Index

A

Admin center
Administer global functions
Administration center
administrator roles
billing administrator
configuration
administration roles
company options
deleting users
domains
external sharing
grouping licenses
license, assigning
license quantity, changing
multifactor authentication ( see Multifactor authentication)
open license key activation
open subscription activation and links
password expiration
password information
renaming user
restore deleted users
security groups
troubleshooting, domain
user information and E-mail address
user information, changing
functions
global administrator
licenses dashboard
logging administrator
new Office 365
One Drive for Business ( see One Drive for Business)
partner administrators
password administrator
service support administrator
Skype for Business ( see Skype for Business (S4B))
user management administrator
Administrator roles
Advanced Threat Protection (ATP)
Advance query strings (AQS)
Alias e-mail address
adding distribution group
distribution group, creation
grant permissions
group for external access, enabling
Outlook
restricting access, distribution group
Autodiscover
Azure Active Directory
Azure AD directory connector
Azure AD Identity Protection
AIP
alerts
Azure dashboard
enforce MFA
invalid access attempts
risk policy
weekly digest
Azure Advisor
Azure cloud solution provider (CSP)
Azure dashboard, favorites list
Azure Information Protection (AIP)
activation
Azure dashboard
CCPA
credit card protection
DLP
document classification
global policy
labels
parameters
sublabel functions
management tool
RMS tracking service
Security & Compliance Center
service
service testing
Word 2016
Azure Intune management portal
Azure security center
Azure security services
checklist
configuration
Advanced Threat Analytics
Azure Active Directory Identity Monitoring
Azure Active Directory in Office 365
Azure security center, loading
data collection options
e-mail notifications
Log Analytics
Log Analytics data collection
Log Analytics resource
payment tier
portal.azure.com
resource, creating
Windows Collection Agent on Desktop System

B

Billing administrator
BitTitan’s MigrationWiz tool
Bring Android to Work account
Business associates agreement (BAA)
Business data retention

C

Client apps, MDM
Android
conditional access
configuration policies
enrolling device
Google Play store
load app
company portal
managed app
protection policies
Cloud Application Security (CAS)
accessing
applications for security monitoring
connection
linking Azure services
status board
Cloud solution advisors
Cloud solution provider (CSP)
Company administrators
Compliance management
Compliance Manager
assessment, completing
business review
licensing/compliance partner
NIST 800-53 requirements
purpose
real-time assessment
regulations
Secure Score and
Compliant devices, Microsoft Intune
Configuration completion checklist
Corporate information security officer (CISO)
Corporate security officer (CSO)
Crypto-jacking
Cybersecurity

D

Data information protection
Data loss prevention (DLP)
Deep learning
Default compliance policy, MAM deployment
access controls
All users
application access
Azure Active Directory
CAS
compliance status
conditional access
enable policy
Outlook
PIN code
session controls
Default user role assignments
Delegated administrators
Delegate users
Deployment
Azure Active Directory
BitTitan’s MigrationWiz tool
cleanup operation
Cloud PBX (E5) option
cutover migrations
DNS trouble shooting
bulk add users
bulk-loading users
DNS records
onboarding users
domain validation
Add domain
add users and assign licenses
CNAME records
complete setup message
DNS configuration
DNS records
domain name
MxToolbox
ownership
records verification
SRV records
TXT record
E-mail migration ( see E-mail migration)
external devices
final check list
hybrid migrations
load users and assign licenses
Add each user
Bulk-add users
cutover migration
Enable Directory Synchronized users
hybrid migration
license assignment
Onboarding flow chart
migration plans
coexistence E-mail flow
configure desktop services
cutover migration and hybrid
exchange control panel
relay mail flow
shared domain
test groups
mobile device configuration
onboarding E-mail
BitTitan’s MigrationWiz
PST mail migration
PowerShell installation
process
purchasing Office 365 business
creation
Enterprise E3 trial account creation
subscription
trial subscription
validation
S4B
Service Administration software
Skykick migration tool
user portal
Yammer enterprise configuration
DeploymentPro
Device compliance, MDM
compliance policy
device policies
hardware deployment
iOS Policy
policy groups
test user
Device enrollment, MDM
Apple
Apple push certificate
Google
Google sign up
Office 365/Azure tenant
set up
terms and conditions
Windows enrollment
Device management
Directory synchronization
Distribution groups
creation
defining
external delivery, setting
interface
restricting access
types
DMARC/DKIM deployment
CNAME records for custom domains
DMARC Identifier in Office 154
e-mail analysis
mail flow
in Office 154
SPF records
DNS records
DNS troubleshooting
Document classification
Domain-based Message Authentication, Reporting and Configuration (DMARC)
Domain Keys Identified Mail (DKIM)
Domain management
Dynamics groups, EMS
Android devices
device groups
iOS device
manage devices
team groups
user group
Windows 10 devices

E

Electronic Discover Reference Model (EDRM) standard
E-mail encryption
AIP client
Azure Information Protection
custom HIPAA policy
Microsoft 365 E3/E5 suites
Office E3/E5 subscriptions
PII information
policy for execution
portal customization
properties
restricting access
Rights Management service
E-mail migration
AD connect synchronization migration
approaches
exchange server
methods
office 365
onboarding process
tool selection
Enterprise Exchange admin center
Enterprise Mobility & Security suite (EMS)
AIP ( see Azure Information Protection (AIP))
Azure AD Identity Protection
Azure-configured services
Azure dashboard
bad actors
components
E-mail encryption
identity management
Intune, Azure portal
layer
MAM deployment ( see MAM, Intune deployment)
manual encryption
MDM deployment ( see Mobile Device Management (MDM))
MDM process
Microsoft MDM
multifactor authentication ( see Multifactor authentication)
Password Smart Lock Protection
PIM ( see Privileged Identity Management (PIM))
smart lockout
Exchange admin center (EAC)
alias e-mail address
conference room, configuration
conference room, PowerShell modification
default user role
distribution groups
mail flow and mailbox features
new e-mail address
roles
Shared Mailbox
user E-mail account primary domain
Exchange administration functions
External sharing
calendars
settings
sites
teams

F

Fix Fee IT service
Front-line worker

G

General Data Protection Regulation (GDPR)
to businesses
control and notifications
CSO
for data management
IT training and responsibilities
personal privacy and individual rights
regulations
requirements
transparent privacy policies with data management
Global administrator

H

Health Insurance Portability and Accountability Act (HIPAA)
Hybrid configuration wizard
connector validation
downloading and installing
login screen
spam filter
Hybrid migration
deployment
exchange 2007

I, J, K

Identity management
Information security
Integrated systems editor (ISE)
Intelligent security
Intune MDM
Intune MDM/MAM solutions

L

Lateral attack
Legacy group interface
Litigation hold
Lock nonconditional access, MAM deployment
e-mail block
nonmanaged applications
notification
Exchange Active Sync connector
Microsoft Intune
Lockout threshold
Log Analytics

M

MAM, Intune deployment
Android application policy
app protection policy
block notification
default compliance policy ( see Default compliance policy, MAM deployment)
iOS Application policy
lock nonconditional access ( see Lock nonconditional access, MAM deployment)
Microsoft Authenticator
Outlook clients
rules
setup
test e-mail
test group
Windows 10 Application policy ( see Windows 10 Application policy, MAM deployment)
Windows Intune portal
Management score
Manual encryption
DLP rules
EAC
encrypted e-mail
Exchange transport mailbox rule
Outlook
setting overrides
transport rule, custom
MDM iOS devices staff
Meeting rooms
Microsoft 365 E5 subscriptions
Microsoft 365 security
Azure CSP subscription
breaches
classes of workers
E5 enterprise
E3 enterprise
Fix Fee IT service
F1 subscription
front-line worker
Microsoft 365 Business
Microsoft cloud partners
Microsoft Cloud Security
AIP
ATP
Azure Security Center
capabilities
CAS
e-mail gateway/ATP, exchange
for Enterprise Architects
Log Analytics
MDM and EMS
questions to IT staff
Windows 10 Defender Advanced Threat Protection
Microsoft Enterprise Mobility Suite
Microsoft Intune
compliance test
deploy MDM
deployment groups
All Users
Azure subscription
production
test
MDM authority
MDM/MAM enrollment URLs
update policy
Office Pro Plus
Office suite
Windows updates
Microsoft mail migration
Azure AD connect configuration
downloading
express installation
installation
local AD sync
options
steps
syncing the office 365 service
sync notification
systems
tool, selecting
Microsoft Partners
Microsoft security subscriptions
Microsoft threat detection map
Mobile Application Management (MAM)
Mobile Device Management (MDM)
company portal
conditional access
device compliance
device configuration
device enrollment
devices
MDM/MAM configuration
Microsoft Intune
mobile apps
noncompliant policy
test groups
Windows 10 devices
Multifactor authentication (MFA)
app access
app password
authenticating smartphones
Azure Multifactor
Azure password
deploy MFA
MFA
Microsoft authenticator
Office 365 tenant
secondary device
selecting users
setting new password
testing
cloud apps
conditional access
device platform
location
name location
policy name
users
testing service
user accounts
user credentials
user setting up

N

National Institute of Standards and Technology Cybersecurity Framework (NIST-CSF)
Network operations center (NOC)

O

Office 365 administration
administration center ( see Administration center)
Azure AD
Bing Places for Business
business administration functions
Compliance
configuration completion checklist
CRM
distribution group interface
EAC ( see Exchange admin center (EAC))
exchange administration functions
global administrator account
GUI interface
Power BI
PowerShell
assign license
audit logs verification
Autodiscover process
Azure PowerShell
commands
enable audit
environment
filtering e-mail
get Mailbox statistics
legal holds—with notice
mailbox
meeting room configuration
passwords forever
PowerShell installations
purges folder
review permission
sign error
Standard Header
user principal name
validating PowerShell commands
Winmail.dat problem
security configuration completion checklist
SharePoint
Skype for Business
Office 365 and Azure Service Trust Portal
Office 365 compliance
alert structure
Azure notification
customization
dashboard
highlighted alerts
Security & Compliance Center
types
best way
configuration
data governance
archaic journaling approach
archive policy
audit policy
description
information immutability
litigation hold
retention policy
document production
audit log search
Bates Express
content search
data, preview
exporting documents
placed on hold
Security & Compliance Center icon
reference links
retention policy
search and investigation
settings
threat dashboard ( see Threat dashboard)
trust center
Office 365 Security & Compliance Center
Office 365 security score, See Secure Score
Office 365 security, subscriptions
Office Pro Plus updates, EMS
All users group
license type
Office 365 account
Office deployment group
Office deployment software
update channels
OMA_URI
One Drive for Business
configuration and set up
device access control
device management and mobile policy
limits
sharing
usage
Open License key activation
Open Mobile Alliance Uniform Resource Identifier (OMA-URI)
Outlook client

P, Q

Partner administrators
Partnership model
Password administrator
Password policy
Password Smart Lock Protection
Power BI
PowerShell
audit command
audit logs
bulk-assign licenses
filtering e-mail
installation
legal holds—with notice
mailbox forwarders
mailbox permission command
meeting rooms
not remotely signed error
passwords forever
setting up teams and sharepoint
standard header
validating commands
Winmail.dat Problem
Privileged Identity Management (PIM)
Azure AD roles
Azure dashboard
Azure services
bad actor
identity verification
user roles
Product-focused solutions
PST mail migration
outlook, export
outlook, import

R

Room mailbox

S

Secure Score
administration center
comparison score
from Compliance Center
goal
increasing security score
Score Analyzer
target
Windows Security Center
deploying ( see Windows Advanced Threat Protection)
reviewing
Security
GDPR and privacy policies
to businesses
control and notifications
CSO
data management
IT training and responsibilities
personal privacy and individual rights
regulations
requirements
and hackers
AI tools
compliance
Microsoft Trusted Cloud ( see Microsoft Cloud Security)
offerings
Armor class
basic monitoring package
components
Fortress class
Shield class
Office 365 security score
Security & Compliance Center dashboard
Security & Compliance Center
Security configuration completion checklist
Security groups
Security operations center (SOC)
Service support administrator
Shared Exchange mailbox
options
outlook
PowerShell
smartphone and outlook
SharePoint PowerShell
Skykick migration tool
Skype for Business (S4B)
conferencing add-on
federation
licenses roles
voice
adding phone numbers
assigning emergency location
assigning phone numbers
call forwarding
number verification
options, setting
porting phones number
selecting phone number
teams admin center
Software-as-a-service (SaaS)
Staged migration/Test group
Support service records (SRV)
System Center Configuration Management (SSCM)
System health

T

Teams administration functions
Teams PowerShell
Threat dashboard
attacks
attacks against users
Attack Simulator option
campaign selection
distribution list
e-mail, customizing
executing campaign
offer customization
regulations
in Security & Compliance Center
web portal
Threat intelligence graph

U, V

User activation
User management administrator

W, X, Y, Z

Windows 10 Application Policy, MAM deployment
add a policy
add apps
advanced settings
All User policy
app protection policies
with enrollment
advanced settings
All User policy
Office Pro Plus
set up
WIP
protected apps
WIP
Windows 10 devices
deploying commercial ID
Data Collection and Preview Builds
enabling Telemetry
Group Policy, editing
uploading
OMA-URI
retrieving commercial ID
Log Analytics and Update management
from Update Compliance blade
Windows 10 Update Rings, EMS
Azure dashboard
configuration
device licenses
insiders group
Microsoft 365 E5
update channel options
update status
user devices
user licenses
Windows Advanced Threat Protection
ATP deployment
Azure Log Analytics
client software
cloud instance
data repository, set up
data retention preferences
installation process
organization’s data size
organization type
securitycenter.windows.com
Windows 10 environment
Windows Defender ATP
Windows Desktop Search (WDS)
Windows Information Protection (WIP)
Windows Intune
Azure Intune portal
cloud-based
computer adding
consistency
management console
vs . Microsoft Systems Center
reference links
self-service model
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.9.172