0%

Make the most out of your investment in Office 365 apps and services with this Microsoft Office cookbook

Key Features

  • Learn how to manage and secure the entire Office 365 stack in addition to specific services
  • Delve into newer and frequently shifting areas such as Power Platform, Microsoft Teams, and Microsoft Search administration
  • Discover carefully selected techniques that cover a range of administrative tasks of varying difficulty levels

Book Description

Organizations across the world have switched to Office 365 to boost workplace productivity. However, to maximize investment in Office 365, you need to know how to efficiently administer Office 365 solutions.

Microsoft Office 365 Administration Cookbook is packed with recipes to guide you through common and not-so-common administrative tasks throughout Office 365. Whether you’re administering a single app such as SharePoint or organization-wide Security & Compliance across Office 365, this cookbook offers a variety of recipes that you’ll want to have to hand. The book begins by covering essential setup and administration tasks. You’ll learn how to manage permissions for users and user groups along with automating routine admin tasks using PowerShell. You’ll then progress through to managing core Office 365 services such as Exchange Online, OneDrive, SharePoint Online, and Azure Active Directory (AD). This book also features recipes that’ll help you to manage newer services such as Microsoft Search, Power Platform, and Microsoft Teams. In the final chapters, you’ll delve into monitoring, reporting, and securing your Office 365 services.

By the end of this book, you'll have learned about managing individual Office 365 services along with monitoring, securing, and optimizing your entire Office 365 deployment efficiently.

What you will learn

  • Get to grips with basic Office 365 setup and routine administration tasks
  • Manage Office 365 identities and groups efficiently and securely
  • Harness the capabilities of PowerShell to automate common administrative tasks
  • Configure and manage core Office 365 services such as Exchange Online, SharePoint, and OneDrive
  • Configure and administer fast-evolving services such as Microsoft Search, Power Platform, Microsoft Teams, and Azure AD
  • Get up and running with advanced threat protection features provided by the Microsoft 365 Security & Compliance Center
  • Protect your organization's sensitive data with Office 365 Data Loss Prevention
  • Monitor activities and behaviors across all Office 365 services

Who this book is for

This book is for newer Office 365 administrators and IT pros alike, and comes with recipes of varying difficulty levels along with step-by-step guidance. Whether you are new to Office 365 administration or just seeking new ideas, this cookbook contains recipes to enhance your organization's app and service management and productivity.

Table of Contents

  1. Microsoft Office 365 Administration Cookbook
  2. Why subscribe?
  3. Contributors
  4. About the author
  5. About the reviewers
  6. Packt is searching for authors like you
  7. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Sections
    7. Getting ready
    8. How to do it…
    9. How it works…
    10. There's more…
    11. See also
    12. Get in touch
    13. Reviews
  8. Chapter 1: Office 365 Setup and Basic Administration
    1. Technical requirements
    2. Accessing the admin centers
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Setting up the PowerShell environment
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. There's more…
    12. See also
    13. Viewing and filtering the roadmap
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. There's more…
    18. See also
    19. Discovering upcoming changes
    20. Getting ready
    21. How to do it…
    22. How it works…
    23. There's more…
    24. See also
    25. Opening a service request
    26. Getting ready
    27. How to do it…
    28. How it works…
    29. There's more…
    30. See also
    31. Monitoring service request status
    32. Getting ready
    33. How to do it…
    34. How it works…
    35. There's more…
    36. See also
    37. Adding a domain
    38. Getting ready
    39. How to do it…
    40. How it works…
    41. See also
    42. Changing the domain for users
    43. Getting ready
    44. How to do it…
    45. How it works…
    46. See also
    47. Assigning a license to a user
    48. Getting ready
    49. How to do it…
    50. How it works…
    51. There's more…
    52. Assigning a license to a group
    53. Getting ready
    54. How to do it…
    55. How it works…
    56. See also
    57. Customizing navigation of the admin center
    58. Getting ready
    59. How to do it…
    60. How it works…
    61. Personalizing your admin center home page
    62. Getting ready
    63. How to do it…
    64. How it works…
  9. Chapter 2: Office 365 Identity and Roles
    1. Technical requirements
    2. Creating a new user
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. Importing users in bulk
    7. Getting ready
    8. How to do it…
    9. How it works…
    10. See also
    11. Creating a new Office 365 group
    12. Getting ready
    13. How to do it…
    14. How it works…
    15. There's more…
    16. See also
    17. Enabling Security Defaults (MFA)
    18. Getting ready
    19. How to do it…
    20. How it works…
    21. See also
    22. Exporting users
    23. Getting ready
    24. How to do it…
    25. How it works…
    26. Managing guest users
    27. Getting ready
    28. How to do it…
    29. How it works…
    30. There's more…
    31. See also
    32. Creating a user template
    33. Getting ready
    34. How to do it…
    35. How it works…
    36. There's more…
    37. See also
    38. Restricting users from creating new O365 groups
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. See also
    43. Assigning the User Administrator admin role in Azure AD
    44. Getting ready
    45. How to do it…
    46. How it works…
    47. See also
    48. Managing admin roles in the Microsoft 365 admin center
    49. Getting ready
    50. How to do it…
    51. How it works…
    52. See also
  10. Chapter 3: Administering Office 365 with PowerShell
    1. Technical requirements
    2. Getting a list of all available commands
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. Creating a user
    7. Getting ready
    8. How to do it…
    9. How it works…
    10. There's more…
    11. Disabling a user
    12. Getting ready
    13. How to do it…
    14. How it works…
    15. Changing user settings or profile information
    16. Getting ready
    17. How to do it…
    18. How it works…
    19. Getting a list of all users with user properties
    20. Getting ready
    21. How to do it…
    22. How it works…
    23. There's more…
    24. Changing a user password
    25. Getting ready
    26. How to do it…
    27. How it works…
    28. Connecting via PowerShell to SharePoint Online
    29. Getting ready
    30. How to do it…
    31. How it works…
    32. See also
    33. Creating a SharePoint site collection
    34. Getting ready
    35. How to do it…
    36. How it works…
    37. There's more…
    38. Adding a new site collection admin to all SharePoint Online sites
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. Restoring a deleted OneDrive site
    43. Getting ready
    44. How to do it…
    45. How it works…
    46. Hiding Office 365 groups from the Global Address List
    47. Getting ready
    48. How to do it…
    49. How it works…
    50. Preventing external senders from emailing internal Office 365 groups
    51. Getting ready
    52. How to do it…
    53. How it works…
  11. Chapter 4: Managing Exchange Online
    1. Technical requirements
    2. Creating a user mailbox
    3. How to do it…
    4. How it works…
    5. There's more
    6. See also
    7. Creating a mail-enabled security group
    8. Getting ready
    9. Getting ready
    10. How to do it…
    11. How it works…
    12. See also
    13. Creating a shared mailbox without an O365 group
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. See also
    18. Creating a distribution list
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. See also
    23. Creating a dynamic distribution list
    24. Getting ready
    25. How to do it…
    26. How it works…
    27. See also
    28. Assigning permissions and roles
    29. Getting ready
    30. How to do it…
    31. How it works…
    32. See also
    33. Creating an Exchange-specific retention policy
    34. Getting ready
    35. How to do it…
    36. How it works…
    37. See also
    38. Creating a mail flow rule
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. See also
    43. Configuring spam filter policies
    44. Getting ready
    45. How to do it…
    46. How it works…
    47. Creating room and equipment resources
    48. Getting ready
    49. How to do it…
    50. How it works…
    51. Enabling advanced threat protection (ATP) features
    52. Getting ready
    53. How to do it…
    54. How it works…
    55. See also
  12. Chapter 5: Setting Up and Configuring Microsoft Search
    1. Technical requirements
    2. Creating an acronym
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. There's more
    7. See also
    8. Creating a bookmark
    9. Getting ready
    10. How to do it…
    11. How it works…
    12. See also
    13. Importing bookmarks in bulk from CSV
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. See also
    18. Importing SharePoint promoted results as bookmarks
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. See also
    23. Adding a location
    24. Getting ready
    25. How to do it…
    26. How it works…
    27. There's more
    28. See also
    29. Adding a floor plan
    30. Getting ready
    31. How to do it…
    32. How it works…
    33. See also
    34. Adding a Q&A result
    35. Getting ready
    36. How to do it…
    37. How it works…
    38. There's more
    39. See also
    40. Assigning the Search Admin and Search Editor roles
    41. Getting ready
    42. How to do it…
    43. How it works…
    44. See also
    45. Setting up the usage of Microsoft Search in Bing
    46. Getting ready
    47. How to do it…
    48. How it works…
    49. There's more
    50. See also
    51. Using Search Insights dashboard reports
    52. Getting ready
    53. How to do it…
    54. How it works…
    55. See also
  13. Chapter 6: Administering OneDrive
    1. Technical requirements
    2. Enabling the local syncing of files
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Restricting local syncing to PCs on specific domains
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. See also
    12. Setting up compliance safeguards
    13. Getting ready
    14. How to do it…
    15. How it works…
    16. Providing manager access to a terminated employee's OneDrive
    17. Getting ready
    18. How to do it…
    19. How it works…
    20. There's more
    21. See also
    22. Setting the default share link type
    23. Getting ready
    24. How to do it…
    25. How it works…
    26. Configuring external sharing permission levels
    27. Getting ready
    28. How to do it…
    29. How it works…
    30. See also
    31. Restricting sharing to specific domains
    32. Getting ready
    33. How to do it…
    34. How it works…
    35. See also
    36. Adjusting all users' default storage allocation and retention periods
    37. Getting ready
    38. How to do it…
    39. How it works…
    40. See also
    41. Restricting OneDrive access to devices on specific IP address locations
    42. Getting ready
    43. How to do it…
    44. How it works…
    45. See also
    46. Configuring mobile app permissions
    47. Getting ready
    48. How to do it…
    49. How it works…
    50. See also
    51. Migrating data using the SharePoint Migration Tool
    52. Getting ready
    53. How to do it…
    54. How it works…
    55. See also
  14. Chapter 7: Configuring the Power Platform
    1. Technical requirements
    2. Creating a new Power Platform environment
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. There's more
    7. See also
    8. Restricting certain connectors in Power Apps and Power Automate from accessing business data
    9. Getting ready
    10. How to do it…
    11. How it works…
    12. See also
    13. Installing an on-premises data gateway
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. There's more
    18. See also
    19. Restricting users from installing on-premises data gateways
    20. Getting ready
    21. How to do it…
    22. How it works…
    23. See also
    24. Auditing Power BI embed codes created by your organization
    25. Getting ready
    26. How to do it…
    27. How it works…
    28. There's more
    29. Restricting Power BI's Publish to Web (anonymous share) ability to specific security group members
    30. Getting ready
    31. How to do it…
    32. How it works…
    33. See also
    34. Restricting the external sharing of Power BI reports
    35. Getting ready
    36. How to do it…
    37. How it works…
    38. See also
    39. Configuring a default logo, cover image, and theme for Power BI
    40. Getting ready
    41. How to do it…
    42. How it works…
    43. See also
    44. Creating a Common Data Service database
    45. Getting ready
    46. How to do it…
    47. How it works…
    48. See also
  15. Chapter 8: Administering SharePoint Online
    1. Technical requirements
    2. Creating a new site collection
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Deleting a site collection
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. There's more...
    12. See also
    13. Limiting external sharing abilities
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. See also
    18. Setting up stricter external sharing settings for a specific site collection
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. There's more...
    23. See also
    24. Setting up the default share link type
    25. Getting ready
    26. How to do it…
    27. How it works…
    28. See also
    29. Configuring site collection storage
    30. Getting ready
    31. How to do it…
    32. How it works…
    33. See also
    34. Giving someone access to another user's OneDrive site
    35. Getting ready
    36. How to do it…
    37. How it works…
    38. Importing data from network locations using Migration Manager
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. There's more...
    43. See also
    44. Hiding the Subsite creation button
    45. Getting ready
    46. How to do it…
    47. How it works…
    48. See also
    49. Designating a site collection as a hub site and associating other site collections with it
    50. Getting ready
    51. How to do it…
    52. How it works…
    53. There's more...
    54. See also
    55. Restricting access by IP address
    56. Getting ready
    57. How to do it…
    58. How it works…
    59. See also
  16. Chapter 9: Managing Microsoft Teams
    1. Technical requirements
    2. Creating a team
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. There's more
    7. See also
    8. Creating a Teams policy
    9. Getting ready
    10. How to do it…
    11. How it works…
    12. See also
    13. Creating a meeting policy
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. See also
    18. Configuring meeting settings
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. See also
    23. Creating a live event policy
    24. Getting ready
    25. How to do it…
    26. How it works…
    27. See also
    28. Configuring live event settings
    29. Getting ready
    30. How to do it…
    31. How it works…
    32. See also
    33. Creating a messaging policy
    34. Getting ready
    35. How to do it…
    36. How it works…
    37. See also
    38. Configuring Teams setup policies
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. See also
    43. Configuring external access
    44. Getting ready
    45. How to do it…
    46. How it works…
    47. There's more
    48. See also
    49. Configuring guest access
    50. Getting ready
    51. How to do it…
    52. How it works…
    53. See also
    54. Reviewing teams and their owners
    55. Getting ready
    56. How to do it…
    57. How it works…
    58. Using PowerShell to export a list of all the teams' owners and members
    59. Getting ready
    60. How to do it…
    61. How it works…
    62. See also
  17. Chapter 10: Configuring and Managing Users in Azure Active Directory (Azure AD)
    1. Technical requirements
    2. Bulk create users in AAD
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Adding branding to the AAD sign-in page
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. See also
    12. Adding a privacy statement to the AAD sign-in page
    13. Getting ready
    14. How to do it…
    15. How it works…
    16. There's more...
    17. See also
    18. Installing and connecting to AAD via PowerShell
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. There's more...
    23. See also
    24. Adding/removing users via PowerShell in AAD
    25. Getting ready
    26. How to do it…
    27. How it works…
    28. See also
    29. Creating an access review report in Azure AD
    30. Getting ready
    31. How to do it…
    32. How it works…
    33. See also
    34. Allowing/disallowing users from connecting LinkedIn to their account
    35. Getting ready
    36. How to do it…
    37. How it works…
    38. See also
    39. Enabling a self-service password reset
    40. Getting ready
    41. How to do it…
    42. How it works…
    43. See also
    44. Using SSO to simplify organization-wide sign-in processes
    45. Getting ready
    46. How to do it…
    47. How it works…
    48. See also
  18. Chapter 11: Understanding the Microsoft 365 Security & Compliance Center
    1. Technical requirements
    2. Viewing a report on all users who have accessed a specific SharePoint file
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. There's more...
    7. See also
    8. Using Content Search to find content containing certain keywords
    9. Getting ready
    10. How to do it…
    11. How it works…
    12. See also
    13. Creating a retention policy based on the discovery of certain keywords
    14. Getting ready
    15. How to do it…
    16. How it works…
    17. See also
    18. Accessing the standard Microsoft BAA
    19. Getting ready
    20. How to do it…
    21. How it works…
    22. There's more...
    23. Accessing and reviewing an organization's secure score
    24. Getting ready
    25. How to do it…
    26. How it works…
    27. See also
    28. Complying with Secure Score security configuration recommendations
    29. Getting ready
    30. How to do it…
    31. How it works…
    32. See also
    33. Assigning permissions for non-IT users to the Security & Compliance admin center
    34. Getting ready
    35. How to do it…
    36. How it works…
    37. See also
    38. Using Communication Compliance to identify potential policy violations in messages
    39. Getting ready
    40. How to do it…
    41. How it works…
    42. See also
  19. Chapter 12: Deploying Data Loss Prevention and eDiscovery
    1. Technical requirements
    2. Creating a DLP policy to protect content with HIPAA-protected data detected
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Using DLP to automatically report HIPAA incidents
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. See also
    12. Creating a DLP policy for content with custom keywords in the name or subject
    13. Getting ready
    14. How to do it…
    15. How it works…
    16. See also
    17. Tuning a sensitive information type's confidence level
    18. Getting ready
    19. How to do it…
    20. How it works…
    21. There's more...
    22. See also
    23. Creating an eDiscovery case
    24. Getting ready
    25. How to do it…
    26. How it works…
    27. There's more...
    28. See also
    29. Managing eDiscovery cases
    30. Getting ready
    31. How to do it…
    32. How it works…
    33. See also
    34. Creating an advanced eDiscovery case
    35. Getting ready
    36. How to do it…
    37. How it works…
    38. See also
    39. Changing who has access to an advanced eDiscovery case
    40. Getting ready
    41. How to do it…
    42. How it works…
    43. See also
  20. Chapter 13: Monitoring Office 365 Apps and Services
    1. Technical requirements
    2. Finding at-risk users
    3. Getting ready
    4. How to do it…
    5. How it works…
    6. See also
    7. Creating alerts for specific activities performed by users in OneDrive
    8. Getting ready
    9. How to do it…
    10. How it works…
    11. See also
    12. Reviewing mail handling to see spam and malware history
    13. Getting ready
    14. How to do it…
    15. How it works…
    16. See also
    17. Identifying your least active SharePoint sites
    18. Getting ready
    19. How to do it…
    20. How it works…
    21. There's more…
    22. See also
    23. Reviewing search activity across SharePoint site collections
    24. How to do it…
    25. How it works…
    26. See also
    27. Checking the service health status and known issues
    28. Getting ready
    29. How to do it…
    30. How it works…
    31. See also
    32. Checking general usage data for Office 365 apps and services
    33. Getting ready
    34. How to do it…
    35. How it works…
    36. See also
    37. Checking Teams usage and user activity
    38. Getting ready
    39. How to do it…
    40. How it works…
    41. There's more...
    42. See also
    43. Monitoring Power Apps and Power Automate usage
    44. Getting ready
    45. How to do it…
    46. How it works…
    47. See also
  21. Chapter 14: Appendix – Office 365 Subscriptions and Licenses
  22. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
44.200.49.193