Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Mastering Office 365 Administration
  • Toc
  • feedback
Mastering Office 365 Administration

Mastering Office 365 Administration

By : Carpe, Hall, Nikkia Carter, Rogers
3.3 (9)
close
Mastering Office 365 Administration

Mastering Office 365 Administration

3.3 (9)
By: Carpe, Hall, Nikkia Carter, Rogers

Overview of this book

In today's world, every organization aims to migrate to the cloud in order to become more efficient by making full use of the latest technologies. Office 365 is your one-stop solution to making your organization reliable, scalable, and fast. This book will start with an overview of Office 365 components, and help you learn how to use the administration portal, and perform basic administration. It then goes on to cover common management tasks, such as managing users, admin roles, groups, securing Office 365, and enforcing compliance. In the next set of chapters, you will learn about topics including managing Skype for Business Online, Yammer, OneDrive for Business, and Microsoft Teams. In the final section of the book, you will learn how to carry out reporting and monitor Office 365 service health. By the end of this book, you will be able to implement enterprise-level services with Office 365 based on your organization's needs.
Table of Contents (16 chapters)
close
10
Administering Yammer

Search & investigation


This section is all about finding certain types of content or behaviors. It can be useful for monitoring ongoing policy compliance and responding to incidents as needed. Subsections include Content search, Audit log search, eDiscovery (which is basically Content search by another name), and Productivity app discovery.

Content search

Content search replaces much of the functionality that was formerly only available through the eDiscovery center in SharePoint Online. With it, you can specify queries for specific keywords and other criteria, to help you identify potentially sensitive or inappropriate disclosure of information.

Over the years, we've used Content search and eDiscovery tools to help security officers (sometimes named FSOs) and their organizations with a variety of security-related matters. For example, some businesses subject to ITAR regulations (including foreign companies doing business with the US federal government) may be required to track emails between...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete