Skip to main content

Planning Microsoft 365

  Planning Microsoft 365

• Microsoft 365 is a Software as a Service (SaaS) solution

that includes Microsoft Office and other services, integrates

all Microsoft’s exiting online applications.

o such as email and collaboration, from Microsoft’s cloud

server

o Microsoft Office 365 provides desktop functionalities 

and is available by subscription

• No upfront installation or integration is required, other than

an Internet connection and supporting Web browser.

o The Microsoft Office 365 suite of applications includes 

several different online services, including Office 

Professional Plus, Exchange Online, SharePoint Online, etc.

• Features and benefits of Office 365 are:

o Explore and Integrate

„ Office 365 Integrates seamlessly with Microsoft Office and

other Microsoft programs. It takes just a few minutes to

create a trial account that users can test and integrate with

the cloud.

o Collaborate anywhere anytime

„ With Office 365, users get web-enabled access to email,

documents, contacts, and calendars regardless of

whichever device or browser they use. This accessibility

enables unified collaboration among employees.

o Stay Up and Running always

„ By running your applications in the cloud and storing your

data there, too, you’ll ensure all your business documents 

and applications, such as email, will always be available –

even if your company experiences a disaster such as a 

fire or a flood.

o Flexibility

„ With multiple options in the Office 365 suite, enterprises buy

only the office solutions they need and convert 

CAPEX into OPEX.

o Single sign-on

„ Users can store their password in the system tray of their

machine to avoid having to repeatedly sign in.

o Support

„ Users receive business-class service including IT admin

phone support, a financially-backed 99.9% uptime

guarantee, geo-redundant data centers, disaster recovery,

robust security, privacy controls, and standards.

o Security

„ Office 365 has built-in security and continuous compliance.

You always know where your data is and who has access to

it. You can also remotely wipe all data from your mobile

device if it’s lost or stolen.

o No Licensing Issues

„ Office 365 includes all licensing and it can be deployed

company-wide. This means everyone has the same version

of Microsoft Office, and all users receive upgrades at the

same time.

o Get Organized

„ When you use Office 365, email, calendar and contacts are

all synchronized. Update a contact on your mobile phone

and it will be automatically updated across all your devices.

You can also access the same data from any device or save

a document on your PC and continue working on it on your

smartphone or tablet.

o Real-time Collaboration

„ Teams can collaborate with Microsoft Word, Excel and

PowerPoint. Users can see real-time edits or additions their

colleagues are making to a document. It also saves each

version automatically, so you can revert to older versions

easily. This ensures a quicker and simpler collaboration

between employees and departments, resulting in

improved productivity.


Microsoft 365 Component Service

• The Enterprise Mobility + Security components included

with Office 365 Enterprise. These services provide

capabilities that enable Microsoft cloud enterprise

administrators to not just protect company employees’

identities and devices, but also control access to company

data itself 

o Microsoft Azure Active Directory

„ Azure Active Directory (Azure AD) is Microsoft's cloudbased identity and access management service, which

helps your employees sign in and access resources in:

External resources, such as Microsoft 365, the Azure

portal, and thousands of other SaaS applications.

o Azure AD Identity Protection

„ Identity Protection is a tool that allows organizations to

accomplish three key tasks:

„ Automate the detection and remediation of identitybased risks.

„ Investigate risks using data in the portal.

„ Export risk detection data to third-party utilities for further

analysis.

„ Identity Protection uses the learnings Microsoft has

acquired from their position in organizations with Azure

AD, the consumer space with Microsoft Accounts, and in

gaming with Xbox to protect your users. Microsoft

analyses 6.5 trillion signals per day to identify and

protect customers from threats.

o Azure AD Information Protection

„ Azure Information Protection (AIP) is a cloud-based

solution that enables organizations to discover, classify,

and protect documents and emails by applying labels to

content.

„ AIP is part of the Microsoft Information Protection (MIP)

solution, and extends the labeling and classification

functionality provided by Microsoft 365.

o Azure AD privileged identity management

„ Privileged Identity Management (PIM) is a service in

Azure Active Directory (Azure AD) that enables you to

manage, control, and monitor access to important  resources in your organization. These resources include 

resources in Azure AD, Azure, and other Microsoft Online 

Services such as Microsoft 365 or Microsoft Intune. 

o Microsoft Intune

„ Microsoft Intune, which is a part of Microsoft Endpoint

Manager, is a Microsoft cloud-based management tool

that provides for mobile device and operating system

management. It aims to provide unified endpoint

management of both corporate and BYOD equipment in

a way that protects corporate data.


Planning Microsoft 365 Subscription

• An organization should consider the following questions

when it plans to purchase a Microsoft 365 subscription:

o Which business needs will drive the organization to

move to Microsoft 365? 

o What is the organization’s current IT infrastructure? 

o What is the organization’s change-management

process? 

o How many employees will use Microsoft 365 and what

are the organization’s plans for growth?

• Organizations that migrate to Microsoft 365 should plan on

performing the following tasks:

o Decide which Microsoft 365 plan(s) meets the

organization’s requirements

o Inventory the current environment in the organization

o Make key deployment decisions

o Fix potential deployment blockers and clean up the

organization

o Configure the Microsoft 365 subscription

• Organizations that migrate to Microsoft 365 should plan on
performing the following tasks:
o Set up accounts and mailboxes
o Migrate existing data to Microsoft 365
o Validate functionality
o Migrate users to Microsoft 365 


User Identities
o Cloud Identities
„ Everything is done in the cloud, so there is no need for onpremises servers. This is the simplest option to manage.
„ Cloud Identity is an Identity as a Service (IDaaS)
solution that centrally manages users and groups. You
can configure Cloud Identity to federate identities
between Google and other identity providers, such as
Active Directory and Azure Active Directory.
o Synchronized Identity
„ Sync on-premises directory objects with Office 365 and
then manage users on premises. You can synchronize
users’ passwords for the cloud and on premises, but
they will have to sign in again to use Office 365.
o Federation Identity
„ Sync on-premises directory objects with Office 365 and
then manage users on premises. Users keep the same
password for the cloud and on premises and will not
have to sign in again to use Office 365. This is
sometimes referred to as single sign-on.
„ A federated identity in information technology is the
means of linking a person's electronic identity and
attributes, stored across multiple distinct identity
management systems.

Comments

Popular posts from this blog

what is computer network and their types ?

   what is network ? -  A network is a group of two or more computer systems, which are connected together. It also consist of a collection of computers, printers, scanner and other devices that are liked together. Networking has single purpose to share information as fast as possible.   The basic types of network- 1) LAN - LAN stands for Local Area Network. It is used to network computers within a limited area like office, school by using the network media. 2) CAN - Campus Area Network is an interconnection of local area networks within limited geographical area. campus network can be additional to the set of wireless connections. connects several buildings to the same network. Example, corporate office campus, university. 3) MAN - MAN means Metropolitan Area Network, which optimized for a larger geographic area than a LAN, ranging from several blocks of buildings to entire city. 4) WAN - WAN is Wide Area Network that is network connection of wide area such as the w...

Levels of Software Testing

   Levels of Software Testing There are various testing levels one of which is unit testing in which the smallest testable part of an application is testing for correctness. In integration testing we check the system when we linking  the various modules.  In system testing we check the system as a whole from customers’ viewpoint. Acceptance testing tries to check whether the system is acceptable by most of the users. Alpha testing is carried out at developer’s site and beta is at customer’s site. A Testers workbench is a virtual environment used to verify the correctness or soundness of a design or model. 11 step testing process is a experience based practical approach for solution to a test assignment.     UNIT TESTING -        Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing is often...

PL / SQL IN DBMS

                                          PL / SQL   Pl/SQL    state Loops in PL/SQL   Built in Function     Cursor Management     Exception INTRODUCTION   PL/SQL stands for Procedural Language/SQL. PL/SQL extends SQL by adding constructs found in procedural languages,  resulting in a structural language that is more powerful than  SQL.PL/SQL is not case sensitive. ‘C’ style comments (/* ……… */)  may be used in PL/SQL programs whenever required.   All PL/SQL programs are made up of blocks, each block performs  a logical action in the program. A PL/SQL block consists of three parts  1. Declaration section   2. Executable section   3. Exception handling section  Only the executable section is required. The other sections are  optional.  A PL/SQL block h...