Office 365 for IT Professionals 2020 Edition

Total Page:16

File Type:pdf, Size:1020Kb

Office 365 for IT Professionals 2020 Edition Office 365 for IT Pros Page 1 Office 365 for IT Pros Office 365 for IT Professionals (2020 Edition) Published by Tony Redmond © Copyright 2015-2019 by Tony Redmond. All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means without the written permission of the authors. The example companies, organizations, products, domain names, email addresses, logos, people, places and event depicted herein are fictitious. No association with any real company, organization, people, domain name, email address, logo, person, place, or event is intended or should be inferred. The book expresses the views and opinions of the authors. The information presented in the book is provided without any express, statutory, or implied warranties. The authors cannot be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Although the authors are members of Microsoft’s Most Valuable Professional (MVP) program, the content of this book solely represents their views and opinions about Office 365 and any other technologies mentioned in the text and is not endorsed in any way by Microsoft Corporation. Please be respectful of the rights of the authors and do not make copies of this eBook available to others. Sixth (2020) edition. Previous editions: • Office 365 for Exchange Professionals (May 2015 and September 2015). • Office 365 for IT Pros (3rd edition – June 2016). • Office 365 for IT Pros (4th edition – June 2017). • Office 365 for IT Pros (5th edition – July 2018) The authors issue regular updates for this eBook until they publish a new edition, usually after a year. People who buy the book through gumroad.com can use their accounts to download updates as they become available. Updates are also available for the Kindle edition, but this depends on the willingness of Amazon to make purchasers aware that an update exists. We try to persuade Amazon of this need about once a month. Information about how to access updated files can be found in our FAQ. The companion volume for this book has other information that you might find interesting. The companion volume is included in your subscription and is updated separately. This is update 1 for the 2020 Edition published on 1 August 2019. You can find information about the changes made in each update in our change log or through our Facebook page. The photo used on the front cover is of a Galapagos giant tortoise taken on Santa Cruz island by Tony Redmond in February 2018. Page: i Office 365 for IT Pros Office 365 for IT Pros Table of Contents Foreword ......................................................................................................................................................................................................... xi Introduction .................................................................................................................................................................................................. xii Organization of this book................................................................................................................................................................... xii Highlighting the important stuff..................................................................................................................................................... xiii Book Updates ......................................................................................................................................................................................... xiv The Author Team .................................................................................................................................................................................. xiv Thanks ...................................................................................................................................................................................................... xvii Sponsor content ................................................................................................................................................................................... xvii Comments and feedback ................................................................................................................................................................. xviii Chapter 1: An Overview of Office 365 .................................................................................................................................................. 1 Office 365 Infrastructure ....................................................................................................................................................................... 2 Office 365 Plans ..................................................................................................................................................................................... 13 The Commercial Success of Office 365 ........................................................................................................................................ 21 Competition for Office 365 ............................................................................................................................................................... 23 Leveraging the Breadth of Office 365 ........................................................................................................................................... 26 Will we move? ........................................................................................................................................................................................ 28 Chapter 2: Embracing the Cloud ......................................................................................................................................................... 29 Removing Cloud FUD .......................................................................................................................................................................... 29 Interpreting Service Level Agreements for Office 365 Services ......................................................................................... 38 Making the Decision to Embrace the Cloud .............................................................................................................................. 42 The Economic Imperative .................................................................................................................................................................. 44 Creating a Network to Support Cloud Services ........................................................................................................................ 48 Executive Buy-in and Communications ........................................................................................................................................ 51 Dipping Your Feet into The Water ................................................................................................................................................. 52 Office 365 Partners ............................................................................................................................................................................... 53 The Value of Hybrid Connectivity ................................................................................................................................................... 55 The Need for Plan B ............................................................................................................................................................................. 55 Cancelling a Tenant Subscription ................................................................................................................................................... 57 Identities ................................................................................................................................................................................................... 58 Chapter 3: Identities and Authentication ......................................................................................................................................... 59 Azure Active Directory ........................................................................................................................................................................ 60 Identity Models for Office 365 ......................................................................................................................................................... 62 Authentication ........................................................................................................................................................................................ 71 Synchronizing with Azure Active Directory ................................................................................................................................ 88 Page: ii Office 365 for IT Pros Office 365 for IT Pros Connecting to LinkedIn .................................................................................................................................................................... 111 Managing a Tenant ............................................................................................................................................................................ 112 Chapter 4: Managing Office 365 ......................................................................................................................................................
Recommended publications
  • Flower Power Daisy CEO Neil Muller on the Firm’S Plans to Blossom Into a £1Bn Business 16
    March 2017 Flower power Daisy CEO Neil Muller on the firm’s plans to blossom into a £1bn business 16 ESSENTIAL ELEMENTS OF A GOOD PARTNER PROGRAMME 20 EMERGING CHANNEL OPPORTUNITIES IN THE AREA OF DATA ANALYTICS 25 WHAT THE CHANGES TO G-CLOUD MEAN FOR SUPPLIERS 32 REMOTE CONTROL 7th Gen Intel® Core™ vPro™ processorsocessors and Intel® Active Management Technologychnology help reduce on-site IT support costs.ts. SMART REMOTE MANAGEABILITY £ª®°£¢³¡£­¬[±§²£±³®®­°²¡­±²±µ§²¦°£«­²£¢§¥¬­±²§¡± WIRELESS DEVICE MANAGEMENT ¶£¡³²£°£«­²£¦§¥¦[°£±­ª³²§­¬°£§«¥§¬¥¤­°ª­µ£°1 SIMPLIFY PC LIFESTYLE TRANSITIONS §®£¢²§¬±£¡­¬¢±¤°­«¬·µ¦£°£°­³¬¢²¦£µ­°ª¢µ§²¦¬²£ª£«­²£ £¡³°£°±£¤­°¬²£ª¾­ª§¢²²£°§´£±1 ¬²£ª²£¡¦¬­ª­¥§£±Ì¤£²³°£±¬¢ £¬£ß²±¢£®£¬¢­¬±·±²£«¡­¬ß¥³°²§­¬¬¢«·°£¯³§°££¬ ª£¢¦°¢µ°£±­¤²µ°£­°±£°´§¡£¡²§´²§­¬£°¤­°«¬¡£´°§£±¢£®£¬¢§¬¥­¬±·±²£« ¡­¬ß¥³°²§­¬¦£¡©µ§²¦·­³°±·±²£««¬³¤¡²³°£°­°°£²§ª£°­°ª£°¬«­°£²¦²²®``±³®®­°²§¬²£ª¡­« ½¬²£ª­°®­°²§­¬ ªª°§¥¦²±°£±£°´£¢¬²£ª²¦£¬²£ªª­¥­¬²£ª­°£²¦£¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£ª­¥­¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£¬²£ª¬±§¢£ ¬¢¬²£ª´°­°£²°¢£«°©±­¤¬²£ª­°®­°²§­¬§¬²¦£¬¢`­°­²¦£°¡­³¬²°§£± Call our specialist sales teams North 01282 776776 South 01256 707070 a Company store.exertis.co.uk Haymarket House, 28-29 Haymarket, London SW1Y 4RX Tel: (020) 7316 9000 Editorial Editor Doug Woodburn 9517 [email protected] Deputy editor Hannah Breeze 9510 [email protected] Reporter Tom Wright 9097 [email protected] Avoiding a public Channelnomics.eu Content editor Sam Trendall 9813 [email protected] tongue-lashing Reporter Josh Budd
    [Show full text]
  • Formatting Guide: Colors & Fonts
    SAAS & CLOUD M&A AND VALUATION UPDATE Q1 2016 BOSTON CHICAGO LONDON LOS ANGELES NEW YORK ORANGE COUNTY PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA CONTENTS Section Page Introduction . Research Coverage: SaaS & Cloud 3 . Key Takeaways 4-5 M&A Activity & Multiples . M&A Dollar Volume 7 . M&A Transaction Volume 8-10 . LTM Revenue Multiples 11-12 . Revenue Multiples by Segment 13 . Highest Revenue Multiple Transaction for LTM 14 . Notable M&A Transactions 15 . Most Active Buyers 16-17 Public Company Valuation & Operating Metrics . SaaS & Cloud 125 Public Company Universe 19-20 . Recent IPOs 21 . Stock Price Performance 22 . LTM Revenue, EBITDA & P/E Multiples 23-25 . Revenue, EBITDA & EPS Growth 26-28 . Margin Analysis 29-30 . Best / Worst Performers 31-32 Notable Transaction Profiles 34-43 Public Company Trading & Operating Metrics 45-50 Technology & Telecom Team 52 1 INTRODUCTION RESEARCH COVERAGE: SAAS & CLOUD Capstone’s Technology & Telecom Group focuses its research efforts on the follow market segments: ENTERPRISE SAAS & MOBILE & WIRELESS CONSUMER INTERNET CLOUD • Analytics / Business Intelligence • Cloud & IT Infrastructure • Cloud Computing / Storage • Communication & Collaboration • Content Creation & Management • CRM & Customer Services • ERP, Supply Chain & Commerce CONSUMER IT & E-COMMERCE • Finance & Administration TELECOM HARDWARE • Human Resources • Marketing & Advertising • Software Conglomerates • Vertical Markets 3 KEY TAKEAWAYS – M&A ACTIVITY & MULTIPLES LTM M&A dollar volume continued to increase in Q1’16, representing
    [Show full text]
  • Data Protection & the Insider Threat
    Issue 2 1 Data Protection & the Insider Threat 4 Veriato Recon 6 Veriato 360 Data Protection & the Insider Threat 8 Research from Gartner: Market Guide for User and Entity Behavior Analytics Veriato (formerly known as SpectorSoft) has With multiple studies and surveys showing 22 Contact Us been enabling greater insight into insider actions that 50% of employees believe it is OK to take for over a decade. Thousands of companies, corporate data, the chances your organization has, government agencies, educational institutions is, or will experience insider driven data exfiltration and non-profits have successfully used Veriato are unacceptably high. In addition, the constant solutions to increase the security of critical stream of data breaches caused by imposters – systems and intellectual property, and to more external actors who level compromised credentials quickly and effectively respond to incidents. to “become” insiders – highlights the need to detect changes in insider behavior that suggest An established leader in employee monitoring attack. and investigations, we recognized the need for greater intelligence about the behavior of insiders. If you do not have a plan in place to detect it, you Many solution providers have done the same will miss your chance to prevent the damage. -- as evidenced by the Market Guide to User and Entity Behavior (“UEBA”) from Gartner Research With our unique ability to collect data at the point contained within these pages. of interaction between insiders and the IT resources they access, we saw an opportunity to help address Why Veriato? this challenge. Veriato has a proven data collector; As we set out to create a high value, differentiated one that provides much greater visibility into offering, we first focused on the need to secure insider activity than is available from logs.
    [Show full text]
  • Where You Start Matters the First Few Years in Your Career Are Critical
    Where you start matters The first few years in your career are critical- they set the trajectory for your future. We know that as a student you want to be on the fast track and don’t have time to waste. Join us at Microsoft and see what will you do? As a student at Microsoft you will be able to balance between your studies and your work, gain on-hands experience while working around 20 weekly hours and enjoy maximum flexibility during exams periods as you are not required to work during exams period, and can work full time during vacations. Here is your chance to experience the exciting field of software development! *** We greatly encourage and welcome qualified candidates who happen to have disabilities to apply for jobs in our company Apply for Microsoft Positions- Student positions: Software Engineer Student - Cortana (Herzeliya) Software Engineer Student - WCD (Herzeliya) Research Software Engineer Student - OSG Recommendation (Herzeliya) Data Scientist Student- OSG Recommendations (Herzeliya) Software Engineer Student - Adallom (Herzeliya) Data Scientist Student - Aorato (Herzeliya) Hardware Student - Surface (Herzeliya) Cloud Analyst Student- Adallom (Herzeliya) Software Engineer Student- Bing Next (Herzeliya) Student positions at Raanana: Service Center TAM- Student (Raanana) Development Student (Raanana) Infrastructure Student (Raanana) New college graduate positions: Software Engineer- WCD (Haifa) Software Engineer - Cortana (Herzeliya) Software Engineer- Kusto (Herzeliya) Software Engineer- Data Security Team (Herzeliya) Software
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • Enterprise Software Market
    ENTERPRISE SOFTWARE REVOLUTIONISING THE MODERN WORKPLACE November 2016 Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc. is a member of FINRA Enterprise Software: Revolutionising the Modern Workplace P3 CONTENTS 05 The Enterprise Software market 10 Our survey: The experts weigh in 17 Key findings 24 Overview of corporate finance activity 34 Selected company profiles 44 Authors 45 Our team 46 Disclaimer ABOUT US GP Bullhound is a technology investment bank providing independent strategic advice on Mergers & Acquisitions and Capital raising to leading technology entrepreneurs, companies and investors across the globe. Our passion for technology, our financial acumen and our understanding of the entrepreneur’s journey differentiate our advice from other investment banks. We help exceptional people build exceptional businesses to create more billion-dollar technology companies across Europe. MERGERS & ACQUISITIONS CAPITAL RAISING, SECONDARIES AND BLOCK TRADES We act as a trusted partner to entrepreneurs and investors planning to sell their businesses In the last 17 years we have built up a or build by acquisition. unique, global set of relationships with investors who, like us, are passionate about Since inception in 1999 we have completed technology. over 230 transactions with category leaders in the technology sector globally. We pride ourselves on building long-term relationships, and we work with our clients More than half of our deals deliver a cross- from growth equity fundraising, through debt border solution. restructuring, secondary fundraising and towards liquidity via trade sale or IPO. Our six offices across Europe and the US allow us to provide expert and experienced, local ASSET MANAGEMENT service to clients as well as market leading access to technology consolidators across the GP Bullhound Asset Management is our globe.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Infilings Redline Report Redline Key: New / Added Text Text Deleted Text
    Datadog (DDOG) Sep-09 2019 S-1/A inFilings Redline Report Redline Key: New / Added Text Text Deleted Text - Prospectus As filed with the Securities and Exchange Commission on September 9, 2019. Registration No. 333- 333-233428 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 Amendment No. 1 to FORM S-1 REGISTRATION STATEMENT UNDER THE SECURITIES ACT OF 1933 Datadog, Inc. (Exact name of Registrant as specified in its charter) Delaware 7372 27-2825503 (State or other jurisdiction of (Primary Standard Industrial (I.R.S. Employer incorporation or organization) Classification Code Number) Identification Number) 620 8th Avenue, 45th Floor New York, New York 10018 (866) 329-4466 (Address, including zip code, and telephone number, including area code, of Registrant's principal executive offices) Olivier Pomel Chief Executive Officer Datadog, Inc. 620 8th Avenue, 45th Floor New York, New York 10018 (866) 329-4466 (Name, address, including zip code, and telephone number, including area code, of agent for service) Copies to: Jodie Bourdet David Obstler Richard D. Truesdell, Jr. Nicole Brookshire Laszlo Kopits Marcel R. Fausten Alison Haggerty Datadog, Inc. Davis Polk & Wardwell LLP Cooley LLP 620 8th Avenue, 45th Floor 450 Lexington Avenue 55 Hudson Yards New York, New York 10018 New York, New York 10017 New York, New York 10001 (866) 329-4466 (212) 450-4000 (212) 479-6000 Approximate date of commencement of proposed sale to the public: As soon as practicable after this registration statement is declared effective. If any of the securities being registered on this Form are to be offered on a delayed or continuous basis pursuant to Rule 415 under the Securities Act of 1933, check the following box.
    [Show full text]
  • World Tech M&A Report 2016
    WORLD TECH M&A REPORT 2016 www.corumgroup.com 2016 – ANOTHER RECORD YEAR? 2016 will continue the LUMINARY PANEL record pace established Thanks to our luminary panelists who took part in “Forecast 2016: last year in all 30 Global Tech M&A.” For more of their thoughts on the technology market sectors around landscape, view the original webcasts at www.corumgroup.com. the world. This report profiles those sectors, “The most interesting conversations we’re having including top buyers, result not from any one trend, because anyone can jey deals and valuation extrapolate, but from triangulating, looking for ways metrics. For the third these trends will play off of each other.” year, we are presenting PETER COFFEE, SALESFORCE the Corum Top Ten Disruptive Technology Trends with individual “There is an arms race in data security between good reports by Corum’s top executives. These trends guys and bad guys, and making it convenient for the are driving tech M&A, fueled by over $4 trillion good guys to use the best stuff is probably the bigger dollars available to both strategic and financial challenge now, rather than the technical challenge.” buyers. REESE JONES, SINGULARITY UNIVERSITY Special thanks to our panel of industry luminaries “I’m very excited to see more companies getting formed for their insights and contribution to this report: in the areas of predictive analytics, in the area of being Peter Coffee from Salesforce, Reese Jones from able to help industry-specific verticals, to be able to Singularity University, Mukund Mohan from understand what to do with large amounts of data.” Microsoft Ventures and Dr.
    [Show full text]
  • Market Compass Cloud Access Security Brokers Report No.: Mc80079 Page 2 of 77 5.7 Mcafee
    KuppingerCole Report By Mike Small MARKET COMPASS September 23, 2020 Cloud Access Security Brokers The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker) solutions that help to secure the organizational use of cloud services. By Mike Small [email protected] Content 1 Management Summary ........................................... 4 2 Market Segment ................................................. 6 2.1 Market Description .............................................. 6 2.2 Market Direction ............................................... 8 2.3 Capabilities .................................................. 11 2.3.1 Basic Functionality ........................................... 11 2.3.2 Discovery of Cloud Use ........................................ 13 2.3.3 Cloud Service Access Control .................................... 14 2.3.4 Cloud Data Protection ......................................... 15 2.3.5 Compliance ................................................ 17 2.3.6 Posture Management .......................................... 18 3 Vendors & Products ............................................. 20 3.1 Vendors Covered .............................................. 20 3.2 Vendors to Watch ............................................. 21 4 Ratings at a Glance ............................................. 23 4.1 Featured Vendors ............................................. 25 4.1.1 Featured for Innovation:
    [Show full text]
  • Microsoft's Expanded Horizons in Security
    Microsoft's Expanded Horizons in Security Securing Azure remains front and center, but hybrid and multicloud security is the way forward Licensed Reprint Publication Date: 02 Apr 2019 | Product code: INT003-000345 Rik Turner Information Classification: General Microsoft's Expanded Horizons in Security Summary Catalyst Microsoft's development of its security offerings has, until now, been designed to reinforce the appeal, first of its operating system, database, and office productivity software and more recently of its cloud services. While this remains the core driver of its activities in security, there are signs of a broadening of its approach of late as it moves to support heterogeneous environments and the environments of competing cloud service providers (CSPs). Most significantly, in the run-up to the recent RSA Conference on cybersecurity, held in San Francisco March 4‒7, 2019, the company launched Azure Sentinel, a security incident and event management (SIEM) platform it is offering as a cloud-based service, and a managed threat-hunting service called Microsoft Threat Experts. The SIEM-as-a-service (SIEMaaS) offering in particular takes Microsoft into the world of heterogeneous security management. Ovum view Microsoft has already expanded successfully from being a vendor of software licenses to providing the whole spectrum of cloud services, which include infrastructure- and platform-as-a-service (IaaS and PaaS) with its Azure business and software-as-a-service (SaaS) with its Microsoft 365 portfolio. In making that journey, the vendor has also recognized that security is an integral part of being a CSP, and it has invested accordingly in both internal development and acquisitions.
    [Show full text]
  • Mergers in the Digital Economy
    3136 REPRINT Axel Gautier, Lamesch Joé Mergers in the Digital Economy Information Economics and Policy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email:[email protected] https://uclouvain.be/en/research-institutes/ lidam/core/reprints.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z June 2, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Apple and Microsoft (GAFAM) acquired 175 companies, from small startups to billion dollar deals. In this paper, we provide detailed information and statistics on the merger activity of the GAFAM and on the characteristics of the firms they acquire. One of the most intriguing features of these acquisitions is that, in the majority of cases, the product of the target is discontinued under its original brand name post acquisition and this is especially true for the youngest firms. There are three reasons to discontinue a product post acquisition: the product is not as successful as expected, the acquisition was not motivated by the product itself but by the target's assets or R&D effort, or by the elimination of a potential competitive threat. While our data does not enable us to screen between these explanations, the present analysis shows that most of the startups are killed in their infancy. This important phenomenon calls for tighter intervention by competition authorities in merger cases involving big techs. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank P.
    [Show full text]