MS100 PDF
MS100 PDF
Contents
Set Up Microsoft 365 Tenancy and Subscriptions .................................................................................. 2
MS 365 for different Organization ...................................................................................................... 2
Tenancy Meaning in O365 .................................................................................................................. 2
Plan and Create and office 365 Tenant............................................................................................... 2
Office 365 vs Microsoft 365 ................................................................................................................ 2
Users Identity ...................................................................................................................................... 2
Organization Custom Domain ............................................................................................................. 3
To review licenses allocated ............................................................................................................... 3
List of purchased product ................................................................................................................... 3
Plan for O365 On-Premises Infrastructure ......................................................................................... 3
Office 365 web service Josn ................................................................................................................ 3
Planning Identity and Authentication ................................................................................................. 3
Manage Microsoft 365 Subscription and Tenant Health ........................................................................ 4
Monitor Service health ....................................................................................................................... 4
Managing Service health Alerts .......................................................................................................... 4
Creating Service request ..................................................................................................................... 4
Usage Metrics ..................................................................................................................................... 4
Using Office 365 Management Solution OMS .................................................................................... 4
Scheduling Security and Compliance Reports .................................................................................... 5
Identifying Data and Methods for Migration.......................................................................................... 5
Email migration is more complex ................................................................................................... 5
Files and folders migration ............................................................................................................. 5
Skype for business migration .......................................................................................................... 6
Migrating Email to Office 365 ............................................................................................................. 6
Office 365 service Limit ................................................................................................................... 6
Migration Method........................................................................................................................... 6
Planning for Directory Synchronization .............................................................................................. 6
Federated Authentication ............................................................................................................... 7
PHS Password Hash Synchronization .............................................................................................. 7
Pass-Through Authentication ......................................................................................................... 7
Federated authentication ............................................................................................................... 7
Intro
Office 365 is a subscription-based service for popular MS office Tools and services
O365 also included Identity and authentication services, as well as collaboration tools
Office.com
Every User in Office 365 a member of one and only one Tenant (although they can be Guest in
others)
Users Identity
<user>@<tenant name>.microsoft.com
User’s use this email address as their identity in O365
To validate your ownership of a domain name, which types of DNS records can be used?
MX or TXT record
Organization access to office 365 services will go through Firewalls and proxy servers
https://docs.microsoft.com/en-us/Office365/Enterprise/office-365-ip-web-service
Baseline Authentication
1. User\Password
2. Security Question
3. Email verification
1- MS authentication App
2- OATH Hardware Token
• SMS-Text Message
• Voice Call
App-Specific password
1- Planned Maintenance events (No less than 5 days Prior) and update hourly
2- Unplanned downtime
Dashboard – Health – Message Centre
1- Check docs.microsoft.com
2- Need help?
O365 assistant -interaction Support
Usage Metrics
Which Microsoft tool is used to aggregate and view usage metrics for Office 365?
log Analytics
The recommended method to install and configure the O365 solution is enabling the O365
connector in Azure Sentinel
1- Email
2- Files\Folders
3- Skype for business account
https:// technet.microsoft.com/en-us/exdeploy2013
User can migrate their own email and contacts (export PSD)
https://docs.microsoft.com/en-us/exchange/mailbox-migration/decide-on-a-migration-path
https://docs.microsoft.com/en-us/office365/enterprise/migrate-data-to-office-365
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-
description/exchange-online-limits
Migration Method
1- Cutover Migration
Migrate all on-premises mailbox to O365 quickly (hours or days)
Max 2000 Mailboxes
Recommended 150 for performance reason
2- Staged Migration
Migrate mailboxes in smaller stages over a longer period
3- Hybrid deployment
4- Imap Migration
Allows Migration from 3rd party hosted solution (non-Ms provider)
https://docs.microsoft.com/en-us/exchange/mailbox-migration/office-365-migration-best-
practices
1. Managed Authentication –
Azure AD handles Authentication either with password Hashes or by communicating with
on-premises Active directory
Federated Authentication
Azure AD redirects authentication requests to another identity provider (often on perm AD)
Pass-Through Authentication
Credential will pass through AD to O365
Federated authentication
User accounts are Managed On-Premises, synchronized to azure AD, but Authentication is
handled by a 3rd party provider
PST import feature is fine grained and detailed, and can be enabled for users to self-service migrate
PST files can be uploaded to the cloud or sent via hard disk
https://docs.microsoft.com/en-us/microsoft-365/compliance/importing-pst-files-to-office-
365?view=o365-worldwide
The hybrid model allows for both feature-rich Authentication using on-premises active directory as
well as flexible Authentication with office 365
IDFIX Tools
Download and running IdFix tool prior to running your first Synchronization
IdFix can identify errors or potential issues in your on-premises AD such as duplicates or formatting
errors
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-
prerequisites
2- Pass-through Authentication
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in
to both on-premises and cloud-based applications using the same passwords. ... When users
sign in using Azure AD, this feature validates users' passwords directly against your on-
premises Active Directory.
3- Federation with AD FS
4- Federation with PingFederate
5- Do not configure
6- Enable single sign-on
Yes. Installed on AD
AuthN Agent No No Connect server or
member server
Yes, when device connected Yes, when device connected Yes, when device
Seamless SSO connected to AD
to AD to AD
• Password maintained in On- • Cost effective & Easy to • No need of ADFS deployment
Advantages
Premise deploy • Cloud Authentication
• On-Premise MFA • Cloud Authentication & • Seamless SSO.
• On-Premise Conditional Access scalability • Simple deployment of AuthN
Support • Identity Protection agent.
• Seamless SSO. • User to remember one • HA for AuthN agent.
password • Automatic certification roll
• Ability to login cloud over
service even if AD down.
• Authentication prompt
when switching
• Doesn't provide cloud applications.
authentication scalability. • HA to be setup On-Premise
• No granular logon • Password gathered at Azure
Disadvantages • Identity Protection required P2
restrictions. AD
License.
• Azure AD Premium license
• SSL requirement.
required for self-service
password reset.
Which property in Active Directory is used to match with a verified domain in Office 365?
UPN suffix
If there are conflicting password complexity requirements between your on-premises Active
Directory and Azure Active Directory, which of the following happens?
1- Connectors
- Properties
The immutable attribute used to identify an identity even as other attributes are change uniquely is
known generally as SOURCEANCHOR
PS
Service
Azure AD connect needs one premume License P1 and assign to the user
The ideal is Self Service Password Reset (it is not enabled by default)
Enable SSPR
Azure AD admin center – Self Service password reset – Enabled
1- Create a group
2- Add Members (depends on the subscription -Cloud users\On promises)
3- Configuration
Identity Governs- Access reviews – on-boarding access review (p2 License needed) – New access
review
To setup;
Assigning the fewest permissions required for a user to perform their job is known as which of the
following? the principal of Least Privilege
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-
security-defaults
www.portal.azre.com
baseline policy
Configuring RBAC with Azure AD
To manage the security, it is better to create a group and assign permissions to the groups
Portal.azure.com
The Office 365 Security and Compliance center provides default role groups for internal
Microsoft Office 365 services only. True or false? False
The act of a system validating that the user has entered the correct password is known as;
Authentication
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
methods
Portal.azure.com
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-
deployment-plans
Monitoring Authentication
Sign in monitoring and alerts
Portal.azure.com
Dashboard – Monitoring
- Sign in
- Audit logs
- Logs
- Diagnostic settings
- Workbook
- Usage and inside
Risk events include multiple logins from new, disparate geographic locations.
i) Admin center – Office 365 - active user – edit user – Manage multi-factor Authentication
ii) Admin Center – Azure AD – Users – Multi-Factor Authentication
Baseline Policy
Azure AD – Security – Conditional Access – Policies
Which Azure AD Feature can be used to apply MFA to a group in Azure AD?
Conditional Access Policy
MFA configuration
Azure AD – MFA – Settings
Application Deployment
Registering Applications with Azure AD
Register application with Azure AD to leverage security and identity features from office 365.
- Azure AD app marketplace has thousands of apps pre-configured for Azure AD integration
- your non-gallery can be easily integrated
- an on-premises application can leverage cloud identities and sso
Setting up an application to use SAML authentication requires specific URLs configured both in the
application and in Azure AD
Application proxy Provides secure, remote Access to On-Premisses WEB Applications from an
external URL
1- URL endpoint
2- Azure AD Authentications user
3- App proxy Service (on Az AD) passes token to app proxy connector
4- App Proxy Connector Manages communication between App proxy Service and local
application
Portal.azure.com
Users- New guest user – Send invitation email
You can disable the ability for Guest users to list out users in your directory
Azure Ad – Setting – External Collaboration settings
Restriction;
- Create a local Download source for end-users to install from, instead of downloading over
the internet for each user
- Configure which application is allowed to be installed
- Pre-download specific language pack files
https://docs.microsoft.com/en-us/DeployOffice/overview-office-deployment-tool
Config.office.com
PowerShell
- The Command-Line scripting Language of Windows
- (Bash for Linux)
- Admin portal Reveles 85 – 90% of configuration
- PowerShell can Reveal information or features not available in the admin portal.
- Ideal for Bulk Task or working with data in large quantities
- Processes can be saved as repeatable
Powershell ISE
Get-AzureADUser
Get-AzureADGroup
New-AzureADGroup
https://docs.microsoft.com/en-us/microsoft-365/enterprise/manage-user-accounts-and-licenses-
with-microsoft-365-powershell?view=o365-worldwide
You can use the PowerShell pipe feature with Office 365 cmdlets
Get-AzureAdApplication
New-AzureADApplication
users from your company can invite external users to access files on the SharePoint sites. You need
to ensure that the company users can invite only authenticated guest users to the sites. What should
you do?
verify whether all the Authentication Agents are used for authentication
From the Azure portal, use the Troubleshoot option on the Pass-through authentication page.
external access to the application. The solution must support multi-factor authentication
A. From an on-premises server, install a connector, and then publish the app.
B. From the Azure Active Directory admin center, enable an Application Proxy.
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-add-
onpremises-application
ensure that an administrator named Admin1 can view all the sign in details of User 1
A. Security administrator
B. Password administrator
C. User administrator