pieces of equipment. People can go in. They can book they can book for a, for a day or a number of days. And then that would block off the availability of that piece of equipment or room to anybody else. You would need someone who obviously would manage that for you. The next thing here is sites. Let's take a look at sites. Now, sites are going to be internal. Intranet web sites, internal to the company. Access to that website would be through a URL, but in order to gain access to that website, you would have to log in to take advantage of the resources. You'll find that these sites will be set up and be utilized with Office 365 groups, team sites that will link the website, which will be a web interface for for that group with Office 365 groups as well as OneDrive file sharing. It's a way of grouping people together. So that because they all have the same department or the same interests within the company. And then finally, we have public websites. Now, Office 365 no longer makes available public websites. You have to do that from outside of the tenant. And microsoft has has a partnership with Go Daddy and with which and basically you would click on these links to go set up a website there. Once you set up your website, you would go back and he was setup in a record that would redirect requests for www dot your vanity to your website. Okay, let's move on to billing. Now under here we have subscriptions. And when we come into description subscriptions, you'll see this one has expired. Now, I'll show you in just a couple of moments what we can do at this point. But this means that I've exceeded my first my 30 days of my free trial. And so it's now expired. Function every dysfunctionality. But if this wasn't expired, you would see some additional things here. We'll take a look at that when we come back. I will extend this and I'll show you how that's done. But you've got the the subscription type event licenses that have been purchased. If you've purchased it, how many had been assigned? You can go ahead and come in here and do assigned to users descriptions, et cetera. There's more things available here if this was not expired, and we'll look at that in just a moment. Now, bills, you can actually see what your monthly bills are and you can choose by month. So when you do this, click down, you can go last month, past three months, passed six months past year. You can specify a date range, but you can actually see your bills and you can download them. So that information is available to you right from within your tenant licenses. It's pretty much the same thing as under subscription is just not as just not as comprehensive. It just shows you what licenses you have in your tenant, how many valid licenses, if there was any that are expired. And how many ever signed purchase services if you wanted to add something to your tenant? Let's say that you wanted to add Office Pro Plus or or a or, or E3, or perhaps any one of these different additional services you would come to the purchase services. Screen to do that. Now one of the things I want to show you here is you can see I've got in trial here for Office 365 business premium. Now when I move my mouse cursor over, look, I have the option to extend trials. So I'm going to click extend trial. And it's gonna say, okay, going to trial, and it'll be extended for 30 days. Only one trial extension is allowed. So extending a trial extension requires that you provide your credit card information. We will not charge your credit card for the trial extension. Learned about why we request your credit card information. So click Next and then you'd have to put your credit card information. Ok. So once you put your credit card information in, it says your trial has been extended by 30 days. Click OK. And we come back up to the admin center. And it looks like this taking us back to home. Okay, here we go. So 30 days left. Okay, so let's go back to subscriptions and let's see what we have. What's changed now, under here. Now you can see it looks very different. Ok. So you've still got licenses, you still got assigned to users. But now you had this little button right here that more actions at a partner of record or cancel trial. So if you wanted to buy now you can just click on buy or you can click on cancel trial. That's what it looks like when it's active. And that's how you can extend your trial yourself as a, as a customer. Okay, next we're gonna go through settings and there's a couple of different menu options here. We'll start with settings, surfaces and add-ins. There is a lot here. These are the different services and add-ins that you can put into your Office 365 tenant, absorbed, multi-factor authentication, directory synchronization. Some of these things are products that would help a small business. Some of them, for example, directory synchronization is something that you would use if you had a, a larger organization on-premise using a XHR Active Directory and you wanted to link it to your Office 365 tenant. This will be a separate video down the road because there is quite a bit here that you can you can add into your Office 365 account. Let's go to security and privacy. Here's where you can set the security options for your tenet. For example, password policy. If you click on edit here, you could actually sit. Passwords never expire, or you can set they expire after so many days. So you can make that 60 days, 90 days. I've got 730 here. We just have a couple of years. So I'll close this. Next is customer lockbox. Not much there. This particular tenant doesn't have that option to it sharing. You can click here and enable your users to invite external guests to share organizational data. Most companies would probably turn that off because you want the IT department to control who can access what internal data resources. Let your people reset their own passwords. If you want to enable this and you click on a X4 admin, This is what it brings up, the Oort cloud interface for your particular tenant. And then you would come down here to self-service password reset, and you would click that to enable it. So let's move on. Organizational profile. This is where you can set the details for your organization, the name, the address, the phone number, technical contact, the preferred language, Release Preferences, managed custom things. If you click on here, you can actually put a custom logo in this bar up here. You can have the logo. Click a URL that would take them to the website or a team site. You can select the background cover. You can customize this entire interface that that your users will see when they log into your particular tenant. And then down here we have partner relationship. If you have purchased your tenant through a Microsoft partner, then that person would show up here. If you decide that you want to add a Microsoft partner to your tenant to manage this side of it for you. You would add them here. Alright, so let's now move to setup. We've got three sub menus here. First one is products. This is basically a list of the different subscriptions you have. The number of licenses in each one, and the available licenses for each one, you can see what the status is, as well as assigned licenses. So when you go here and click on assigned licenses, it will actually take you to where you can assign licenses, which is up here in active users. We go back down to setup and we go back to products. The other link on this page is migrate user mailboxes. So if we click on that, it actually takes you to the Data Migration link here. And from here you can upload PST files. You can migrate from Gmail, you can migrate from Hotmail, Yahoo, other emails sources gives you information and details on how to do each. Migrating from Exchange Online. It gives you details on how to do each of those. So this is where you would go to learn how to take your on-premise data and migrate it up to Office 365. This third one here is domains, and we've already been through this one, m, r, and one of our previous videos. Where you would add a domain, you could make it the default domain, et cetera. So that takes care of setup. Okay, let's move now to reports, okay, and we're gonna start with usage. Now, this particular page will give you usage for your different activities. This one here, you don't see a whole lot going on, but let me show you the usage of a tenet that does have activity. You can see that there's a graph up top that shows the different services and how active they'd been. And then each one of those services are broken down individually. Email activity One, Drive files, SharePoint files. Not a whole lot going on for Skype for Business because I stopped using it a while back with respect to PSTN calling and so forth. The next section is security compliance. And in here you've got different reports that allow you to check the security and compliance of your tenant. Now, if you quit, if we click on spam detection, this is what would come up with an individual report specific to spam detections. Each one of these, each one of these options will give you the same thing, the same looking interface, and it'll break down the specific information that you're looking for. Okay, our final section is going to be health. Here you have two sub-band US service health and message center. Service health is a tile on your main admin page. When you click here, it shows you the status of the different services within your office 365 subscription. If you're experiencing any trouble with one of the services, you're my advice is to come here first, take a look and see if there's an incident or an advisory. When you do that, you click on the Advisory, it gives you the details about that environment advisory. When it started, when an update is when the expected resolution date is. That way, instead of taking time away from your business to call the call support and get on the phone with a constant as Ambassador, you can continue working. And then just come back to your monitor to see what the status is. Once everything's green, if you're still having a problem, by all means, jump right in and go ahead and get and get support. And we talked about how to do that. I'll show you that in just a moment here. And then message center, if you hear about something or read about something new to Office 365 and you want to know, is it available on my particular tenant? You can come here and this will show you what's been added to your tenant and the date that it was added. So that way you can keep up with what's new and in your particular tenant. Now, I want to show you the last thing I'm going to show you is the option to get help from within Office three 65. It anytime you're having a problem, it is so easy. Down here in the lower right you see need help. When you click on that, up comes a dialog box where you can type in your issue. You can go ahead and click on get help em. What will happen is a conscious Ambassador will call you back within ten minutes to work with you on that issue. It's a great feature. It's a great service that Microsoft offers for free with your Office 365. 17. Practical Questions: This question is also a true or false or yes or no question. Microsoft Cloud services offer significant energy savings for Microsoft and his customers, lowers costs, no hardware maintenance near unlimited scalability and high liability are all advantages of a private cloud. Microsoft Cloud services offer security options and have the ability to provision resources quickly. Feel free to pause and we'll look at the answer shortly. So here are the answers. Microsoft Cloud Service is does offer significant energy savings for Microsoft and its customers by not having any on-premise hardware to manage. That takes the significant energy consumption and increases your overall bill for energy consumption for your office or Datacenter. Second question, it lowers, lowers costs, no hardware maintenance, near unlimited scalability and higher liability. Advantages of a private cloud. So the, the key term here is a private club. So these are all benefits, but not of a private cloud, but of a public cloud. So private cloud, as we discussed, is an on-premise IT infrastructure. And the public cloud is one that the cloud service provider provides. So the answer for this as null. And third question mark, SoundCloud services offer security options and have the ability to provision resources quickly. We discussed this as well, where you can scale and you can provision virtual machines, you can provision gateways, you can provision user accounts and groups and mailboxes very quickly. And you just have to allow little bit of time for propagation. But this is also another benefit. So the answer for this is also yes. 18. LESSON 2 - Microsoft 365 Services: Now that you've learned about the fundamental cloud concepts, let's move into discussing some of the Microsoft 365 Cloud services. You may already be using an on-premise aversion of many of these services like Exchange server. So let's take a look at cloud services and see how they differ from the on-premise version that you, you might already be familiar with. So in this module, you'll learn what the core Microsoft D6, D5 services in part, it's due that difference routine. The Microsoft services and their on-premise counterparts, like Exchange Online and Exchange Server and Office 365. We'll learn about the fundamentals of Microsoft Azure, will review the primary products and services included in a Microsoft 365 subscription. And this slideshow display the different subscription types and the solution that may work for different business or IT environments. And finally, we'll look at some alternative cloud solutions, including AWS and Google Cloud. So from this point forward, the core structure is going to be based more on the MS 900. Microsoft do 65 fundamentals learning objectives. So I would urge you to maybe take a look at that PDF file that I showed you earlier. Just so you have an idea of where this core structure is going to be flowing. And then on a side note that the end of the lesson, I'll show you how to get a free office you 65 subscription and access to the office you 65 portal for some practical walkthroughs. 19. Office 365 and Microsoft 365 Comparison: Before we dive into the Microsoft D6, D5 services, I wanted to show you this plan comparison just to give you an idea of the different subscription or licensed models and what services they provide. Feel free to pause this training here and zoom in if you'd like. Just to review these in more detail to kind of understand what services Microsoft offers and what what's actually included in each plan. I wanted to provide this overview to give you an idea of the different plans that they currently have to offer. And as you can see, exchange OneDrive, SharePoint, Microsoft teams are included with the most basic office you 65 business premium versions. 20. What is Microsoft 365: So let's talk about what is Microsoft D6, D5. It's basically a pay-as-you-go service that includes Office you 65, and Windows ten, and additional mobility and security features. What's included really depends on the version and plan you choose. But in short, you'll see the list on the right of what's actually included. And we'll go into some of these in more detail as we, as we move along into the course. And so as you can see, Microsoft D6, D5 is a bit more than only Windows ten and office use IC50 combined. Another advantage is that you can manage all your devices and security settings from the cloud with from the Microsoft 365 Admin Center that we went through in the last demo. 21. Benefits of Microsoft 365: So one of the benefits of Microsoft through 65 by connecting office 365, Windows ten, and Enterprise Mobility and Security into a single subscription model. Microsoft 365 helps drive digital transformation in four key areas, unlocking creativity. So it provides capabilities, AI power tools to unleash organizations creativity. From engaging presentations to 3D models, animated 3D models. You can create new high-quality content that really stands out. So you can really transform your organization and the insights that employees might have. Using this technology, you can stay focused with fewer distractions and easily access to people and information without leaving the flow of your work is built for. Teamwork, enables teamwork and collaboration through the tools that Microsoft offers. Increases service scalability allows you to work together in real time. Microsoft Teams is basically the hub for teamwork. You could chat, hold meetings, live events, share files, have Outlook integration, and it's available on multiple platforms. So iOS, Android, so there's no real limitation to what it brings. With that being said, Microsoft is still improving Microsoft Teams in, in many ways and they continuing to expand on the admin center, we'll discuss briefly. But it's what Microsoft's doing. He's basically it's integrating all those services that it has with Microsoft came. So it's easier for teamwork. It's built for simplicity. Helps you reduce IT. Complexity, increases agility, lowers cost, and by making it easier to adopt for a lot of these businesses. So Microsoft do 65 really enables you to centrally provision and manage all your devices from mobiles to PCs and all across different platforms. So organizations can take advantage of these advances in cloud security, distinct in their security posture, for example. And they can administer apps, services, a same goal, admin Center. And then finally the intelligence security. We briefly discuss it. It's like a holistic security approach across users, devices, apps, and data. Hausa stop attacks and integrated an automated security. Protecting against the credential and device compromise. Conditional access, location-based Security, protecting information basically anywhere lives. So we'll discuss more of this in the, in the security model. But these are just some of the core benefits of Microsoft D6, D5. 22. Microsoft 365 vs Office365: There's still a little bit of confusion over the differences with pin offers the 65 and Microsoft D6, D5. So off it, Office 365 is Microsoft's cloud-based productivity suite, which includes desktop apps that you may already be familiar with, such as Word, Outlook, PowerPoint, and other cloud services like Exchange, Skype and teams. And Microsoft through 65 is basically a bundle of the services plus office through 65, which include Windows ten Enterprise, a complete set of security and compliance features. Provided. This adds services and add ons and Windows as a Service and Enterprise Mobility and Security. And Microsoft, the 65 really addresses the need of many organizations who want to maximize the adoption for their productivity, for Cloud productivity. So essentially, Microsoft through 65's like up a package of services that includes offers 365. We'll discuss more of this in the next few slides. But let's move on to what is Microsoft Azure. So today, plenty of businesses still have real concerns about migrating applications to the cloud. They are fearful about network security, availability and potential downtime that they might suffer. So this is where Microsoft Azure comes in. Azure is basically a solution for going to partially or totally cloud-based architecture. We'll, we'll discuss how Microsoft Azure actually works. But essentially what it is, is, is that a server is a set of services that are available through the portal, portal dot And you can use these set of services to create virtual machines, databases, file storage, backups, and other services for mobile and web apps. So, uh, going through a lot of these services, you'll see, you'll see when we go through it in a practical example, is that anything is really possible. You can create a setup of a Windows or a Linux virtual machine that host whatever software you want to use. You can even host a Windows or Linux desktop in the cloud or are on a virtual machine. And that Kinect where remotely just several ways to. Really, depending on the way that your IT functions, you can use Microsoft Azure for that purpose. What can Microsoft Azure actually do? So, as we discuss, Microsoft maintains a growing directory of Azure services with more being added all the time, such as. So one of the first ones we will discuss is virtual machine. You can create Microsoft or Linux virtual machines in minutes from a selection of templates. You can also. Upload your own custom machine image as well. And these cloud-based VMs will hold your applications or services as if they reside in your own datacenter. There's also offers Azure actually off offers a Managed SQL relational databases. So from one or two are unlimited number. This saves you overhead and expenses on hardware and software and the need for in-house expertise to manage these databases. This is built on the same proven technology as Windows Active Directory. So Azure Active Directory Domain Services is service for Azure that lets you remotely manage Group Policy, authentication, everything else. This makes moving in existing security structure partially or totally to the cloud as easy as a few clicks. Application services. So with Azure, it's, it's much easier than ever to now create a globally deploy applications that are compatible on different web and portable platforms. There's reliable, scalable cloud access that lets you respond quickly to your businesses ABB and inflow, saving time and money. So with the introduction of Azure web apps and Azure marketplace, it's now easier to even manage production, testing and deployment. There's a virtual team services as well. So let's also talk about some of the different cloud solutions as well and that alternatives to Microsoft. So and in addition to Microsoft, Amazon and Google also offer cloud services, respectively known as AWS, Amazon web services and Google Cloud. So similarly to Azure, AWS and Google Cloud offer very similar cloud solution. And the differences are in the pricing models. Exactly what services are supported. So both AWS and Cloud, Google Cloud offer a variety of different plants, like I mentioned, such as data that needs to be frequently accessed. Sun, which is hot, hot storage data. In cold storage or archival storage of data. And each service. Cloud service also includes analytical tools. But the particular Types of Support and technologies really vary from one CSP to another. And finally, all cloud providers for provides some sort or some aspect of networking and content delivery management tools to manage accounts security features. So a CSP supposed to be providing you with these features. But it all really depends on how, like what kind of services you would use. So there would be something that you'd have to do a little bit more research on to see what kind of services that are really important to you and also the costs associated with the services. So now we're gonna go through a demo on how to set up an Office 365 license and login so that you can go along with or you can actually, on your own time, go to the portal and get familiar with a lot of these feared the admin features. 23. LAB DEMO - How to sign up for Office365: In this demo, I'm gonna be showing you how to sign up for the office 365 subscription as part of the MS 900 Microsoft D6, D5 Fundamentals course provided by the Delphi IT Academy. So first things first, head over to, type in Office 365 for free. You'll see a bunch of results. One to look for their free trial download. Once you go there, you can feel free to go to the page. You'll see the different changes that Microsoft's been making as part of some of the new features that they keep adding to office you 65. But once you go into that page, you'll see a try one month fee link. Click on that and feel free to sign up with any custom domain email that you might have or standard Gmail Hotmail account they may have. You'll need to create a Microsoft account. So go ahead and create that. Next type in a password. And just you name or company you work for. And you'll get a code in your email. So once he kept the code and to their code in and the capture code, of course. And once you login, you can see that you get the one month free office you 65 license to use and install the applications. So go ahead and click Next and enter your credit card or debit card information. You can also use PayPal to make the payment. I'm just going to skip this part to go on to the next section. Once you've paid, they can basically see that you get the free trial. And this hit subscribe. As you can see, the process is pretty straightforward and you get access to Office 365 apps instantly. So as soon as a payment clears, you'll be able to download the applications. So it takes you to this portal, gives you all the information about what you can do, such as installing, sharing the applications. So we'll go ahead and install. Once you hit install, you'll see a file that gets downloaded to the bottom-left depending on your browser. So wherever your download local location is, go ahead and install that application. You need to install it. And either you have other section, sections in office, office you 65 portal where you can manage your account, can manage your subscriptions. You can actually cancel this subscription if you need to. And after there or even before that 30-minute period ends. So if you want to just try it out and you don't want to wait until the 30 pin, 30 month period to start doing that. You can do that. You can share your subscription with five other users so that you can get one terabyte each space for, for cloud storage. So you can go ahead and share your link via email or just a standard copy paste link. And that provides the apps and the storage to those that you share with. And then the back end, you can always manage your account update billing and things like that. So that's just going to log into the portal and give you a quick insight into the back-end. So once you're there, you know, see this splash page that comes up. And here you can actually have access to your applications on a cloud environment. So you can click on these links and open these obligations and or you can install them. But that's basically it for installing Office 365. Feel for you to pause this video. Throughout this video, you can pause, cuts in sections and go through it in your own pace, and go through the portal itself on your own pace so you understand it. But yeah, that's basically it. On signing off for an office you 65 subscription. 24. LESSON 3 - Migrating to the cloud: Don't worry, we're not switching the course to astrophysics. We're just going to talk about migrating to the cloud. So in this lesson, we're gonna be talking about the different cloud models and migration to the club. So firstly, we will discuss what cloud models shouldn't businesses choose and the different type of cloud models available for businesses that choose fun. We're gonna describe what a cloud only model lens and provide some scenarios for when this type of migration is best for an organization. We'll also discuss what a hybrid cloud model is and provide some scenarios when, when this, this type of migration is best for an organization. And then finally, we're going to talk about both combinations of a cloud model where you might have certain applications that you can go out and get rid of and you still need to migrate to the cloud. But how do you do that? How do you keep that same application in place? Where and also migrate some of the other services to the cloud. So this lesson is going to be beneficial in that sense to give you an idea of what you can put to the cloud and what you can keep in your office. 25. What cloud model should businesses choose: When you move to the cloud, you really need to decide which service model you want to implement. We briefly discussed this in the previous lesson about SAS pass or ions. So you'll need to determine which type of implementation you want to use. Whether it's purely cloud-based or working together with some on-premise systems, such as it could be a Windows Server 2003 system, for example. So in this lesson, we'll discuss how companies and businesses can purely at work in the cloud, or connect existing on-premise systems to the cloud to extend the value of their legacy infrastructure that they necessarily can't move to the cloud. So you'll see how these two different service models require different approaches to migration. And then you'll review a few scenarios that demonstrate whenever business might offer one type of migration over the other. And then finally, we'll review some considerations for how an organization approaches migration systems with older version of, versions of Windows. 26. Cloud only Model: The cloud only model describes a situation where the service or services model you want to use SAS pass OR IS, is strictly run in the cloud. There isn't any connection to existing on-premise space systems. One of the advantages of using the cloud only model is that organizations don't have to concern themselves with infrastructure that the services run on. All the backend functionality is invisible, or it's in a black box for users. For smaller companies and startups, for example, or non-profits that don't have that in-house resource or resources or even infrastructure, capital to purchase and maintain some of the infrastructure. The cloud only model can be a really good choice for them. However, a cloud only model will limit the amount of customization that's available as users. They won't have access to the cloud-based servers. So if you're a development company, for example, and you want to move to the cloud in and it's going to be tough for you to scale in and make changes in that sense. So if you're a standard, you know, a company with, without any specific requirements in that sense, and this model would work for you. 27. Hybrid Cloud Model: So what if your company is large and has heavily invested in an on-premise hardware or line of business system or custom apps and so on. There's this, there's all this have to be abandoned to gain the benefits of cloud computing. Definitely not. A hybrid cloud migration is a solution that fits most large organizations because it allows you to keep critical resources on-premise. So many of the enterprises companies, they embrace this model because it connects on-premise systems to the cloud, which effectively makes the new cloud services and extension of the on-premise infrastructure. And by doing so, the enterprise company can continue to extract value from it, say it's legacy systems that's already in place while using the cloud to extend capabilities or features such as mobility and productivity that might not have been available. And the standalone on-premise system. 28. Migration vs Co Existence: So once you've chosen the right deployment model for your organization, it's really time to start planning your migration. The two different service models require different approaches like we discuss. So migration for the cloud only deployments and CO and coexistence for hybrid deployments. So what is migration? Migration is moving everything from an old system to a new system with the intent of eventually removing the old system and the context of your cloud deployment. You move your data and applications from local resources up into the cloud. The infrastructure that's provided by your cloud service provider. For example, if you have a free web-based mail system and decide to move the move to the more secure email. Email system where exchange and marks off the 65 provides, you'll need to migrate all users email accounts from the free online surveys to Exchange Online. After that migration, users can access their old email through Outlook and the data stored in Exchange Online. So there's nothing left in the whole system to use. 29. Migration vs Co Existence Pt2: So coexistence means two different systems, one on-premise and one in the cloud. And they connect and work together at the same time or co-exist as a single service, such as email. So for example, say you've chosen to go with a hybrid environment where your Microsoft we 65 subscription extends your existing Microsoft Exchange servers. You'll link the on-premise Windows Server Active Directory and Exchange Server to their online Azure Active Directory and Exchange Online counterparts. This is called coexistence. I've actually had to do this recently. There's certain skills, certain information that you need to know to basically put this in place. So you have to keep that in mind as well. So you have to make sure that you have the right resources to be able to migrate your data. And they have the knowledge and experience and expertise to be able to complete the task. 30. Migration Considerations: It's common in both large and small organizations to still be running some older versions of Windows Server computer operating systems, and even Microsoft Office programs. And that's very common in a lot of small businesses. To maximize the business value of Microsoft D6, D5, integrated suite of products. Begin implementing and planning and strategy to migrate. Let's take a look at migrating Office, for example. So Office you 65, sorry. So let me just basically say that you really have to understand what the migration entails. So with migration, you, as you know, you have to have proper documentation. You have to have a maintenance window. You have done the right skill set that someone would deliberate experience and skill set to be able to do the migration. And you also have to understand what can and cannot be migrated. So that's one of the fundamental things. Will take office example as an example. So Office 20132016 are currently supported versions, but will require ongoing updates, then might not scale well with the organization. So instead of maintaining and updating computers with the stand-alone installations, consider updating in assigning Microsoft do 65 licenses. Office 2010, for example, will no longer be supported in 20-20. Instead of upgrading to Office 2013 or 2016, which require manual updates, consider providing Microsoft V6 five licenses as well for these users. And in 2707 is no longer supported. Rather than upgrade upgrading your computers. Running Office 300720102013 or 2016. Consider updating or assigning a Microsoft D6, D5 license for your users. So this is just one example of using Microsoft Office. But you had to make considerations for upgrading parts of your inefficient. Accordingly, migration should be properly planned, like I mentioned, with the maintenance windows, setting expectations, and the right individuals. So a lot of, a lot goes into it in the pre-planning stages. And then allow also goes into a to the migrations days and then post migration as well. 31. Migrating to Windows 10: Let's look in my greeting. Windows 7.188, Windows ten, to migrate your devices running Windows seven or 8.1. And upgrading all your devices throughout an organization to the same operating system is proven to reduce support costs. So accomplishing all of these migrations over time brings your organization closer to the modern workplace. A secure, an integrated environment that unlocks a lot of the features that we discussed that teamwork, creativity were remotely accessible. Services in your organization through the Microsoft 365 services. 32. MODULE 1 REVIEW: Congratulations, you've made it through the module one of this course. So I hope you'll learn the fundamentals of cloud computing through this module one. And let's go through a brief summary of what we learned. After their summary, we're gonna go through some of the practice questions that we can review as part of this module. So let's take a look at the summary. So in lesson one, we discussed what is cloud computing? What is the cloud? The differences between the traditional IT versus cloud computing. The different costs associated with cloud computing versus on-premise infrastructure. Different cloud competing models we briefly discussed in the benefits of using cloud computing. We also talked about the difference between Microsoft do 65 and office. If you're 65. Some of the services included in Microsoft do 65. What Azure does, and we know what it can do and different cloud solutions. And then finally we discussed migrating to the cloud. What cloud model your businesses should choose. What's involved in migration to the cloud, different migration versus coexistence. So they're migrating fully to the cloud or having, doing an Hybrid migration to the cloud. So let's go through the questions that you can expect to see on the actual exam itself. It's just gonna be a couple of questions. So if you don't get the answers, don't worry if you, if you're not, if you don't get the perfect answer on the questions, practice does make perfect. So I would advise you to go through this module again, this understand some of the core concepts and feel free to Google some of these terms. So there's a lot of articles that discuss these technicalities and the services in more detail. That'll help you understand some of the core fundamentals that we discussed in module one. So the first question we're going to and display here. So a company has an Exchange Server environment. The company plans to migrate to the cloud. You need to recommend a cloud model that meets the following requirements. Upgrade this existing email environment, and minimize server and Application Maintenance. Which model should you recommend? Pass RAS, SAS or. So, feel free to pause and we'll look at the answer shortly. So the answer is actually SAS. This is the model you should recommend for someone upgrading aids in existing email environment and minimizing server an application. And we discussed this briefly on the benefits of upgrading to moving to a SaaS solution, which is basically everything entire. You just getting the actual solution from Microsoft 365. So that's the answer for that question. Next question, this is going to be a drag-and-drop question. So if you are planning on writing your MS 900 exam, you can expect to see questions like this. You can expect to see questions and falls. The drag-and-drop. Yeah, you can see some of the other type of questions that are, fill in the blanks for specific questions makes it match. So these have to understand the concept behind it and and go from there. And so for this question, you're then Microsoft D6, D5 Administrator for a company that uses only on-premise resources. The company does not have a private cloud. You need to deploy cloud-based resources for the company that minimizes costs. Which cloud models should you choose? Drag the appropriate answer. So here's the answer. Providing on-demand sandbox environment. So this can be easily accessible through spinning up a VM, for example. So pub in a public cloud, you can do that. Providing failover capabilities between local resources that you manage and read those regions. So we discussed if you have existing infrastructure that you wanna use for failover, for example, or for applications that you cannot migrate, hybrid wouldn't be, would be a good solution. And then deploying virtual machines that use proprietary peripheral devices. So as you know, you can't use the public model if you want to use proprietary peripheral devices or hardware devices. Recently set up a server for a client where you actually had the Insert a USB drive into the server for the application to function. So you wouldn't be able to do that when you migrate it to a public cloud, you need to have a server on-premise where you can plug in the USB drive, for example. 33. MODULE 2 - MICROSOFT 365 SERVICES: Welcome to module two of this course on Microsoft D6, D5 services. Before we dive into learning about what we're going to be discussing in this module. I want to touch briefly on a couple of points. If you're solely taking this course to learn about the 365 fundamentals along we taking the exam, I would highly recommend to pay close attention to these concepts that we're going to be discussing in this module. Previous module was more about the cloud fundamental concepts. But now things are going to get a little bit more granular. We're going to discuss a lot of concepts and services, features that Microsoft has HIV provide in their 365 product suite. And in the next few modules, we're gonna get a little bit more granular with R. In the third module, we're going to get more granular with security and not to scare you, but I miss 900 exam is is fairly challenging. So I would advise you to take notes and perform some additional research on certain concepts that you're not aware of. If you are technical, you shouldn't have too much of an issue with some of the concepts that we're going to discuss here. So I would advise you to also research that different microsoft D6, D5 services on your own and really understand the features of the admin portal in detail. So the outline for the rest of the course will be based on the objectives as outlined by Microsoft. So as to help you understand the services and also to help you get prepared for the exam. Aside from that, I would urge you to go to the office portal, the Azure portal, get a free subscription using the demo that we, that I shared in the previous module. And if you need to pause the lesson anywhere and just re-listen to it, please do so and ensure you understand the topic discussed before moving forward. So let's go through an overview of what the lessons in this module we'll look like. Previously we went through Module One as an intro to cloud computing. But the next few modules are going to be more specifics on Microsoft D6, D5. So grab a drink and let's buckle up. 34. LESSON 1 - MICROSOFT 365 CORE SERVCICES: Just so you have a bit of a guideline on the top so it wouldn't be discussing Indie in each of the lessons. That's just briefly go through them. So lesson one, we're going to start off with Microsoft, these XY five core services. So that's going to discuss the important features of Windows ten. Then we'll dive into Exchange SharePoint online and then talk about Microsoft Teams for teamwork and collaboration. And then the additional services like Yammer and whatnot will also briefly discuss Microsoft in-tune for mobile device management and Microsoft Office ie 65 Pro Plus. Along with comparing the different or the two as solutions, which is SharePoint and Exchange Online versus on-premise Exchange Server and SharePoint server. Next lesson is going to be about how to plan deployment of Windows ten and obviously 65. And the update model for Windows and obviously 65 Pro Plus. And we'll follow up with a unified endpoint management and Microsoft the 65. So what endpoint management looks like in the Microsoft dot 365 hemisphere, identify some of the challenges involved with managing and securing devices and describing the concepts and benefits of cloud connected management. And finally, lesson four, we're going to talk more about Microsoft teams and teamwork scenarios and how it's all kinda co-related, all the service or co-related to help team work be more productive. And we're gonna talk about some of the products in Microsoft, these 85 that are part of their team work toolkit. How Microsoft and 65 helps you run meetings, you know, setup calendars, share files, projects, and things like that more effectively. And the different analytical and reporting tools that can also improve the efficiency. 35. WINDOWS 10 - Intelligent Security: Windows ten protects, detects and automatically responds to the most advanced malware and hacking threats we face today. While protecting user identities, devices, and your organization's information. It investigates threats as they evolve and automates the remediation tomake response times faster. Thanks to what's called the Intelligent Security Graph. This uses security intelligence, machine learning, and behavioral analytics. And these solutions are built in to provide you with the full security lifecycle management of Windows ten. And it also integrates with the Microsoft D6, D5 systems, which cover even the most complex multi-platform environments. 36. WINDOWS 10 Flexible Management: Windows ten also provides flexible management. You can deploy, manage, and update devices anywhere your employees need to work. Window sign includes tools to help you customize device setup. Use unified endpoint management, control the corporate identities, and control the corporate data and apps that are on, that's on personal devices without impacting personal data. So for example, if you have a smart phone and you have, your company has a BYOD policy where you can bring your own device. You obviously have some personal data on that phone. But this flexible management allows the administrator can manage year data that's personal and keep that personal and co-exist with the corporate data and secure that data using the endpoint management. Windows ten supports the transition to cloud-based device managing with the ability to call Manage Devices in, in-tune and config manager. You can use both AD in Azure AD together. And in addition, Windows virtual desktop enables users to run incompatible applications on a Windows ten device. 37. WINDOWS 10 Simplified Updates: With Windows ten, you also get simplified updates. So you can stay current with Windows ten by maximizing security on productivity. And the way we update Windows ten has changed a lot, moving away from the major updates that we recently received. I'm for feature for every few years to feature updates like twice a year. So Windows ten also provides a modern tools and insights needed to support the semiannual Release. 99% of the applications that run on Windows seven will now run on Windows, will not, will also run on Windows ten. You can plan OS upgrades with confidence using telemetry based analytics from Windows analytics. And windows time provides the flexibility and control to manage and distribute updates using your current method or by leveraging Microsoft rings infrastructure. With every release, Windows Updates becomes smaller and easier to distribute so that they're less disruptive to your organization. So I remember in the past where we, where we used to do updates, uses scheduled downtime, and there was a lot of downtime based on the number of machines that had to be updated. But now Windows ten and makes it makes things easier, especially with workstations. You can let the update Ryan and n choose to reboot, you know, as per the schedule. So in that sense is simplified updates has sick to significantly increase with Windows ten. 38. WINDOWS 10 Work Smarter: With Windows ten, it helps improve productivity by providing faster, safer ways to get work done across all your users devices. Users can find, you know, PowerPoint or documents settings, messages by using the Enterprise Search and Cortana and use a timeline to see a chronological view of your activities and documents. It supports collaboration through Office 365 apps and whiteboard and one note, windows ten, your users can work from devices and places in ways that work best for them. Windows ten has hardware options ranging from surface hub to the nearly connected, always connected PCs to support users wherever they need or preferred to work. Users can move from one device to another and continue in Microsoft Edge or take notes directly on a webpage with Microsoft Inc. And Windows, Sen comes with a set of accessibility tools and features such as narrator. So you can narrate then, have word prediction. I control. So lot of these features that are built into Windows ten and I really boosts the productivity and quality of the operating system. 39. EXCHANGE ONLINE: Exchange Online is a messaging and collaboration platform for your email calendar, contact info and pass. You can access all of this with Microsoft Outlook. Outlook Web Access, or Outlook mobile Exchange Online works for most mobile devices, including Android, iOS, and Windows ten devices. Let's discuss some of the features that Exchange Online has to offer. So mailbox and online archives where individual users have their own mailboxes that they can use to store mail messages. In addition to the main mailbox. Some office the 65 plans include an online archive that provides additional storage. You have calendaring, so each user has a calendar they can use to track their upcoming events and things like that. Book meetings. And users can delegate access to counter calendars of other users, such as administrative assistance and teammates. You have. You can view and edit attachments online. So when users receive attachments, they can view and edit them online and not look on the web. They don't require a locally installed version of Office. You have shared mailboxes and resources where you can use shared mailboxes for groups or users that need to share information. And essentially Central mailbox. You can configure resources for meeting rooms and equipment to facilitate bookings and public folders, which is earlier version of Microsoft machine server, where it relied on public folders for collaboration is still available and Exchange Online if needed. And the message policy and compliance. And so there are several message policy and compliance features in Exchange Online. These include retention policies, message encryption, e-discovery, data loss prevention, and journaling. And then you have anti-spam and anti-malware. So all exchange online subscription include this protection, which provides configurable anti-spam and anti-malware scanning. And then you have configurable male full to support specialize mail flow scenarios. You can create send, receive connectors. 40. EXCHANGE ONLINE cont'd: You have configurable mail flow to support specialized male full scenarios. You can create send receive connectors. For example, you can create a connector that requires additional security or additional security with a business partner, for example. And you have mobile and multi-player platform access, hybrid deployment, and different migration tools that you can use to migrate from other on-premise Exchange Server servers to Exchange Online. And there's also a tool to migrate from the IMAP messaging service to exchange online. And you can always their research this in more detail and in terms of migrating from one service to the Exchange Online. So these are just some of the exchange service exchange features that are available with Exchange Online. Feel free to research some of these in more detail to help you understand them illiterate better. But these are some of the core features that come with Exchange Online. 41. EXCHANGE ONLINE cont'd: Sharepoint Online is the cloud evolution of Microsoft SharePoint server. So if you're familiar with the SharePoint server, you'll know some of the features you're already part of you familiar with some of the features that SharePoint server on-premise server provides. We'll briefly go through that. Sharepoint Online is a cloud service that enables you to store, organize, and add third party apps. Access information from any device, allows sharing with external people, and all by using a web browser. With SharePoint, Online, users can build site's pages, document, libraries, and less ad web parts to customize their pages. Share visuals, news updates with the team or more broadly with public. If he, if he, if need be, search and discover sites, files, people manage business process, co-author documents with other users. And all of this can be controlled by site administrators so that the external sharing can be controlled by sited inside administrators for sharing company files and folders. 42. Microsoft Teams: With this ever evolving world of mobility, Microsoft introduced Microsoft Teams, which provides a central hub for collaboration within your organization, allows you to implement a chat base workspace that enables members of your organization to have conversations where plans, co-author certain documents, sync by sharing documents. Insights, status updates, and teams is also available as a mobile app. It lets you stay up to date both in the office and on the goal. So let's discuss some of the core features that Microsoft Teams has to offer. So you can host audio and video web conferences and chat with anyone inside or outside your organization. Teams also enables company employees and users from outside the company to collaborate on a project in real-time by using a whiteboard. You can make teamwork easy with Microsoft Teams by co-authoring, call authoring and sharing files with popular offers 365 apps such as Microsoft Word, Excel, PowerPoint, OneNote, SharePoint, or Power BI. You can use teams to integrate apps from Microsoft and third-party partner services that you may have in your company. You can make calls with Microsoft D6, D5 when paired with Office 365 foam system licensing and calling plan. Microsoft's D6. D5 provides a full business calling experience in teams on a global scale. So if you were wondering about migrating from an on-premise or PSTN phone system over to teams. And that's also possible now. You can connect across devices. So teams and teams, devices work better together for intelligent meeting, calming experiences, Finding the right device for your needs and bring your best ideas to life is, is what teams really does. It does have a team, development team that's working to constantly improve Microsoft Games. And it has a little bit of wasted goal. But I feel that Microsoft Teams provides a good collaboration among, among in the organization or in a business environment. So these are some of the core features on Microsoft Teams. Feel free to research some of these on your own if you're interested in the end, the voice features for example, or if you are interested in the collaboration features. But these are some of the core features of Microsoft Teams. 43. Microsoft Intune: So let's talk about Microsoft in tune. So Microsoft in tune is a cloud-based service that helps you manage computers, laptops, tablets, and other mobile devices. This includes iOS, Android, and Mac OSX devices. It uses Azure Active Directory as a directory store for identity. And it can integrate with local management solutions such as Microsoft. As Microsoft does System Center Configuration Manager, or also known as SECAM in tune, is especially useful for devices that are beyond the management school of group policy, such as mobile devices that are not domain members, Active Directory domain members, or Windows ten devices that are joined to the Azure AD in tune can prevent users from copying company data from managed applications that are installed on unmanaged devices. There's other things that you can do with ONE tune, it lets you your organizations, employees use their personal devices to access organizational data. You can manage organization own phones, control access to Microsoft D6, D5 from unmanaged devices, such as polymer kiosks and mobile devices. It helps ensure that devices and apps that do not, or sorry, that do connect to corporate data compliant with security policies. You can deploy protection policies which enable you to standardized quote by device deployment by setting corporate configuration standards. So there's a lot of features would tune that. There's a lot of security features that come integrated with in-tune that and a lot goes on in the background that the user doesn't see. But the user is able to access the company data in a secure way, in a fast way. So that's one of the main features of Microsoft in tune. 44. Additional Microsoft Services: An organization can also subscribe to optional components within Office you 65 that can enhance your use of this cloud-based service and provide your, you, your users with additional facilities to increase productivity. These optional components include Yammer Project Online, Project pro for offices 65, and Microsoft Office Visio parole for office you 65. So let's take a look at some of these briefly. And in the next few minutes. Microsoft Yammer is enterprise social networking tool that can be used to efficiently resolved support issues and gather feedback on project and documents. Yammer is becoming more integrated office you 65 and SharePoint online users nowadays. And users now have the option to actually replaced their activity stream and SharePoint Online with Yammer. And to make this chained users click on Yammer ln N assigned to service, and sorry, Sign in to this service. Duo separate browser window. Feature integration include SSO between Yammer and Office you 65. And furthermore, users can use a Yammer news feed instead of SharePoint newsfeed. Project online is the Cloud version of Microsoft Project Server that enables organizations to get started, prioritize project portfolio investments and deliver projects with the intended business value. One key value feature with the project online is that enables global organizations to plan project portfolios and multiple time zones. Would project parole for office 65 provides desktop Project Management for small teams and organizations and organizations that I require full desktop project management management capabilities and the ability to participate online from virtually anywhere on almost any device. Can combine this service with Project Online. With Office Visio pro for Office 365. It's a subscription version of Microsoft Visio Professional. If you're not familiar with visual, it's basically diagramming and flowchart application. Users can install it on up to five devices and includes a Vizio on-demand feature, which enables a user to install the application on any computer. Running recent versions of Windows operating system. Dynamics 365 is a cloud-based platform that combines customer relationship manager and enterprise resource planning, which is functionalities and applications for managing business functions like sales, marketing, finance, and customer service. So as you can see, it's a dashboard for our dynamic T6. T5 leads by source sales pipeline, open opportunities. So it's more of like a dashboard to, to keep track of your sales and marketing activities in a single place. Onedrive for Business is a private library for the storage, organization and sharing of users work documents. It's a cloud service that enables you to store and protect files, share files with others, access from anywhere, use an app or web based browser and restore all files to a previous date and time. Nowadays, it's a very integral component of a user's office, the 65 online environment. It's provided to each of your organization's users. Do it subscription to SharePoint online. And if you get OneDrive for business through your organization subscription, then you get 25 gigs of personal storage by default. One difference is, one thing I want to mention is that OneDrive for Business is not the same as in OneDrive, which is a cloud-based service intended for personal storage. And it's provided with Microsoft accounts in accounts. Whereas Microsoft or sorry, OneDrive for Business comes with the when you, when you apply a subscription. 45. Microsoft Planner: You can use Planner from any of your devices to create new plans, assigned tasks, share files with others. You can organize teamwork, collaborated on a project. You can use Planner to childhood colleagues and keep track of your team's progress. As you can see, is an example of a marketing campaign where you have certain paths that are unassigned somewhere assigned to users not started late. So gives you an overall picture of what you can do with the Microsoft Planner. Power BI. It's a business analytic service that delivers insight to enable fast informed decisions. So you can use Power BI to transform data into visual, visual tabs, visual tiles. You can use a variety of different device types to access this content. Has any open API available. You can integrate other applications and display data in these widgets and tiles. Maybe on a dashboard or on a TV somewhere in the office. You can always display this data in an appealing way, in an interesting way. However, you really want to manipulate that data. You can use Power BI to manipulate that data and use that data and display that data however you would like. 46. StaffHub: Staff HUB helps workers manager Workday by using schedule management and information sharing. It also provides the ability to connect to other work related ops and resources. So managers can quickly distributed from important information to their team, such as policy documents, news bulletins, or videos. As you can see on the screen there there are certain tasks that, that are being sent or requests being submitted. So staff hub is a really good tool for management to keep track of daily activities and time entries for the employees. Stream is an enterprise video service where people in your organization can upload, view and share videos securely. You can share recordings of classes, meetings, presentations, training sessions, or other videos that help your teams collaboration. Stream can also make it easy to share comments about a video, tag time codes in comments, descriptions, or refer to specific points in a video and discuss with colleagues. 47. Office 365 Pro Plus: Let's talk a bit about Office 365 Pro Plus. It provides Microsoft productivity suite of applications such as Word, Excel, PowerPoint, Outlook. For both the Windows and Mac devices. It's a full version of Office, and it's installed and runs on the user's local device. It's not a web-based version of Office. And the applications that come with Pro Plus can be used with the on-premise and online versions of Exchange and SharePoint and Skype for business. It can be installed and directly from the internet, or it can be deployed from a location or an organizations local network. There's no Windows Installer MSI pack is that the users download and install. Once installed users and don't have to be connected to the internet all the time to use Office 365 Pro Plus. But users must connect at least once every 30 days to confirm that they still have the right to use the the offer C 65 pro plus license. 48. Exchange Online vs On Premise: The online versions of SharePoint and Exchange that are in Microsoft, the 65 offer additional features and reliability improvements when compared to the on-premise versions. So let's took a look at how, how to compare Microsoft D 65 core services with the on-premise equivalence, comparing exchange online and on-premises Exchange server, for example, to determine whether Exchange Online is appropriate for your organization, you must identify the differences between Exchange Online and the on-premise Exchange server. Some of the primary differences include unlimited storage. Many on-premise deployments of Exchange Server place low limits on mailbox sizes, such as one or two GB. Exchange Online supports larger mailboxes are 50 GB or larger. Depending on the plan you've purchased. What the Exchange Online. There's high availability. For, sorry, for an on-premise Exchange server, you need to purchase and configure hardware to store multiple mailbox copies. And configure load balancing to achieve high ability availability. And for high availability, you also need an alternate datacenter. Would they exchange online? It's automatically highly available with their datacenter replicated or actually your data replicated to multiple datacenters. With exchange online. It doesn't have any built-in methods for configuring backups. In set a, you configure retention through single item discovery and litigation hold. Exchange Online offers additional features such as alphas, IC50 groups, which integrate multiple office each CCR5 features together. And another example is the online viewing and editing of email attachments. And there's new features that are readily available with Exchange Online exist in the on-premises Exchange server. It's possible that these features will be integrated into on-premise Exchange in the future, but they'll always appear first in Exchange online just because the development happens there first. Unlike an on-premise Exchange server, where you administer and manage Exchange servers and databases. Microsoft manages these items in Exchange Online. With Exchange. It provides Exchange Web Services to k solutions for managing business email, calendar contacts, on desktop and mobile devices and online, and for accessing and managing exceeds store items. In addition to Exchange Web Services, some of them were popular features that are available in both on-premise in an online include information rights management, archiving, and illegal holes. So this is the critical information, crucial information for, for you to understand this for the examines law. So I would maybe research this a little bit more on that. Other differences between Exchange Online and on-premise Exchange. Just so you have an idea of what's, what's available with online and what's not. 49. Sharepoint Online vs On Premise: Sharepoint Online is a Microsoft cloud-based service. So instead of installing and deploying a server on-premise, you can subscribe to a Microsoft D6, D5 plan or to the standalone SharePoint Online service. Your users can then create sites, have collaborator communicate. Sharepoint Online receives all the latest features with regular updates. Some of the features we're going to discuss shortly. It includes the ability to create an great sites for collaboration communication, but won't reflect the latest updates. This as far as SharePoint on-premises server, the on-premise server requires an organization to maintain this over very much similarly to make change on, sorry, exchange on-premise server. Some other features. Differences between SharePoint Online and an on-premise SharePoint server are anti-malware protection is not included in SharePoint server. Claims based authentication is only provided with the SharePoint server. Data loss prevention policies are available in SharePoint online as part of the E3 or E5 subscription. And encryption at rest is not available in SharePoint SharePoint server. Not all modern web parts are available in SharePoint server 2019. Intelligent functionality based on the Microsoft Graph is all as is available in SharePoint Online. 50. LESSON 2 WINDOWS 10 AND OFFICE 365 PRO PLUS: So in this lesson, we're gonna be talking about the different ways to deploy Windows ten and alphas to 65. We'll discuss these tools and methods on a high level, just to give you an understanding of what's available. The two most critical parts of planning and enterprise deployment of Windows ten, Office 365 Pro Plus are assessing your environment and network and making sure your existing hardware and applications will work with the new software. Almost all the applications written in the last ten years or so will run on Windows ten. And almost all add-ins and Visual Basic for Applications, macros that are based on previous versions of office. And we'll continue to work on the latest versions of Office. However, depending on the size and age of your organization and verifying application and hardware compatibility will still be an essential first step in deploying the, the modern desktop. 51. Windows Analytics: Microsoft offers several tools to help with making sure your applications and hardware are compatible, including Windows analytic upgrade readiness. This recommended tool is for assessing desktop device and application readiness. It provides application and driver compatibility information to give you a detailed assessment of issues that my block, your upgrade. It supported with links to suggest, to suggest it fixes known to Microsoft. Currently, microsoft has built-in methods for automatically limiting bandwidth, including reducing the size of updates downloads with Express update delivery and binary delta compression. As a result, you'll only download the changes between the current update and the previous update, which can minimize the impact to your network. So peer-to-peer options, they basically shift the traffic related to Windows ten Office 365 away from the center of the network and reduce the need for the classic throttling approaches. They basically let computers find, update files that they need on peers and their local network. And rather than downloading them from a distribution point or the internet. So these are some of the peer-to-peer options that are available for this deployment. I would urge you to just take a look at these in more detail. I won't go into detail into these, but feel free to research the specifically the branch cache peer cash and deliver optimization. 52. Readiness Toolkit for Office: Their readiness tool for Office Add-ins and dBA. This tool can help you identify compatibility issues with your Microsoft VBA Macros and add-ins that EU's with Office. So you've probably seen if your technical, you and you've troubleshooting some of these issues, you know that there are some VBA Macros in Outlook and Word or Excel that can cause some issues sometimes. So this toolkit can help scan for VBA Macros and these Office applications. And it's four versions as far as back as the Office 2003. It can also scan for certain types of Add-ins. Use it used within Office as well. 53. Desktop App Assure: The desktop app assure is a new service design to address issues with Windows 1065 pro plus application compatibility. For customers with eligible subscription. A Microsoft engineer works with you to address any valid and applications application issues you might have. As party a testing process. Like I would recommend deploying Windows ten, Office Depot IC50 plus first to a pilot group of users across your organization. For example, you might want to include devices from your finance department because those devices probably include specialized down line of business applications and microbes. So this pilot group can actually test the initial deployment of Windows ten and obviously 65 Pro Plus, as well as feature updates before you roll out Windows ten Office Pro plus to the rest of the organization. 54. Assess and Optimize Your Network: Network bandwidth is a critical consideration when deploying and managing updates for Windows ten and office if EC50 plus installation files for office the 65 pro plus for example, or at least 1.6 GB in size for the core files, plus at least another about 250 MB for each language that's deployed. Microsoft's built-in methods for automatically eliminating bandwidth, including reducing the size of update downloads with Express update delivery in binary delta compression. So as a result, you only download the changes between their current and the previous update, which can significantly minimize the impact on your network. This is where peer-to-peer options also helped shift traffic related to Windows ten and obviously CCR5 or e from the center of the network, like we discussed earlier. 55. Windows 10 and Office Deployment: How you deploy Windows ten, Office 365 Pro Plus depends on your business requirements and your environment, including how much administrative control you want over the deployment, your network capacity, and the deployment tools you already used. You can choose from a variety of existing and new, new deployment tools for Windows ten Office Pro Plus, including Windows autopilot and the Microsoft development toolkit for Windows, the Office Deployment tool for Office, and in tune and Configuration Manager for both Windows and Office. As part of your deployment, you can also choose whether to deploy Windows and Office from the cloud or from a local source on your network. So it all really depends on your office in your environment. And if you have a small pipe with the small, small bandwidth or low bandwidth, then it may make sense to downloaded where in a network with high bandwidth, so you can transfer it over USB drive or something. So you have that option. But I would urge you to take a look at that before you actually proceed with the migration or the installation process. 56. Windows 10 Deployment: By upgrading all client devices to Windows, ten, organizations can reduce the amount of time their IT team spends on user support. The same goal can be met by deploying Office EC50 pole plus on all devices. Since having the same software on all computers is known to reduce user support issues. So in the next little while we're going to discuss the deployment options for Windows ten. 57. Windows AutoPilot: The benefits of Windows autopilot are clear for both IT users and users. It admins don't have to physically touched me and then new devices anymore. And can prepare everything ahead of time in a more efficient manner. And users, meanwhile, can start using their new devices sooner. So you don't need to ask IT for support. And you can experience a modern all digital workplace that, that enables you to spend your time better with none of their bickering system level inconvenient, inconveniences of the past. So on the paths you, you know, a lot of involvement was with IT support. So a new employee, for example, comes on. And to their company. There was a lot more involvement with IT support to help facilitate their enrollment into the company. But with the autopilot, this makes things a lot easier for the end user, and especially makes it a lot easier for the IT admins using Windows autopilot. 58. Windows 10 In Place Upgrade: And in-place upgrade install involves using the Windows OS installer to replace all the operating system files for Windows ten on a PC. So basically you're using the AAC program to re-install the same OS back over them over itself. This leaves a user files entirely alone, retains many settings and preferences. And best of all, leaves already installed apps and applications unchanged. It does, however, overwrite operating system files more or less completely. And in so doing, it offer it often repairs, bulkier, misbehaving OS, and returns it to normal working conditions. So now we're going to talk about dynamic provisioning. It is where you create a provisioning package will quickly configure one or more devices. Even those without network connectivity. You create a provisioning package with the windows Configuration Designer and can install them over a network. Former removal will media like a USB drive or an NFC tag or bar codes. 59. Windows 10 Subscription Activation: Let's talk a bit about the subscription activation for Windows ten. You can now use a subscription taste switch from one edition of Windows tend to another. For example, you can switch from Windows ten Pro to Windows and enterprise. When a licensed user signs into a device and they have credentials associated with Windows ten, E3 or E5 license. The OS changes from Windows ten Pro to Windows ten Enterprise, and all the appropriate windows and enterprise features at then unlocked. If the subscription expires or is transferred to another user. That device here averts seamless to, seamlessly to Windows ten Pro edition after a grace period of up to 90 days. In addition to those new tools, you can deploy Windows ten with modern desktop management tools and existing tools in your organization, including in-tune, Azure AD and configuration manager. 60. Office 365 Pro Plus Demployment: Let's take a look at some of the deployment options for Office 365. So let's talk about System Center Configuration Manager for enterprises that already use SECAM to deploy and manage software. Microsoft recommends using gear for Office deployment as well. Secam skills for a large environments and enables extensive control over the installation, updates and settings. I CCM can be used to deploy Office the CCR5 from a local distribution source by downloading the installation files first, and then can be used for installing Office on, on computers and the local network. It also has built-in features we're deploying and managing Office and Windows. 61. Office Deployment Tool: For organizations that don't have SECAM, but still want to manage the deployment. You can use the Office Deployment Tool, which provides control over installation updates and settings. Organizations use Office Deployment Tool to download installation files to a local distribution source and then install offices. You see five Pro Plus by using the downloaded files had deploy Office to computers in the network. You can use this as a stand-alone tool in conjunction with third party software deployment tools as well. 62. Microsoft InTune: For organizations that want to deploy and manage Office from the cloud. In tune provides a cloud-based service that manages mobile devices and PCs, along with the applications on those devices like aphasic testify, protoplasts in tune can also be used to manage Windows ten on your PCs as well. 63. DEMO Office 365 Deployment: Check the other way around. Because in this particular country. So yeah, check OK. 64. MODULE 3 - INTRO: Welcome to module three of this course for security, compliance, privacy, and trust. In this module, we're gonna be discussing some of the fundamental concepts around Microsoft. The 65 security. Security is one of my favorite topics to discuss, and I hope you'll learn some, find interesting insightful things from this topic. We'll discuss how Microsoft provides simplicity and customization and security options. Will discuss security in the realm of Microsoft, the 65 services focusing on identity, what it is, and how Microsoft secures the identity, will talk about apps and data security devices security. So computers, laptops, mobile devices. And if find that infrastructure security. So like I mentioned, the module, the focus primarily on the content is outlined by Microsoft and the course outline. And if you're interested in pursuing further studies and security can take a look at the 500 Microsoft Security 365 administrator course. 65. SECURITY INTRO: The implications of a security breach reach far beyond just the cost of fixing the security problem. The business level implications that that can threaten accompanies position and the market include a loss of customer loyalty, brand reputation, intellectual property, market share profit depending on the size of the company, you know, market share profits, revenue. And then not to mention the huge legal liabilities and, and, and job loss for the company. Security needs to be embedded in an organization strategy and culture. It's an integral part of any companies. Like framework of a, of a company's base framework. As technology becomes a core part of business today, security needs to be embedded in the organization strategy and culture. A detail security strategy that incorporates basic hygiene, including security patches and maintenance, maintaining up-to-date software and third-party software. It can go a long way to protecting an organization. 66. WHAT TO PROTECT: When it comes to solutions for protecting personal information and maintaining regulatory compliance, there are few more requirements that need to be met. It might surprise you to learn that Microsoft D6, D5 includes a whole set of technologies that can enhance any security and compliance strategy. Here's a few of the most powerful assets that come as part of the Office of 65 and Enterprise Mobility and Security suites. Microsoft, the 65 help safeguard your customer's data, your intellectual property, while protecting against the business impacts of cybercrime without affecting productivity. Keep the familiar tools and interfaces that need to remain efficient. There is line of business applications that company has that the solely rely on that our soul targets for for the company owners. So hackers, they actually go out and seek what line of business application, certain company they're using and target those targeted attacks are always more efficient. More effective there the hurt the company the most. So these are the types of software they need to be protected most guarding data from attacks on multiple levels using innovative identity security protocols. Protecting gets the latest threats. So the security features and Microsoft provides in the security sweets have a whole team of professionals dedicated for research and development, for patching, for updates, for keeping on top of the latest security trends to keep you more secure. And this ever evolving world of security, of security. 67. WHY MICROSOFT 365 SECURITY: So why should we choose, were washed you choose Microsoft through 65 security over others. It's customizable. Microsoft can help you defined policies and alerts, set Cloud usage parameters, manage certain apps, get the information you need to protect identities and analyze user and device behavior. It's also robust. Microsoft the 65 offers a comprehensive suite of safety and protection feature, like we discussed earlier. There's a huge team working with you on providing the latest updates to these services. So you don't have to have a security professional that's looking at, that's working to safeguard your year company data and the infrastructure. So by it being robust, it, it guards against cyber attacks and data leakage. And also provides you with a more enhanced visibility and control over what's happening in your, in your environment. Microsoft D6, D5 is responsive. So it can define policies that trigger suspicious activity alerts. You can leverage machine learning to identify high-risk activity and get the information you need quickly to make real-time security decisions. For example, you probably noticed with Google and other services, they also provide some of these features where geolocation comes into play. So if someone from Korea or anywhere else in the world signs in under your user account, you get notified. Was this legitimate attempt to access your account or was it was it malicious? So these are the different types of security features that Microsoft the 65 encompasses in a security suites. 68. TIMELINE: Here the different lessons that we'll be going through in this module. Lesson one's going to be about security fundamentals. We'll discuss key pillars of security. Identify the most common security threats that are going on in this world and that affect most organizations. Threat Protection concepts. Common security threats will talk about security features in Microsoft, the 65 in less than two. That describes how Microsoft D6, D5 house protect Identity and Access. Data Protection. How it classifies information protector from data loss. And then there'll be a demo for the Microsoft do 65 Security Center. And what that encompasses. Lesson three is gonna be about identity and access management. So which will describe briefly features of Azure AD, Azure AD Identity Protection. Less than four is going to be about device and data protection. Microsoft the 65. So what the need for device management? How can someone bring their devices and also have that secured aside from company assets? Will discuss IRM, information rights management and finally, compliance and Microsoft 365. 69. LESSON 1: Many organizations today are considering moving to the cloud, but still have security concerns about making this transition by using a cloud service to your organization and trust your service provider to process your data, store and manage your data securely. So in this module, you'll learn about those features. And then after the lesson, you'll be able to describe the key pillars of security and identify the common security threats. We'll discuss the different ways that the company network can be, basically can be infiltrated. So I sort of go through this example of the key pillars of computer security. The goal of any security design is to provide for defense in depth. So this defense in depth as a security concept in which you protect your data by using several layers of security. If a malicious hacker or attacker compromises one layer of defense, other layers continue to offer protection. So as you can see in this picture, you have the different layers of firewall, VLANs, anti-virus, and anti-malware. These are the different layers that protect your castle. Castle has a moat around it, as you can see in this picture. And the inner world and outer walls. Networking example could be a common practice of having the external firewall as a parameter. And then internal firewall with additional firewalls that you configure on host computers. However, when it comes to data security, no single solution ensure that data remains secure. So instead, organizations must, must use a layered approach to protect the data. So if you want to protect your data on your organizational computers, there's my involve implementing drive encryption, file and folder permissions and rights management. If your information is stored in the cloud, then you must also consider implementing appropriate security measures within your cloud-based infrastructure. So let's talk about some of the key security fundamentals. Many organizations are considering moving to the cloud, but some still have security concerns about making this transition. By using a cloud service, your organization and trust your service provider to process your data and to store and manage your data security, security. Let's take a look at identity as a, as the most common security threat. How identity is being affected, how it's being targeted. It's, what is identity? Let's look at that. Identity is used to identify user so they can be authorized access resources within your IT infrastructure. Typically, we identify users through the use of user accounts. These accounts are assigned appropriate level of access or privilege on certain systems or applications. Most people have many user accounts. So today we ourselves as individuals, had many user accounts. I'm have multiple Gmail accounts or other accounts as well. So that really puts the Jeopardy posterior count in jeopardy. These accounts, my end and identify people to their bank account, their credit card company, or to their own personal computer. Your users might have a number of user accounts within your organizations, such as local accounts, Active Directory accounts, Microsoft Azure, Active Directory accounts, and even now Microsoft account. Because a user count or accounts is the primary means of determining who a user is. So it's important that we protect the process of verifying identity. Identity Protection is the method that you use to do this to basically to protect that identity. Microsoft, these 65 includes a number of features that enable you to identify when a user account might have been compromised. For example, a change in sign in time of day. Now, for example, a user signs in certain time of day but they're signed in I 2m. Why is that? Where did they sign in from? So any unusual sign-in location is assigned, that account has been compromised. So when you identify these changes, you can take action to protect them or set filters and alerts to to notify you. When this happens. For Threat Protection, concepts, that's your organization's data and infrastructure can originate from both the devices and the network. So considering device security is basically when users connected devices here IT infrastructure the potentially introduce security risks. For example, let's take, let's take firewall settings as an example. If device lacks a properly configured firewall, then every time you connect to a network, it's at risk. This is especially true if the, if the device connects to public or unsecured networks such as Wi-Fi hotspots, anti-virus or anti-malware protection without proper anti-malware protection or antivirus protection. And up-to-date definitions, a device is at risk for being infected with malware. This software might be transferred to your organization when an improperly protected user device connects to your device, to your network, software fixes and update. So when a weakness or flaw is discovered, the flaw has not been patched. So the device is at risk, which can. The chance for that risk to the network as well, or the organization's infrastructure. Lack security settings. So most users, they secure their forms with a pin, but not all do. And often that pin is not secure enough or is too short, so it's easy to guess then that's also a security risk. Poor physical security. You know, many people are users. Our favorite relax that's having their phones, tablets fully available, not locked. So that's also a security risk. Network security. So in a connected world, organizations network means getting through to the security door. So numerous possible forms of network tax can occur. If there is no proper network access planning. And now or if if the Wi-Fi is open or it's not properly configured, that's also a way that attackers can get into here. Your environment. Let's take a look at some of the common security threats that are currently, currently pose a risk to an organization. An eavesdropping attack, which is someone sitting in your parking lot. It doesn't happen often, but if they're targeting you, this can happen. If they say it in your parking lot, charter penalty trait, you're wired or wireless network by just constant flooding of pockets. A denial of service. Ddos attack, flooding environments. Sodium is so much traffic that no one can get in. Port scanning attacks, which is looking for open ports or RDP ports and try to remote desktop into your environment. Little tip on this is you can actually google your, your IP and port and check to see if it's open externally. So there's a few things that you know, your IT administrator, security administrator can do. Mit am man in the middle attacks, which is collecting some information and manipulating the traffic via spoofing attacks. So it is, this is very common now with attackers sending spoofing emails to, to users and employees. Data security threats. So unauthorised users accessing information on a server. Unauthorized users accessing data from a stolen or removable device. So having certain measures in place where you can track your company assets is a good practice. And data leakage arising from my loss and Solon laptops with this data ends up on the dark web and it's on sale and people pay good money for it. And data leakage arising from user emails with sensitive content directly being sent to unintended recipients. So spoofing emails, phishing emails. This is all part of certain tactics that the attackers can, can take, can take, can take an int kinda run with it. So, so these are just some of the common security threats that are, that are currently happening in the security world. So we'll take a look at in the next lesson, some of the security features in Microsoft D6, D5, that'll help you protect the identity axis and protect your information and data. 70. LESSON 2: In this lesson, we're gonna talk about the different security features in Microsoft D6, D5. I'm gonna go through this in detail, but feel free to go through these. And I'm platforms, basically, lots of different ways of protecting environment, keep the information from release, leaking out. So let's take a look at identity and access and how we can protect it. So with Microsoft D6, D5, simply going out there and using a username and password is not enough anymore. Yes, we need to have strong passwords and something monitoring to make sure that people aren't getting into our environment. Which means we need something like Azure AD, Identity Protection, having the ability to use multi-factor authentication and conditional access. So you have to be coming from a specific network and device in order to come in to their company environment. So we can restrict on what the user's doing. For example, if someone's coming from an anomaly, anonymous location or IP, we can block that access or until someone can verify their location. Now someone might be on vacation there. They're working from vacation in Florida, for example. And you don't want to block them just because they are on vacation and they just sign in to check e-mails or something. So there's certain flexibility that Microsoft provides and gives you that control to be able to allow or block certain users based on the situation. But Microsoft does a pretty good job and identifying the malicious attempts in an Access. Let's talk a bit about the threat protection and Microsoft the 65. So Threat Protection helps protect users identities, devices, userData apps and your infrastructure. The following solutions, as you can see on this on the slide there. They're included in Microsoft D6, D5, and help you deal with threats to your users devices and data. Azure Active Directory Identity Protection is more than just the monitoring and reporting tool. You can configure risk-based policies that automatically respond to issues. These policies, along with other conditional access controls, can either be automatically block or start to remediation access like resetting passwords or enforcing multifactor authentication. And if you have the E5 plan or any five plan, and you have this feature. So it monitors a logging behavior and knows who you are. If you're from the US and nausea from the US and not logging in from Africa. For example. Azure, advanced threat protection or ATP. It's a Cloud-based security solution that identifies the tax and helps you investigate advanced threats or compromise identities and malicious insider actions directed at your organization. You can pull security reports and user profile analytics. It helps you reduce tax surface. Making your harder to compromise user credentials and advanced attack on the company. Azure Security Center. It provides unified security management and advanced our protection. So you can get a unified view of security across your on-premise and cloud workloads. You can automatically discover an onboard new Azure resources, apply security policies and security standards. You can collect, search, and analyze security data from a variety of sources, including firewalls and partner solutions. So let's just part of the Azure Security Center feature. Microsoft cloud app security gives you visibility into your cloud. Apps and services, provides analytics to identify and combat cyber threats. Enables you to control how your data travels. So you can control how or when someone's asked accessing your data. Microsoft Exchange Online protection. So this is a cloud-based email filtering service that helps you against spam and malware. They also third party applications like spam filter. Spam filters that help you block this. Certain organizations have that in place it along with a ELP. I believe it's more overkill. But I believe ELP does a very good job in simplifying the management of your messaging environment. You can helps you alleviate many of the burdens that come with them maintaining and maintaining an on-premise hardware and software. And like the spam filter, for example. Microsoft in-tune, which is mobile device management component of Enterprise Mobility and Security, integrates with Azure AD for identity and access control. So when you use a with Office 365 for example, you help your users be protective or productive on all the devices while protecting your information. For example, Microsoft into and prevents users from copying company data from managed applications installed on unmanaged devices. So again, end-to-end is also only available via the E5 subscription. And if you only have Microsoft Office 365, all faced the 65 advanced stuff protection. Since email as a primary way, malware gets into your organization. Atp helps them to identify these threats before they land in the user's mailbox. So this feature, also in the E5 subscription, provides a protection by scanning e-mail and URLs in those emails, identifying, blocking malicious files that are also sent via the attachment. Detecting someone tries to impersonate one of your users to access your organization's data. This is a big, big problem with someone trying to spoof another user's email. So ATP also includes what's called Safe Links, which is a feature that scans emails in real time. And sends uses a warning message if they select building that couldn't be malicious. It includes attack simulator, which he can use to run realistic attack scenarios in your organization. Attack simulations include password spray, brute force password, and display name, spear phishing attacks. And finally, offices 365 barred intelligence, which is a collection of insights and information available in the office of 65 Security and Compliance Center. The Foreign Intelligence monitors signals, gathers data from multiple sources such as user activity, authentication, email, compromise, PCs, and security incidents. So you can use this information to understand and respond to threats against users and intellectual property. Let's move on to Information Protection in Microsoft 365. So to protect information, follow the data through its entire lifecycle, as, as you can see in this image. First recreate the data. You know, any document, their Word document or something. We try to use the AIP Azure Identity Protection to classify the data by automatically or having the user manually apply a label to it. You know, for example, if you're putting in a credit card information into the file, you can apply label saying this has credit card information and applying certain label or center certain policy so that this information is encrypted. So that now the data, when it travels, there's a monitor that's monitoring it. And that's, that's how the labels applied to it. And eventually when you no longer need the data, you can apply a policy to permanently remove or retire that data. Let's talk about discovering and classifying sensitive information. So now you have to discover sensitive information. How do you do that? Microsoft has built-in over 80 scientists, sensitive information types that we can build policy around. So if he has something that looks like a sin car like I'd previously disgust or a credit card or a bank routing number or something. We can automate the process to protect that information. We can use things like the content search to locate it, apply a policy to locate it. We can create our own sensitive information types. Doesn't have to be the one that Microsoft provides. For example, if we need, need to have a project with a certain name in it to apply policy for it. We can apply certain policies for that. We can put a, excuse me, a watermark or label so that people know that it's a confidential information that they get a little yellow tip bar that says, okay, this has confidential information and you can share this information for anyone to anyone externally. We can protect the information regardless of whether it's in our environment, leaves our environment. So the user needs the appropriate permissions to be able to access this data. And in the final or in their next lab, we're actually going to talk about Microsoft E6, E5, security Senate. So security center has what's called a secure score. So this secure score is based on certain requirements that if you follow, your score will be higher. So this is like risk analysis on what's happening in your company. You gotta give you, gives you a snapshot view. What you're secure security score is like. And to increase it and what you can do to increase it. You know, for example, setting up our multi-factor authentication. Certain complexity in passwords and things like that. So there's a lot of different ways that you can increase that score. So I found between 500 to 800 to be reasonable. Anything hires is more for extremely security focused companies that require the data to be kinda like Fort Knox. But Microsoft does a good job in protecting your data as long as you're, you're between that score. You also don't want to limit data access to your own employees without having to go through certain hoops and procedures. So yeah, basically, Microsoft the 65 Security Center and gives you a snapshot view of what your security picture looks like in your organization. And we'll go through that in the live demo in the, in the next slide. 71. DEMO - MICROSOFT SECURITY CENTER: And this section, we're going to be going through the Microsoft 365 Security Center. There's gonna be a live demonstration of the portal that's available via security dot So as soon as you log into this portal, you'll see on the left-hand side here you see the home or parts secure score and other links here. This layout changes frequently. So Microsoft's always making changes to the dashboard, making changes their security policies returns you and sensitivity labels. And Microsoft makes these changes on an ad hoc basis. So you'll often see some of these services changed like the admin panel change, the dashboard changes, reports change. So never rely on screenshot. Someone sends you from six months ago because likely that the dashboards likely had changed. So with that being said, let's take a look at the homepage, current homepage of the Microsoft Security Center. So you can see the first thing you'll see is a secure score. So we left it low just to give you an idea of what you can do to improve the score. So 33%, which is 19 out of the 57 points achieved. So when you click on improve your score, you'll see the different points mentioned here that'll allow you to increase that score. So these are the different points do not expire password ensure all users can completely multi-factor and it has a weight of the point associated with it. So if you complete this for example, or even this one, and that means that your, your percentage will go down much higher. So these points have score impact associated with them. The more you complete, the higher security squirrel OB. So essentially that's the, that's the secure score. Let's go on to classification. We're going to be discussing these in a little bit more detail in a few in the upcoming course material. But basically sensitivity labels, and they use a classified emails, documents, sites. So when labels applied, you can apply policy to that label. So you can basically tell Microsoft what to do if a certain situation happens. So those are sensitivity and retention labels. And we'll discuss these in more detail on how to create them and how they actually work. So you can see, this is the section here. This is a sensitive information type. So you can see credit card numbers, Social Insurance numbers. So you can apply those here. And you can even create a new and for ty for example, if you want to create one for confidential project, for example, project number, you can create that here. So you can see Microsoft does a pretty good job in addressing a lot of the sensitive information types that you can use to Apply these policies. So it'll help make things easier. You don't have to import a lot of this information. Microsoft doesn't really good job of doing that for you. Label analytics. So this basically shows you how the labels being used. So currently we don't have any labels setup, but basically once you have them set up and this page will tell you how they're being used, what's happening with certain information that's being shared, where it's going, who seeing it, things like that. So some of the features here require E5 license as well. So you'll have to see what actually is part of this dashboard that requires that E5 license. So we'll go into a little bit more detail a little bit later on, on that side of things. For policies. You can see here, you can set up certain types of alerts. So for example, if someone is an awfully through 65, they get a certain email. You can set what to do when a certain email is detected. So for example here, let's see suspicious email sending patterns as a severity medium. And what to do with that. You can enable these policies based on your risk level. So you can see some of these severities are high. So you can enable some of these depending on how you'd want to structure your security strategy. This part here is it takes you to protection dot as you see. And this you can apply in this URL only. So security dot is specifically for these and these areas here. But then they take you the links take you to specific different links. Also on the Microsoft dot portal site. So Protection dot is also part of security. You have more information and more flexibility on making some of these changes here. So we're not gonna go through this in detail. This gets covered usually in the MSF 500s security course. But you can see there's a lot of different options here that you can use to adjust your security strategy. So going back to this security to Security and Compliance Center, you can have these links here that allow you to get a better understanding where your security kinda stands in a nutshell. So then once you understand this, then you can apply these labels and go ahead and apply their learned policies and things like that. It'll give you more control over your data protection, your information protection, your identity protection. And just gives them more control over the administrators had or whoever's whoever's involved in managing the security side of things. So this was just a brief overview of the Security Center. Let's move on to the next and the next section of the course. 72. IDENTITY AND ACCESS MANAGEMENT: So Azure AD comes with P1 on e3 subscription and p2 in the E5 plan. You can by Azure AD as part of a separate package. But we'll discuss this in the next module. These are the features that Azure AD provides. So self-service group management. So users can manage their own groups, Advanced Security Reports and alerts. And you get increased reporting and alerting capability. For example, if someone accesses and on-premise application, that's not normal in like in a normal behavior, we get multi-factor authentication. So you can set that up what they Microsoft at or text messaging gives you high level of security. And that, that you can implement in your environment. And Microsoft Identity Manager, you can leverage MIM for on-premise applications. With password resets, users can actually perform the password reset as well. Conditional access, it gives you Azure AD Connect Health, which is monitoring the Sync Service. This is more for companies that have a hybrid environment. Azure pin. So you can now have just-in-time access to things. So let's move on to the identity protection features. So what is identity protection? It's a set of technologies that you implement to help you proactively monitor user behavior, especially during authentication and to take actions, a risk or vulnerability is detected. So each computer today typically has at least five identities or accounts for accessing local or Internet-based resources. And an employee, for example, usually has more than one business account to access resources in their business. This is actually a good thing because if, if you have one account and that is 1 of failure, right? So if you have multiple accounts, say you can secure those individually based on how important they are for your line of business applications and things like that. So the more important they are, the higher security you can apply to them. With Azure AD Identity Protection, it uses the monitoring features to recognize that potential security risks, such as determining your location. So if you're located in one location and if you try your sign-on from somewhere else, it will block your connection. And it requires you, it'll require you to reset your password or setup all multi-factor authentication. Azure AD Identity Protection is a good way to help provide you all the administrator and the peace of mind that the features in place well, it will prevent the identity hijack. 73. Why business environments need to protect devices and data: So why would a business environments need to protect devices and data? The past decade has bought a massive influx of mobile technology into the workplace. So iPads, iPhones, and mobile devices, Android mobile devices, Google mobile devices. So different manufacturers, different brands making these devices are coming into this corporate environment. And then companies are introducing BYOD. So they're saying, OK, you can bring your own device and you set up your company email on your personal device. So that opens doors to two security risks. While this enables more flexibility for the employee to be more productive, it also presents big security risks as well. If this data was to get into the wrong hands, for example, there'd be some serious consequences. If you're like the HIPAA or if you're in the medical field, you have to be HIPAA compliant. So a lot of these factors need to be taken into consideration. It's safe to say, with this sort of data being exposed, a certain degree of security is required to prevent the worst from happening. In order to enable this kind of freedom. Owning a company phone has, and like the company network, company data also needs to be protected. Mobile device management is a solution that will help with this kind of dilemma. Mobile device management can help streamline issuing mobile phones, while also ensuring that mobile devices across the enterprise remain safe. Implementing an MDM solution doesn't have to be more work. Automation can be find it via the IT department. Small, tedious tasks like software updates can be automated with most MDM solutions. Removing some of the burden from the ovary, utilized IT department as it is. 74. How Microsoft 365 helps protect data in an organization: In tune forms a part of the Microsoft enterprise mobile security package, which is a comprehensive device management suite. Due to being a cloud-based tool in tune serves your organization regardless of where you are and has the flexibility to grow their business to. Our protection policies are rules you can put into place to ensure your businesses data and remain safe or contained in a managed app. Some of the examples of rules and in tune admin can set are and end users must sign in with a password. Every time they access business data on their mobile device, he must set or he or she must set, can also set. A device can not be jailbroken or routing. They must have the latest version of the operating system installed on their device. And the device must not exceed a certain threat level. So these are different rules at the admin can can apply. So let's move on to how Microsoft do 65 helps protect data. In an organization. We can protect corporate data by using compliance policies which can be created in, in tune. And you can restrict users from accessing data unless you're, you're on a compliant device. If you're on a device that's non-compliant, then you can control to whether to allow the device to corporate data or not. For example, if you route a device and you listed your device as noncompliant, you can set up a policy to not allow corporate data on their route at device. You can also control where company data is being shared. For example, you can't copy and paste data from a Word document into Instagram. Because Instagram is not an approved or trusted company application. 75. WIP: The main idea behind Windows Information Protection is to keep work and personal data separate and protect corporate data. So as a result, WIP can help reduce the risk of accidental data leaks. For example, apps and email services like Gmail, which are outside the enterprises control. Therefore, what needs to know the difference between work and personal related data? What adds a tag to corporate data and define by a corporate identity, I can toss or whatever your is. And network boundaries like can TASO dot Therefore, Data's automatically encrypted when C from these corporate sources to your devices using what's called Windows in corruption file system. In other words, whip does not encrypt your files on SharePoint or OneDrive. It only encrypts the corporate data saved to your device. Using whip without enrollment, which is mam, administrators can identify which apps are allowed to access corporate data and whether users can copy data from those files and then paste that data. Personal documents are not. For personal data. Performing a Selective Wipe will not delete personal files. And when the user removes his or her purse, workplace account, only the corporate data on their personal devices. Remote, protected corporate data will be revoked and inaccessible once a device is unrolled and enrolled from Azure, AD. Administrators can also remotely wipe corporate data from devices. While leading the personal data untouched. Of course. 76. AIP: Let's talk about Azure Information Protection. It's a cloud solution that gives an organization the power to classify and protect documents, data, and emails with labels. Working with the robust Microsoft Azure platform, it's able to improve upon the existing infrastructure of Microsoft Azure to ensure that the classified and sensitive information or documents aren't compromised. Under AIP, labels can be applied manually or automatically generated. Based on Saturn rules are conditions like we saw in the Security Center. Administrators can recommend settings for documents that contain important information. Security information such as credit card numbers or sin numbers, while also allowing employees to manually labeled documents as being classified like We also saw on, you know, we had a list of all the templates that Microsoft added in, but you can also add manual labeled documents in there as well. So employees attempt to send documents that have the security information and outside of their system, there'll be alerted. 77. Service Trust Portal and Compliance Manager: So we've reached the final lesson of this module and security module and the last lesson five, or compliance in Microsoft 365. Here, this lesson will describe the three pillars of compliance. Explain the benefits of the Compliance Manager tool, and describe the Microsoft Compliance Center, which you'll be a demo. And then I'll go through with you guys showing you what the Microsoft compliance center consists of. So let's talk about the common compliance needs in today's business environments. In order to legally operate, businesses must comply with certain requirements. Regarding their company's transactions, labor practices, safety procedures, and things like that. Before launching your business, you should know the appropriate regulate regulations for your industry while making sure to keep a log of any cost and dates related to their compliance. So talking simply, you can be a US based company and have a US staff. But we required to meet GDPR rules of the, of the EU just because one of your customers does bins as in Europe. There, their compliance from government policies, corporate policies, and granting people access to data stored about them. You know, defining retention period, how long we have to keep something. For example, the government can tell you, you have to keep certain documents for a specific period of time. Exposing someone's health information or other information can cause you finds. So for example, if data's leaving your environment and going into someone else's, it's, yeah, it's your responsibility to make sure that data is safe. So this is where Microsoft comes in and guide you in meeting these compliance requirements. The Service Trust Portal is a one-stop shop for security, regulatory compliance and privacy information and related to the Microsoft Cloud Service Trust Portal, also referred to simply as SDP, is a service feature that's available within Microsoft, obviously 65. It provides current and prospective users of the platform with a wealth of insight into how the tech giants and managed Piranesi compliance and security. The platforms and location where Microsoft shares information that organizations need to perform, due diligence and evaluate all of their Microsoft Cloud Services. Microsoft launched a service basically as a way to improve transparency. Transparency, enhance the understanding and simplify the assessment for the users. The STP contains quite a bit of useful information. Completing all compiled from all across the different Microsoft Cloud services. It also has tools and other resources that the organizations need for all things concerning security compliance and privacy. 78. DEMO Compliance Manager: So we're going to briefly go through the service transporter and Compliance Manager. Compliance Manager is going to be the primary portal that we're gonna be going through. So open it up here. So basically, this is the compliance manager that tells you if you're in compliant to based on the compliance score or not. So Microsoft has certain criteria that they assess you on. These different criteria that they're assessing us on. The access control assessment, authorization, monitoring, configuration management manager, and all these things. So as you can see, there's a lot of compliance policies that you have to review as accompany. So Microsoft does their part in making sure that their ear compliant. But you also have to do your own part. There can be compliance policies such as doing exit interviews for employees that leave the company. Anonymous and guest access policies. What they can and cannot do things like that. So a lot of these different policies, you'd really have to go through them in detail and see what works for you and your security strategy. But this dashboard lists all of them in 11 clean snapshot for action items. Once you click on a, tells you what you have to complete in order to be compliant. So as you can see, this tendency compliance score is 75%. And what you can do to increase that score. So let's see here. So anonymized usage activity. So you can review that and put in your notes for what you can do for that to meet compliance for this policy, assign it to a specific user and have them be responsible to maintaining that compliance policy. So all of these policies can be assigned to specific individuals so that they are responsible for adhering to these policies that can be department based or individual-based. 90 for IT, for example, blocking legacy on the authentication, certain policies and for HR to make sure that the devices are properly formatted or company data is properly removed, things like that. So this is a huge list of action items that need to be completed. Um, and here you can see some of the different compliances. Kip and ISO. A few company deals with transactions. And yep. So basically this is the compliance manager that allows you to add users have certain compliance policies and complete them to make sure that you're you're fully compliant and you're not at risk or your company's not at risk. Penetrating or or going against some of these policies. 79. COMPLIANCE: So we're going to briefly go through the service transporter and Compliance Manager. Compliance Manager is going to be the primary portal that we're gonna be going through. So open it up here. So basically, this is the compliance manager that tells you if you're in compliant to based on the compliance score or not. So Microsoft has certain criteria that they assess you on. These different criteria that they're assessing us on. The access control assessment, authorization, monitoring, configuration management manager, and all these things. So as you can see, there's a lot of compliance policies that you have to review as accompany. So Microsoft does their part in making sure that their ear compliant. But you also have to do your own part. There can be compliance policies such as doing exit interviews for employees that leave the company. Anonymous and guest access policies. What they can and cannot do things like that. So a lot of these different policies, you'd really have to go through them in detail and see what works for you and your security strategy. But this dashboard lists all of them in 11 clean snapshot for action items. Once you click on a, tells you what you have to complete in order to be compliant. So as you can see, this tendency compliance score is 75%. And what you can do to increase that score. So let's see here. So anonymized usage activity. So you can review that and put in your notes for what you can do for that to meet compliance for this policy, assign it to a specific user and have them be responsible to maintaining that compliance policy. So all of these policies can be assigned to specific individuals so that they are responsible for adhering to these policies that can be department based or individual-based. 90 for IT, for example, blocking legacy on the authentication, certain policies and for HR to make sure that the devices are properly formatted or company data is properly removed, things like that. So this is a huge list of action items that need to be completed. Um, and here you can see some of the different compliances. Kip and ISO. A few company deals with transactions. And yep. So basically this is the compliance manager that allows you to add users have certain compliance policies and complete them to make sure that you're you're fully compliant and you're not at risk or your company's not at risk. Penetrating or or going against some of these policies. 80. Retention and Sensitivity Labels: A cop's your organization. You probably have different types of content that I require different action items on them in order to comply with the industry regulations and internal policies. For example, you might have talks form standing to be retained for a minimum period of time. You may have a press materials that need to be permanent, permanently deleted when they reach a certain age or certain time. Competitive research that needs to be retained and then permanently deleted, for example. And then for government policies, you have work visas that must be marked as a records or they can't be added or deleted. So in all these cases, the retention labels in Office 365 can help you take the right actions on specific type of content. So you can pick different actions on different types of content based on what your requirements are. With retention labels, you can classify data across your organization for governance, for enforcing retention rules. Based on the classification, we'll get a little bit more detail. So I just wanted to just summarize Essentially, what can you do with these labels that you want to apply to beta? And that's basically what tension insensitive to be labels are. So you can enable people in your organization to apply retention label manually to content and Outlook on the Web. Outlook 2010, OneDrive SharePoint in office he 65 groups, et cetera. Users often know what, what kind of content they're working with so they can classify it accordingly. So for example, HR has specific task they need to perform. It has specific task management, non-specific pass. So all these can be put into these retention and sensitivity labels and the IT administrator can apply these, of course, are whoever whoever has access when applying retention labels to content automatically, if a match a specific condition, such as when the, when the content contains specific types of sensitive information, like sin numbers or credit card numbers, specific keywords that match a specific query that you equate. You can apply labels to, you know, patterns that match for specific class classification. It's a little bit complicated at this point, but let's go to a scenario example that'll help explain a little bit better. 81. Scenario Example: Let's take a look at this scenario. Malcolm Singer is an IT admin who needs to create some new retention and sensitivity labels. So he goes into the Security and Compliance centers. You can see on the screen, navigates to the classifications and decides to start with retention labels. So first things first, what does he have to do? Yes, I gave it a name. He has to give it a description for admins. So this is not mandatory. Even that description for users also not mandatory. So it gives it a description just for everyone's information, whoever has access so they can see this information always a good idea too. Put this information in next in the label settings. While it's possible to create a retention label with no settings. The whole point of retention labeled is to define the retention period and then define what happens after that period ends are expires. So in this instance, contracts must be kept for three years. After that, Cindy in finance is responsible for reviewing them. So the clock starts as soon as the content is labeled and you click apply and go to the next screen. Retention levels include the option to declare a document as a SharePoint record, which means that it can't be edited or deleted. However, the emitted metadata about a record can be edited. So in this instance, Malcolm isn't setting the label to declare content as a record. Once the labels created, it still needs to be published in order for it to be available to everyone else who has access. Labels are published to a label policy. And individual labels maybe publish to multiple labor policies as well. Whenever retention labels published to a naval policy, it can be made available to all supported office 65 services, you know, groups Exchange, SharePoint and OneDrive. Or it can be limited to specific services as well. By selecting the latter option, a label policy can also be limited to specific users or group of users. So pretty common use case might be, you know, like a department X has very flying tune labor requirements that don't apply to anyone else. So why is this all important? And the Finance Department, for example, might have a sophisticated set of labels that they use identify retention and retention policies. They might have labels for contracts, you know, credit memos, payables, receivables, and so on. So perhaps Malcolm has already created a dozen labels for finance and apply them to a policy called financial retention policy the following month. And the facilities team tells Malcolm that they want to ensure that they don't throw away any contracts. So after talking to them, Malcolm realize is that the definition of contract quarter and coal use for finance works well enough for facilities, but the data won't need the others. So in response, Malcolm creates a new facilities retention policies that only has one label for contracts. So both of these policies are limited in scope to facilities and finance. And thereby you can specify, know how they, how they work for finance and how they work for facilities. 82. Module 3 REVIEW: Well done, you've made it through Module three. So let's take a brief look at the module in summary, to refresh your memory on the key concepts that we discussed. And then after that we'll live review the practice questions that might be on the exam as well. So and level one or sorry, lesson one. We talked about security fundamentals, the key pillars and the most common security threats. Threat protection contacts, common security threats. So general, fundamental overview of security in general. And we kinda went deeper into that and how Microsoft the 65 security features are used. You know how we described how Microsoft you 65 helps protect Identity and Access. Protects you against threats and protect your information through AIP classifies information to protect it from data loss. So that's with WIP. And then we went through the demo and lab exercise and then Microsoft you 65 Security Center. Just a bit on this security center part. It's better to go back to that demo and kinda go through it again. If you have time, I would go through the Security Center and more detail so you can have some practical knowledge about it. In the exams, you do see questions about practical scenario, scenario examples. You know, they say, How would you get to this screen? What options would you select at this green kind of those kind of questions. Lesson three, Identity and Access Management. We talked about the features of Azure, AD, and AIP. And then we talked about device and data protection in lesson four, that the need for device management, and we talked about MDM and how in tune provides divided device protection. We talked about Microsoft through 65 services in your organization, how you can use it to protect the, the different devices, how to enroll them. And what not. Less than five, we talked about compliance and just the recently describing the three pillars of compliance, benefits of Compliance Manager tool. Again, I would urge you to go to the companion of the Compliance Manager tool as well as a Compliance Center. Just so you have an idea of where certain features are, where certain windows are. I know this is always changing, but Microsoft exam, they do ask these type of questions. We talked about retention and sensitivity labels and then went through this example of when and how you would apply the sensitivity labels. And so next we'll move on to the exam questions, practical or practice exam question, sorry. 83. Exam Questions: So let's take a look at some of these practice exam questions for this module. So again, I'm going to display the question and also display the answer. After a short pause, feel free to take a snapshot or our screenshot of the question and save it in a Word file and practice if you, if you need to, alternately, you can just pause it and the short wildest resume and you'll see the answer for that question. So first questions, here it is. And here's the answer. Question number two. And here's the answer. Alright, that concludes Module three. Let's move on to the final module of this course is going to be small one short one, Microsoft 365 pricing and support. See you in the next module. 84. MODULE 4 Pricing and Support: So welcome to the Microsoft we 65 pricing and support final module of this course. This is going to be a cook module that discusses Microsoft do 65 pricing and support. As the title state will go to the different types of subscriptions. Some of the licenses which consistently change Microsoft, some men changing the verbage on these licenses. So it's a good idea to just keep up to date with this billing and support. And Microsoft through 65 will also go through, I'll share some links on a specific page that gives you an overview as an up-to-date paid someone keeps updating on how Microsoft Dom keeps their licenses and changes their licenses and naming conventions. So let's move on. We're gonna talk about the school to the, just a brief overview of the lessons in this course. Just going to be the two lessons, which is going to be Microsoft few 65 subscriptions, updates, licenses, and billing. So we're gonna talk about the different subscription options. How we can manage that subscription. So you can always manage it as a partner or as individual company. You can add or remove licenses. How to do that from a user manager, Microsoft D6, D5 billing, who can have access to that billing? For example, you can assign billing administrator rules for specific users. They can manage that. Explaining the different or the typical Microsoft the 65 lifecycle phases as well. And the final lesson of this module is going to be support and Microsoft is 65. So what support options that are available? How are they in terms of their SLA? How they how are they in terms of support, quality, and whatnot? We'll discuss that in this lesson. And we'll talk about how to create a service request, has to review and existing service requests. Even historical service requires for, if you need it for archiving purposes when whatnot will talk about demonstrating how to monitor your Microsoft V. 65 health as well as part of this lesson. So first lesson, Microsoft through 65 subscriptions, updates, licenses, and billing. So this lesson's meant to clear up some confusion and ambiguity around licensing for Microsoft cloud subscriptions. So throughout the past three modules, you've heard me talk about licensing. Since Microsoft doesn't make it easy with the different business, enterprise essentials, desktop education, i E one, F1, e3, e5. There's so many different type of subscriptions and licenses. It's really hard to keep track of these different Dom, cabbages and abbreviations, right? So I'll try to make it as simple as possible so you understand why Microsoft's done it this way. So with offers to be 65. Licensing this way, we got Office 365 and Enterprise Mobility and Security. Office you CCR5 is productivity focused. So it gives you a familiar collection of applications we're all used to. On the apps. On the app side, you got Word, Excel, PowerPoint and so on. And then on the services side, you've got Exchange, SharePoint teams, OneDrive, it, et cetera, right? So now by the time you've made your way through all of these offices, usually do 65 offering. You'll probably find that it covers a vast majority of business services that people use across organizations on a day-to-day basis. And the other big package of products is Enterprise Mobility and Security. So as the name suggests, it focuses on the security side of things. Protecting your data, your devices, against the modern landscape. Now, it can be used independently of office do 65, but the two really complement each other. They are more complimentary. Offered through 65 IS giving access to your data on any device. Anywhere in the world. Enterprise mobility and security is about protecting that data when it's on that device anywhere in the world. So it's worth mentioning that you don't have to buy the full package. You can buy a lot of the individual components separately in these two different service models. In fact, some of the components of Enterprise Mobility and Security and in fact, product packages themselves. Azure Active Directory, for example, it contains an ever-expanding list of identity and access management services. So you can pick what you'd need. But if you're going to be using a field, them, it might be better value and just the by the package, right? So with Microsoft, where Microsoft, like, where does Microsoft 305 really fit into this whole thing? Microsoft do 65 is kinda like an all encompassing product suite. So it includes Office the 65 and Enterprise Mobility and Security, and Windows ten. Alright, sorry, it's a little cut off on the right side, but that's that green box must be Windows ten. So whether Cloud subscription, you get the added advantage that you're always license for the latest version. This can help avoid the trap that some businesses find themselves and where they want to change. One little thing. But to change that one little thing means everything, everyone needs new licenses. And that one little thing becomes really expensive as a result. So this is particularly helpful when moving to cloud services because they tend to move quite quickly. And Microsoft requires you to keep your hand up to date as well. Something people quite often miss, and then they end up in trouble over it later. The definitely advantages to getting everything as a single per use license. And the cost of all those services can look quite good actually. And you get a lot for it essentially. But there's also a danger there. So you can easily end up buying a whole bunch of services that you don't actually use. So have a look at what you need and do the numbers. But you know, keep a realistic idea in your head of what you're actually going to be using. So don't overspend on stuff that you know, it looks good. A lot of nice features, but is it really going to be useful for you in your organization? Microsoft's constantly releasing, retiring, changing products and the cloud land. So for example, by the time you watch this training, it could be that intern might not be no more, right? So the current plan is that in tune and config manager going to be merged to form offering called endpoint manager. I think it's already taken place. So the exact products will change, but the overall theme of the package shouldn't remain roughly the same. Now, you know where Microsoft or office of 65 and Enterprise Mobility and Security and marks up the 65 all fit together. What about the different variations now? So for Office 365 in Microsoft, the 65, that different variations can broadly be split into one or two caps. You got business and you've got enterprise. The business plans are all named with the word business in front of them. So you got business essentials and business premium or just plain business. The enterprise plans are named with e, So e phi where y3, y1. They really like the odd number. So 1135 nor even ones exist at them in at the moment. So E2, E4, you can line the officers the five subscriptions up a little bit. So business essentially is roughly the equivalent of one. They both give you access to the standard set of online services and bring business premium is roughly the equivalent of E3, the ad on the Office client apps as well. So you can take a look at this plan comparison that I have here. And it gives you an overview of what kind of services are included in each plan. Alright, so that's a good idea to just kinda go over this, just to have it in the back of your mind. And we'll also go through a link that's active and give you, and gives you a better idea of what the current state of licensing naming conventions are. So the enterprise plans, as you can see, that the equivalent of people at denture eventually having the enterprise cows, right? It's roughly the same sort of feature difference. So there are couple of other big differences that could push you towards the enterprise subscription versus the business. Firstly, the business subscription top out at 300 users. So you can have more than that. So you've got, if you have more than 300 people in your organization, you're going to have to buy at least, at least some enterprise subscriptions. Another gotcha to watch out for is that office you 65 business plans that include the client apps do not cover shared computer activation. This is a feature that allows you to bypass the normal five computers for user activation limit. This can be important if your staff are irregularly hot desking, moving from one place to another, sharing computers. Or you know, if you use a remote desktop or a Citrix farm, for example, enterprise and Pro Plus subscriptions of obviously CCR5 do include this feature. And just to make matters more confusing, so does Microsoft do 65 business, which is called the Microsoft do 65 business, but not officer, the 65 business, two completely different. So it is a bit confusing. And this why, this is why people exist whose entire job is just to understand Microsoft licensing. Other than that, the enterprise subscriptions costs nearly twice as much as a business subscriptions. So if you don't need the extra features, you don't use shirts, devices, you've got less than 300 users saved the cash, go business. So that shows where the business and enterprise versions exist. Microsoft do 65. The different variations can broadly be split into one of the two camps. So you've got business, enterprise write. Business plans are all named Woodward business like we discussed. So you've got business essentials, business premium or just business. And then enterprise that E1, E3, E5, like we discuss. So they both give you access to the standards that are services. Business premium is roughly the equivalent of E3 and the ad on the Office client does as well. There's an E5 add-on for additional security services and telephony teams as well. So, but, but there's no business equivalent, equivalent of that is enterprise only. So there's also an office, the 65 business, which lines up with Office you 65 Pro Plus, which is just office on the enterprise side. So this gives you the client applications like Word, Excel, PowerPoint, and OneDrive. And it also includes the other enterprise services as well. So despite the similar name in incorporates Office365 business premium rather than officer crucified business. So just to keep things simple, as a general rule, the enterprise plans out a few extra, additional features compared to the business plan. That's basically the in one line. If I was to explain it. The enterprise plans out a few extra, extra additional features compared to the business buttons. So what about the A5? So there's to draw a rent in the in the in the mix here. We also have education A3 and a fives. There is, is for Education customers, pay for academic, you know, I just want to keep it simple. The roughly line up the enterprise equivalence. You got A1, which roughly lines up with y1, A3 for e3, and then a phi for e phi, which is the top of the line, would security features and whatnot. Now they don't quite line up. There's some differences as a few Education specific features in the, when we say a1, a1 plus and has specific education features. So you're going to have some more features there. That actually does come with Office, with the Office client. So it generally doesn't line up quite exactly, but it's similar to the E1 plan. Main difference, of course is the pricing. So the education variance, A1, A3, A5 there, they're a lot cheaper. And in some cases they're even free. So it all depends on the plan. And you know what, what's available to your education, educational institute. So let's also talk about the first line workers plan. So the F subscriptions that F1, which is F stands for first line. This is basically for people who technically don't use a computer for most of their day job. As such, these licenses are quite restricted, but can also significantly be cheaper and the normal ones compared to enterprise. Anyways, there, they're about half the price. So a user where the F1 license can access the same sort of services that a user with an E1 license can. But they can only use the web apps, right? They can't use the fall desktop applications even if they buy them elsewhere. So that's just that limitation. Now they can use mobile apps, but only in a small device. They can't use them on a device with a screen greater than 10.1 inches, right? They can also get a they also get an Exchange Online mailbox and but it's limited to two GB. They can join teams meetings, but they can create them. So it's not really suitable for a desk-based worker who spends a lot of time on a computer, but it's for someone who's out in about maybe on the shop floor. So it's half the price of a E1 license. So this works for someone that that that's technically has a different job than and a lot of people that spend most of their time on their computer. So hopefully this is cleared up some of the confusion behind the different subscription plans so that a series, f series and the series, I'll post another link where you can take a look at this in more detail. So let's move on. So also, just recently, Microsoft chains in naming the office CCR5 and Microsoft the 65 I licensed names. So as you can see on the screen, their office just for business essentials. Now Microsoft VC's by business basic. Business premium is Business Standard and then general businesses business premium. So again, in that link, it'll highlight for you and explain that to you in more detail. So we'll go to the lab demo. So in the live demo, we'll review the Lincoln. And let's go to that right now. 85. Live Demo Licensing: Okay, so we're gonna go to the demo of looking at the different licensing of this person's page, air and damage. He'd done a pretty good job of putting it all together on one page. So it gives you an overview of different types of licenses and what's actually included in those licenses. So let's open this up here. Said GitHub page. Last update was May 20, 20. So it's up to date, fairly up to date. So as you can see, signal look, I'm just going to decrease the so this is this Office 365. So just, just one of the examples, but dumb. When you go to that page, you'll see all these lengths here, right? You'll see the enterprise licensing, Microsoft Office's five business, business office, Education, Microsoft Enterprise Office Education, Office enterprise, Windows ten. So Microsoft doesn't make you really make it easy at all to show this information, but especially since I'm a pretty good job. So let's open some of these links here. So we'll start off with Windows ten. So as you can see what's included in Windows ten. So these are all the features that are included windows and E5 license. And same for this one, just another link that I opened from here. This is the office you see five E5 license. So on a high level, what's included? And you can always drill down or do a Google search on what's included in the online Exchange Online to plan to, for example, this is E3 licenses zoom into this a little bit. So mikes up C3, 65, e, three as well as Office is like E3. So they're considering, you know, getting certain services from e3 here. You can get them based on the license. So y3, and we'll give you all of this. Microsoft 365. E5 gives you these additional security and compliance features. That is all. So E5 security only license will give you all of this. If I've compliance will give you all of this. So this is a fairly well written out. So it gives you a good idea of what's actually included and the different licenses. So it's the E3 and e5. This is the Microsoft, the CCR5 business premium. So in the EMS license, this is what you can get as part of that 365 business premium. Right? So that's that. And then the licensing here, it's on a high level of what features you can expect that EMS E3. So Aaron does a good job with putting this altogether and it looks like it's up to date. So if you don't want miking that URL, and just for your reference in case you ever need to refer to it. It's better than just googling a lot of sense for information and takes saves a lot of time. So if you go through this, it'll save you a lot of time and just figuring out what I show a license actually need for the specific service that you need for your organization. So that concludes the demo. We'll continue with the module and we'll talk about how to manage subscriptions and Microsoft through 65. 86. Manage Subscriptions: So let's talk about how we can manage subscriptions and Microsoft 365. So each business has its own requirements, obviously, right? As we talked about the different licensing, you can apply specific features from this. If you want to apply specific features, you'd have to assign specific licenses. So how to manage your Microsoft do 65 subscription? This is likely one of the questions on the test, so how you can manage it as yeah, the Admin Center, you can you apply licenses using PowerShell commands and you can add a partner record. So if you have an MSP or someone that manages your IT department, they can also be added to manage your subscriptions. You can edit your suffocation address while you're managing them and can cancel your subscription from the Admin Center as well. So let's take a look at the demo of how we can actually manage our licensing. So I'm just going to pull up a page here. So this is a Admin center. So once you go into the admin center, they they've changed it quite a lot over the past few months. So you have the two modes here, like working in this one. Basically you, once you go into the active users, you would just have your list of users here. So for example, you want to change a user's licensing. Here. You would just go into licensing and apps. And you can see a list of all the licensing that she currently has. A she has office 55 y_3 plan. You can check or uncheck that and click save changes and that will update her to have that subscription or not. It does take a little bit of time to propagate, but it's been fairly instant on. A lot of times where I've applied or are removed licenses for our users. Aside from the main licensing here, you also have the different apps that you can allow for the user. So as you can see in this plan, she has a E3 license. So long as this is checked, you can actually disable certain features from that license. So for example, if you don't want to, I want her to have access to flow. You can just disable that or any other, you know, specific services that you don't use, you know, then you can just disable from here, hit Save Changes and she will have access to that anymore. Shields, they'll still continue to have access to Office apps and everything that's included with the Office 365 E3 subscription. Let's also take a look at the admin portal and billing. So you go into the Billing here. So if you go into purchase services, you can actually go in and purchase specific licensing, right from this page here. So you have different solution providers that you can look into purchasing from. You can actually right away go into here and I'm purchase specific licensing. If you don't have a third party company that you deal with, you can go into here and just purchase directly from Microsoft as well. So you have the purchase services, business science, and whatnot. So a lot of it is included here. Gives you a snapshot of all your products that you currently have and what you're paying for them and what now you can see your bills in payments here. Different billing accounts, parent methods and notification setup for specific administrators or HR or finance and whatnot. This gives you a list of all the licenses that you currently have and who they're applied to and whatnot. If you don't want to go through each user and see what they have, just click on licensing and you can see exactly what you have here and how it's being applied. So this has, has changed significantly. The constantly make changes to the back-end in the admin portal. So you'll see different changes everytime you probably log in. But this is pretty good because it gives you an overview of what actually you are actually paying for, right? So what's included in this plan that gives you the Office apps and which Office apps and whatnot. So there's a good overview of what you can see, where what you're actually paying for and what you're actually getting right? So BLS, basically an overview of the billing part of the admin portal. You'll probably see additional features here. As Microsoft continues to develop this, the backend page swell. So next we're gonna move on to support and Microsoft you 65. So we're gonna talk about what support options are available with Microsoft through 65 guaranteed SLAs for this CSP because they have certain liability and they have certain guarantees any to provide you as a customer, right, because you're paying for that service. So when go through, briefly discuss these and also have a demo to show you how to create a service request, how to review any active service requests, and then finally how to monitor your Microsoft, the 65 health. So when you go into the admin portal, you'll see, as I mentioned, that this consistently changes, but the support module has been consistently the same. It hasn't changed a lot. So when you get into this admin panel and you first create a service request, you're gonna get the tier one support. First off the bat. Usually when you create a service request, the generally get back to you within within 15 minutes or so. With every Microsoft 365 enterprise business, education, government subscription, Microsoft support provides global technical and pre, you know, presales, billing subscription support as well. Supports available for both from both online and through the Office portal. And it's also available through telephone for both paid and Charles subscriptions as well. So when you go into the admin center, admin dot, you get a message saying that you don't have permissions to access this page. When you click need help, you click the Need Help button as you see in the picture there. And then contact support. You put in a description, you put in your contact number, e-mail address, contact method, and what not. And the contact you they tell you the expected weight time. Generally, I've found that to be above 15 minutes. You also have the option to pay for additional support, like premium support. But generally, Microsoft provides this as a, as a start starting place to get support. There is also third party services that provide support on behalf Microsoft. So these are third party companies, support companies that are contracted by Microsoft to provide the support for their services. We'll go through this in more detail in the demo. So let's talk about SLA. You'll get the priority based on severity of the issue. So if it's a P1, your email's down. They're gonna get someone on it right away. And they if they need to involve a higher-level technician that will get them involved as soon as possible. I've generally found their support to be okay. They haven't had a couple of issues, but they're complicated issues. They haven't level one agents have not been able to resolve. So they do get escalated and they do get back to you fairly quickly. So it all depends on how fast you can get by the level one support. So if you're issues affecting one or two users, not the entire environment, you'll get a specific time to repair guarantee. If it's just a basic question about a feature or how you can get a feature. It's even less of a priority, right? Just make sense. But if your entire organization is down or environments down, they'll treat is the highest priority and char to live up to the 99% of available time guaranteed as well. So in addition to your CSP is SSH SLA. Microsoft offers a Microsoft Online Service Agreement as well. So when you sign up with Microsoft, you haven't you have this agreement that you agree to and it lists the SLAs in more detail. And what happens if they miss the SLA and what not. So there's a lot more detail in data if you are born and go through it. So next we're gonna talk, we're gonna go through the live demo of how to create a service request. So as you can see here, you have a support module here. You just click New service request after that. And you'll see this page here, need help. This has changed. So let's say, you know, is down. Nothing came up. So what you're gonna do is just hit enter and it'll look for a solution. If it can't find something, then you have the option to contact support, right? You click support. And this is the, what I was mentioning before as the different support teams that can assist you with your issue. Generally, I've found it to best to create their Microsoft service request. So you just click a new Microsoft servers request and it'll take you through the details of your issue. So you have to specify your title, description in more detail. A phone number, for example, your email address and whatnot. So once you put this information in, then you can numb. They'll contact you within a specific amount of time and they'll tell you what, when they'll get back to you and what not. This is also a screen where you can see previous service requests that have been opened, but where they resolved or what what happened in that service requests. All the details are listed here as well. So these are generated three tabs that and that you can expect to see when you create a new service request. You can also turn off this support assistance second automated bot that tells you, okay, if this is your issue, go through this KB and whatnot. I've generally found better to talk to someone or discuss the issue with the live agent, then go through the articles personally. So in a nutshell, that's essentially how to create a service requests and how to manage it. 87. Microsoft Service Health: So finally, we're going to talk about Microsoft do 65 services health. This is essentially is tells you what services are currently up and what's down. So when you Google this, you'll get this page here. And you can click on V or Microsoft through 65 bus service health. And it lists if there's any ever any any issues with any of the services that we currently have. So you'll see different advisories for a few experiences. There are certain issues I would advise this would be the first place. You should check to see if the service is actually functioning or if it's degraded. So as you can see here, there's four advisories for exchange and the list that title. And if you click on it, it gives you more detail. And then go back to all services. And then same thing here. If you go into more detail, you can take a look at the what the issue is and next update by Tuesday, September eighth. So they also started listing the when approximate ETA on when you can expect a resolution. So that's nice to have there. Now you can always see the history of what went down in the past. And if ever, you need to explain something to management or whatnot. And you can always go back to history of reported issues by Microsoft and what they did to fix it. You can look at your reported issues if you report it, anything. In this section here, they essentially this would be the first place to check if there's ever any service degradation. And then you can go on to troubleshooting the issue if it's not listed here and on your end. And if you can't figure it out, then there's always support. So create a support request and talk to a technician. I found that very useful in a lot of the troubleshooting that I've done with it. So. 88. Practice Questions: Let's go through a couple of questions for this module, and I'll do the same thing with posing the question and then moving on to the answer. 89. Conclusion: So I want to congratulate you and finishing the course. Give yourself a pat on the back for completing this course. No, really, it's tough sitting through some of the concepts discuss, but you made it. I hope I wasn't too boring with this course. This, we did discuss a lot of technical concepts and it may take you a couple of times to grasp some of the concepts by going through, going through part of the course or the course all over again. But I would urge you to go through it again as much as much as you need to. To start preparing for the exam. Go through the exam questions. We'll review in the next slide how to prepare for the actual exam and what you can expect to see and whatnot. I'll provide a list like I've provided some of the actual exam questions to you to practice on your own. But I'll leave my email. If you need further questions or additional questions, feel free to contact me and I'll send you some additional questions that you can use to prepare. I hope. Best of luck, for this journey that you're in into the cloud technology, Microsoft Cloud technology in specific. I do ramble on a little, so I apologize. And I hope you gain some insights into this Microsoft 365 technology. And I hope to see you in further courses for Microsoft to 65 security and also Enterprise administrator course that I'm looking forward to creating as well. So let's move on to the some information I'm going to share about preparing for the exam.