SlideShare a Scribd company logo
Microsoft 365 Fundamentals:
MS-900
Kevin Brown
MCT, MCSE, Azure Architect,
Azure Security Associate,
M365 Security Associate,
M365 Enterprise Administrator
Course Outline
Module 1: Cloud concepts
Module 2: Microsoft 365 apps and services
Module 3: Security, compliance, privacy, and trust in Microsoft 365
Module 4: Microsoft 365 pricing, licensing, and support
Module 1:
Describe Cloud Concepts
What is cloud computing?
Cloud computing is the delivery of computing
services—servers, storage, databases, networking,
software, analytics, intelligence and more—over the
internet (“the cloud”)
Some of the most common types of services
delivered from the cloud include:
Compute services
Communications services
Productivity services
Search services
Storage services
Differentiating between various IT funding models
Cloud computing changes not only how and
where a business uses computing systems, it also
changes the funding model—the costs associated
with computing:
Capital expenditures (CapEx)
Operating expenditures (OpEx)
Cloud computing models
A cloud deployment model defines where your data
is stored and how your customers interact with it
Public cloud
 In the public cloud model, you have no local hardware to manage or keep up-to-date—everything
runs on your cloud service provider’s hardware
 There are two variants of a public cloud:
Shared public cloud
Dedicated public cloud
Private cloud
 In a private cloud, you create a cloud environment in your own datacenter and provide self-service
access to compute resources to users in your organization
Hybrid cloud
 A hybrid cloud combines public and private clouds, allowing you to run your applications in the
most appropriate location
Types of cloud services
Cloud computing has three major categories:
• IaaS (Infrastructure as a Service)
• The most flexible category of cloud services
• Aims to provide you with complete control over the hardware that
runs your application
• PaaS (Platform as a Service)
• Provides an environment for buying, building, testing, deploying,
and running software applications
• SaaS (Software as a Service)
• Software that is centrally hosted and managed for the end
customer
• Usually based on an architecture where one version of the
application is used for all customers
Types of cloud services
Infrastructure as a
Service
Platform as a
Service
Software as a
Service
Applications
Data
Operating system
Operating system
Virtualization
Virtualization
Virtualization
Servers
Servers
Servers
Storage
Storage
Storage
Networking
Networking
Networking
Privacy, compliance, and data protection
Privacy
Read the cloud service provider’s privacy notices
Consider how the cloud service provider handles disaster recovery and
business continuity
Consider how the hosting company handles security breaches
Compliance
If you store any data in the cloud, ensure that your cloud service provider
follows all legal and regulatory requirements
Data protection
When running services and storing data in the cloud, follow standard best
practices for security, just as you would on any on-premises network
When considering protection for data in the cloud, explore how to best
protect your data both where it’s stored, and when it’s being used or
transmitted
Benefits of using cloud computing
Top benefits of cloud computing:
Cloud computing is cost effective
Cloud computing is scalable
Vertical scaling (scale up)
Horizontal scaling (scale out)
Cloud computing is elastic
Cloud computing is always current
Cloud computing is reliable
Hybrid working vs Flexible working
• Hybrid working only refers to flexibility with the place of work – i.e., hybrid workers work partly
from an office and partly from home.
• Flexible working covers working hours, the place of work, the time the employee is required to
work, and much more. Flexible working is a type of Hybrid working.
What is Microsoft Azure?
Microsoft Azure is a cloud-computing platform used for
building, deploying, and managing applications and
services through a global network of Microsoft-managed
datacenters
Azure contains more than 100 services, including:
• Azure Active Directory (Azure AD or AAD)
• Azure Information Protection
• Backup
• Content Delivery Network
• Key Vault
• Machine Learning
• Media Services
• Mobile Services
• Multi-Factor Authentication
• Stream Analytics
• Virtual Machines
• Virtual Network
What is Microsoft 365?
Microsoft 365 is a SaaS offering that includes Microsoft Office 365,
Windows 10 and Windows 11, and Microsoft Enterprise Mobility +
Security, and dozens of applications
By combining all these features into a single subscription model,
customers can:
Use all the familiar productivity tools available in Office 365
Collaborate using Microsoft Teams, and Skype for Business
Help increase security and compliance
Microsoft 365 addresses the needs of many organizations who want to
maximize their adoption of the cloud for productivity, but also for
enterprise-grade security and desktop operating system management
Comparing Office 365 to Microsoft 365
• Office 365 is a cloud-based service that includes apps such as Word, Excel, PowerPoint, and
Outlook along with services such as Microsoft Exchange, SharePoint, Teams and OneDrive.
• Microsoft 365 is a cloud-based service that includes the same Office apps and services, plus
Windows 10, Windows 11, and Enterprise Mobility + Security.
• Enterprise Mobility + Security (EMS) is a mobility management and security platform that
includes services such as Azure Active Directory (Azure AD), Microsoft Intune, Azure Information
Protection and Microsoft Advanced Threat Analytics.
• There are Microsoft 365 subscription plans for personal use, small businesses, large enterprises,
schools, and more.
• Existing Office 365 subscriptions for home and business automatically become Microsoft 365
subscriptions, so no action is needed from your end.
Differences between Business and Enterprise editions
• Microsoft 365 Business is designed for small to medium-sized businesses with up to 300 users.
It includes the core productivity applications such as Word, Excel, PowerPoint, Outlook, and
OneNote, as well as other services such as Microsoft Teams, SharePoint, and Exchange.
Microsoft 365 Business also includes device management and security features such as Intune
and Windows Defender, which can help businesses protect their data and devices.
• Microsoft 365 Enterprise is designed for larger organizations with more than 300 users. It
includes all the features of Microsoft 365 Business but also includes advanced security and
compliance features such as Advanced Threat Protection, Information Protection, and
Compliance Manager.
Module 2:
Describe Microsoft 365 Apps
and Services
Exchange Online
Microsoft Exchange Online is a messaging and
collaboration platform that provides one location for
composing, reading, and storing email, calendar, contact,
and task information
Some features of Exchange Online include:
Microsoft Project
Project is a powerful project management tool designed for more
complex work efforts. Project for the web is Microsoft's most recent
offering for cloud-based work and project management.
• Begin a project and assign tasks and schedules to team members and
managers.
• Automatically update the timeline through the powerful scheduling
engine helping you reduce your time and effort.
• Utilize the easy-to-use views such as grid views, and Kanban-style task
boards.
• Integrate with Microsoft Teams to enrich collaboration across the
project.
• Create stunning interactive dashboards in Power BI so you can visualize
every aspect of the project at a glance.
• Extensible with other platform apps and data because Project is built on
the Power Platform.
Kanban
• Kanban is a workflow management method that originated in the
manufacturing industry and has since been adopted by a variety of
other industries. The word "kanban" is Japanese and translates to
"visual signal" or "card."
• The Kanban system is based on the concept of visualizing the flow of
work and limiting work in progress to improve efficiency and
effectiveness. It involves the use of physical or digital cards or boards,
known as "kanban boards," to represent tasks or work items and their
progress through different stages of a process.
• Each stage of the process is represented by a column on the kanban
board, and the cards are moved from one column to the next as work
progresses. This allows team members to see at a glance what work is
being done, what work is coming up, and what work is blocked.
• Kanban is often used in Agile and Lean software development
methodologies as a way to manage workflow, improve communication,
and increase collaboration between team members.
Microsoft Planner
Planner is an intuitive, collaborative task management tool that enables
people to plan, manage, and complete task-based initiatives. Planner
provides a simple and visual way for teams to organize their work. As a
web-based tool, Planner is accessible from anywhere and available as a
mobile app for both iOS and Android.
• Assign and manage tasks on a Kanban board using task cards and add
those tasks to buckets.
• Task cards populate with various information, such as due dates, status,
priority, checklists, labels, and file attachments.
• Receive notifications to stay on top of deadlines.
• Monitor your team’s progress with colorful visual cues and built-in
status reporting.
• Integrate with Teams by adding a "Tasks by Planner" tab, use
@mentions in Word, Excel, and PowerPoint to assign tasks, and add
your tasks to your calendar in Outlook or Microsoft To Do.
Microsoft Yammer
• Leader engagement
• Broadcast company meetings with live events and real-time Q&A.
• Communicate at scale with a site for leaders to share news, events, blogs, and polls.
• Keep everyone informed and engaged, across web and mobile.
• Share news and announcements that reach users as interactive discussions in Microsoft Teams
and Outlook.
• Target specific communities or reach your entire organization using the All Company
community.
• Pin and feature important conversations and send essential announcements to ensure delivery
of critical information.
• Create compelling communications with rich text, GIFs, photos, and videos.
• Use questions and answers to gain solutions, highlight the best answers, and upvote replies.
Microsoft Yammer
• Call in experts with @mentions.
• Follow topics across conversations and communities with tags.
• Find and join recommended communities around common interests.
• Designate official communities where employees can find what they need and join the
discussion.
• Engage in fully interactive discussions without leaving your Outlook inbox.
• Bring the power of communities to SharePoint with the Yammer conversations web part.
• Embed a Yammer community on any HTML page.
Microsoft Bookings
Bookings is an appointment scheduling and management system.
Bookings simplify the process of scheduling and managing
appointments. It includes a web-based booking calendar and integrates
with Outlook to optimize your staff’s calendar and give your customers
the flexibility to book a time that works best for them.
• Manage staff schedules, set business hours, services, and pricing.
• Add buffer time between appointments for any required pre or post-
appointment activities.
• Create a booking page where your customers and clients can schedule
and reschedule appointments on their own.
• Share the booking page via a direct link, your Facebook page, and link
embedding within your website.
• Ensure customers receive proper confirmations and reminders with
automatic appointment notifications through email and SMS.
• Integrate with Microsoft Teams to support virtual appointments.
Microsoft To Do
To Do is an intelligent task management app that makes it easy to plan
and manage your day. Access To Do across devices including iOS,
Android, Windows, and the web.
Focus and achieve your most important tasks with a daily to-do list called
"My Day."
• Utilize smart suggestions to add tasks, upcoming or overdue tasks.
• Share lists and assign tasks with colleagues, friends, and family.
• Break down more complex tasks into subtasks.
• Schedule reminders and repeatable tasks.
• Sync your tasks across Outlook, Teams and Planner, and generate tasks
from flagged Outlook emails.
Microsoft Forms
Forms is a simple, lightweight app that allows you to quickly and easily
capture the information you need. Create surveys, quizzes, polls,
questionnaires, registrations and more. Forms work from any web
browser, on any device.
• Insert quizzes, surveys, polls, and other types of forms into other Office
products.
• Enhance your form by adding a logo, displaying pictures or videos next
to questions.
• Share your quiz or form and collaborate with others or share it as a
template.
• Invite others to respond to your form using any web browser or mobile
device.
• View real-time results as they're submitted.
• Use built-in analytics to evaluate responses.
• Export results to Excel for more analysis or grading.
Microsoft Lists
Lists is a smart information tracking app that gives you and your team a
flexible way to organize information and work.
• Quickly create a list from scratch or use a ready-made template.
• Create a list in a SharePoint site or in Microsoft Teams.
• Create a list with various columns, include links, pictures and attach
files.
• Sort, group, format and filter lists to highlight the most important
information.
• Automate a list to streamline work and save time.
• Track history of a list item over time with versions.
SharePoint Online
Microsoft SharePoint Online is the cloud version of
Microsoft SharePoint Server that enables organizations to
create and customize intranet and team-focused or task-
focused sites for efficient collaboration
Using SharePoint Online, users can:
Build intranet sites and create pages, document libraries, and lists
Discover, follow, and search for sites, files, and people across their
organization
Manage their daily routines with workflows, forms, and lists
Sync and store their files in the cloud so anyone can securely work with them
Use the SharePoint mobile app
Microsoft Teams
Microsoft Teams provides a central hub for collaboration
within your organization
You can implement a chat-based workspace, share
documents, insights, and status updates with colleagues
With Teams you can also:
Communicate through chat, meetings, and calls
Collaborate together with integrated Microsoft
Office 365 apps
Make calls in Office 365 and Teams
Connect across devices
Teams Phone
• Use voice and video calling using Microsoft Teams Phone on your computer, tablet, mobile
device, or desk phone. You can start a call from chat, contact card, Outlook, or the Calls app.
Teams Phone has updated cloud calling features like voicemail transcription and group call
pickup to elevate your experience beyond that of traditional calls.
Microsoft Teams
Some of the ways that you can extend Teams using collaborative apps
are:
• Power BI in Teams can empower your organization to collaborate with data to
deliver improved outcomes.
• Power Apps can help you build apps to add directly into Teams by creating a
tab.
• Power Automate can help you automate tasks and processes all within Teams.
• Dynamics 365 and Teams integration can provide high-level details of your
customers to ensure you have helpful context and can be prepared in customer
meetings.
• Power Virtual Agents allows you to create chatbots that can be integrated into
Teams.
• Integrate with third-party partners and services for more capabilities within
Teams, like ServiceNow or Salesforce. Integration with third-parties can be done
through incoming and outgoing webhooks and connectors.
OneDrive for Business
• Sharing
• Sync
• Storage
• Device Access
• Compliance
• Notifications
• Recycle Bin
Microsoft Yammer
• Yammer is a secure enterprise social network designed for connecting and engaging people
across your organization. Yammer helps facilitate community collaboration and idea-sharing
among leaders, coworkers and partners from anywhere. Access Yammer through your browser,
or you can install Yammer on your desktop or mobile device.
• Yammer offers two types of networks to help users communicate and collaborate in the most
convenient and effective ways possible:
• Internal network, also known as a home network, is restricted to users inside the organization.
Only employees with a valid corporate email address can join the internal network and access its
content and users.
• External network, includes invited users from outside your organization. It's a space for you to
engage with outside partners, like customers, suppliers, or investors.
Microsoft Stream
Microsoft Stream is a video streaming and sharing service that allows organizations to securely
upload, share, manage and view videos within their company. It is designed as a business-focused
platform and offers features such as video upload, storage, sharing, tagging, search, and analytics.
Microsoft Stream is integrated with other Microsoft Office 365 products, such as SharePoint and
Teams, and can be used to share and collaborate on video content with colleagues or external
partners. Microsoft Stream also provides advanced security features, such as automatic encryption
of video content and access control through Azure Active Directory.
Other Apps
• Word can help you create impressive documents and improve your
writing with built-in intelligent features like Microsoft Editor and
Researcher.
• Excel can help you simplify complex data and create easy-to-read
spreadsheets and visualizations.
• PowerPoint can help you create polished presentations that stand out
with intelligent features like rehearse with Coach and PowerPoint
Designer.
• Outlook can help you manage your email, calendar, tasks, and contacts
together in one place.
• OneNote can help you with your note taking needs by organizing your
notes into tabs and subsections creating a single digital notebook.
Reports
• Usage reports show how people in your business are using Microsoft
365 services. Reports are available for the last 7 days, 30 days, 90 days,
and 180 days. Data won't exist for all reporting periods right away. The
reports become available within 48 hours.
• Adoption Score provides insights into your organization's digital
transformation journey through its use of Microsoft 365 and the
technology experiences that support it.
Data Residency
• How do users know where data is stored?
• How can users access data?
• How do administrators manage large amounts of data?
• What does it mean to secure data?
• Users
• Administrators
• Applications
• Devices
• Locations
Windows-as-a-Service model
With Windows as a service, Microsoft simplifies the operating
system build, deployment, and servicing process
Revisions and updates are propagated more frequently by
using:
 Feature updates
 Quality updates
Microsoft provides organizations with more control over how
and when updates are applied to their devices through:
 Servicing channels: Windows Insider, Semi-annual
channel, long-term servicing channel
 Deployment rings: Preview, Broad, Critical
Update: Limited Ring
Limited ring
• The purpose of the Limited ring is to validate the update on
representative devices across the network. During this period, data, and
feedback are generated to enable the decision to move forward to
broader deployment. Desktop Analytics can help with defining a good
Limited ring of representative devices and help monitor the
deployment.
Who goes in the Limited ring?
• The most important part of this phase is finding a representative sample
of devices and applications across your network. If possible, all
hardware and all applications should be represented.
Virtual Desktop
• Windows Virtual Desktop allows administrators to
create and customize Windows 10 images and host
them in Azure as Virtual Machines.
• Users connect to the virtual machines and have a
full operating environment
• Updates, configuration changes and application
management is all controlled centrally in Azure,
thus allowing for simplified administration
Virtual Desktop
Windows 365
• Most users are familiar with Windows 10 and Windows 11. Windows 365 isn't exactly an
operating system and isn't installed on a PC like Windows. Windows 365 is a cloud-based
service that automatically creates a new type of Windows virtual machine, called Cloud PCs, for
your end users. Windows 365 securely streams your Windows desktop, apps, settings, and
content from the cloud to a Cloud PC so you can access a personalized Windows 10 or Windows
11 experience from any Windows, iOS, or Android device. With a Cloud PC, Windows evolves
from a device-based operating system (OS) to hybrid personalized computing.
• Windows 365 Editions:
• Business- 300 users, no support for Mobile Device Management
• Enterprise- unlimited users, supports Mobile Device Management
Windows 365 compared to Virtual Desktop
• Scalability: Windows 365 is designed to be a highly scalable solution
that can easily accommodate a growing number of users. It can
automatically scale up or down based on the demand, and the users
can easily add or remove licenses as needed. In contrast, Azure Virtual
Desktop requires more planning and configuration to scale up or down.
• Integration with other services: Azure Virtual Desktop is tightly
integrated with other Azure services such as Azure Active Directory,
Azure Monitor, and Azure Backup. This allows for better management
and monitoring of the virtual desktop infrastructure. Windows 365 also
integrates with Microsoft 365 services such as Microsoft Endpoint
Manager and Microsoft Teams, but it does not have the same level of
integration with Azure services.
Co-management
• Co-management combines your existing on-premises Configuration Manager with the cloud-
based features in Intune, including Endpoint Manager. It enabled you to use conditional access.
Co-management enables you to concurrently manage Windows 10 or later devices by using
both Configuration Manager and Microsoft Intune.
Configuration Manager
• Configuration Manager is an on-premises management solution to manage desktops, servers,
and laptops that are on your network or internet-based. You can use Configuration Manager to
manage data centers, apps, software updates, and operating systems. You can cloud-enable it to
integrate with Intune, Azure Active Directory, Microsoft 365 Defender, Windows AutoPilot and
other cloud services.
Tenant-attach
• If you need to manage a combination of both cloud and on-premises endpoints, you can use
cloud attach to use both Intune and Configuration Manager. Cloud attach consists of tenant
attach, co-management, and Endpoint analytics. Tenant-attach sets up synchronization between
your Configuration Manager site and your Intune tenant. This synchronization provides you with
a single view for all devices that you manage from the Microsoft Endpoint Manager admin
center.
What is Unified Endpoint Management?
Unified Endpoint Management is an industry term
that describes the notion of a platform that can
provide overall device and app management from a
single console
Management challenges:
 Mobile devices that connect to unsecured networks
 Mobile devices that intermittently connect to organizational
networks
 Backing up data
 Lost or stolen devices
 Compromised devices that connect to the internal network
 User-owned mobile devices
Enterprise Mobility + Security components
E5 plan
E3 plan
Product
P2 plan
P1 plan
Azure AD Premium
Yes
Yes
Intune
P2 plan
P1 plan
Azure Information Protection
Yes
Yes
Microsoft Advanced Threat Analytics
Yes
No
Cloud App Security
Yes
Yes
Configuration Manager
Microsoft 365 Plans and Pricing:
https://www.microsoft.com/en-us/microsoft-365/business/compare-
more-office-365-for-business-plans
Module 3:
Describe security, compliance,
privacy, and trust in Microsoft
365
Common types of attacks
Broad-based phishing & Spear-phishing
• Attacker masquerades as a trusted entity, dupes employees into opening emails, texts or IMs.
Password Spray
• Attacker tries a large list of possible passwords for a given account or set of accounts
Cross-site scripting
• An attacker uses third-party web resources to run scripts in the victim’s web browser.
Device compromise
• Malware is installed on the device. This can include viruses, spyware, ransomware, and other
unwanted software that installs without user consent.
GDAP
Microsoft Granular Delegated Admin Privileges (GDAP) is a set of
principles that enable organizations to delegate administrative tasks to
specific users while maintaining control and security over their systems
and data. The following are the key principles of GDAP:
• Granularity: GDAP provides a fine-grained control mechanism that allows
organizations to delegate specific administrative tasks to users based on their
roles and responsibilities.
• Delegation: With GDAP, organizations can delegate administrative tasks to
specific users without granting them full administrative access. This ensures that
users have only the privileges they need to perform their tasks and reduces the
risk of accidental or intentional misuse of privileges.
• Auditing and Monitoring: GDAP provides a comprehensive auditing and
monitoring mechanism that enables organizations to track and report on all
delegated administrative activities. This ensures that organizations can detect
and respond to any suspicious activities in a timely manner.
• Permissions: GDAP enables organizations to define the specific permissions that
users have for each delegated task. This ensures that users have access only to
the resources and data they need to perform their tasks.
Microsoft 365 Defender
Microsoft 365 Defender is a comprehensive security solution that provides integrated protection
across multiple Microsoft products and services, including endpoints, identities, cloud apps, and
Office 365.
Microsoft 365 Defender
Defender for Endpoint is a security solution designed to protect endpoints such as desktops,
laptops, servers, and mobile devices. It provides advanced threat protection, endpoint detection
and response, automated investigation and remediation, and device control capabilities.
Microsoft 365 Defender
Defender for Office 365 is a security solution that provides protection for Microsoft Office 365
applications, such as Exchange Online, SharePoint Online, and OneDrive for Business. It offers
email filtering, anti-phishing and anti-malware protection, and real-time protection against
advanced threats.
Microsoft 365 Defender
Defender for Identity is a cloud-based security solution that provides advanced threat protection
for identity and access management. It helps to detect and remediate identity-based attacks and
helps to prevent unauthorized access to sensitive data.
Microsoft 365 Defender
Defender for Cloud Apps is a security solution designed to provide protection for cloud
applications, such as Microsoft Teams, OneDrive, and SharePoint Online. It provides advanced
threat protection, real-time monitoring and alerts, and proactive threat hunting capabilities.
Microsoft Defender
The Microsoft 365 Defender Portal is a centralized security management console that provides
a unified view of security across all Microsoft products and services. It allows security teams to
manage and investigate security incidents, view alerts and recommendations, and configure
security policies and settings.
Conditional Access Policies explained
The
picture
can't be
displayed
.
The
picture
can't be
displayed.
The
picture
can't be
displayed.
The picture
can't be
displayed.
The picture
can't be
displayed.
Microsoft Purview
• Microsoft Purview is a unified data-governance service that helps you manage and govern
your on-premises, multi-cloud, and software-as-a-service (SaaS) data.
• Compliance Manager
• Auditing
• eDiscovery
• Alerts
• Content search
• Data Loss Prevention
• Insider Risk Management
• Compliance Score
Priva
• Privacy is top of mind for organizations and consumers today, and concerns about how private
data is handled are steadily increasing. Regulations and laws such as the European Union's
General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA)
impact people around the world, setting rules for how organizations store personal data and
giving people rights to manage personal data collected by an organization.
• To meet regulatory requirements and build customer trust, organizations need to take a
"privacy by default" stance. Rather than manual processes and a patchwork of tools,
organizations need a comprehensive solution to address common challenges’
Information Protection Features
• Know your data: Organizations can understand their data landscape and identify important
data across on-premises, cloud, and hybrid environments.
• Protect your data: Organizations can apply flexible protection actions including encryption,
access restrictions, and watermarks to data.
• Prevent data loss: Organizations can detect risky behavior and prevent accidental oversharing
of sensitive information using Data Loss Prevention .
• Govern your data: Organizations can automatically keep, delete, and store data and records in
a compliant manner using Retention Policies.
Sensitive Information Types
• Sensitive information types are pattern-based classifiers. They have set patterns that can be
used to identify them. For example, an identification number in a country/region may be based
on a specific pattern, like this:
• Credit card numbers
• Passport or identification numbers
• Bank account numbers
• Health service numbers
You can also create custom sensitive information types to for your organizations needs
Sensitivity Labels
• Sensitivity labels, available as part of information protection in the Microsoft Purview
compliance portal, enable the labeling and protection of content, without affecting
productivity and collaboration. With sensitivity labels, organizations can decide on labels to
apply to content such as emails and documents.
• Labels are:
• Customizable: Admins can create different categories specific to the organization, such as
Personal, Public, Confidential, and Highly Confidential.
• Clear text: Because each label is stored in clear text in the content's metadata, third-party apps
and services can read it and then apply their own protective actions, if necessary.
• Persistent. After you apply a sensitivity label to content, the label is stored in the metadata of
that email or document. The label then moves with the content, including the protection
settings, and this data becomes the basis for applying and enforcing policies.
Sensitivity Labels
• Sensitivity labels can be configured to:
• Encrypt email only or both email and documents.
• Mark the content when Office apps are used. Marking the content includes adding
watermarks, headers, or footers. Headers or footers can be added to emails or documents.
Watermarks can be applied to documents but not to email.
• Apply the label automatically in Office apps or recommend a label. Admins choose the types
of sensitive information to be labeled. The label can be applied automatically or configured to
prompt users to apply the recommended label.
• Protect content in containers such as sites and groups. This label configuration doesn't
result in documents being automatically labeled. Instead, the label settings protect content by
controlling access to the container where documents are stored.
Label Policies
• After sensitivity labels are created, they need to be published to make them available to
people and services in the organization. Sensitivity labels are published to users or groups
through label policies. Sensitivity labels will then appear in Office apps for those users and
groups. The sensitivity labels can be applied to documents and emails.
• Choose the users and groups that can see labels
• Apply a default label to all new emails and documents that the specified users and groups
create. Users can always change the default label if they believe the document or email has
been mislabeled.
• Require justifications for label changes. If a user wants to remove a label or replace it, admins
can require the user to provide a valid justification to complete the action. The user will be
prompted to provide an explanation for why the label should be changed.
• Require users to apply a label (mandatory labeling). It ensures a label is applied before users
can save their documents, send emails, or create new sites or groups.
Data Loss Prevention (DLP)
• Data Loss Prevention (DLP) is a way to protect sensitive information and prevent its
inadvertent disclosure. With DLP policies, admins can:
• Identify, monitor, and automatically protect sensitive information across Microsoft 365,
including:
• OneDrive for Business
• SharePoint Online
• Microsoft Teams
• Exchange Online
• For example, if a user tries to share a document containing sensitive information, a DLP policy
can send them an email notification and show them a policy tip.
• View DLP reports showing content that matches the organization's DLP policies. To assess how
the organization is following a DLP policy, admins can see how many matches each policy has
over time.
Insider Risk
• Microsoft Purview Insider Risk Management is a solution that helps minimize internal risks by
enabling an organization to detect, investigate, and act on risky and malicious activities. Insider
risk management is available in the Microsoft Purview compliance portal.
• Managing and minimizing risk in an organization starts with understanding the types of risks
found in the modern workplace. Some risks are driven by internal events and employee
activities that can be eliminated and avoided. Some examples are risks from illegal,
inappropriate, unauthorized, or unethical behavior and actions by employees and managers.
These behaviors can lead to a broad range of internal risks from employees:
• Leaks of sensitive data and data spillage
• Confidentiality violations
• Intellectual property (IP) theft
• Fraud
• Insider trading
• Regulatory compliance violations
Auditing
Auditing solutions in Microsoft Purview help organizations effectively respond to security
events, forensic investigations, internal investigations, and compliance obligations. Thousands of
user and admin operations performed in dozens of Microsoft 365 services and solutions are
captured, recorded, and retained in your organization's unified audit log. Audit records for these
events are searchable. This capability provides visibility into the activities performed across your
Microsoft 365 organization.
Microsoft Sentinel
Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) system
that helps organizations detect, prevent, and respond to security threats across their entire IT
environment. It provides intelligent security analytics and threat intelligence, using machine
learning algorithms to identify and respond to potential security incidents. It offers features such
as security automation, orchestration, and response (SOAR), built-in threat intelligence, and
support for over 120 connectors to integrate with various other security tools. The benefits of
using Microsoft Sentinel include:
• Improved visibility into security events and threats across the IT environment
• Better threat detection and faster response times
• Increased automation and efficiency in security operations
• Improved compliance with industry regulations and standards
• Centralized management and control of security
Module 4:
Describe Microsoft 365 pricing,
licensing, and support
Pricing Models, CSPs, and EAs
• The Cloud Solution Provider (CSP) program provides a pay-as-you-go subscription model with
per-user, per-month pricing that enables your business to scale up or down from month to
month as your needs change.
Enterprise Agreement
• The Microsoft Enterprise Agreement (EA) is designed for organizations that want to license
software and cloud services for a minimum three-year period. The Enterprise Agreement offers
the best value to organizations with 500 or more users or devices. 24x7 technical support,
planning services, end-user and technical training are included in EA agreements.
Pricing Models, CSPs, and EAs
Direct Billing
• Buy and pay for your Microsoft 365 subscription with a credit or debit card, or a bank account.
The payment method you use to pay will continue to be charged until the subscription expires
or is canceled. Payment methods can be managed through the Microsoft 365 admin center.
Trial
• Sign up for a free trial subscription and try it out for 30 days.
Billing account options
• A billing account is created when you sign up to try or buy Microsoft products. You use your
billing account to manage your account settings, invoices, payment methods, and purchases.
The Microsoft 365 admin center currently supports the following type of billing accounts:
• Microsoft Online Services Program: This billing account is created when you sign up for a
Microsoft 365 subscription directly.
• Microsoft Products & Services Agreement (MPSA) Program: This billing account is created
when your organization signs an MPSA Volume Licensing agreement to purchase software and
online services.
• Microsoft Customer Agreement: This billing account is created when your organization works
with a Microsoft representative, an authorized partner, or purchases independently.
Fixed-price vs Consumption-based pricing
• Consumption-based price: You're charged for only what you use. This model is also known as
Pay-As-You-Go.
• Fixed-price: You provision resources and are charged for those instances whether or not they're
used.
Billing Management
Microsoft 365 billing is managed from the Microsoft 365 admin center. The admin center allows
you to manage subscriptions, view billing statements, update payment methods, change your
billing frequency, and more. The following list describes in further detail what can be reviewed
and modified in the Microsoft 365 admin center:
• Upgrade, renew, reactivate or cancel subscriptions.
• Buy, remove, and view the number of subscription licenses and how many of those licenses are
assigned.
• Assign and unassign licenses from users.
• View a bill, invoice, and past billing statements.
• Modify payment methods.
• Modify your billing frequency to monthly or annual billing.
• Buy and manage other services or features.
• Manage your billing notification emails
Subscription
Microsoft 365 for home
• Microsoft 365 Home comes in two plans, Microsoft 365 Personal and Microsoft 365 Family.
Personal is for a single person with multiple devices and family is for up to six people.
Subscription
Microsoft 365 Education
• Microsoft 365 Education is available for educational institutions. Academic licenses can be
tailored to fit any institution’s needs, including productivity and security solutions for faculty,
staff, and students. Microsoft 365 Education has three subscription plans for faculty and students
that include different features: A1, A3, and A5.
Microsoft 365 Government
• Microsoft 365 Government is available for government institutions. Microsoft 365 Government
has two subscription plans that include different features: G3, and G5.
Subscription
Microsoft 365 for business
• Microsoft 365 for business is designed for small to medium-sized organizations that have up to
300 employees. It offers the full set of Office 365 productivity tools and includes security and
device management features. There are four subscription tiers that include different features:
Microsoft 365 Business Basic, Microsoft 365 Business Standard, Microsoft 365 Business Premium,
and Microsoft 365 Apps for business.
Subscription
Microsoft 365 Enterprise
• Microsoft 365 Enterprise is designed for enterprise-sized organizations. It provides enterprise-
class services to organizations that want a productivity solution that includes robust threat
protection, security, compliance, and analytics features. Microsoft 365 Enterprise has three
subscription tiers that include different features: Microsoft 365 E3, Microsoft 365 E5, and
Microsoft 365 F3.
Licenses
Licenses
• A license, or base license allows users to use the features and services included in the
subscription plan. When you buy a subscription, you specify the number of licenses you need,
based on the number of people you have in your organization. After you buy a subscription, you
create accounts for people in your organization, and then assign a license to each person. As
your organizational needs change, you can buy more licenses to accommodate new people, or
reassign licenses to other users when someone leaves your organization.
• Microsoft 365 products and services are available as user subscription licenses (USLs) and are
licensed on a per-user basis. Each user accessing Microsoft 365 products and services is required
to be assigned a USL. Administrators manage licenses in the Microsoft 365 admin center. They
can assign the licenses to individual user or guest accounts.
Licenses
• Full USLs are for new customers who haven't previously purchased Microsoft products and
services.
• Add-on USLs are for on-premises software customers who want to add Microsoft 365 cloud
products and services.
• From SA USLs are for on-premises Software Assurance customers that want to transition to the
cloud.
• Step Up USLs are for customers who want to upgrade the level of their service.
Types of add-ons
Types of add-ons
• Traditional add-ons are linked to a specific subscription. If you cancel the subscription, the linked
add-on is also canceled.
• Standalone add-ons appear as a separate subscription on the Your products page within the
Microsoft 365 admin center. They have their own expiration date and are managed the same
way you would any other subscription.
Licensing
Support Options
Support Requests
Customer Lockbox for Office 365:
Microsoft 365 Lighthouse
Microsoft 365 Lighthouse is a management solution designed for Managed Service Providers
(MSPs) to simplify the management of multiple Microsoft 365 tenants. It offers a centralized
dashboard that allows MSPs to manage and monitor their customers' Microsoft 365 environments
from a single location. The benefits of using Microsoft 365 Lighthouse include:
• Simplified management of multiple Microsoft 365 tenants
• Streamlined deployment and management of Microsoft 365 services for customers
• Centralized monitoring and reporting across multiple tenants
• Increased efficiency and productivity for MSPs
• Improved customer satisfaction and retention
Ad

More Related Content

Similar to MS-900+Courseware pdf. learn//annimations// (20)

Microsoft Services.pdf
Microsoft Services.pdfMicrosoft Services.pdf
Microsoft Services.pdf
abkalpcom
 
A Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
A Business Perspective on Building SharePoint 2013 Solutions on Windows AzureA Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
A Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
Christian Buckley
 
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Elysium Academy
 
Cloud Service Providers-unit5 university
Cloud Service Providers-unit5 universityCloud Service Providers-unit5 university
Cloud Service Providers-unit5 university
moeincanada007
 
Mini project on microsoft azure based on time
Mini project on microsoft azure based on timeMini project on microsoft azure based on time
Mini project on microsoft azure based on time
LawalMuhd2
 
Cloud computing bpos & windows azure oss
Cloud computing   bpos & windows azure ossCloud computing   bpos & windows azure oss
Cloud computing bpos & windows azure oss
Avni Gupta
 
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdfPPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
gdefwy4s5
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
Neethu Kuruvilla
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
Deepak Shukla
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Romano Machoka
 
Introduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptxIntroduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptx
Nadir Arain
 
220929-Presentation-business case for moving to the cloud.pptx
220929-Presentation-business case for moving to the cloud.pptx220929-Presentation-business case for moving to the cloud.pptx
220929-Presentation-business case for moving to the cloud.pptx
ZiadHaidamous1
 
comparison (1)comparison (1)comparison (1).pptx
comparison (1)comparison (1)comparison (1).pptxcomparison (1)comparison (1)comparison (1).pptx
comparison (1)comparison (1)comparison (1).pptx
FutureTechnologies3
 
Get Started with Microsoft Azure.pptx
Get Started with Microsoft Azure.pptxGet Started with Microsoft Azure.pptx
Get Started with Microsoft Azure.pptx
AnjaliMishra647628
 
Azure_Business_Opportunity
Azure_Business_OpportunityAzure_Business_Opportunity
Azure_Business_Opportunity
Nojan Emad
 
SPS Vancouver 2018 - What is CDM and CDS
SPS Vancouver 2018 - What is CDM and CDSSPS Vancouver 2018 - What is CDM and CDS
SPS Vancouver 2018 - What is CDM and CDS
Nicolas Georgeault
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
Romana Sharmin
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuum
Mathews Job
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
 
Katpro Technologies- Azure Portfolio
Katpro Technologies- Azure PortfolioKatpro Technologies- Azure Portfolio
Katpro Technologies- Azure Portfolio
Katpro Technologies Pvt Ltd
 
Microsoft Services.pdf
Microsoft Services.pdfMicrosoft Services.pdf
Microsoft Services.pdf
abkalpcom
 
A Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
A Business Perspective on Building SharePoint 2013 Solutions on Windows AzureA Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
A Business Perspective on Building SharePoint 2013 Solutions on Windows Azure
Christian Buckley
 
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Navigating Microsoft Azure A Practical Guide to Cloud Computing and Developme...
Elysium Academy
 
Cloud Service Providers-unit5 university
Cloud Service Providers-unit5 universityCloud Service Providers-unit5 university
Cloud Service Providers-unit5 university
moeincanada007
 
Mini project on microsoft azure based on time
Mini project on microsoft azure based on timeMini project on microsoft azure based on time
Mini project on microsoft azure based on time
LawalMuhd2
 
Cloud computing bpos & windows azure oss
Cloud computing   bpos & windows azure ossCloud computing   bpos & windows azure oss
Cloud computing bpos & windows azure oss
Avni Gupta
 
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdfPPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
PPT-Deck-Power-Platform-Virtual-Training-Day-Fundamentals.pdf
gdefwy4s5
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
Deepak Shukla
 
Introduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptxIntroduction to Azure fundamentals of cloud.pptx
Introduction to Azure fundamentals of cloud.pptx
Nadir Arain
 
220929-Presentation-business case for moving to the cloud.pptx
220929-Presentation-business case for moving to the cloud.pptx220929-Presentation-business case for moving to the cloud.pptx
220929-Presentation-business case for moving to the cloud.pptx
ZiadHaidamous1
 
comparison (1)comparison (1)comparison (1).pptx
comparison (1)comparison (1)comparison (1).pptxcomparison (1)comparison (1)comparison (1).pptx
comparison (1)comparison (1)comparison (1).pptx
FutureTechnologies3
 
Get Started with Microsoft Azure.pptx
Get Started with Microsoft Azure.pptxGet Started with Microsoft Azure.pptx
Get Started with Microsoft Azure.pptx
AnjaliMishra647628
 
Azure_Business_Opportunity
Azure_Business_OpportunityAzure_Business_Opportunity
Azure_Business_Opportunity
Nojan Emad
 
SPS Vancouver 2018 - What is CDM and CDS
SPS Vancouver 2018 - What is CDM and CDSSPS Vancouver 2018 - What is CDM and CDS
SPS Vancouver 2018 - What is CDM and CDS
Nicolas Georgeault
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
Romana Sharmin
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuum
Mathews Job
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
 

Recently uploaded (20)

Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Ad

MS-900+Courseware pdf. learn//annimations//

  • 1. Microsoft 365 Fundamentals: MS-900 Kevin Brown MCT, MCSE, Azure Architect, Azure Security Associate, M365 Security Associate, M365 Enterprise Administrator
  • 2. Course Outline Module 1: Cloud concepts Module 2: Microsoft 365 apps and services Module 3: Security, compliance, privacy, and trust in Microsoft 365 Module 4: Microsoft 365 pricing, licensing, and support
  • 4. What is cloud computing? Cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics, intelligence and more—over the internet (“the cloud”) Some of the most common types of services delivered from the cloud include: Compute services Communications services Productivity services Search services Storage services
  • 5. Differentiating between various IT funding models Cloud computing changes not only how and where a business uses computing systems, it also changes the funding model—the costs associated with computing: Capital expenditures (CapEx) Operating expenditures (OpEx)
  • 6. Cloud computing models A cloud deployment model defines where your data is stored and how your customers interact with it Public cloud  In the public cloud model, you have no local hardware to manage or keep up-to-date—everything runs on your cloud service provider’s hardware  There are two variants of a public cloud: Shared public cloud Dedicated public cloud Private cloud  In a private cloud, you create a cloud environment in your own datacenter and provide self-service access to compute resources to users in your organization Hybrid cloud  A hybrid cloud combines public and private clouds, allowing you to run your applications in the most appropriate location
  • 7. Types of cloud services Cloud computing has three major categories: • IaaS (Infrastructure as a Service) • The most flexible category of cloud services • Aims to provide you with complete control over the hardware that runs your application • PaaS (Platform as a Service) • Provides an environment for buying, building, testing, deploying, and running software applications • SaaS (Software as a Service) • Software that is centrally hosted and managed for the end customer • Usually based on an architecture where one version of the application is used for all customers
  • 8. Types of cloud services Infrastructure as a Service Platform as a Service Software as a Service Applications Data Operating system Operating system Virtualization Virtualization Virtualization Servers Servers Servers Storage Storage Storage Networking Networking Networking
  • 9. Privacy, compliance, and data protection Privacy Read the cloud service provider’s privacy notices Consider how the cloud service provider handles disaster recovery and business continuity Consider how the hosting company handles security breaches Compliance If you store any data in the cloud, ensure that your cloud service provider follows all legal and regulatory requirements Data protection When running services and storing data in the cloud, follow standard best practices for security, just as you would on any on-premises network When considering protection for data in the cloud, explore how to best protect your data both where it’s stored, and when it’s being used or transmitted
  • 10. Benefits of using cloud computing Top benefits of cloud computing: Cloud computing is cost effective Cloud computing is scalable Vertical scaling (scale up) Horizontal scaling (scale out) Cloud computing is elastic Cloud computing is always current Cloud computing is reliable
  • 11. Hybrid working vs Flexible working • Hybrid working only refers to flexibility with the place of work – i.e., hybrid workers work partly from an office and partly from home. • Flexible working covers working hours, the place of work, the time the employee is required to work, and much more. Flexible working is a type of Hybrid working.
  • 12. What is Microsoft Azure? Microsoft Azure is a cloud-computing platform used for building, deploying, and managing applications and services through a global network of Microsoft-managed datacenters Azure contains more than 100 services, including: • Azure Active Directory (Azure AD or AAD) • Azure Information Protection • Backup • Content Delivery Network • Key Vault • Machine Learning • Media Services • Mobile Services • Multi-Factor Authentication • Stream Analytics • Virtual Machines • Virtual Network
  • 13. What is Microsoft 365? Microsoft 365 is a SaaS offering that includes Microsoft Office 365, Windows 10 and Windows 11, and Microsoft Enterprise Mobility + Security, and dozens of applications By combining all these features into a single subscription model, customers can: Use all the familiar productivity tools available in Office 365 Collaborate using Microsoft Teams, and Skype for Business Help increase security and compliance Microsoft 365 addresses the needs of many organizations who want to maximize their adoption of the cloud for productivity, but also for enterprise-grade security and desktop operating system management
  • 14. Comparing Office 365 to Microsoft 365 • Office 365 is a cloud-based service that includes apps such as Word, Excel, PowerPoint, and Outlook along with services such as Microsoft Exchange, SharePoint, Teams and OneDrive. • Microsoft 365 is a cloud-based service that includes the same Office apps and services, plus Windows 10, Windows 11, and Enterprise Mobility + Security. • Enterprise Mobility + Security (EMS) is a mobility management and security platform that includes services such as Azure Active Directory (Azure AD), Microsoft Intune, Azure Information Protection and Microsoft Advanced Threat Analytics. • There are Microsoft 365 subscription plans for personal use, small businesses, large enterprises, schools, and more. • Existing Office 365 subscriptions for home and business automatically become Microsoft 365 subscriptions, so no action is needed from your end.
  • 15. Differences between Business and Enterprise editions • Microsoft 365 Business is designed for small to medium-sized businesses with up to 300 users. It includes the core productivity applications such as Word, Excel, PowerPoint, Outlook, and OneNote, as well as other services such as Microsoft Teams, SharePoint, and Exchange. Microsoft 365 Business also includes device management and security features such as Intune and Windows Defender, which can help businesses protect their data and devices. • Microsoft 365 Enterprise is designed for larger organizations with more than 300 users. It includes all the features of Microsoft 365 Business but also includes advanced security and compliance features such as Advanced Threat Protection, Information Protection, and Compliance Manager.
  • 16. Module 2: Describe Microsoft 365 Apps and Services
  • 17. Exchange Online Microsoft Exchange Online is a messaging and collaboration platform that provides one location for composing, reading, and storing email, calendar, contact, and task information Some features of Exchange Online include:
  • 18. Microsoft Project Project is a powerful project management tool designed for more complex work efforts. Project for the web is Microsoft's most recent offering for cloud-based work and project management. • Begin a project and assign tasks and schedules to team members and managers. • Automatically update the timeline through the powerful scheduling engine helping you reduce your time and effort. • Utilize the easy-to-use views such as grid views, and Kanban-style task boards. • Integrate with Microsoft Teams to enrich collaboration across the project. • Create stunning interactive dashboards in Power BI so you can visualize every aspect of the project at a glance. • Extensible with other platform apps and data because Project is built on the Power Platform.
  • 19. Kanban • Kanban is a workflow management method that originated in the manufacturing industry and has since been adopted by a variety of other industries. The word "kanban" is Japanese and translates to "visual signal" or "card." • The Kanban system is based on the concept of visualizing the flow of work and limiting work in progress to improve efficiency and effectiveness. It involves the use of physical or digital cards or boards, known as "kanban boards," to represent tasks or work items and their progress through different stages of a process. • Each stage of the process is represented by a column on the kanban board, and the cards are moved from one column to the next as work progresses. This allows team members to see at a glance what work is being done, what work is coming up, and what work is blocked. • Kanban is often used in Agile and Lean software development methodologies as a way to manage workflow, improve communication, and increase collaboration between team members.
  • 20. Microsoft Planner Planner is an intuitive, collaborative task management tool that enables people to plan, manage, and complete task-based initiatives. Planner provides a simple and visual way for teams to organize their work. As a web-based tool, Planner is accessible from anywhere and available as a mobile app for both iOS and Android. • Assign and manage tasks on a Kanban board using task cards and add those tasks to buckets. • Task cards populate with various information, such as due dates, status, priority, checklists, labels, and file attachments. • Receive notifications to stay on top of deadlines. • Monitor your team’s progress with colorful visual cues and built-in status reporting. • Integrate with Teams by adding a "Tasks by Planner" tab, use @mentions in Word, Excel, and PowerPoint to assign tasks, and add your tasks to your calendar in Outlook or Microsoft To Do.
  • 21. Microsoft Yammer • Leader engagement • Broadcast company meetings with live events and real-time Q&A. • Communicate at scale with a site for leaders to share news, events, blogs, and polls. • Keep everyone informed and engaged, across web and mobile. • Share news and announcements that reach users as interactive discussions in Microsoft Teams and Outlook. • Target specific communities or reach your entire organization using the All Company community. • Pin and feature important conversations and send essential announcements to ensure delivery of critical information. • Create compelling communications with rich text, GIFs, photos, and videos. • Use questions and answers to gain solutions, highlight the best answers, and upvote replies.
  • 22. Microsoft Yammer • Call in experts with @mentions. • Follow topics across conversations and communities with tags. • Find and join recommended communities around common interests. • Designate official communities where employees can find what they need and join the discussion. • Engage in fully interactive discussions without leaving your Outlook inbox. • Bring the power of communities to SharePoint with the Yammer conversations web part. • Embed a Yammer community on any HTML page.
  • 23. Microsoft Bookings Bookings is an appointment scheduling and management system. Bookings simplify the process of scheduling and managing appointments. It includes a web-based booking calendar and integrates with Outlook to optimize your staff’s calendar and give your customers the flexibility to book a time that works best for them. • Manage staff schedules, set business hours, services, and pricing. • Add buffer time between appointments for any required pre or post- appointment activities. • Create a booking page where your customers and clients can schedule and reschedule appointments on their own. • Share the booking page via a direct link, your Facebook page, and link embedding within your website. • Ensure customers receive proper confirmations and reminders with automatic appointment notifications through email and SMS. • Integrate with Microsoft Teams to support virtual appointments.
  • 24. Microsoft To Do To Do is an intelligent task management app that makes it easy to plan and manage your day. Access To Do across devices including iOS, Android, Windows, and the web. Focus and achieve your most important tasks with a daily to-do list called "My Day." • Utilize smart suggestions to add tasks, upcoming or overdue tasks. • Share lists and assign tasks with colleagues, friends, and family. • Break down more complex tasks into subtasks. • Schedule reminders and repeatable tasks. • Sync your tasks across Outlook, Teams and Planner, and generate tasks from flagged Outlook emails.
  • 25. Microsoft Forms Forms is a simple, lightweight app that allows you to quickly and easily capture the information you need. Create surveys, quizzes, polls, questionnaires, registrations and more. Forms work from any web browser, on any device. • Insert quizzes, surveys, polls, and other types of forms into other Office products. • Enhance your form by adding a logo, displaying pictures or videos next to questions. • Share your quiz or form and collaborate with others or share it as a template. • Invite others to respond to your form using any web browser or mobile device. • View real-time results as they're submitted. • Use built-in analytics to evaluate responses. • Export results to Excel for more analysis or grading.
  • 26. Microsoft Lists Lists is a smart information tracking app that gives you and your team a flexible way to organize information and work. • Quickly create a list from scratch or use a ready-made template. • Create a list in a SharePoint site or in Microsoft Teams. • Create a list with various columns, include links, pictures and attach files. • Sort, group, format and filter lists to highlight the most important information. • Automate a list to streamline work and save time. • Track history of a list item over time with versions.
  • 27. SharePoint Online Microsoft SharePoint Online is the cloud version of Microsoft SharePoint Server that enables organizations to create and customize intranet and team-focused or task- focused sites for efficient collaboration Using SharePoint Online, users can: Build intranet sites and create pages, document libraries, and lists Discover, follow, and search for sites, files, and people across their organization Manage their daily routines with workflows, forms, and lists Sync and store their files in the cloud so anyone can securely work with them Use the SharePoint mobile app
  • 28. Microsoft Teams Microsoft Teams provides a central hub for collaboration within your organization You can implement a chat-based workspace, share documents, insights, and status updates with colleagues With Teams you can also: Communicate through chat, meetings, and calls Collaborate together with integrated Microsoft Office 365 apps Make calls in Office 365 and Teams Connect across devices
  • 29. Teams Phone • Use voice and video calling using Microsoft Teams Phone on your computer, tablet, mobile device, or desk phone. You can start a call from chat, contact card, Outlook, or the Calls app. Teams Phone has updated cloud calling features like voicemail transcription and group call pickup to elevate your experience beyond that of traditional calls.
  • 30. Microsoft Teams Some of the ways that you can extend Teams using collaborative apps are: • Power BI in Teams can empower your organization to collaborate with data to deliver improved outcomes. • Power Apps can help you build apps to add directly into Teams by creating a tab. • Power Automate can help you automate tasks and processes all within Teams. • Dynamics 365 and Teams integration can provide high-level details of your customers to ensure you have helpful context and can be prepared in customer meetings. • Power Virtual Agents allows you to create chatbots that can be integrated into Teams. • Integrate with third-party partners and services for more capabilities within Teams, like ServiceNow or Salesforce. Integration with third-parties can be done through incoming and outgoing webhooks and connectors.
  • 31. OneDrive for Business • Sharing • Sync • Storage • Device Access • Compliance • Notifications • Recycle Bin
  • 32. Microsoft Yammer • Yammer is a secure enterprise social network designed for connecting and engaging people across your organization. Yammer helps facilitate community collaboration and idea-sharing among leaders, coworkers and partners from anywhere. Access Yammer through your browser, or you can install Yammer on your desktop or mobile device. • Yammer offers two types of networks to help users communicate and collaborate in the most convenient and effective ways possible: • Internal network, also known as a home network, is restricted to users inside the organization. Only employees with a valid corporate email address can join the internal network and access its content and users. • External network, includes invited users from outside your organization. It's a space for you to engage with outside partners, like customers, suppliers, or investors.
  • 33. Microsoft Stream Microsoft Stream is a video streaming and sharing service that allows organizations to securely upload, share, manage and view videos within their company. It is designed as a business-focused platform and offers features such as video upload, storage, sharing, tagging, search, and analytics. Microsoft Stream is integrated with other Microsoft Office 365 products, such as SharePoint and Teams, and can be used to share and collaborate on video content with colleagues or external partners. Microsoft Stream also provides advanced security features, such as automatic encryption of video content and access control through Azure Active Directory.
  • 34. Other Apps • Word can help you create impressive documents and improve your writing with built-in intelligent features like Microsoft Editor and Researcher. • Excel can help you simplify complex data and create easy-to-read spreadsheets and visualizations. • PowerPoint can help you create polished presentations that stand out with intelligent features like rehearse with Coach and PowerPoint Designer. • Outlook can help you manage your email, calendar, tasks, and contacts together in one place. • OneNote can help you with your note taking needs by organizing your notes into tabs and subsections creating a single digital notebook.
  • 35. Reports • Usage reports show how people in your business are using Microsoft 365 services. Reports are available for the last 7 days, 30 days, 90 days, and 180 days. Data won't exist for all reporting periods right away. The reports become available within 48 hours. • Adoption Score provides insights into your organization's digital transformation journey through its use of Microsoft 365 and the technology experiences that support it.
  • 36. Data Residency • How do users know where data is stored? • How can users access data? • How do administrators manage large amounts of data? • What does it mean to secure data? • Users • Administrators • Applications • Devices • Locations
  • 37. Windows-as-a-Service model With Windows as a service, Microsoft simplifies the operating system build, deployment, and servicing process Revisions and updates are propagated more frequently by using:  Feature updates  Quality updates Microsoft provides organizations with more control over how and when updates are applied to their devices through:  Servicing channels: Windows Insider, Semi-annual channel, long-term servicing channel  Deployment rings: Preview, Broad, Critical
  • 38. Update: Limited Ring Limited ring • The purpose of the Limited ring is to validate the update on representative devices across the network. During this period, data, and feedback are generated to enable the decision to move forward to broader deployment. Desktop Analytics can help with defining a good Limited ring of representative devices and help monitor the deployment. Who goes in the Limited ring? • The most important part of this phase is finding a representative sample of devices and applications across your network. If possible, all hardware and all applications should be represented.
  • 39. Virtual Desktop • Windows Virtual Desktop allows administrators to create and customize Windows 10 images and host them in Azure as Virtual Machines. • Users connect to the virtual machines and have a full operating environment • Updates, configuration changes and application management is all controlled centrally in Azure, thus allowing for simplified administration
  • 41. Windows 365 • Most users are familiar with Windows 10 and Windows 11. Windows 365 isn't exactly an operating system and isn't installed on a PC like Windows. Windows 365 is a cloud-based service that automatically creates a new type of Windows virtual machine, called Cloud PCs, for your end users. Windows 365 securely streams your Windows desktop, apps, settings, and content from the cloud to a Cloud PC so you can access a personalized Windows 10 or Windows 11 experience from any Windows, iOS, or Android device. With a Cloud PC, Windows evolves from a device-based operating system (OS) to hybrid personalized computing. • Windows 365 Editions: • Business- 300 users, no support for Mobile Device Management • Enterprise- unlimited users, supports Mobile Device Management
  • 42. Windows 365 compared to Virtual Desktop • Scalability: Windows 365 is designed to be a highly scalable solution that can easily accommodate a growing number of users. It can automatically scale up or down based on the demand, and the users can easily add or remove licenses as needed. In contrast, Azure Virtual Desktop requires more planning and configuration to scale up or down. • Integration with other services: Azure Virtual Desktop is tightly integrated with other Azure services such as Azure Active Directory, Azure Monitor, and Azure Backup. This allows for better management and monitoring of the virtual desktop infrastructure. Windows 365 also integrates with Microsoft 365 services such as Microsoft Endpoint Manager and Microsoft Teams, but it does not have the same level of integration with Azure services.
  • 43. Co-management • Co-management combines your existing on-premises Configuration Manager with the cloud- based features in Intune, including Endpoint Manager. It enabled you to use conditional access. Co-management enables you to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune.
  • 44. Configuration Manager • Configuration Manager is an on-premises management solution to manage desktops, servers, and laptops that are on your network or internet-based. You can use Configuration Manager to manage data centers, apps, software updates, and operating systems. You can cloud-enable it to integrate with Intune, Azure Active Directory, Microsoft 365 Defender, Windows AutoPilot and other cloud services.
  • 45. Tenant-attach • If you need to manage a combination of both cloud and on-premises endpoints, you can use cloud attach to use both Intune and Configuration Manager. Cloud attach consists of tenant attach, co-management, and Endpoint analytics. Tenant-attach sets up synchronization between your Configuration Manager site and your Intune tenant. This synchronization provides you with a single view for all devices that you manage from the Microsoft Endpoint Manager admin center.
  • 46. What is Unified Endpoint Management? Unified Endpoint Management is an industry term that describes the notion of a platform that can provide overall device and app management from a single console Management challenges:  Mobile devices that connect to unsecured networks  Mobile devices that intermittently connect to organizational networks  Backing up data  Lost or stolen devices  Compromised devices that connect to the internal network  User-owned mobile devices
  • 47. Enterprise Mobility + Security components E5 plan E3 plan Product P2 plan P1 plan Azure AD Premium Yes Yes Intune P2 plan P1 plan Azure Information Protection Yes Yes Microsoft Advanced Threat Analytics Yes No Cloud App Security Yes Yes Configuration Manager Microsoft 365 Plans and Pricing: https://www.microsoft.com/en-us/microsoft-365/business/compare- more-office-365-for-business-plans
  • 48. Module 3: Describe security, compliance, privacy, and trust in Microsoft 365
  • 49. Common types of attacks Broad-based phishing & Spear-phishing • Attacker masquerades as a trusted entity, dupes employees into opening emails, texts or IMs. Password Spray • Attacker tries a large list of possible passwords for a given account or set of accounts Cross-site scripting • An attacker uses third-party web resources to run scripts in the victim’s web browser. Device compromise • Malware is installed on the device. This can include viruses, spyware, ransomware, and other unwanted software that installs without user consent.
  • 50. GDAP Microsoft Granular Delegated Admin Privileges (GDAP) is a set of principles that enable organizations to delegate administrative tasks to specific users while maintaining control and security over their systems and data. The following are the key principles of GDAP: • Granularity: GDAP provides a fine-grained control mechanism that allows organizations to delegate specific administrative tasks to users based on their roles and responsibilities. • Delegation: With GDAP, organizations can delegate administrative tasks to specific users without granting them full administrative access. This ensures that users have only the privileges they need to perform their tasks and reduces the risk of accidental or intentional misuse of privileges. • Auditing and Monitoring: GDAP provides a comprehensive auditing and monitoring mechanism that enables organizations to track and report on all delegated administrative activities. This ensures that organizations can detect and respond to any suspicious activities in a timely manner. • Permissions: GDAP enables organizations to define the specific permissions that users have for each delegated task. This ensures that users have access only to the resources and data they need to perform their tasks.
  • 51. Microsoft 365 Defender Microsoft 365 Defender is a comprehensive security solution that provides integrated protection across multiple Microsoft products and services, including endpoints, identities, cloud apps, and Office 365.
  • 52. Microsoft 365 Defender Defender for Endpoint is a security solution designed to protect endpoints such as desktops, laptops, servers, and mobile devices. It provides advanced threat protection, endpoint detection and response, automated investigation and remediation, and device control capabilities.
  • 53. Microsoft 365 Defender Defender for Office 365 is a security solution that provides protection for Microsoft Office 365 applications, such as Exchange Online, SharePoint Online, and OneDrive for Business. It offers email filtering, anti-phishing and anti-malware protection, and real-time protection against advanced threats.
  • 54. Microsoft 365 Defender Defender for Identity is a cloud-based security solution that provides advanced threat protection for identity and access management. It helps to detect and remediate identity-based attacks and helps to prevent unauthorized access to sensitive data.
  • 55. Microsoft 365 Defender Defender for Cloud Apps is a security solution designed to provide protection for cloud applications, such as Microsoft Teams, OneDrive, and SharePoint Online. It provides advanced threat protection, real-time monitoring and alerts, and proactive threat hunting capabilities.
  • 56. Microsoft Defender The Microsoft 365 Defender Portal is a centralized security management console that provides a unified view of security across all Microsoft products and services. It allows security teams to manage and investigate security incidents, view alerts and recommendations, and configure security policies and settings.
  • 57. Conditional Access Policies explained The picture can't be displayed . The picture can't be displayed. The picture can't be displayed. The picture can't be displayed. The picture can't be displayed.
  • 58. Microsoft Purview • Microsoft Purview is a unified data-governance service that helps you manage and govern your on-premises, multi-cloud, and software-as-a-service (SaaS) data. • Compliance Manager • Auditing • eDiscovery • Alerts • Content search • Data Loss Prevention • Insider Risk Management • Compliance Score
  • 59. Priva • Privacy is top of mind for organizations and consumers today, and concerns about how private data is handled are steadily increasing. Regulations and laws such as the European Union's General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) impact people around the world, setting rules for how organizations store personal data and giving people rights to manage personal data collected by an organization. • To meet regulatory requirements and build customer trust, organizations need to take a "privacy by default" stance. Rather than manual processes and a patchwork of tools, organizations need a comprehensive solution to address common challenges’
  • 60. Information Protection Features • Know your data: Organizations can understand their data landscape and identify important data across on-premises, cloud, and hybrid environments. • Protect your data: Organizations can apply flexible protection actions including encryption, access restrictions, and watermarks to data. • Prevent data loss: Organizations can detect risky behavior and prevent accidental oversharing of sensitive information using Data Loss Prevention . • Govern your data: Organizations can automatically keep, delete, and store data and records in a compliant manner using Retention Policies.
  • 61. Sensitive Information Types • Sensitive information types are pattern-based classifiers. They have set patterns that can be used to identify them. For example, an identification number in a country/region may be based on a specific pattern, like this: • Credit card numbers • Passport or identification numbers • Bank account numbers • Health service numbers You can also create custom sensitive information types to for your organizations needs
  • 62. Sensitivity Labels • Sensitivity labels, available as part of information protection in the Microsoft Purview compliance portal, enable the labeling and protection of content, without affecting productivity and collaboration. With sensitivity labels, organizations can decide on labels to apply to content such as emails and documents. • Labels are: • Customizable: Admins can create different categories specific to the organization, such as Personal, Public, Confidential, and Highly Confidential. • Clear text: Because each label is stored in clear text in the content's metadata, third-party apps and services can read it and then apply their own protective actions, if necessary. • Persistent. After you apply a sensitivity label to content, the label is stored in the metadata of that email or document. The label then moves with the content, including the protection settings, and this data becomes the basis for applying and enforcing policies.
  • 63. Sensitivity Labels • Sensitivity labels can be configured to: • Encrypt email only or both email and documents. • Mark the content when Office apps are used. Marking the content includes adding watermarks, headers, or footers. Headers or footers can be added to emails or documents. Watermarks can be applied to documents but not to email. • Apply the label automatically in Office apps or recommend a label. Admins choose the types of sensitive information to be labeled. The label can be applied automatically or configured to prompt users to apply the recommended label. • Protect content in containers such as sites and groups. This label configuration doesn't result in documents being automatically labeled. Instead, the label settings protect content by controlling access to the container where documents are stored.
  • 64. Label Policies • After sensitivity labels are created, they need to be published to make them available to people and services in the organization. Sensitivity labels are published to users or groups through label policies. Sensitivity labels will then appear in Office apps for those users and groups. The sensitivity labels can be applied to documents and emails. • Choose the users and groups that can see labels • Apply a default label to all new emails and documents that the specified users and groups create. Users can always change the default label if they believe the document or email has been mislabeled. • Require justifications for label changes. If a user wants to remove a label or replace it, admins can require the user to provide a valid justification to complete the action. The user will be prompted to provide an explanation for why the label should be changed. • Require users to apply a label (mandatory labeling). It ensures a label is applied before users can save their documents, send emails, or create new sites or groups.
  • 65. Data Loss Prevention (DLP) • Data Loss Prevention (DLP) is a way to protect sensitive information and prevent its inadvertent disclosure. With DLP policies, admins can: • Identify, monitor, and automatically protect sensitive information across Microsoft 365, including: • OneDrive for Business • SharePoint Online • Microsoft Teams • Exchange Online • For example, if a user tries to share a document containing sensitive information, a DLP policy can send them an email notification and show them a policy tip. • View DLP reports showing content that matches the organization's DLP policies. To assess how the organization is following a DLP policy, admins can see how many matches each policy has over time.
  • 66. Insider Risk • Microsoft Purview Insider Risk Management is a solution that helps minimize internal risks by enabling an organization to detect, investigate, and act on risky and malicious activities. Insider risk management is available in the Microsoft Purview compliance portal. • Managing and minimizing risk in an organization starts with understanding the types of risks found in the modern workplace. Some risks are driven by internal events and employee activities that can be eliminated and avoided. Some examples are risks from illegal, inappropriate, unauthorized, or unethical behavior and actions by employees and managers. These behaviors can lead to a broad range of internal risks from employees: • Leaks of sensitive data and data spillage • Confidentiality violations • Intellectual property (IP) theft • Fraud • Insider trading • Regulatory compliance violations
  • 67. Auditing Auditing solutions in Microsoft Purview help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable. This capability provides visibility into the activities performed across your Microsoft 365 organization.
  • 68. Microsoft Sentinel Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) system that helps organizations detect, prevent, and respond to security threats across their entire IT environment. It provides intelligent security analytics and threat intelligence, using machine learning algorithms to identify and respond to potential security incidents. It offers features such as security automation, orchestration, and response (SOAR), built-in threat intelligence, and support for over 120 connectors to integrate with various other security tools. The benefits of using Microsoft Sentinel include: • Improved visibility into security events and threats across the IT environment • Better threat detection and faster response times • Increased automation and efficiency in security operations • Improved compliance with industry regulations and standards • Centralized management and control of security
  • 69. Module 4: Describe Microsoft 365 pricing, licensing, and support
  • 70. Pricing Models, CSPs, and EAs • The Cloud Solution Provider (CSP) program provides a pay-as-you-go subscription model with per-user, per-month pricing that enables your business to scale up or down from month to month as your needs change. Enterprise Agreement • The Microsoft Enterprise Agreement (EA) is designed for organizations that want to license software and cloud services for a minimum three-year period. The Enterprise Agreement offers the best value to organizations with 500 or more users or devices. 24x7 technical support, planning services, end-user and technical training are included in EA agreements.
  • 71. Pricing Models, CSPs, and EAs Direct Billing • Buy and pay for your Microsoft 365 subscription with a credit or debit card, or a bank account. The payment method you use to pay will continue to be charged until the subscription expires or is canceled. Payment methods can be managed through the Microsoft 365 admin center. Trial • Sign up for a free trial subscription and try it out for 30 days.
  • 72. Billing account options • A billing account is created when you sign up to try or buy Microsoft products. You use your billing account to manage your account settings, invoices, payment methods, and purchases. The Microsoft 365 admin center currently supports the following type of billing accounts: • Microsoft Online Services Program: This billing account is created when you sign up for a Microsoft 365 subscription directly. • Microsoft Products & Services Agreement (MPSA) Program: This billing account is created when your organization signs an MPSA Volume Licensing agreement to purchase software and online services. • Microsoft Customer Agreement: This billing account is created when your organization works with a Microsoft representative, an authorized partner, or purchases independently.
  • 73. Fixed-price vs Consumption-based pricing • Consumption-based price: You're charged for only what you use. This model is also known as Pay-As-You-Go. • Fixed-price: You provision resources and are charged for those instances whether or not they're used.
  • 74. Billing Management Microsoft 365 billing is managed from the Microsoft 365 admin center. The admin center allows you to manage subscriptions, view billing statements, update payment methods, change your billing frequency, and more. The following list describes in further detail what can be reviewed and modified in the Microsoft 365 admin center: • Upgrade, renew, reactivate or cancel subscriptions. • Buy, remove, and view the number of subscription licenses and how many of those licenses are assigned. • Assign and unassign licenses from users. • View a bill, invoice, and past billing statements. • Modify payment methods. • Modify your billing frequency to monthly or annual billing. • Buy and manage other services or features. • Manage your billing notification emails
  • 75. Subscription Microsoft 365 for home • Microsoft 365 Home comes in two plans, Microsoft 365 Personal and Microsoft 365 Family. Personal is for a single person with multiple devices and family is for up to six people.
  • 76. Subscription Microsoft 365 Education • Microsoft 365 Education is available for educational institutions. Academic licenses can be tailored to fit any institution’s needs, including productivity and security solutions for faculty, staff, and students. Microsoft 365 Education has three subscription plans for faculty and students that include different features: A1, A3, and A5. Microsoft 365 Government • Microsoft 365 Government is available for government institutions. Microsoft 365 Government has two subscription plans that include different features: G3, and G5.
  • 77. Subscription Microsoft 365 for business • Microsoft 365 for business is designed for small to medium-sized organizations that have up to 300 employees. It offers the full set of Office 365 productivity tools and includes security and device management features. There are four subscription tiers that include different features: Microsoft 365 Business Basic, Microsoft 365 Business Standard, Microsoft 365 Business Premium, and Microsoft 365 Apps for business.
  • 78. Subscription Microsoft 365 Enterprise • Microsoft 365 Enterprise is designed for enterprise-sized organizations. It provides enterprise- class services to organizations that want a productivity solution that includes robust threat protection, security, compliance, and analytics features. Microsoft 365 Enterprise has three subscription tiers that include different features: Microsoft 365 E3, Microsoft 365 E5, and Microsoft 365 F3.
  • 79. Licenses Licenses • A license, or base license allows users to use the features and services included in the subscription plan. When you buy a subscription, you specify the number of licenses you need, based on the number of people you have in your organization. After you buy a subscription, you create accounts for people in your organization, and then assign a license to each person. As your organizational needs change, you can buy more licenses to accommodate new people, or reassign licenses to other users when someone leaves your organization. • Microsoft 365 products and services are available as user subscription licenses (USLs) and are licensed on a per-user basis. Each user accessing Microsoft 365 products and services is required to be assigned a USL. Administrators manage licenses in the Microsoft 365 admin center. They can assign the licenses to individual user or guest accounts.
  • 80. Licenses • Full USLs are for new customers who haven't previously purchased Microsoft products and services. • Add-on USLs are for on-premises software customers who want to add Microsoft 365 cloud products and services. • From SA USLs are for on-premises Software Assurance customers that want to transition to the cloud. • Step Up USLs are for customers who want to upgrade the level of their service.
  • 81. Types of add-ons Types of add-ons • Traditional add-ons are linked to a specific subscription. If you cancel the subscription, the linked add-on is also canceled. • Standalone add-ons appear as a separate subscription on the Your products page within the Microsoft 365 admin center. They have their own expiration date and are managed the same way you would any other subscription.
  • 85. Microsoft 365 Lighthouse Microsoft 365 Lighthouse is a management solution designed for Managed Service Providers (MSPs) to simplify the management of multiple Microsoft 365 tenants. It offers a centralized dashboard that allows MSPs to manage and monitor their customers' Microsoft 365 environments from a single location. The benefits of using Microsoft 365 Lighthouse include: • Simplified management of multiple Microsoft 365 tenants • Streamlined deployment and management of Microsoft 365 services for customers • Centralized monitoring and reporting across multiple tenants • Increased efficiency and productivity for MSPs • Improved customer satisfaction and retention