Muutke küpsiste eelistusi

E-raamat: Microsoft 365 Administration Inside Out

  • Formaat: EPUB+DRM
  • Sari: Inside Out
  • Ilmumisaeg: 16-Feb-2023
  • Kirjastus: Addison Wesley
  • Keel: eng
  • ISBN-13: 9780137908981
  • Formaat - EPUB+DRM
  • Hind: 46,79 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Inside Out
  • Ilmumisaeg: 16-Feb-2023
  • Kirjastus: Addison Wesley
  • Keel: eng
  • ISBN-13: 9780137908981

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Conquer Microsoft 365 administration, from the inside out!

Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds; all you need to continually enhance organizational agility, productivity, and security. Three Microsoft insiders help you fully leverage Microsoft Purview, Microsoft Enterprise Mobility + Security (EMS), Azure AD, Exchange Online, Microsoft Teams, SharePoint Online, OneDrive for Business, and more. Discover how experts tackle today’s key tasks and challenge yourself to new levels of mastery.

  • Plan deployment, understand downstream impacts, and avoid pitfalls
  • Prepare your environment, establish governance, and enforce compliance
  • Assess and improve security posture with Microsoft 365 Secure Score
  • Move to identity-based security with Microsoft Enterprise Mobility + Security (EMS)
  • Plan identity types, authentication, identity federation, and AAD Connect deployment
  • Replace costly premises infrastructure with cloud-based Azure synchronization
  • Manage complex Azure AD scenarios such as mergers, acquisitions, and divestitures
  • Automate Azure to improve consistency, security, and standardization
  • Prepare for Exchange Online cloud-only deployments, hybrid coexistence, and migration
  • Move mailboxes and public folders to Exchange Online
  • Understand Microsoft Teams concepts, architecture, and user interface
  • Support meetings, webinars, and live events
  • Deliver full-featured telephony solutions with Teams Phone System
  • Implement telephony scheduling, room collaboration, automation, and IVR
  • Use SharePoint Online to manage content and extend it with analytics and dashboards

 

For IT Professionals and Consultants

  • Your role: You have, or will have, responsibilities for deploying, migrating to, or managing some or all of a Microsoft 365 environment
  • Prerequisites: For individuals at any stage of their cloud journey
About the Authors xxiii
Introduction xxii
Who this book is for xxiv
Conventions xxv
Text conventions xxv
Book features xxv
Acknowledgments xxvi
Free ebooks from Microsoft Press xxvi
Errata, updates, & book support xxvii
We want to hear from you xxvii
Stay in touch xxvii
Chapter 1 Jumping into the cloud
1(32)
Getting started
1(2)
Which plan is best for me?
2(1)
Picking a tenant name
3(5)
Adding your domain name to your tenant
5(3)
Delegating access to your tenant
8(1)
Should I deploy in hybrid mode?
9(4)
Exchange Hybrid
9(2)
SharePoint Hybrid
11(2)
Is your Exchange environment ready?
13(5)
Physical Exchange Server infrastructure
13(1)
Mail routing
14(1)
Mailboxes
14(2)
Load balancers, network configurations, proxy servers, and firewall rules
16(2)
Is your directory ready?
18(7)
User readiness
18(3)
Forests and domains
21(2)
Stale users
23(2)
Are your users ready?
25(6)
UPN versus email address
25(1)
Multi-forest environments
26(1)
Office versions
27(1)
Updates
27(1)
Mailbox cleanup
28(1)
Scheduling
29(1)
The Global Address List
30(1)
Replying to old emails
30(1)
What's next?
31(2)
Chapter 2 Preparing your environment for the cloud
33(32)
Setting up your subscription
33(4)
Finding your tenant name
33(4)
Assigning administrators
37(2)
Configuring DNS, firewalls, and proxy servers
39(9)
Public DNS records
39(1)
Firewall configurations
40(1)
Proxy servers
41(7)
Preparing your directories
48(5)
Updating and deploying client software
53(5)
Installing Microsoft 365 Apps
54(3)
Activation
57(1)
Synchronizing your users
58(1)
Licensing your users
59(5)
Group-based licensing
59(2)
PowerShell licensing
61(2)
Manual license assignment
63(1)
What's next?
64(1)
Chapter 3 Governance concepts
65(22)
Identity and access management concepts
66(3)
Identity lifecycle
67(1)
Access management lifecycle
68(1)
Governance for core workloads and features
69(5)
Azure Active Directory
69(2)
Exchange Online
71(1)
SharePoint Online
71(1)
Microsoft Teams
72(1)
Retention and data security
72(2)
Ediscovery
74(1)
Governance controls
74(12)
Azure AD
74(2)
Exchange Online
76(2)
SharePoint Online
78(3)
Microsoft Teams
81(3)
Retention and data security
84(1)
Discovery
85(1)
What's next?
86(1)
Chapter 4 Compliance Manager
87(18)
Your organization's compliance score
87(4)
Understanding improvement actions
89(1)
Types of improvement actions
89(2)
Assigning permissions
91(2)
Conducting an assessment
93(5)
Creating an assessment
93(3)
Reviewing controls and actions
96(2)
Updating improvement actions
98(5)
Working with alerts
103(1)
What's next?
104(1)
Chapter 5 Secure Score
105(12)
Overview
105(2)
Assessing your security posture
107(1)
Prioritizing improvements in your security posture
108(5)
Reporting on your security posture
113(2)
What's next?
115(2)
Chapter 6 Labels, retention, and eDiscovery
117(72)
Data governance concepts
117(10)
Sensitive information types
118(2)
Classifiers
120(1)
Labels
121(2)
Data loss prevention
123(1)
Retention
124(2)
Records
126(1)
Data governance scenarios
127(34)
Sensitivity labels
127(20)
Retention labels
147(6)
Retention policies
153(3)
Data loss prevention policies
156(5)
Records search
161(26)
Audit log search
162(2)
Content search
164(10)
Ediscovery
174(13)
What's next?
187(2)
Chapter 7 Enterprise Mobility + Security
189(18)
Overview
189(2)
Identity and access management
191(7)
Simplified access management and security
191(1)
Multifactor authentication
192(1)
Conditional access
193(1)
Risk-based access
194(3)
Advanced security reporting
197(1)
Privileged Identity Management
197(1)
Endpoint management
198(3)
Mobile application management
199(1)
Advanced Microsoft Office 365 data protection
199(1)
Integrated PC management
200(1)
Integrated on-premises management
201(1)
Information protection
201(2)
Persistent data protection
201(1)
Intelligent data classification and labeling
202(1)
Document tracking and revocation
203(1)
Encryption key management
203(1)
Identity-driven security
203(3)
Microsoft Advanced Threat Analytics
203(1)
Microsoft Cloud App Security
204(1)
Microsoft Defender for Identity
205(1)
What's next?
206(1)
Chapter 8 Security features of Enterprise Mobility + Security
207(30)
Securing identity
207(20)
Microsoft Defender for Identity
208(1)
Ensure your hardware is up to the task
208(2)
Make sure the required connectivity is in place
210(1)
Create the service account
211(1)
Create your MDI instance
211(2)
Monitoring your environment
213(1)
Multifactor authentication
214(4)
Conditional Access
218(5)
Risk-based Conditional Access
223(4)
Securing devices
227(8)
Mobile Device Management
227(1)
Mobile Application Management
228(1)
Getting started with Intune
228(7)
What's next?
235(2)
Chapter 9 Identity and authentication planning
237(22)
Identity types
237(12)
Synchronized identities
237(1)
Cloud identities
238(8)
Guest identities
246(3)
User authentication
249(5)
Password
249(3)
Password policy
252(2)
Identity federation
254(3)
What's next?
257(2)
Chapter 10 Installing AAD Connect
259(86)
The Custom and Express installation experiences
259(13)
Express installation
261(6)
Custom installation
267(5)
Selecting your authentication method
272(12)
Password synchronization
273(11)
Connecting to your directories
284(3)
The UserPrincipalName and SourceAnchor attributes
287(3)
Domain and OU filtering
289(1)
Uniquely identifying your users
290(32)
User matching
291(8)
Important notes about GalSync and AAD Connect
299(14)
SamAccountName and MailNickname
313(3)
Custom join attribute selection
316(3)
Source Anchor
319(3)
Filter users and devices
322(15)
Optional features
325(7)
Group Writeback
332(1)
Device Writeback
333(2)
Directory Extension Attribute Sync
335(2)
Finalizing the installation
337(7)
Configuration complete
339(1)
When should you start synchronizing?
340(1)
Starting synchronization
341(2)
Staging Mode--your ace in the hole
343(1)
What's next?
344(1)
Chapter 11 Azure AD Cloud Sync
345(36)
Azure AD Cloud Sync
346(3)
Device synchronization and hybrid Azure AD Join
347(1)
Writeback
348(1)
Pass-through authentication
348(1)
Directory extensions
348(1)
Custom attribute flows and rule editing
349(1)
SourceAnchor
349(1)
Installing Azure AD Cloud Sync
349(6)
Configuring Azure AD Cloud Sync
355(24)
Deleting attribute mappings
360(1)
Editing attribute mappings
361(1)
Adding attribute mappings
362(3)
Additional complex mapping examples
365(5)
Decompressing
370(1)
Using the Expression Builder
370(3)
Provisioning a user (the validate step)
373(4)
Notification and deletion protection
377(1)
Enabling the configuration
378(1)
Moving from Azure AD Connect to Azure AD Cloud Sync
378(1)
What's next?
379(2)
Chapter 12 Advanced Azure AD scenarios
381(32)
Migrations and the SourceAnchor
381(14)
What does mS-DS-ConsistencyGuid support add to the configuration?
389(6)
Performing migrations
395(2)
UserPrincipalName
395(1)
Email address and Exchange attributes
396(1)
Group and user SIDs
396(1)
Microsoft options for cross-forest migrations
397(1)
Additional Azure AD Connect considerations
397(1)
Password Writeback
398(6)
Requirements
398(1)
Enabling Password Writeback
398(6)
Precedence
404(8)
What's next?
412(1)
Chapter 13 Azure Automation
413(18)
Azure Automation concepts
413(1)
Runbooks
413(1)
Hybrid Runbook Worker
414(1)
Authentication
414(1)
Webhooks
414(1)
Configuring authentication
414(8)
Microsoft 365 service account
415(1)
Azure Automation account
416(6)
Creating a PowerShell runbook
422(8)
Prepare an Exchange Online script
423(1)
Creating a runbook with a script
424(2)
Testing a PowerShell runbook
426(2)
Publishing a runbook
428(2)
What's next?
430(1)
Chapter 14 Exchange Online overview
431(24)
Exchange Online deployment concepts
431(5)
Recipients
431(1)
Mail routing
432(1)
Autodiscover
432(3)
Migration and coexistence methodologies
435(1)
Exchange and Active Directory on-premises environment
436(5)
Active Directory versions and configuration
436(1)
Autodiscover
437(1)
Certificates
438(1)
Exchange versions, service packs, cumulative updates, and rollups
439(1)
Exchange Best Practices Analyzer
440(1)
IDFix
440(1)
SSL offloading
440(1)
Windows updates
441(1)
Recipients
441(3)
Contacts
441(1)
Mailboxes
441(3)
Mail-enabled users
444(1)
Groups
444(3)
Dynamic distribution groups
445(1)
Microsoft 365 groups
445(1)
Permissions and delegation
446(1)
Public folders
446(1)
Mail routing
447(1)
Data loss prevention
447(1)
Message encryption
447(1)
Message hygiene
447(1)
Networking
448(5)
Bandwidth
448(1)
Firewall
448(1)
Load balancing
449(1)
Proxy
449(1)
DNS
449(1)
Network security appliances
450(1)
Things that don't migrate
451(2)
Additional tools
453(1)
Remote Connectivity Analyzer
453(1)
Exchange Deployment Assistant
453(1)
What's next?
453(2)
Chapter 15 Exchange Online hybrid planning and deployment
455(34)
Overview of Exchange Online hybrid features
455(3)
Planning
458(7)
General
458(1)
Autodiscover
458(1)
Azure Active Directory Connect
458(1)
Cross-premises access and delegation
458(1)
DNS
459(1)
Email address policies and proxy addresses
459(1)
Exchange Server Deployment Assistant
460(1)
Exchange server versions
460(1)
Free/busy and hybrid authentication
461(2)
Message sizes
463(1)
Mail transport
463(1)
Networking
464(1)
Public folders
465(1)
Office 365 Hybrid Configuration Wizard
465(1)
Overview
465(3)
Prerequisites
468(1)
Installing the Office 365 Hybrid Configuration Wizard
469(2)
Running the Office 365 Hybrid Configuration Wizard
471(10)
Rerunning the Hybrid Configuration Wizard
481(1)
Troubleshooting
482(1)
Mailbox provisioning
482(3)
Decommissioning the hybrid environment
485(2)
What's next?
487(2)
Chapter 16 Migrating mailboxes to Exchange Online
489(26)
Migration endpoints
489(4)
Migration batches
493(16)
Onboarding
493(14)
Off boarding
507(2)
Troubleshooting
509(4)
What's next?
513(2)
Chapter 17 Migrating public folders to Exchange Online
515(30)
Exchange Online prerequisites
515(2)
Configuring hybrid public folders
517(5)
On-premises public folders
518(4)
Public folder migration
522(16)
Exchange 2007 or Exchange 2010
523(9)
Exchange 2013 or later
532(6)
Post-migration configuration
538(2)
Exchange Online public folder location
538(1)
Exchange Online mail-enabled public folder routing
538(1)
Exchange Online mail-enabled public folder external email address
539(1)
Exchange on-premises mail routing domain
539(1)
Exchange on-premises public folder migration complete
539(1)
Apply Send-As permissions
539(1)
Apply Grant-Send-On-Behalf-To permissions
540(1)
Troubleshooting
540(4)
Active Directory Operation Failed. The Object Already Exists
540(1)
Exceeded Maximum Number Of Corrupted Items
541(1)
Subscription Couldn't Be Loaded
541(1)
Make Sure Public Folder Access Is Locked
541(1)
No Such Request Exists
542(1)
Public Folder "Path" Could Not Be Mail-Enabled
542(1)
Public Folders Could Not Be Mail-Enabled
543(1)
What's next?
544(1)
Chapter 18 Managing Exchange Online
545(44)
Exchange admin center
545(1)
Recipient management
546(11)
Mailboxes
547(6)
Mail-enabled users
553(1)
Contacts
554(1)
Distribution groups
554(1)
Restricting delivery
555(2)
Transport
557(17)
Connectors
557(1)
Transport rules
557(9)
Central mail transport
566(1)
Manage IP filtering lists
567(2)
Enhanced filtering for connectors
569(1)
Message trace
569(1)
Migration of transport settings between Office 365 tenants
570(1)
Migration of transport rules collections
571(1)
DKIM
572(2)
Spam, phish, and malware filtering
574(8)
Malware filter
574(1)
Phish filter
574(2)
Spam filter
576(3)
Quarantine
579(2)
Outbound spam
581(1)
Blocked accounts
581(1)
Organization management
582(5)
Organization relationships
583(3)
Sharing policies
586(1)
Hybrid management
587(1)
Provisioning remote mailboxes
587(1)
Updating domains in a hybrid configuration
588(1)
What's next?
588(1)
Chapter 19 Microsoft Teams overview
589(20)
Architecture
589(6)
Identity
592(1)
Files
593(1)
Messaging and chat services
593(1)
Connectors
594(1)
Voicemail
594(1)
Recording
594(1)
Calendars and meetings
594(1)
Contacts
594(1)
Other components
594(1)
Architecture deep dive
595(5)
Microsoft 365 groups
595(4)
Teams
599(1)
User interface
600(7)
Menu bar
601(1)
Appbar
601(1)
List pane
601(1)
Main content area
601(1)
Exploring the App bar
601(6)
What's next?
607(2)
Chapter 20 Meetings, webinars, and live events
609(30)
Meetings
609(4)
Types
609(4)
Webinars
613(12)
Administration
616(9)
Live events
625(12)
Live events policies
625(4)
Live events settings
629(2)
Integrated services
631(5)
Configuring Teams Live events with external production
636(1)
What's next?
637(2)
Chapter 21 Phone system planning
639(32)
Overview of Teams Phone concepts
639(7)
Teams Phone concepts and terminology
639(4)
Calling features
643(3)
Choosing an architecture
646(9)
Calling Plans for Microsoft 365
647(1)
Direct Routing
648(6)
Operator Connect
654(1)
Planning network requirements
655(12)
Network requirements
655(1)
Bandwidth requirements
656(1)
Ports
657(1)
Network endpoints
657(1)
Split-tunnel VPN
658(1)
Quality of Service
658(9)
Best practices and additional network tools
667(2)
Verify all required outbound network ports
667(1)
Bypass encryption and other filtering devices
668(1)
Microsoft Teams Network Assessment Tool
668(1)
Network Planner for Teams
668(1)
Microsoft 365 Network Connectivity Test
668(1)
Call Quality Dashboard Report
668(1)
What's next?
669(2)
Chapter 22 Phone System configuration
671(54)
Prerequisites
672(1)
Emergency dialing
672(11)
Define networks
674(1)
Configure Location Information Service
675(6)
Configure emergency policies
681(2)
Test the emergency location configuration
683(1)
Phone numbers
683(17)
Obtain phone numbers
683(13)
Assign phone numbers
696(3)
Communications credits
699(1)
Teams voice policies
700(23)
Calling restrictions
701(5)
Calling policies
706(6)
Call parking policies
712(4)
Caller ID policies
716(2)
Voicemail policies
718(5)
What's next?
723(2)
Chapter 23 Phone System advanced features
725(36)
Resource accounts
726(15)
Microsoft Teams advanced calling feature resource accounts
727(6)
Microsoft Teams Room resource accounts
733(8)
Holidays
741(2)
Call queues
743(6)
Configure call queue prerequisites
743(1)
Configure a call queue
743(5)
Voice-enabled channels
748(1)
Auto attendants
749(10)
Configure auto attendant prerequisites
750(1)
Configure an auto attendant
750(8)
Check auto attendant voicemail
758(1)
What's next?
759(2)
Chapter 24 Managing Teams
761(20)
Microsoft 365 Groups and Teams component architecture
761(2)
Collaboration management
763(14)
Access control planes
763(9)
Channel controls
772(5)
Troubleshooting
777(3)
This link won't work for people outside your organization
778(1)
We ran into an issue. Please try again later
778(1)
Your organization does not allow collaboration with the domain of the user you're inviting
779(1)
Due to admin policy, you can't add external people to the channel
780(1)
What's next?
780(1)
Chapter 25 SharePoint Online
781(10)
SharePoint Online concepts
781(1)
SharePoint Online capacities
782(3)
Overall service limits
782(1)
Individual service plan limits
783(2)
SharePoint Online features
785(5)
OneDrive for Business
785(1)
Office Online
786(1)
Delve
787(1)
Yammer
788(1)
Enterprise search
788(1)
SharePoint Store apps
789(1)
Business Connectivity Services
789(1)
SharePoint Online hybrid
790(1)
What's next?
790(1)
Chapter 26 SharePoint Online planning and deployment
791(18)
Planning a modern site architecture
791(5)
Planning sites and hubs
791(3)
Planning navigation
794(2)
Designing site collection structure
796(2)
Determining site taxonomy and topology
796(2)
Determining site users
798(1)
Planning and configuring site and guest access
798(9)
How external sharing works
798(3)
Planning and configuring sharing and site access
801(3)
Planning security options
804(3)
What's next?
807(2)
Chapter 27 SharePoint Online Hybrid configuration
809(36)
Planning
810(5)
General
810(1)
OneDrive for Business
811(1)
Search
811(2)
Taxonomy
813(1)
App launcher
814(1)
Business-to-business extranet
814(1)
Configuration
815(29)
Set up SharePoint services for hybrid integration
816(8)
OneDrive for Business and Hybrid Sites
824(6)
Hybrid search
830(7)
Hybrid taxonomy
837(5)
App launcher
842(1)
Business-to-business extranet
843(1)
What's next?
844(1)
Chapter 28 Migrating data to SharePoint Online
845(22)
Inventorying data sources and mapping destinations
846(3)
What data is being migrated?
846(1)
Where should it go?
846(1)
What can't be migrated?
847(2)
Choosing the migration tools
849(1)
Planning for requirements and prerequisites
849(4)
SharePoint Online planning and prerequisites
850(2)
Network planning and prerequisites
852(1)
Scanning content
853(5)
Generating an identity map
854(2)
Scanning SharePoint content
856(1)
Customizing the SMAT scanning process
857(1)
Resolving blocking issues
858(1)
Planning for content that cannot be migrated
858(1)
Migrating data with SharePoint Migration Tool (SPMT)
859(7)
What's next?
866(1)
Chapter 29 SharePoint Online management
867(38)
Sites
868(2)
Policies
870(3)
Sharing
870(2)
Access control
872(1)
Settings
873(5)
Content services
878(2)
Term Store
879(1)
Content Type Gallery
879(1)
Migration
880(1)
Reports
881(2)
Content Services
881(1)
Data access governance
881(2)
Advanced
883(1)
More Features
883(21)
Term Store
884(1)
User profiles
884(4)
Search
888(1)
Apps
889(4)
Business Connectivity Services
893(3)
Secure Store
896(1)
Records management
897(6)
Infopath
903(1)
Hybrid Picker
903(1)
What's next?
904(1)
Chapter 30 OneDrive for Business
905(32)
Accessing OneDrive for Business
905(10)
OneDrive sync client for Windows
907(7)
OneDrive sync client for Mac OS X
914(1)
Collaborating with OneDrive for Business
915(5)
Sharing documents and folders
915(1)
Coauthoring
916(1)
Document versioning
917(3)
Deploying OneDrive for Business to your users
920(14)
Group Policy
921(7)
Manage OneDrive for Business
928(6)
Troubleshooting
934(3)
Index 937
Aaron Guilmette is a Senior Program Manager for Customer Experience at Microsoft and provides guidance and assistance to customers adopting the Microsoft 365 platform, focusing on messaging, identity, automation, and security solutions. You can follow Aaron on LinkedIn at aka.ms/aaronlinkedin.

Darryl Kegg is a Senior Program Manager at Microsoft, dedicated to deploying Microsoft 365 and Azure technologies with a focus on identity, security, and access management. Darryl has been involved in deploying Microsoft 365 to government, education, healthcare, and commercial customers since its launch in 2011 and has helped migrate 15+ million users to Azure. You can follow Darryl on LinkedIn at aka.ms/darrylkegg.

Ed Fisher is a Technical Solution Leader-Security at Microsoft, focusing on helping customers evaluate, deploy, and adopt Microsoft 365 collaboration technologies, networking, and security solutions. His focus is on Microsoft's XDR and SIEM platforms and Microsoft Defender for Office. Find out more at aka.ms/edfisher.