Microsoft 365 Admin Tips and Tricks

Microsoft 365 Admin Tips and Tricks

フラットレートに含まれます。

  • Triple Tech LLC dba Bigger Brains

Flatrate 12 月

19 USD 1ヶ月あたり

incl. 7% VAT

  • 12ヶ月
  • シングルライセンス
  • 19 USD 228 USD 年間
  • 850以上の電子ブックとビデオチュートリアル
  • 専門家からのヒントやコツ
  • インスタントアクセス
  • 自動的に更新されます

製品を共有する

言語

英語

レベル

初心者

出版

2021

Learn the secrets to keep your Microsoft 365 tenant safe and secure As an administrator, you know the importance of streamlining user, device, and configuration management, while ensuring a safe and secure experience for both your users and your company. In this course, Amy Babinchak, Microsoft 365 MVP, shows you how she administers and secures Microsoft 365 tenants for her company and her clients. Learn how to access the various Microsoft 365 admin centers and where to perform necessary tasks, while also getting tips and tricks from Amy based on her years of experience. By the end of this course, you’ll be ready to get started with or improve your Microsoft 365 administration.  Topics include: 

  • Navigating the Microsoft 365 Admin Center and the specific Admin Centers (e.g., Azure AD, Exchange, Teams)  
  • Configuring settings and security for Microsoft Teams, OneDrive, and SharePoint 
  • Managing users and groups, including Dynamic (self-managing) groups 
  • Creating Break Glass global admin accounts 
  • Managing and properly licensing Shared Mailboxes 
  • Pushing configuration changes and add-ins to users 
  • Securing access to your tenant with multi-factor authentication (MFA) and password policies 
  • Securing email traffic in your tenant with DKIM, SPF, and DMARC policies 
  • Enhancing the security of your Azure AD environment by branding your site, limiting what users can do in Azure AD, enabling Conditional Access Policies, accessing Audit Lots, and monitoring Secure Scores 
  • Using Security Baselines to quickly set up device configuration policies 
  • Accessing and reviewing device compliance policies 
  • Describing the purpose of AutoPilot in automatically deploying and configuring devices 
  • Configuring Advanced Threat Protection with Anti-Phishing, Safe Attachment, Safe Links, Anti-Spam, and Anti-Malware policies 
  • Conducting a Message Trace to investigate undelivered email 
  • Configuring Alerts