Welcome Improved Security and Productivity using Office 365 & Cloud

What do you hope to learn today?

Please take a moment to fill out the yellow cards.

Our presenters will review the cards to ensure that we cover the topics/areas of interest.

We will collect them before we get started.

Thanks!

System Source & Microsoft: ▪ Microsoft Certified Partner…since 1980’s • Silver – Learning Solutions • Train 6,000 students/year • Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. • Silver – Infrastructure ▪ 1,000’s of Microsoft implementations • Small Business to Enterprise • Non-profit • Education System Source & Microsoft: Microsoft Competencies • Server Platform • Hosting • Windows Server 2012 & 2016 • Exchange Server, SQL Server, Microsoft Server • Management and Virtualization • Microsoft Cloud Solutions, Microsoft • Devices & Deployment Private Cloud, Configuration • Windows 10, Office Manager, Windows Server • Small Business • Messaging • Office 365, Windows 10 • Exchange Server, Exchange Online, Exchange Online Protection • Mid-Market Solutions Provider • Microsoft Cloud Solutions, Office 365, Windows Server 2012 & 2016, Windows 10 Agenda System Source – Dave Ferg  What is a secure environment?  Identity and authentication security with Office 365  Email security features with Office 365

Microsoft - Steve Deming System Source Learning Center – Jack Underwood What is security? What is a secure environment?  Organizations have varying degrees of security requirements.  Regulations for financial, health, government, etc.  Threats are evolving daily  Viruses and malware  Vulnerable , data breaches, lost devices  Hacked identities  Ransomware, and more… What is a secure environment?  Threats are attacking various targets.  Data in transit  Email and storage  Servers and end devices  Some threats are “innocent”  Sending confidential information outside the organization  Having data on unsecure devices – Unencrypted drives, removable media, unmanaged devices, etc. What is a secure environment?  Security is a continuous process that requires depth, automation, education, and awareness.  Protection  Firewalls and other filtering tools  Deployment tools  Detection  AV software / scanning tools  Monitoring and notification  Remediation  Quarantine, clean, block, educate What is a secure environment?  Security requires continuous monitoring and modification  Security requires actions by the IT department to implement technology, but also education of the user community to protect against “innocent” mistakes and social engineering attacks. Is Office 365 secure?  Microsoft provides  Here you can find information about the information about: security of Office 365 at  Privacy  Compliance their Trust Center site  Physical and infrastructure security https://www.microsoft.com/en-  Data security such as encryption in us/trustcenter/cloudservices/office365 transit and at rest  Identity security  Operation and use safe guards  Monitoring and remediation  And much more… Microsoft’s Holistic Approach

PROTECT DETECT

!

RESPOND Microsoft’s Defense in Depth Strategy Office 365 Enterprise capabilities

APPS SERVICES SECURITY ANALYTICS VOICE Cloud Productivity & Rich Communication and Advanced Enterprise Complete Cloud Insights for Everyone Mobility Collaboration Protection Communication

Office Pro Plus: Exchange : Advanced Threat Protection: Power BI Pro: PSTN Conferencing: Office apps on up to 5 PCs & Macs Business-class email & Calendar Zero-day threat and malware Live business analytics and Worldwide dial-in for your online protection visualization meetings Mobile Office Apps: OneDrive: Cloud Storage and file sharing Advanced Security Management: Delve Analytics: Cloud PBX: Office Apps for Tablet & Enhanced visibility and control Individual and team effectiveness Business phone system in the cloud Smartphones SharePoint: Team sites & internal portals Threat Intelligence: PSTN Calling: Actionable insights to global attack Cost effective cloud based dial tone for Business: threats (add-on) Online Meetings, IM, video chat Advanced Compliance: Microsoft Teams: Identifying the relevant data quickly Chat-based Collaboration and enhanced customer data access : controls. Private social networking Office 365 E3 Office 365 E5 Enterprise Mobility & Security capabilities

Identity and access management Identity Driven Security Managed Mobile Productivity Information Protection

Azure Microsoft Advanced Threat Information Premium P1 Analytics Intune Protection Premium P1

E3 Single sign-on to cloud and on- Identify suspicious activities & Mobile device and app Encryption for all files and storage premises applications. Basic advanced attacks on premises. management to protect corporate locations. Cloud based file

conditional access security apps and data on any device. tracking EMS

Existing Azure RMS capabilities E5

Azure Active Directory Microsoft Azure Information EMS Premium P2 Cloud App Security Protection Premium P2

Advanced risk based identity Bring enterprise-grade visibility, Intelligent classification, & protection with alerts, analysis, & control, and protection to your encryption for files shared inside remediation. cloud applications. & outside your organization

Secure Islands acquisition Identity Management Where are your Office 365 Identities? Microsoft Azure Active Directory  Azure Active Directory (Azure AD) is Microsoft’s multi-tenant cloud based directory and identity management service.  Azure AD also includes a full suite* of identity management capabilities including: Azure  Multi-factor authentication Active Directory  Device registration  Self-service password management  Self-service group management  Privileged account management  Role based access control  Application usage monitoring  Rich auditing and security monitoring and alerting. Active Directory

* Subscription level (Free, Basic or Premium) determines features available  Every paid subscription to Office 365 comes with a free subscription to Azure Active Directory.

 To activate this subscription and access the Azure management portal directly, you have to complete a one-time registration process.

 You can use Azure AD to manage your apps and to create and manage user and group accounts independent of Office 365.

 You can purchase Azure AD Basic and/or Premium directly or get the Premium edition as part of the Enterprise Mobility Suite.

Identity Management with Office 365

Cloud identity with Cloud identity directory synchronization

Azure AD Connect A free tool that can be installed on a domain controller

Single identity in the cloud Suitable for small organizations with no Single identity integration to on-premises suitable for medium directories and large organizations without federation* Identity Management with Office 365 Cloud identity with Azure AD Connect directory synchronization Installation  Password Synchronization – Passwords are stored in Azure AD  Pass-through authentication – Passwords passed to on-premises AD for validation (no passwords in AAD)  ADFS – Will deploy ADFS servers  SSO – Browser login to Azure AD (works with password synchronization or pass-through Single identity authentication) suitable for medium and large organizations without federation* Directory Synchronization – SSO

 A computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos decryption key is shared securely with Azure AD.  Two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used during authentication between the client and Azure AD.  SSO Process – Browser login  Azure AD challenges the client, via a 401 Unauthorized response, to provide a Kerberos ticket.  The client requests a ticket from Active Directory for Azure AD.  Active Directory locates the machine account and returns a Kerberos ticket to the client encrypted with the machine account's secret.  The client sends the Kerberos ticket it acquired from Active Directory to Azure AD.  Azure AD decrypts the Kerberos ticket. Directory Synchronization Considerations

• Install on a Windows 2008 R2 - 2016 server • Configure OUs to synchronize • Optional – Configure attribute filtering Directory Synchronization Considerations  Microsoft requires an Exchange server on-premises to manage Exchange attributes  Password synchronization requires password changes to occur in Active Directory (unless a Premium Azure AD license is purchased)  Account management is done on-premises for most settings Identity Management with Office 365

Cloud identity with Cloud identity directory synchronization Federated identity

Single identity in the cloud Suitable for small organizations with no Single identity Single federated identity integration to on-premises suitable for medium and credentials suitable directories and large organizations without for medium and large federation* organizations Federation  Directory Federation redirects all authentication to the on-premises AD  Fault tolerant designs are necessary because if your ADFS servers are unreachable, there will be no access to your Office 365 resources  Federated domains can be unfederated if needed SaaS Single Sign On

SaaS SSO  Microsoft has pre-built SSO connectors with thousands of SaaS vendors SaaS SSO  Setup of SSO is done in the Azure AD console

 Using SSO reduces identity management tasks and standardizes credentials for application access. Multifactor Authentication Setup Multifactor Authentication Setup Multifactor Authentication

▪ After selecting the user, you will be directed to the multi-factor authentication management page. User login with MFA App Passwords

▪ Used for non-browser apps with MFA is enabled ▪ The app password is used when authenticating with the application instead of the account’s password. ▪ Cannot view the password after creation ▪ The user can create / delete passwords as needed Managing App Passwords Email security (and more) Exchange Online Protection

▪ Some features are: • Manage Accepted Domains • Directory Based Edge Blocking to Reject Messages Sent to Invalid Recipients • Configure mail flow using connectors • Configure your content filter policies • Route spam to each user's Junk Email folder Data Loss Prevention

▪ Data loss prevention (DLP) is designed to prevent sensitive data from accidently leaving your organization. ▪ DLP are specialized transport rules to filter certain times of content. • Credit card numbers • Bank account numbers • National ID numbers • Passport numbers • Custom rules can be created ▪ DLP protects more than just email, it can also be applied to SharePoint Online or OneDrive for Business. Data Loss Prevention Advanced Threat Protection (ATP) Advanced Threat Protection ▪ Safe Attachments ▪ Safe Links • Entire organization or specific recipients ATP – Safe Attachments

▪ Uses a ‘Sandbox’ to verify attachments. ▪ Dynamic Delivery – Body delivered while attachment is scanned ATP – Safe Links

▪ URLs, at time of click, are rewritten to redirect to a Microsoft server were the reputation can be checked ATP – Reporting ATP – What’s Next

▪ ATP Beyond Email – ATP protection in SharePoint Online, OneDrive for Business, Skype for Business and Windows endpoints.

▪ ATP Enhanced Reporting – Provides visibility into the threats that ATP stops and why ATP viewed something as a threat. ▪ Enhanced Anti-Phish Capabilities – New Machine Learning algorithms to strengthen anti-phishing. ▪ Document Preview – Ability to view any attachment while the attachment is being scanned by ATP. ▪ Per-tenant Block List – Customized block list URLs. Infrastructure Security Government Energy and Manufacturing Education Health and Retail Banking and and public telco social services financial sector services

Every customer, regardless of industry vertical, is either under attack or already breached. Sobering statistics The frequency and sophistication of cybersecurity attacks are getting worse.

146 >63% $500B $3.8M The median # of days that of all network intrusions are The total potential cost of The average cost of a data attackers reside within a due to compromised user cybercrime to the global breach to a company victim’s network before credentials economy detection

Complexity Prone to false Designed to protect positives the perimeter

Initial setup, fine-tuning, You receive too many reports When user credentials are stolen and creating rules and in a day with several false and attackers are in the network, thresholds/baselines positives that require valuable your current defenses provide can take a long time. time you don’t have. limited protection. What’s the solution? An on-premises platform to identify advanced security attacks and insider threats before they cause damage

Behavioral Detection of advanced Advanced Threat Analytics attacks and security risks Detection

Microsoft Advanced Threat Analytics brings the behavioral analytics concept to IT and the organization’s users. Detect threats Adapt as fast Focus on what Reduce the Prioritize and fast with as your is important fatigue of false plan for next Behavioral enemies fast using the positives steps Analytics simple attack timeline 1 Analyze After installation: • Simple non-intrusive port mirroring, or deployed directly onto domain controllers • Remains invisible to the attackers • Analyzes all Active Directory network traffic • Collects relevant events from SIEM and information from Active Directory (titles, groups membership, and more) 2 Learn ATA: • Automatically starts learning and profiling entity behavior • Identifies normal behavior for entities • Learns continuously to update the activities of the users, devices, and resources

What is entity? Entity represents users, devices, or resources 3 Detect Microsoft Advanced Threat Analytics: • Looks for abnormal behavior and identifies suspicious activities • Only raises red flags if abnormal activities are contextually aggregated • Leverages world-class security research to detect security risks and attacks in near real-time based on attackers Tactics, Techniques, and Procedures (TTPs)

ATA not only compares the entity’s behavior to its own, but also to the behavior of entities in its interaction path. 4 Alert

ATA reports all suspicious ATA identifies For each suspicious activities on a simple, Who? activity, ATA provides functional, actionable What? recommendations for attack timeline When? the investigation and How? remediation Advanced Threat Analytics Resources  Product Info: http://www.microsoft.com/ata  Documentation: https://www.microsoft.com/en-us/cloud- platform/advanced-threat-analytics-resources  Upcoming webcast on the Advanced Threat Analytics Competitive Landscape  Monday, May 22nd at 11a to 12p Eastern  Register here: https://aka.ms/EMS067PAL-Reg Enterprise Mobility + Security

Identity and access management Identity driven Security Managed mobile productivity Information protection

Azure Active Directory Microsoft Advanced Threat Microsoft Azure Information Premium P1 Analytics Intune Protection Premium P1

Single sign-on to cloud and on- Identify suspicious activities & Mobile device and app Encryption for all files and storage premises applications. Basic advanced attacks on premises. management to protect corporate locations. Cloud based file conditional access security apps and data on any device. tracking

Existing Azure RMS capabilities Device Security Enterprise Mobility + Security

Enterprise Mobility + Security keeps employees productive on their favorite apps and devices—and company data protected. Comprehensive lifecycle management

Enroll Provision • Provide a self-service Company • Deploy certificates, email, VPN, Portal for users to enroll devices and WiFi profiles • Deliver custom terms and • Deploy device security policy conditions at enrollment settings • Bulk enroll devices using Apple • Install mandatory apps Configurator or service account • Deploy app restriction policies • Restrict access to Exchange • Deploy data protection policies email if a device is not enrolled

User IT

Retire Manage and Protect • Revoke access to corporate • Restrict access to corporate resources resources if policies are violated • Perform selective wipe (e.g., jailbroken device) • Audit lost and stolen devices • Protect corporate data by restricting actions such as copy/cut/paste/save outside of managed app ecosystem • Report on device and app compliance Enterprise Mobility Management

Mobile device Mobile application PC management management management

User IT

Intune helps organizations provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure. Multi-identity policy Managed apps Corporate data

Personal User data IT

“Container” maximizes mobile productivity and protects corporate resources • Multi-identity management • No separate login to container required Extend these capabilities to your existing line-of-business apps using the Intune App Wrapping Tool Personal apps Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps

User

Personal apps Maximize productivity while preventing leakage of company data by restricting actions such as copy, cut, paste, and save as between Intune-managed apps and unmanaged apps Managed apps

IT IT

Perform selective wipe via self-service company portal or admin console

Remove managed apps and data Personal apps Keep personal apps and data intact Protect data to secure mobility

Encrypt data Manage rights Enforce policy

Azure Information Protection Share internally Share externally • One solution for the protection & management of: identity, devices, apps, and data • Single app for personal and Identity corporate use Device • Built-in data separation between personal and corporate data Application • Data leakage protection for shared files Data • Identity-based security to protect against unauthorized access, including single sign-on and multi-factor authentication. • Self-service password reset The most secure Windows ever

XP Vista 7 8 8.1 10 2001 2007 2009 2012 2013 2015 Breach detection Device Threat Identity Information protection resistance protection protection investigation & response

PRE-BREACH POST-BREACH Breach detection Device Threat Identity Information protection resistance protection protection investigation & response

PRE-BREACH POST-BREACH 79 Windows 10

Windows trusted boot

1. Get complete control from the start. Windows trusted boot on Windows 10 is built on top of a security standard developed by members of the PC industry to help make sure that your PC boots using only trusted software. When the PC starts, the device's firmware and then Windows itself validate each boot-related component, avoiding headaches caused by malware that can load before the OS boot process has begun or within it.

2. Nip threats in the bud. Windows 10 closes off the pathways that allow malware to hide by ensuring that the devices firmware and operating system have integrity and start before malware can.

3. Enjoy continuous enterprise-grade security for your peace of mind. Once Windows is started by the device's firmware, Windows Trusted Boot can help ensure that the Windows system core starts with integrity every time, working to defend you against modern threats. If anomalies are detected, Windows Trusted Boot will self-remediate and restore the Windows operating system's boot integrity. (Screens simulated, subject to change; Some apps sold separately, availability may vary). 80 Windows 10 Pro

BitLocker

• Keep your peace of mind, even with a lost or stolen device.

• BitLocker and BitLocker to Go encrypt your data on your device and even on your USB drive, so you’re more protected.*

(Screen simulated, subject to change) *Requires TPM 1.2 or greater for TPM based key protection. 81 Windows 10

Windows Hello (Screens simulated, subject to change)

1. Fast and password-free. With Windows Hello,* you can sign into your Windows devices, compatible apps and sites 3 times faster1 than a password that you have to remember and type in and worry about keeping secure. Windows Hello uses your face, fingerprint, or a Windows Hello companion device† to recognize you instantly. You can always keep your PIN as a backup if you choose.

2. More secure than a password. Get better protection when you unlock your device with a look or a touch. Windows Hello uses biometric sensors to recognize you apart from all others. Windows Hello* requires two or more factors of user validation, such as biometrics and your device, to set up the credentials you will use for authentication.

3. Tamper-proof credentials. Your device’s Trusted Platform Module (TPM) hardware protects and isolates your Windows credential from the rest of the operating system, helping to thwart malware and advanced attacks. Windows Hello* is fundamentally immune to phishing and safer from data center breaches because the authentication factors and Windows Hello credential are physically separate. Even if you enter your PIN on a malicious website, an attacker will not be successful unless they also have your device.

4. Unlock your online world. Get rid of passwords. Windows Hello* works with Office 3652 and other Microsoft services, Azure apps2 like Dynamics CRM2 and compatible apps like Dropbox.2 It can wave you into compatible websites too, as long as you're using Microsoft Edge.** Site sign-ins are fast and password-free, with strong security that protects your identity in a way that a password never could.

5. Your companion devices unlock your PC. Windows Hello* lets you use your phone, and other Windows Hello companion devices to quickly unlock your Windows PC without using a password.3 Companion devices† know who you are and give you another choice for quick, secured sign-ins that can meet some of the strictest regulatory compliance standards. * To use Windows Hello with biometrics specialized hardware, including fingerprint reader, illuminated IR sensor, or other biometric sensors is required. Hardware based protection of the Windows Hello credential/keys requires TPM 1.2 or greater; if no TPM exists or is configured, credentials/keys protection will be software-based. ** Limited to compatible websites and apps. † Companion devices must be paired with Windows 10 PC’s via Bluetooth. To use a Windows Hello companion device that enables the user to roam with their Windows Hello credentials requires Pro or Enterprise edition on the Windows 10 PC being signed into. 1Based on average time comparison between typing a password respectively detecting a face or fingerprint to authentication success 2Sold separately 3Available for select premium phones and selected Windows 10 editions. Requires PC and phone to be joined in Azure Active Directory or Active Directory and paired via Bluetooth. 82 Windows 10 Pro

Windows Information Protection

1. Separate personal and professional data. Windows Information Protection* (WIP) helps IT and users prevent accidental leaks by separating personal and business data. WIP allows IT administrators to apply rules to control how business data can be used. WIP recognizes business data as it arrives on devices, is generated by business applications, or when it is designated as business data by the user.

2. User and app access control. Windows Information Protection* (WIP) enables IT to set policies that define which applications and users are authorized to access business data. WIP also enables IT to define which rights a user has, allowing IT to either help block leaks or, optionally, help warn the user before content is copied to unauthorized websites and personal documents. Plus, WIP helps protect business data that is placed on removable storage by ensuring all business data is encrypted and accessible only by authorized users.

3. Provides greater IT control with a seamless experience for users. With Windows Information Protection* (WIP) in Windows 10 Pro and Enterprise editions, business data protection takes place completely behind the scenes, only notifying users when they’re attempting to take an unauthorized action. Your IT team (Screen simulated, subject to change) has full control of keys and protected data, making it easy to perform a remote wipe of business data on demand while leaving personal data untouched. *WIP requires either Mobile Device Management (MDM) or System Center Configuration Manager to manage settings. Active Directory makes management easier, but is not required. When is more needed?

Executive, management, or financial roles

Access, process or store highly- sensitive customer data

Regulated industries including publicly listed companies

In-house software or IP development Breach detection Device Threat Identity Information protection resistance protection protection investigation & response

PRE-BREACH POST-BREACH 85 Windows 10 Enterprise

Credential Guard

1. Protect identities from the impact of a full system compromise. One of several identity protection layers in Windows 10, Credential Guard helps protect the user access tokens (derived credentials) that are generated once users have been authenticated. Protection of these tokens is critical to prevent Pass the Hash attacks, which is the go-to tactic for nearly all major network breaches. Credential Guard stores the tokens within a virtualization-based security (VBS) environment running on top of Hyper-V technology. This helps prevent attackers from extracting the tokens from devices, even when the Windows kernel itself has been fully compromised. Credential Guard is designed so that malware running in the operating system, even with the highest privilege level, can‘t access user related access tokens.

2. Hardware-level security. Credential Guard uses hardware-based virtualization and Hyper-V to host Windows 10 security credentials and isolate them from malware. Hardware based isolation prevents attackers, even with the highest level of Windows privilege, from accessing user related access tokens.

3. Easy Manageability. (Screen simulated, subject to change) Credential Guard can be enabled using Group Policy making it easy and familiar for your IT staff to administer using the existing management tools they have in place. 86 Windows 10 Enterprise

Device Guard

1. Eliminate malware. Help secure your environment and prevent untrusted apps and code from running by using the ultimate form of app control. Using virtualization-based security, the Device Guard feature in Windows 10 offers a solution more powerful than traditional app control products, providing rigorous protection from tampering and bypass.

2. Hardware rooted app control. Device Guard uses virtualization-based security to isolate and help protect Device Guard features, such as the Hyper-V Code Integrity Service (HVCI), from malware and attacks, even if Windows itself has been compromised. HVCI enables Device Guard to help protect kernel mode processes from in-memory attacks, giving you a strong defense against zero-day exploits.

3. Only run trusted apps. Device Guard helps enable your IT department to decide which software vendors and apps can be trusted within your environment. IT can designate as trustworthy the right combination of apps for your organization, from internal line-of-business apps to everything from the Windows Store to apps from specific software vendors. Device Guard works with Windows Classic apps and Universal Windows Platform apps, and it includes tools that make it easy to sign your existing apps.

(Screens simulated, subject to change. Office 365 subscription required for some features ) 87 Windows 10 Enterprise E5

Windows Defender Advanced Threat Protection (ATP)

1. Built into Windows, cloud-powered. Windows Defender Advanced Threat Protection (ATP) is powered by behavioral sensors built into Windows 10 and a cloud back-end. No additional deployment is required, and the service can be switched on through configuration. Running alongside any anti-virus (AV) solution, Windows Defender ATP is continuously up-to- date, and can help lower costs. 2. Behavior-based, post-breach detection. Windows Defender Advanced Threat Protection (ATP) detects attacks that have made it past all other defenses, based on behaviors. Windows Defender ATP uses real-time as well as historic information to identify attacks, and provides actionable alerts for known and unknown adversaries. 3. Rich timeline for investigation. Windows Defender Advanced Threat Protection gives you an easy way to investigate the scope of a breach or suspect behaviors through a rich machine timeline, for all machines enrolled to the service. Gain additional deep analyses for files and URLs by using its detonation service. 4. Unique threat intelligence knowledge base. Unparalleled threat optics combine first and third party threat intelligence data to (Screen simulated, subject to change) provide actor details and intent context for threat detection. Microsoft’s Defense in Depth Strategy Microsoft’s Holistic Approach

PROTECT DETECT

!

RESPOND

Manufacturer Authorized Training Insures Learning Content Matches Software

Offering the most Microsoft Official courses in Maryland – Accepting Software Assurance Training Vouchers! 100% of Baltimore area VMware training in our classrooms 100% of Baltimore area Oracle training in our classrooms All courses offered locally and online Your Teams – Local and Remote

Consistently 17 percentage points higher than Expert Instructors national average for Microsoft Certified Trainers

Combine chapters from multiple courses Tailored Curriculum Add company specific content Develop hands-on labs using your data

Organizational Focus Specific to your culture and objectives and Insight

Convenient Training Small or large groups, in one location or many Your Teams – Local and Remote Offsite Locations Distraction-free learning

Instructor Led Training (ILT) Live Virtual Training (LVT) Attend our ILT sessions from home or work. Project Based Training (PBT) Flexible Scheduling Informal Coaching and Delivery Dual monitors display digital curriculum and labs Formats simultaneously Mobile Curriculum and Classrooms Integration of Video eLearning OnDemand Learning Our Process Our Process Account • Understand your needs Manager • Assess skill levels Tools

Instructor • Develop content

Register • Easy registration

Attend • Your site, our site and live virtually from your home or office

Evaluate • Give course feedback using independent evaluation tool

Report • Attendance and evaluation reports

Reinforce • Post-class support Customized Training Curriculum Corporate/ Management Accounting Topics Development

3.5 6.17 5 Teaching Time in Hours 5 5 5 Introduction to SharePoint 2010 Navigating a SharePoint Site 5 5 5 Navigating the Home Page and the SharePoint Site Navigating the Site Content Tree Navigating the Ribbon Interface Browsing Lists on a SharePoint Site Browsing Document Libraries Training plans 5 5 5 Using the Recycle Bin Working with Lists customized for 30 40 40 Discovering Default Lists in a Site Adding and Editing List Items each audience in Deleting and Restoring a List Item Attaching Files to List Items your organization Sorting and Filtering a List X Setting up Alerts Working with Libraries 35 45 35 Creating a New Document SCAN Documents S: DRIVE Editing Documents Adding Documents X X Co-authoring 5 5 5 Creating a Picture Library and Adding Pictures 10 15 15 Checking Documents In and Out 10 10 Working with Version History - Major 10 Working with Version History - Major/Minor X 10 10 Using Alerts 5 5 5 Deleting and Restoring Documents Working with List Settings X 15 X Configuring Content Approval and Versioning Learning Center Instructors Student Eval Top Box Scores consistently 17 points 100% higher than Microsoft 92% 90% Average 90% 82% 82% 82% 80% 80% 77% 77% 79% 80% 75% 77% 74% 73% 71% 69% 67% 70% 67% 67% 65% 63% 60%

50%

40%

30%

Percent Top Score Top Percent 20%

10%

0% Oct 16 Nov 16 Dec 16 Jan 17 Feb 17 Mar 17 Apr 17 Course Administration Instructor 347

Course Name Length MS20347 Managing Office 365 Identities and Requirements 5 Days Courses to Support your Rollout Date Course Name Location Length 7/24/2017 MS10961B Automating Administration with Windows PowerShell® Columbia 5 Days 10/2/2017 MS10961B Automating Administration with Windows PowerShell® Virtual 5 Days 12/11/2017 MS10961B Automating Administration with Windows PowerShell® Hunt Valley 5 Days Choose Your Date MS10961OD Automating Administration with Windows PowerShell OnDemand Self-paced 6/7/2017 MS10962 Advanced Automated Administration with Windows PowerShell Virtual 3 Days 8/16/2017 MS10962 Advanced Automated Administration with Windows PowerShell Virtual 3 Days 10/25/2017 MS10962 Advanced Automated Administration with Windows PowerShell Virtual 3 Days Choose Your Date MS10962OD Advanced Automated Administration with Windows PowerShell OnDemand Self-paced 7/24/2017 MS55069 PowerShell for SQL Server Administrators Virtual 2 Days 10/2/2017 MS55069 PowerShell for SQL Server Administrators Virtual 2 Days 12/11/2017 MS55069 PowerShell for SQL Server Administrators Virtual 2 Days 7/19/2017 PowerShell Quickstart for Administrators Columbia 3 Days 10/23/2017 PowerShell Quickstart for Administrators Hunt Valley 3 Days Courses to Support your Rollout Date Course Name Location Length 8/16/2017 365: Web Apps (with Skype for Business) Hunt Valley 1 Day 11/13/2017 Microsoft Office 365: Web Apps (with Skype for Business) Hunt Valley 1 Day 6/12/2017 MS20347 Enabling and Managing Office 365 Virtual 5 Days 8/21/2017 MS20347 Enabling and Managing Office 365 Hunt Valley 5 Days 10/30/2017 MS20347 Enabling and Managing Office 365 Virtual 5 Days 8/14/2017 10: Transition from Windows 7 Hunt Valley 1 Day 10/5/2017 Microsoft Windows 10: Transition from Windows 7 Columbia 1 Day 7/24/2017 MS10982 Supporting and Troubleshooting Windows 10 Hunt Valley 5 Days 10/2/2017 MS10982 Supporting and Troubleshooting Windows 10 Virtual 5 Days 12/11/2017 MS10982 Supporting and Troubleshooting Windows 10 Columbia 5 Days Choose Your Date MS10982OD Supporting and Troubleshooting Windows 10 OnDemand Self-paced Courses to Support your Rollout Date Course Name Location Length

6/12/2017 MS20695 Deploying Windows Desktops and Enterprise Applications Virtual 5 Days 8/21/2017 MS20695 Deploying Windows Desktops and Enterprise Applications Virtual 5 Days 10/30/2017 MS20695 Deploying Windows Desktops and Enterprise Applications Virtual 5 Days Choose Your Date MS20695OD Deploying Windows Desktops and Enterprise Applications OnDemand Self-paced 6/19/2017 MS20697-1: Implementing and Managing Windows 10 Virtual 5 Days 8/28/2017 MS20697-1: Implementing and Managing Windows 10 Hunt Valley 5 Days 11/6/2017 MS20697-1: Implementing and Managing Windows 10 Columbia 5 Days Choose Your Date MS20697-1OD Implementing and Managing Windows 10 OnDemand Self-paced 7/10/2017 MS20697-2 Deploying and Managing Windows 10 Using Enterprise Services Virtual 5 Days 9/11/2017 MS20697-2 Deploying and Managing Windows 10 Using Enterprise Services Hunt Valley 5 Days 11/27/2017 MS20697-2 Deploying and Managing Windows 10 Using Enterprise Services Virtual 5 Days Seminar Private Course Pricing

One-day Access, Excel, Word, PowerPoint, Outlook or Office 365 Web Apps course: $143 per student for a class of 10 - Save $153-258 per student!

Any 5 day Microsoft Official Course: $1900 per student for a class of 10 – Save $1225 per student!

Reserve your dates by 6/30 to secure discounted pricing! Learning Center Offer Evaluations Door Prizes Lunch!

THANK YOU!