Configure and use Microsoft Office 365 security and compliance features
Objective
During this lab, you will review the Microsoft® Office 365™ compliance, auditing, and reporting features available in your tenant. You will create mobile device management policies and configure data loss prevention policies for your online services. You will also learn about the advanced threat protection features in Exchange Online.Estimated time to complete: 75 minutes
Before You Begin
Before you can complete this lab, you must have an Office 365 Enterprise E5 trial account.
What You Will Learn
After completing the exercises, you will be able to:
• Understand the Compliance Center.
• Enable mobile device management policies.
• Configure data loss prevention policies for Exchange Online, SharePoint® Online, and OneDrive® for Business.
• Encrypt and decrypt messages using Office 365 message encryption.
• Test mobile device access policies.
• Use Advanced Threat Protection in Exchange Online.
• Enable auditing and review auditing reports.
Scenario
You are the administrator for your Office 365 deployment. You are using Office 365 for all of your messaging, real-time communication, and document management. Your Office 365 tenant’s mobile device management, compliance, and advanced threat protection features are new to you. You need to familiarize yourself with the Compliance Center and its capabilities. You will tour the areas currently available in the Compliance Center and then perform some specific tasks related to mobile device policies and message encryption. You will also configure rules for protecting your organization from email based threats. Finally, you want to be sure you can audit and review the audit reports available to you.
Virtual Machines
- 41-652-CLIENT01
Exercise 1: Loading Lab Content into Your Office 365 Tenant
In this exercise, you will run a script that will create user mailboxes, a SharePoint site, and load content into your tenant that will be used for this lab.
You must already have an Office 365 E5 tenant in order to complete this lab. Due to configuration changes made by this lab to the Office 365 tenant, it is recommended to use a new trial tenant to ensure your production tenant is not impacted.
You must already have an Office 365 E5 tenant in order to complete this lab. Due to configuration changes made by this lab to the Office 365 tenant, it is recommended to use a new trial tenant to ensure your production tenant is not impacted.
- Sign up for a new Office 365 E5 trial tenantIf you have not been provided a tenant for use in this lab, you can sign up for a new Office 365 E5 trial tenant from here: https://products.office.com/en-us/business/office-365-enterprise-e5-business-software
- Complete the Office 365 trial registrationOn the Office 365 Enterprise page, click Free trial and then complete the questionnaire. You should write down your tenant administrator username and password because it will be used throughout the lab.
- Sign in to your new Office 365 trial tenantOnce you have signed up for a tenant, sign in to your tenant and verify that it has finished provisioning.
- Sign in to CLIENT01 as AdminOn CLIENT01, sign in as Admin with a password of Pa$$w0rd
If prompted to activate, click Close.If you see a Networks notification, click Yes to allow network discovery.
If you see a message that updates are available, press Esc to clear the message and then close the UPDATE & SECURITY window. - Open Windows PowerShell® as AdministratorIn the taskbar, right-click Windows PowerShell and then click Run as Administrator
- Run the slmgr commandAt the Windows PowerShell command prompt, type the following and then press Enter:
Slmgr -rearmTo save time, you can use the Type Text [A] icon whenever it is available to automatically type Windows PowerShell commands instead of typing. The Type Text feature is located to the left of the Done button in the task view screen. To use it, make sure the Windows PowerShell window is in the foreground, then click the icon. Review the text, and then press Enter to run the command. - Click OK and then close Windows PowerShellIn the Windows Script Host dialog box, click OK.
There is no need to restart at this time.
Close Windows PowerShell. - Browse to C:\Scripts\SecComplianceLabOpen File Explorer and then browse to C:\Scripts\SecComplianceLab.
- Run O365SecComplianceLab.exe as AdministratorRight-click O365SecComplianceLab.exe and then click Run as administrator.
- Click More info then click Run anywayIn the Windows protected your PC dialog box, click More info, and then click Run anyway.
- Type your tenant administrator credentialsIn the Tenant Administrator Credentials window, sign in using your tenant administrator user credentials and then click OK.
The script will configure and load content into your Office 365 tenant. - In the Script Complete window, click OKWait for the script to complete and then, in the Script Complete window, click OK.
This script may take 8-10 minutes to complete.The script may appear to stop running when verifying the SharePoint Online site creation. If the script takes longer than ten minutes, leave the script window open and continue with the lab. It may happen that some configurations are taking longer than expected.
Exercise 2: Reviewing the Office 365 Compliance Center
In this exercise, you will connect to and review the available options in the Office 365 Compliance Center.
- Open Internet ExplorerIn CLIENT01, open Internet Explorer®.
- Browse to http://portal.office.comBrowse to http://portal.office.com
- Sign in to the Office 365 portalOn the Sign in page, sign in using your tenant administrator user name and password.
- Click the Security & Compliance tileOn the Home page, click the Security & Compliance tile.
- Open Device managementIn the navigation menu, click Threat management, and then click Device management.If you are prompted to update your admin contact info, click cancel. It is not necessary to update the information at this time. You will likely be prompted again during this lab and future labs. You may choose to update the information at that time or click cancel. You may also want to change the Zoom percentage in Internet Explorer from 100% to 75% if the page does not display properly.
- Click Let’s get startedReview the Setup Mobile Device Management (MDM) for Office 365 page and then click Let’s get started.
- Click Start setupReview the information on the Setup Mobile Device Management for Office 365 page, scroll down, and then click Start setup.
- Review the MDM messageReview the message regarding mobile device management setup. This feature will not be available immediately.
- Switch to the Security & Compliance center tabIf necessary, switch to the Security & Compliance center tab.
- Click PermissionsIn the feature pane, click Permissions.
Review the available permissions that can be assigned.Assign permissions to people in your organization so they can perform tasks in the Security & Compliance Center. Although you can use this page to assign permissions for most features in the Security & Compliance Center, you’ll need to use the Exchange admin center and SharePoint to set permissions for others. - In the feature pane, click Threat managementIn the feature pane, click Threat management.
- Click Device managementUnder Threat management, click Device management.
Review the information for Device management.
Close the Intune tab.Device management may still be running the activation process. - Click Data loss preventionUnder Threat management, click Data loss prevention.
Review the information for Data loss preventionUse data loss prevention (DLP) policies to help protect and manage your organization’s information across various locations. For example, you can set up policies to block access to content, automatically encrypt documents, or notify users if content is saved to the wrong location. - In the navigation menu, click Data governanceIn the navigation menu, click Data governance.
- Click ImportUnder Data governance, click Import.
Review the data import feature.Use the Import service to transfer data from your organization’s servers to Office 365. You can ship hard drives to Microsoft or upload the data directly over the network. - Click ArchiveUnder Data governance, click Archive.
Review the information for Archiving mailboxes.Archive mailboxes provide additional email storage for the people in your organization. Using Outlook® or Outlook Web App, people can view messages in their archive mailbox and move or copy messages between their primary and archive mailboxes. After an archive mailbox is enabled, messages older than two years are automatically moved to the archive mailbox by the default retention policy that’s assigned to every mailbox in your organization. - Click RetentionUnder Data governance, click Retention.
Review the information for retention and deletion of the organizations email and documents.Retention allows you to manage the lifecycle of content in Office 365 such as email and documents by keeping the content you need and then removing the content after it’s no longer required. - Click Search and investigationIn the navigation menu, click Search & investigation.Search your organization for content in email, documents, and other sources that contains specific keywords or meets other search criteria. You can then preview and export the search results.
- Click Content searchUnder Search & investigation, click Content search.
Review the options for searching the organizations email, documents, and Skype for Business conversations. - Click Audit log searchUnder Search & investigation, click Audit log search.
Review the options for creating a search of the organization’s audit logs. - Click eDiscoveryUnder Search & investigate, click eDiscovery.
Review the information for eDiscovery.Use eDiscovery cases to identify, manage, and hold content in Exchange, SharePoint, and OneDrive for Business. Use this page to create cases, manage existing cases, and close cases that you no longer need. To access the eDiscovery Center or an eDiscovery case, you have to be a site collection administrator or a member of the Owners group. - In the navigation menu, click ReportsIn the navigation menu, click Reports.
- Click View reportsUnder Reports, click View reports.
Use the View reports feature to review auditing, device management, and data loss prevention reports.Use auditing reports to view activity in SharePoint Online and OneDrive for Business sites, user sign-in activity in Office 365, and mail-related activity in Exchange Online. Audited activity in each of these services is recorded and available to view in an online report or export to a file. Use DLP reports to view information about the SharePoint Online and OneDrive for Business items in your organization that match your DLP policies and rules. - Click Service assuranceIn the navigation menu, click Service assurance.
- Under Service assurance, click DashboardUnder Service assurance, click Dashboard.
You will be automatically redirected to the Region and industry settings page if you have not already configured these settings. - Set your region and industry settingsIf you have already configured these settings, you will not be directed to this page.
Using the available options on this page, set your region and industry information and then click Save. - Click DashboardUnder Service assurance, click Dashboard.
Review the information on the Service assurance page. - Click Compliance reportsUnder Service assurance, click Compliance reports.
Review the information on the Service Compliance Reports page. - Click Trust documentsUnder Service assurance, click Trust documents.
Review the Trust documents provided by Microsoft page.
Exercise 3: Using Mobile Device Management
In this exercise, you will use the Mobile Device Management feature in Office 365 to configure a device security policy for your mobile users.
- In the navigation menu, click Threat managementIn the navigation menu, click Threat management.
- Click Device managementClick Device management. On the Intue tab, verify that mobile device management has completed provisioning. You may have to wait for provisioning to complete.
- In IE, click the Microsoft Office Home tabIn Internet Explorer, click the Microsoft Office Home tab.
- Click the Admin tileOn the Home page, click the Admin tile.If you are prompted to update your admin contact info, click cancel. It is not necessary to update the information at this time. You will likely be prompted again during this lab and future labs. You may choose to update the information at that time or click cancel.
- In the navigation menu, open GroupsIn the navigation menu, click Groups and then click Groups.
- Click Add a groupOn the menu, click Add a group.
- Create a group named Mobile UsersIn the New Group window, click the Type menu and then click Security group.
In the Name box, type Mobile Users and then click Add. - On the Group was added page, click CloseOn the Group was added page, click Close.
- In the Groups list, click Mobile UsersIn the Groups list, click Mobile Users.
- Edit the group's membershipIn the Mobile Users window, next to Members, click Edit.
- In the Mobile Users window, click Add membersIn the Mobile Users window, click Add members.
- Search for Garret VargasOn the Add members page, in the Search box, type Garret.
- Select Garret Vargas, click Save and then CloseIn the results list, select Garret Vargas, click Save and then click Close.
- Review the addition and then click CloseVerify that Garret Vargas is now shown in the Group members list and then click Close..
- Close the Mobile Users security group windowIn the Mobile Users window, click Close.
- Switch to the Intune tabIn Internet Explorer, click the Intune tab.
- Click Manage device security policiesOn the Mobile Device Management for Office 365 page, click the Manage device security policies and access rules.
- Click Device security policiesIn the navigation menu, under Threat management, click Device security policies.Notice that you were redirected to the Security & Compliance center and that there is a new Device security policies feature.
- Click New +On the Device security policies page, click New +.
- Name the policy and click NextIn the New device security policy window, in the Name box, type Mobile Device Access, and then click Next.
- Configure the policy settingsOn the What requirements do you want to have on devices page, review the default selections. In addition to the default settings, set the following settings that are shown in the knowledge feature. To view the knowledge feature click the [Bulb in Head] icon.Number of sign-in failures before device is wiped = 6
Lock devices if they are inactive for this many minutes = 10
Require managing email profile
Block access and report violation - Click NextClick Next.
- Click NextOn the What else do you want to configure page, review the available options and then click Next.
- Click YesOn the Do you want to apply this policy now page, click Yes.
- Under Yes, Click Add +Under Yes, click Add +.
- Search for the Mobile Users groupIn the Select Group window, in the Search box, type Mobile and then click Search.
- Add the Mobile Users groupIn the results list, click Mobile Users, click add, and then click OK.
- Click NextOn the New device security policy page, click Next.
- Review the policy and then click FinishReview the policy settings and then click Finish.
On the Device security page, verify that your new policy is listed. - Click Manage organization-wide device…On the Device security policies page, click Manage organization-wide device access settings.
- Review the settings and then click CancelReview the organization-wide settings and then click Cancel.
Exercise 4: Using Data Loss Prevention
In this exercise, you will create and test a data loss prevention (DLP) policy that will help your organization protect itself from the accidental loss of financial data.
- Click Data loss preventionOn CLIENT01, in the Security & Compliance Center, in the feature pane under Threat management, click Data loss prevention.
- Click New DLP policy from template +On the toolbar, click New DLP policy from template +.The existing policy was created by the script in exercise 1.
- Click Financial regulationsOn the New DLP policy page, under What information do you want to protect, click Financial regulations.
- Click U.S. Financial DataIn the template list, scroll down, and then click U.S. Financial Data.
- Review the information and then click NextReview the template information and then click Next.
- Review the default settings and then click NextOn the Which services do you want to protect page, review the default settings and then click Next.
- Review the existing settings and then click NextOn the Customize rules page, review the existing settings and then click Next.
- Name the new DLP policyIn the Name box, type Protect U.S. Financial Data.
- Verify the default selection and then click CreateUnder What do you want to do after this policy is created, verify that Test it out is selected, review this action description, and then click Create.
- Click go to the Exchange admin centerOn CLIENT01, in the Compliance Center, on the Data loss prevention page, click go to the Exchange admin center.
- Select your time zone and click SaveIn the new window, if necessary, select your time zone and then click Save.
- Create a New DLP policy from templateIn the data loss prevention window, on the toolbar, click the New menu and then click New DLP policy from template.
- Name the new DLP policyOn the DLP policy from template page, in the Name box, type Protect U.S. Financial Data.
- Choose the U.S. Financial Data templateIn the Choose a template list, scroll down, and then click U.S. Financial Data.
- Click More optionsScroll down and click More options.
- Verify Enabled is selected and then click SaveUnder Choose the state of this DLP policy, verify Enabled is selected and then click Save.
- Enable policy tipsVerify that the Protect U.S. Financial Data policy is selected. In the details pane, under Policy Mode, click Test with Policy Tips
- In the Warning dialog box, click YesIn the Warning dialog box, review the information and then click Yes.
- Close the data loss prevention windowWait for the policy to be saved and then close the data loss prevention window.
- In the app launcher, click MailIn the Security & Compliance Center, in the top navigation, click the app launcher, and then click Mail.If the top navigation menu is not visible, in Internet Explorer, click the Back arrow, click the app launcher, and then click Mail.
- Click NewIn the Inbox, click New.
- In the To box, type BobK@TailspinToys.comIn the To box, type BobK@TailspinToys.com
- In the Subject box, type Testing DLP PolicyIn the Subject box, type Testing DLP Policy
- Type the message bodyIn the message body, type the following:
Visa: 4111-1111-1111-1111
Expires: 12/2019 - Review the Policy TipWait for the Policy tip to appear. This may take 1-2 minutes.
Review the Policy Tip. - Click Learn moreReview the information in the Policy tip and then click Learn more.
- Review the information and optionsReview the information and option to report the content as a false positive.
- Click DiscardOn the toolbar, click Discard. If necessary, click the ellipsis and then click Discard.
- Click DiscardIn the Discard Message dialog box, click Discard.
- Close the Mail tabIn Internet Explorer, close the Mail tab.
- Switch to the Security & Compliance tabIn Internet Explorer, switch to the Security & Compliance tab.
- Click Data governanceIn the navigation menu, click Data governance.
- Under Data governance, click RetentionUnder Data governance, click Retention.
- Click Manage document deletion policies…On the Retention page, under Delete, click Manage document deletion policies for SharePoint Online and OneDrive for Business.
- Review the Compliance Policy CenterIn the Compliance Policy Center, review the available areas for policies and policy assignments.
In Internet Explorer, close the Compliance Policy Center tab. - Switch to the Security & Compliance center tabSwitch to the Security & Compliance center tab and the Retention page.
- Under Preserve, click New +On the Retention page, under Preserve, click New +.
- Name the policy then click NextIn the New preservation policy window, in the Name box, type Tailspin Documents and then click Next.
- Select the search locations check boxesOn the Where do you want us to look page, select the Mailboxes and SharePoint Online and OneDrive for Business check boxes.
- Click NextClick Next.
- Click Add +On the Which mailboxes do you want to include page, click Add +.
- Add Garret Vargas’ mailboxIn the Select Mailbox window, click Garret Vargas, click add, and then click OK.
- Click NextOn the Which mailboxes do you want to include page, click Next.
- Click Add+On the Which SharePoint Online or OneDrive for Business sites do you want to include page, click Add +.
- Type the Marketing SharePoint site’s URLIn the Choose sites window, in the Enter the site’s URL box, type https://yourtenantname.sharepoint.com/sites/Marketing and then click add.
For example, https://contoso.sharepoint.com/sites/Marketing - Type Garret Vargas’ OneDrive for Business URLIn the Enter the site’s URL box, type https://yourtenantname-my.sharepoint.com/personal/garretv_yourtenantname_onmicrosoft_com and then click Add.
For example, https://contoso-my.sharepoint.com/personal/garretv_contoso_onmicrosoft_com - Click OK and then click NextClick OK and then click Next.
- Type keyword to search forIn the What do you want to look for box, type Tailspin
- Click NextReview the option to choose start and end dates, and then click Next.
- Preserve content for 6 monthsOn the How long do you want to preserve the content page, click the Time frame to preserve the content menu, click 6 months, and then click Next.
- Click NextOn the Do you want to turn on Preservation lock page, review the information, and then click Next.
- Click NextOn the Do you want to turn on this policy after it is created page, review the default setting, and then click Next.
- Review the policy settings and then click CreateReview the settings for the new policy and then click Create.
- Review the policy statusIn the Preservations policy list, review the status of the newly created policy. It may take several minutes or longer before the policy status is listed as ‘On’. You do not have to wait for the status to update to On; you may continue with the lab.
- Browse to the Office 365 admin centerIn the top navigation, click the apps launcher icon and then click Admin.
Exercise 5: Using Office 365 Message Encryption
In this exercise, you will configure the necessary settings in your Office 365 tenant in order to use Office 365 message encryption. You will then test the configuration and verify automatic encryption for specific content is working.
- In the navigation menu, click Services and add-insOn CLIENT01, in the Office 365 admin center, in the navigation pane, click Settings and then click Services & add-ins.
- Click Microsfot Azure Information Protection.On the Services & add-ins page, scroll down and then click Microsoft Azure Information Protection .
- On the Protect your information page, click ManageOn the Protect your information page, click Manage Microsoft Azure Information Protection settings.
- On the rights management page, click activateOn the rights management page, click activate.
- Click activateIn the Do you want to activate Rights Management dialog box, review the information and then click activate.
- Verify that Rights Management is activatedWait for the page to refresh and then verify that Rights Management is shown as activated.
- Open Windows PowerShell®On CLIENT01, open Windows PowerShell.To save time, you can use the Type Text [A] icon whenever it is available to automatically type Windows PowerShell commands instead of typing. The Type Text feature is located to the left of the Done button in the task view screen. To use it, make sure the Windows PowerShell window is in the foreground, then click the icon. Review the text, and then press Enter to run the command
- Configure Microsoft.Exchange connectionAt the Windows PowerShell command prompt, type the following and then press Enter:
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionURI https://outlook.office365.com/powershell-liveid -Credential (Get-Credential) -Authentication Basic -AllowRedirection - Type your tenant administrator credentialsIn the Windows PowerShell credential request window, type your tenant administrator user name and password and then click OK.
- Import the PSSessionAt the Windows PowerShell command prompt, type the following and then press Enter:
Import-PSSession $Session - Review the rights management configurationAt the Windows PowerShell command prompt, type the following and then press Enter:
Get-IRMConfiguration
Review the output. - Set the key sharing locationAt the Windows PowerShell command prompt, type the following and then press Enter:
Set-IRMConfiguration -RMSOnlineKeySharingLocation https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc
This is the key sharing location specific to North America. - Import the RMS trusted publishing domainAt the Windows PowerShell command prompt, type the following and then press Enter:
Import-RMSTrustedPublishingDomain -RMSOnline -Name "RMS Online" - Enable internal licensingAt the Windows PowerShell command prompt, type the following and then press Enter:
Set-IRMConfiguration -InternalLicensingEnabled $true - Review the rights management configurationAt the Windows PowerShell command prompt, type the following and then press Enter:
Get-IRMConfiguration
Review the output of the command. - Test the rights management configurationAt the Windows PowerShell command prompt, type the following and then press Enter:
Test-IRMConfiguration -Sender yourtenantadministratorname
For example: Test-IRMConfiguration -Sender Administrator@contoso.onmicrosoft.com - Verify that the overall result reads PASSIn the output of the command, verify that the overall result reads PASS.
Leave Windows PowerShell open. It will be used later in this lab. - Switch to Internet ExplorerSwitch to Internet Explorer.
- Close the Rights Management tabClose the Rights Management tab.
- Switch to the Office Admin centerSwitch to the Office Admin center tab.
- On the Services and add-ins page, click MailOn the Services and add-ins page, click Mail.
- Under mail flow, click Custom mail rulesIn the results pane, under mail flow, click Custom mail rules.
- Create a new ruleIn the Exchange admin center, on the rules page, click the New menu and then click Create a new rule.
- Name the new custom mail ruleIn the new rule window, in the Name box, type Encrypt Messages
- Click More optionsClick More options.
- Set the rule parametersClick the Apply this rule if menu, point to The subject or body, and then click subject includes any of these words.
- Specify words or phrasesIn the specify words or phrases window, type Encrypt, click Add +, and then click OK.
- Apply Office 365 Message EncryptionUnder Do the following, click the Select one menu, point to Modify the message security, and then click Apply Office 365 Message Encryption.
- Click SaveScroll down and review the remaining options and then click Save.
- Open a new InPrivate browser session in IEOn CLIENT01, in Internet Explorer, press Ctrl+Shift+P to open a new InPrivate browser window.
- Browse to http://outlook.office.comIn the InPrivate browser window, browse to http://outlook.office.com
- Sign in to Outlook as Garret VargasSign in as GarretV@yourtenantdomainname with a password of Pa$$w0rd For example: GarretV@contoso.onmicrosoft.com
- In the Inbox, click NewIn the Inbox, click New.
- In the To box, type your tenant administrator nameIn the To box, type your tenant administrator name.
- Type a specific subject for the emailIn the Add a subject box, type Encrypt: Testing protection.
- Type a message for the email and click SendIn the message body, type Testing the protection policy. and then click Send.
- Switch to the Exchange admin centerSwitch to the Exchange admin center.
- In the app launcher, click MailClick the app launcher and then click Mail.
- Download the message.html attachmentIn the Inbox, click the message from Garret Vargas. Click the message.html attachment and then click Download.
- In the Internet Explorer banner, click SaveIn the Internet Explorer banner, click Save.If the message is not encrypted, you may have to wait until the policy becomes effective. This may take several minutes.
- Click OpenIn the The message.html download has completed banner, click Open.
- Click Sign inIn the new browser tab, review the information and then click Sign in. For the purpose of this lab, Internet Explorer has been set as the default browser.
- Review the message then close the tabReview the message and close the Encrypted Message tab.
- Switch to Outlook signed on as Garret VargasSwitch to Outlook on the web signed on as Garret Vargas.
- Close the InPrivate windowClose the InPrivate Internet Explorer window.
Exercise 6: Testing MDM and Office 365 Message Encryption (Optional)
In this exercise, you will configure your mobile device to access an Office 365 mailbox using OWA. You will also experience using Office 365 message encryption on a mobile device.
You must have an email account configured on your device using the device’s mail app or a browser on the device that supports Form Post.
You must have an email account configured on your device using the device’s mail app or a browser on the device that supports Form Post.
- Connect to your device’s app storeOn your device, connect to your device’s app store.
- Search the app storeSearch the app store for OME Viewer or Office 365 Message Encryption Viewer.
- Install the free OME Viewer appInstall the free OME Viewer app.
- Search the app storeSearch the app store for OWA or Outlook Web App.
- Install the free OWA appInstall the free OWA app.
- Open the OWA appOpen the OWA app.
- Tap ContinueOn the Before you start page, tap Continue.
- Type the email address for Aubrey SmithIn the Email address box, type AubreyS@yourtenantname.onmicrosoft.com
For example, AubreyS@contoso.onmicrosoft.com - Type Pa$$w0rd and sign inIn the Password box, type Pa$$w0rd and then click Sign in.
- Tap New mailTap New mail.
- Type an accessible email addressIn the To box, type an email address for an account you have configured on your mobile device.
- Type a specific subject for the emailIn the Subject box, type Encrypt: Sending from my OWA app
- Type a message for the email and tap SendIn the message body, type Testing message encryption and then tap Send.
- Open the receiving email accountOpen your device’s email app and the account you sent the message to.You will use your device’s native email app and the account that you sent the message to in the previous task.
- Open the attachment from Aubrey SmithIn the message from Aubrey Smith, tap the message.html attachment and then open the attachment using the OME Viewer.
- Tap Use a one-time passcodeIn the OME Viewer, review the encrypted message. Tap Use a one-time passcode.
Wait for the new reference code page to open. - Switch to your email applicationSwitch to your email application.
- Tap the message from Microsoft Office 365Tap the message from Microsoft Office 365.
- Write down or copy the PasscodeIn the message, locate and write down or copy the Passcode.
- Switch to the OME ViewerSwitch to the OME Viewer.
- Type or paste the Passcode then tap ContinueIn the Passcode box, type or paste the passcode and then tap Continue.
- Review the encrypted messageReview the encrypted message from Aubrey Smith.
- Add Garret Vargas’ email accountOn your device, using the device’s email app or if you have the Outlook app installed, add Garret Vargas’ email account. Use the information available in the knowledge feature[Bulb in Head] icon.User name: GarretV@yourtenantname.onmicrosoft.com
Password: Pa$$w0rd
Server: outlook.office365.com - Open the message from Microsoft OutlookOnce the account is configured, in the Inbox, open the message from Microsoft Outlook.
- Read the message and tap EnrollRead the message and tap Enroll.
- Begin the enrollment processComplete the procedure your device uses to begin the enrollment process.
- Read the page and then tap Get the appIn the web browser, read the page and then tap Get the app. If you have already installed the Microsoft Intune app, you will not be prompted to install.
- Complete the app retrieval and installationComplete the app retrieval and installation using your devices app store.
- Open the Intune Company Portal appOpen the Intune Company Portal app.
- Tap Sign inOn the Company Portal page, read the information and then tap Sign in.
- Sign in as Garret VargasOn the Intune Company Portal page, sign in as GarretV@yourtenantname.onmicrosoft.com with a password or Pa$$w0rd
- Tap EnrollOn the Device Enrollment page, read the information and then tap Enroll.
- Tap ActivateOn the Company Portal page, review the information and then tap Activate.
- If necessary create a lock screen PINIf necessary, create a lock screen PIN that is at least four characters long. This is the minimum requirement used in the creation of the device security policy created earlier.
- Complete the enrollmentComplete the enrollment of your device by completing the onscreen prompts.
- Switch to CLIENT01 and Office 365 admin centerSwitch to CLIENT01 and the Office 365 admin center.If necessary, sign in to http://portal.office.com using your tenant administrator user name and password.
- Open a new tab and browse to Windows IntuneOpen a new tab and then browse to https://manage.microsoft.com
- In the navigation menu, click GroupsIn the navigation menu, click Groups.
- Under Groups, click All DevicesUnder Groups, click All Devices.
- Click the device for Garret VargasIn the mobile devices list, click the device for Garret Vargas.
- Review the informationReview the information in the details pane. Some actions may not be available immediately for the device.
If available, click Selective wipe. - Read the wipe information then click NoIn the Warning dialog box, read the selective wipe information and then click No.
- On your mobile device, tap the MY DEVICES tabOn your mobile device, in the Company Portal app, tap the MY DEVICES tab.
- In the list, tap your deviceIn the list, tap your device.
- Tap Check ComplianceReview the information and then tap Check Compliance.
- Review compliance detailsIf there are any compliance issues, review the compliance details.
Exercise 7: Using Advanced Threat Protection
In this exercise, you will configure the safe attachments and safe links rules in the advanced threat protection feature of Exchange Online.
- On CLIENT01 switch to OutlookOn CLIENT01, switch to Internet Explorer and Outlook on the web.
- Switch to the Office Admin center tab.Close the Mail tab and then switch to the Office Admin center tab.
- Click ExchangeIn the navigation menu, under Admin centers, click Exchange.
- Under advanced threats, click safe attachmentsOn the dashboard, under advanced threats, click safe attachments.
- Click New+On the safe attachments tab, on the toolbar, click New +.
- Name the new safe attachments policyIn the new safe attachments policy window, in the Name box, type Replace Suspect Attachments.
- Click ReplaceUnder Safe attachments unknown malware response, review the information and then click Replace.
- Select Enable redirectUnder Redirect attachment on detection, review the information and then select the Enable redirect check box.
- Send the attachment to your tenant administratorIn the Send the attachment to the following email address box, type your tenant administrator email address.
- Click The recipient domain isUnder Applied To, review the information, click the Select one menu, and then click The recipient domain is.
- Click your tenant domain nameIn the domain selection window, click your tenant domain name, click add and then click OK.
- Click SaveClick Save.
- Click the safe links tabIn the Exchange admin center, click the safe links tab.
- Click New +On the toolbar, click New +.
- Name the new policy "Test safe links"On the new safe links policy page, in the Name box, type Test safe links.
- Click OnUnder Select the action for unknown potentially malicious URLs in messages, click On.
- Select the Do not allow users to clickSelect the Do not allow users to click through to original URL check box.
- Click The recipient domain isScroll down and, under Applied To, click the Select one menu, and then click The recipient domain is.
- Click your tenant domain nameIn the domain window, click your tenant domain name, click add, and then click OK.
- Click SaveOn the new safe links policy page, click Save.
- Sign in to an accessible email accountTasks 21 to 33 test the safe links policy. These tasks are optional. Sign in to an email account that you have access to. You can use the virtual environment to sign into a web accessible email account or use your mobile device.
- Create a new email to Aubrey SmithCreate a new email to AubreyS@yourtenantdomainname
- Type a subject for the emailIn the Subject box, type Testing spam link.
- Type a specific message for the emailIn the message body, type Here’s a link to test http://www.spamlink.contoso.com Depending on your email client, you may have to perform additional steps to configure the address as a hyperlink.
- Click SendSend the message.
- If necessary, switch to CLIENT01If necessary, switch to CLIENT01.
- Open a new InPrivate browser windowOn CLIENT01, in Internet Explorer, press Ctrl+Shift+P to open a new InPrivate browser window.
- Browse to http://outlook.office.comIn the InPrivate browser window, browse to http://outlook.office.com
- Sign in as Aubrey SmithSign in as AubreyS@yourtenantdomainname with a password of Pa$$w0rd For example: AubreyS@contoso.onmicrosoft.com
- Click the email you sent to Aubrey SmithIn the Inbox, click the email you sent to Aubrey Smith.
- Pause the mouse pointer over the linkIn the reading pane, move the mouse pointer and pause over the www.spamlink.contoso.com link. In the lower left corner of Internet Explorer, notice the URL that the link in the email will be directed to.
- Click the www.spamlink.contoso.com linkIn the reading pane, click www.spamlink.contoso.com
- Review the message from Office 365In the Internet Explorer tab, review the message from Office 365.
- Close the InPrivate window and all tabsClose the InPrivate Internet Explorer window and all tabs.
- On the toolbar, click the Reports menuIn the Exchange admin center, on the safe links tab, on the toolbar, click the Reports menu.The Advanced Threat Protection (ATP) reports reviewed in this task will not likely contain any content due to the short period of activity during the lab
- Click ATP by DispositionClick Advanced Threat Protection by Disposition.
Wait for the report to be created. If the report is not created, close the window and click the report again. - Review the available reportReview the available report and notice the Disposition by ATP selections that are available.
- Click View tableIn the report, click View table.
- Review the informationReview the information that can be made available
- Click closeClick close.
- Click the View pending or completed requestsClick the View pending or completed requests.
- Review the informationReview the information that can be provided.
- Click CloseClick Close
- Close the ATP detection message windowClose the Advanced threat protection detection message dispositions window.
- On the toolbar, click the Reports menuOn the safe links tab, on the toolbar, click the Reports menu
- Click ATP File TypesClick Advanced Threat Protection File Types.
- Review the available reportReview the available report and notice the Attachment types selections that are available.
- Review the additional areasReview the additional areas of the report.
- Close the ATP windowClose the Advanced threat protection detection file types window.
Exercise 8: Auditing in Office 365
In this exercise, you will enable different auditing features in Office 365 and then review the available reports that can be helpful to the Office 365 organization’s administrators.
- Switch to the Office admin center tabIn Internet Explorer, switch to the Office admin center tab.
- If necessary, close the Mail windowIf necessary, close the Mail window.
- Under Admin centers, click Security & ComplianceIn the navigation menu, under Admin centers, click Security & Compliance.
- In the navigation menu, click ReportsIn the Security & Compliance Center, in the navigation menu, click Reports.
- Under Reports, click View reportsUnder Reports, click View reports.
- Click Office 365 audit log reportUnder Auditing, click Office 365 audit log report.
- Click Start recording user and admin activitiesOn the Audit log search page, under Audit log search, click Start recording user and admin activities.
- Click Turn onIn the Start recording user and admin activities dialog box, read the information and then click Turn on.
Wait for the organization settings to be updated.
Activity search content is not available immediately.
The remaining steps are used to familiarize you with the search options. - Click the Show results for all activities menuIn the Audit log search window, under Activities, click the Show results for all activities menu.
- Review the available auditing activitiesIn the Activities list, scroll down and review the available activities that can be selected for auditing. Multiple items can be selected.
- Close the Activities listClick an open area on the page to close the Activities list.
- Review the remainder of the log search filtersReview the remainder of the log search filters.Logs for the activities in this lab will not have been reported in the audit log. If log collection had been enabled, you would be able to create reports for the activities performed against your Office 365 organization.
- Switch to Windows PowerShellOn CLIENT01, switch to Windows PowerShell.
This should still be connected to Exchange Online using remote PowerShell.To save time, you can use the Type Text [A] icon whenever it is available to automatically type Windows PowerShell commands instead of typing. The Type Text feature is located to the left of the Done button in the task view screen. To use it, make sure the Windows PowerShell window is in the foreground, then click the icon. Review the text, and then press Enter to run the command. - Review Garret Vargas’ mailboxAt the Windows PowerShell command prompt, type the following and then press Enter:
Get-Mailbox GarretV | FL Audit*
Review the output of the command. - Enable auditingAt the Windows PowerShell command prompt, type the following and then press Enter:
Set-Mailbox -Identity GarretV -AuditOwner MailboxLogin,HardDelete -AuditLogAgeLimit 120 -AuditEnabled $True - Review Garret Vargas’ mailboxAt the Windows PowerShell command prompt, type the following and then press Enter:
Get-Mailbox GarretV | FL Audit*
Review the updated audit settings for the mailbox. - Remove the PowerShell SessionAt the Windows PowerShell command prompt, type the following and then press Enter:
Get-PSSession | Remove-PSSessionIt is not required to remove the open PowerShell session, however, it is good practice to close sessions when no longer in use. - Close Windows PowerShellClose Windows PowerShell.
- Switch to the Security & Compliance centerSwitch to Internet Explorer and the Security & Compliance center.
- In the navigation menu, click View reportsIn the navigation menu, under Reports, click View reports.
- Click Exchange audit reportsUnder Auditing, click Exchange audit reports.
- Run the admin audit log reportReview the available reports and then click Run the admin audit log report.
- Review the cmdletsIn the Search to view configuration changes window, wait for the search to complete and then review the currently logged cmdlets.
- Click CloseClick Close.
- Close the Audit Reports windowClose the Audit Reports window.
2 comments:
Microsoft Office 365 Software in UAE, Personal Software in UAE, 1-Year Subscription Software in UAE
https://gccgamers.com/microsoft-365.html
Microsoft Office 365 in UAE, Safe Shopping Multiple Payment Options Express Delivery GCC Gamers Moneyback Guarantee.
1634523900628-10
Thank you for sharing such a useful article. I had a great time. This article was fantastic to read. Continue to publish more articles on, keep it up. SharePoint: Configure Navigation Links to Open in a New Tab
Post a Comment