Microsoft 365 E5 Learning Module Deck
Total Page:16
File Type:pdf, Size:1020Kb
• What is: • “The Tenant” • Cloud Strategy. M365, Dynamics 365, Azure, 3rd Party • High Level - What is Microsoft 365 • Why: • Business alignment/Priority Agenda • Budget – Licensing and redundant spend • How: • Partner Ecosystem • Fast Track • Premier • Not on the agenda: • Technical Architecture What is the tenant, really? THE WORLD BEFORE MOBILITY & CLOUD users devices apps data On-premises / Private cloud CLOUD APPS & SAAS SERVICES On-premises / Private cloud MOBILE AND PERSONAL DEVICES On-premises / Private cloud ORGANIZATION & SOCIAL IDENTITIES On-premises / Private cloud On-premises / Private cloud On-premises / Private cloud MICROSOFT CLOUD Microsoft 365 Licensing and Roadmap Microsoft Internal & Partner Use Only A complete, intelligent, secure solution to empower employees Unlocks Built for Integrated Intelligent Creativity Teamwork for Simplicity Security Windows 10 Enterprise Enterprise Mobility & Security 14 Microsoft 365 E5 value Microsoft 365 E5 adds incremental value to Microsoft 365 E3 across these solution areas Microsoft 365 E5 Security Compliance Voice Analytics Extends identity and Brings together information Adds audio conferencing and Adds Power BI capabilities threat protection protection & advanced calling capabilities in the that help you realize to help stop damaging compliance capabilities to cloud to enable your teams significant business value attacks with integrated protect and govern data while from your data and automated security reducing risk Office 365 Enterprise Capabilities APPS SERVICES SECURITY ANALYTICS VOICE Cloud Productivity & Rich Communication and Advanced Enterprise Complete Cloud Insights for Everyone Mobility Collaboration Protection Communication Office Pro Plus: Exchange : Advanced Threat Protection: Power BI Pro: Audio Conferencing: Business-class email & Calendar Zero-day threat and malware Live business analytics and Worldwide dial-in for your Office apps on up to 5 PCs & protection visualization online meetings Macs OneDrive: Cloud Storage and file sharing Advanced Security Phone System: Mobile Office Apps: Management: Business phone system in the SharePoint: Office Apps for Tablet & Enhanced visibility and control cloud Team sites & internal portals Smartphones Threat Intelligence: Skype for Business: Flow Actionable insights to global Online Meetings, IM, video chat Power Apps attack threats Microsoft Teams: Advanced Compliance: Stream Chat-based Collaboration Advanced eDiscovery, Advanced Yammer: Data Governance and Customer Private social networking Lockbox bundled together to provide an intelligent solution to Office 365 E3 meet compliance needs Office 365 E5 Microsoft Internal & Partner Use Only 16 Office 365 Government Roadmap Enterprise Mobility & Security Capabilities Identity and access management Identity Driven Security Managed Mobile Productivity Information Protection Azure Active Directory Advanced Threat Analytics Microsoft Azure Information Premium P1 Intune Protection Premium P1 E3 Single sign-on to cloud and on- Identify suspicious activities & Mobile device and app Encryption for all files and storage premises applications. Basic advanced attacks on premises. management to protect corporate locations. Cloud based file conditional access security Updated on an annual cadence. apps and data on any device. tracking EMS EMS Existing Azure RMS capabilities E5 EMS EMS Azure Active Directory Azure Advanced Threat Microsoft Azure Information Premium P2 Protection Cloud App Security Protection Premium P2 Advanced risk based identity Identify suspicious activities & Bring enterprise-grade visibility, control, Intelligent classification, & protection with alerts, analysis, & advanced attacks on premises. and protection to your cloud applications encryption for files shared inside & and cloud data. remediation. Integrated with our Intelligent outside your organization Security Graph. Updates on a cloud Secure Islands acquisition cadence. Integration with Microsoft Threat Protection. Microsoft Internal & Partner Use Only 18 What is the difference Features P1 Directory Objects1 No Object Limit User/Group Management (add/update/delete). User-based provisioning, Device registration Available between Azure AD P1 & P2? Single Sign-On (SSO). Free, basic tiers + self-service app integration templates5 No Limit B2B Collaboration7 Available Self-Service Password Change for cloud users Available Only in Azure AD P2 Connect (Sync engine that extends on-premises directories to Azure Active Directory) Available Security/Usage Reports Advanced Reports Identity Protection Group-based access management/provisioning Available Self-Service Password Reset for cloud users Available • Detecting vulnerabilities and risky accounts: Company Branding (Logon Pages/Access Panel customization) Available • Providing custom recommendations to improve overall security Application Proxy Available posture by highlighting vulnerabilities SLA Available • Calculating sign-in risk levels Premium Features • Calculating user risk levels Advanced group features8 Available • Investigating risk events: Self-Service Password Reset/Change/Unlock with on-premises writeback Available Device objects 2-way sync between on-premises directories and Azure AD (Device write- • Sending notifications for risk events Available • Investigating risk events using relevant and contextual information back) • Providing basic workflows to track investigations Multi-Factor Authentication (Cloud and On-premises (MFA Server)) Available • Providing easy access to remediation actions such as password reset Microsoft Identity Manager user CAL4 Available Cloud App Discovery9 Available • Risk-based conditional access policies: Connect Health6 Available • Policy to mitigate risky sign-ins by blocking sign-ins or requiring multi-factor authentication challenges Automatic password rollover for group accounts Available • Policy to block or secure risky user accounts Conditional Access based on group and location Available • Policy to require users to register for multi-factor authentication Conditional Access based on device state (Allow access from managed devices) Available 3rd party identity governance partners integration Available Advanced Identity Governance Terms of Use Available SharePoint Limited Access Available • Privileged Identity Management (PIM) • Access Reviews OneDrive for Business Limited Access Available 3rd party MFA partner integration Preview Available Microsoft Cloud App Security integration Available What is the difference Features P1 Azure Information Protection content consumption by using work or school Available between AIP P1 & P2? accounts from AIP policy-aware apps and services Protection for Microsoft Exchange Online, Microsoft SharePoint Online, and Available Microsoft OneDrive for Business content Only in AIP P2 Bring Your Own Key (BYOK) for customer-managed key provisioning life cycle2 Available Custom templates, including departmental templates Available Protection for on-premises Exchange and SharePoint content via Rights Available • Configure conditions for automatic and Management connector recommended classification Azure Information Protection software developer kit for protection for all Available • Azure Information Protection scanner for platforms including Windows, Windows Mobile, iOS, Mac OSX, and Android Protection for non-Microsoft Office file formats, including PTXT, PJPG, and PFILE Available automated classification, labeling, and (generic protection) protection of supported on-premises files Azure Information Protection content creation by using work or school accounts Available • Hold Your Own Key (HYOK) that spans Office 365 Message Encryption Available Azure Information Protection and Active Administrative control3 Available Directory (AD) Rights Management Manual, default, and mandatory document classification Available for highly regulated scenarios Azure Information Protection scanner for content discovery of on-premises files Available matching any of the sensitive information types Azure Information Protection scanner to apply a label to all files in an on-premises Available file server or repository Rights Management connector with on-premises Windows Server file shares by Available using the File Classification Infrastructure (FCI) connector Document tracking and revocation Available Windows 10 Enterprise Capabilities The most trusted platform More productive More personal The most versatile devices Enterprise Data Protection Azure Active Directory Join User Experience Virtualization (UX-V) Windows 10 for Industry Devices Prevent accidental leaks by separating Streamline IT process by harnessing the OS and app settings synchronized across Turn any inexpensive, off-the-shelf personal and business data power of the cloud Windows instances device, into an embedded, handheld, or E3 kiosk experience Windows Hello for Business MDM enablement Granular UX Control Enterprise grade biometric and Manage all of your devices with the Enterprise control over user experience companion device login simplicity of MDM E5 Credential Guard Windows Store for Business, Protects user access tokens in a Private Catalog hardware-isolated container Create a curated store experience for employee self-service AppLocker Block unwanted and inappropriate Application Virtualization (App-V) apps from running Simplify app delivery and management Device Guard Cortana Management Windows Windows 10Enterprise Device locked down to only run fully Create, personalize, and manage Cortana trusted apps profiles through