UMGC Information Technology Leadership Presentation

User Generated

pbfgnobl

Engineering

University of Maryland Global Campus

Description

Objective

Create a presentation to demonstrate the capabilities of security and compliance of M365.
Deliverable
The presentation must meet the following requirements:
?11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is
Information Technology leadership.
?voice annotation for every slide (excluding the reference slide)
?at least two references
The presentation can incorporate screenshots from Project 1 and Project 2 along with additional
screenshots as needed. Content should include all the concepts of Project 1 and Project 2 deliverable,
Cloud App Security, Mobile Device Management, Multi-Factor Authentication, Zero Trust, Microsoft
Information Protection, and Data Governance.
At a minimum, the presentation should address your recommendations for the following items:
?M365 Services
?Key Policies
?Zero Trust Concepts
?MFA
?Mobile Device Management
?Cloud App Security
Resources:
Presentation Resources (umgc.edu)

Unformatted Attachment Preview

Creating a M365 Tenant and Privileged Identity Management (PIM) Prepared by: [Vulugho Temaah Valentine] Objective Create a test Microsoft 365 tenant for KCoder and prepare for Privileged Identity Management. The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted and all screenshots must include current data and time. Task 1: Create a Microsoft 365 Tenant • Step 9: Azure AD Account Task 2: Create Users in Azure AD • Step 2: Bulk Users in Azure AD Task 3: License Assignment in Azure AD • Step 2: License Assignment via Group Task 4: Enable Information Rights Management (IRM) for SharePoint Online • Step 5: IRM verification Task 5: Privilege Identity Management (PIM) • Step 11: PIM Role Setting verification Opportunity: Benefits of PIM Explain what would happen if Pam North was assigned to the Global Admin Role. Based on your readings and research, explain why KCoder would benefit from implementing PIM. Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft Intune. If Pam North is given the access, Pam will be able to manage, control and monitor access to important resources in the Organization. Resources Bulk create users in the Azure Active Directory portal | Microsoft Docs Assign licenses to a group - Azure Active Directory | Microsoft Docs References These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate. [1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available: https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020]. Microsoft 365 Threat Intelligence Prepared by: [Vulugho Temaah Valentine] Objective Demonstrate various security and compliance features of M365 for KCoder. The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted and all screenshots must include current data and time. Task 1: Implement a Safe Attachments Policy • Step 12: Safe Attachments Policy Task 2: Implement a Safe Link Policy • Step 11: Safe Link Policy Task 3: Create Anti-phishing Policy • Step 3: Anti-phishing policy Task 4: Create a Malware Policy • Step 3: Malware policy Task 5: Attack Simulator – Spear Phishing • • Step 10: Spear Phishing Simulation Step 16: Credential Harvest Task 6: Data Loss Prevention • Step 9: Data loss prevention Opportunity: Zero-Trust Most of the breaches occur due to credential theft that bad actors exploit using various different methods. In two to three paragraphs, discuss the different M365 services that can deter bad actors. Research and explain the concept of zero-trust. M365 services that can deter bad actors • Office 365 Advanced Threat Protection: Safe Attachments • Office 365 Advanced Threat Protection: Safe Links • Office 365 Advanced Threat Protection: Spoof Intelligence • Office ATP Anti-Phishing Capabilities in Office 365 • Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams Zero Trust Zero Trust is a security framework that requires all users, both inside and outside of an organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data. Explanation: M365 services that can deter bad actors Office 365 Advanced Threat Protection: Safe Attachments The Office 365 Advanced Threat Protection Safe Attachments feature verifies that any email attachments that arrive in your inbox are not malicious. If you have Office 365 Advanced Threat Protection enabled in your Office 365 environment, Safe Attachments automatically opens the file and tests it in a virtual environment that does not affect your real-time environment whenever someone checks an email with an attachment included. If the file is found to be safe, it will open normally. However, if the file is determined to be malicious, it is automatically deleted. Office 365 Advanced Threat Protection: Safe Links Enter Office 365 Advanced Threat Protection Safe Links, which verifies website addresses in email messages and Office documents at the moment of click. When you click on a link in an email that contains a URL, ATP Safe Links will automatically check the URL before opening it. This URL will be classified as either prohibited, malicious, or safe. If the URL is safe, it will open normally without any additional procedures. Instead of exposing your user to the potentially harmful link, it will open a warning page if the URL has been blocked or detected as malicious. When a link within an Office document is clicked, a similar process occurs. Office 365 Advanced Threat Protection: Spoof Intelligence There are occasions when spoofing is important. For example, if you have third-party vendors sending bulk mail on your behalf, or if you've hired an assistant who needs to send emails from another person within your organization, or if you've hired an external company to do lead generation, product updates, or send sales emails that appear to be from you. For these reasons, it's critical not to eliminate spoofing from your company. But how can you be sure that these emails claiming to be from your company are legitimate? More significantly, as phishers frequently utilize spoofing to determine user credentials, how do you ensure that folks spoofing your domain are not phishers? Office ATP Anti-Phishing Capabilities in Office 365 Office 365 Advanced Threat Protection Anti-Phishing uses machine learning models and impersonation detection algorithms to keep your organization safe from potential phishing attacks. Your security team can set up Office 365 ATP's Anti-Phishing to check all your incoming communications for any sign that it could be a phishing attempt using the Anti-Phishing capabilities. Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams Once a file has been identified as harmful, Office 365 Advanced Threat Protection helps to detect and restrict it from entering your document libraries or team sites, as well as locking it and preventing anyone from accessing it once it has been detected as dangerous. The prohibited file will not be able to be opened, moved, copied, or shared, even though it will still appear on your site (but you can delete it). They will also appear on a quarantined objects list, allowing your security team to download, release, report and delete them from the system. Zero Trust Concept Zero Trust is a security framework that requires all users, both inside and outside of an organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data. Resources Bulk create users in the Azure Active Directory portal | Microsoft Docs Assign licenses to a group - Azure Active Directory | Microsoft Docs References These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate. [1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available: https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020]. Management Presentation Prepared by: [insert your name] Objective Create a presentation to demonstrate the capabilities of security and compliance of M365. Deliverable The presentation must meet the following requirements: • • • 11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is Information Technology leadership. voice annotation for every slide (excluding the reference slide) at least two references The presentation can incorporate screenshots from Project 1 and Project 2 along with additional screenshots as needed. Content should include all the concepts of Project 1 and Project 2 deliverable, Cloud App Security, Mobile Device Management, Multi-Factor Authentication, Zero Trust, Microsoft Information Protection, and Data Governance. At a minimum, the presentation should address your recommendations for the following items: • • • • • • M365 Services Key Policies Zero Trust Concepts MFA Mobile Device Management Cloud App Security Resources: Presentation Resources (umgc.edu) Chapter & Lessons : Microsoft 365: Mobility and Security (MS-101) [based on Microsoft 365: Mobility and Security (MS-101)] -uCertify 1 Data Loss Prevention Vulugho Temaah Valentine UMGC CMIT 422 Professor Hugg 01/24/2022 2 Data Loss Prevention In the contemporary age when the value for information is constantly increasing, data security and privacy is vital factor of consideration for individuals and organizations. Recent trends depict a constant increase in the volume and complexity of information, which further raises the need for entities to apply stringent measures for effective information management and governance. As such, institutions are mandated with complying proactively with the standardized industry regulations, and other internal policies, reducing the risks associated with litigation and security breaches and enabling the entity to effectively share garnered knowledge, for instance, by ensuring that users only share data that is current and relevant to them. Setting the Landscape Data governance is a requirement, and entities should optimize the benefits that are garnered from Microsoft 365, for market success. A company should begin by evaluating the strategies they leverage in maintaining the security measures and compliance across Microsoft 365 workloads, for instance, the presence or absence of record retention requirements through the corporate and regulatory policies. A data governance suite, encompassing retention and sensitivity labels should be effectively standardized as they are a part of the requisite governance logical structure that is required for optimal data security and privacy (Abraham et al., 2019). It is noteworthy that content retention is largely dependent on the nature of the element, hence different contents require different types of retention, to help them comply with existing policies and regulations. Industries may apply manual, or automatic retention labels. Creating and Configuring Retention Policies Retention policies enable organizations to effectively manage data, for instance, by deciding to retain or delete the content. Leveraging the retention policies entails assigning similar 3 retention settings by default, such as at the container level, such that they are automatically inherited by any content that enters the container. Retention policies are applicable to a range of locations, and professionals have the chance to either apply a single policy to multiple locations, or to a specific location. As outlined, centralizing the retention policies encompasses setting them to be automatically applied to any content that matches specified conditions. As such, workers do not need to apply the respective retention labels since Microsoft 365 helps in performing the task. Notably, auto-applying labels are beneficial, as it reduces the overall costs that could have been used in user training. Besides, organizations do not have to rely on users for task completion and confer users an opportunity to focus on their work, hence increasing their potential for enhanced productivity. Importantly, companies can apply retention labels in data that previously did not have a functional label, and when the nature of the contained information is identified as sensitive. How to ensure that Data Stored in SharePoint must be encrypted Even if the User Dopes Not encrypt it Encryption is a vital attribute in increasing data security when in transit, and at rest. A vast amount of data is managed online, and subsequently stored in the cloud, and servers, while still connected to the web. However, despite its benefits, encryption can be detrimental to corporate performance and outcomes, for instance, when it is used by ransomware to commit crimes. Prior to ensuring data encryption in SharePoint, there are some security measures that entities must be conversant with and adhere to as the preliminary security approaches. They include installing trusted security software for all devices, keeping them up to date, and updating the user’s operating system and other software (Khumalo & Mearns, 2019). Companies should also have a functional data back-up, as it would be instrumental in facilitating data recovery, and 4 consider leveraging the services of the cloud, as they are identified to be effective in mitigating ransomware infections. Users should implement a standard encryption, such as NIST as a preliminary in enhancing encryption in SharePoint and is also useful in protecting disks and backup drives. It is also imperative for users to properly protect encryption keys, for instance, by actualizing dual control and separation of duties. Notable security tips that users must actualize in the platform include using groups to manage users, which could be enhanced by SharePoint’s flexibility. Standard SharePoint security best practices also emphasize the need of using groups, especially when assigning permissions, as this helps in creating a maintainable security model, and increases the ease of removing, or adding users without worrying about specific levels of performance. Users should also avoid using document-level permissions, as it increases the future risk of maintenance failure. It is also noteworthy that SharePoint security best works through inheritance, which cannot be facilitated by item-level permission. It is also important for users to assign one person as admin for each site collection. Implementing SharePoint security practices is a vital approach to improving and enhancing system robustness against potential insider and external threats that could ultimately compromise data security. The encryption process should apply to the data at rest, and when in transit, for instance, during client communication with the server, and the movement of data between the respective datacenters. In present-day society, most organizations are using centralized security servers in enhancing policy administration, and in automating encryption key management. The attribute is responsible for the enforcement of the security policies for documents. This ensures that as information is being uploaded to SharePoint servers, it is immediately encrypted and remains so 5 throughout, such that only users allowed by the centrally managed security policies could access the data. 6 References Abraham, R., Schneider, J., & Vom Brocke, J. (2019). Data governance: A conceptual framework, structured review, and research agenda. International Journal of Information Management, 49, 424-438. Khumalo, S., & Mearns, M. (2019). SharePoint as enabler for collaboration and efficient project knowledge sharing. SA Journal Of Information Management, 21(1). https://doi.org/10.4102/sajim.v21i1.1044 Course Resource Presentation Resources A narrated presentation is for a specific audience to which you would ideally present in person or online in real time, but for practical reasons, you need to record for later viewing. While Microsoft PowerPoint is considered the default presentation tool for presentations, you may consider using other presentation platforms or tools. Just be sure the tool supports prerecorded narration. Preparing for Your Presentation As with any project, it is good to begin by creating an outline. This will help you determine how many slides you will need to develop and how much information you will need to present on each slide. It should also help determine a logical order in which to present material. Be sure to dedicate enough time to the narrated presentation to get the timing for transitions right, and ensure that the sound is clear and the narration is at the right volume. Creating Slides A good recorded presentation shares most of the same traits as a good live presentation. Your presentation should not be an academic paper cut into text-filled slides. You are giving a talk to an audience, so the narrative should provide most of your ideas and argumentation. Be sure the themes either flow or transition appropriately from slide to slide. Here are some recommendations: Keep slides uncluttered by using brief bullet points—only a few key words each. An easy way to make your presentation look more appealing is to use one of the designs provided within PowerPoint. Adding images and/or clip art is another good way to add visual interest to your presentation, but don't overuse slide transitions or animations, as these can be distracting. When you are citing sources of information on a slide, use a small font size so the citations don't detract from the primary points. Be sure to proofread carefully: Any errors on a slide will be particularly noticeable because of the relatively small number of words. When you record audio for each slide, a loudspeaker icon will appear in the middle of the slide. You can drag this icon to a better position (often the bottom right corner of the slide) so it doesn't interfere with the text. Writing the Script The script for your presentation can be a complete word-for-word documentation of what you intend to say as each slide is displayed, or it can be a much briefer set of notes to use as a reminder while you are recording to ensure that you cover all the points. The latter approach is preferable, because this makes it less likely that you will sound rushed or overly scripted when speaking. Keep in mind that if you were making the presentation in person, you would not want to be reading your comments; instead, you would want to make eye contact with the audience. Here are some additional recommendations for your script: Try to keep the amount of narration to less than two minutes per slide. If you need to say more than that, create another slide so the audience doesn't get bored. Make sure the script and what appears on the slide are closely related so the audience can easily follow what you have to say. Don't simply read the material on the slide—add value by providing additional information. Recording the Narration At this point, you have created and saved slides as a PowerPoint presentation, and you have the script ready. Now it's time to record the audio. Here are a few general recommendations before you record: If you are using a computer to record, use a headset/microphone combination rather than using the computer's built-in speakers and microphone for better audio quality. It isn't necessary to spend a lot on a headset/mic (typically $20 or less), and you will be rewarded with better sound quality and less background noise. Make sure the headset/mic is installed and working. There are simple programs on both Macs and PCs that allow you to test whether recording is occurring and whether the sound quality is acceptable. Choose a quiet location to record so that background noise is minimal. When you begin recording, speak clearly and conversationally without rushing. Remember that it's easy to redo the audio for a slide. If you're not happy with the way it sounds, you can do it again. Once you have completed and narrated the presentation, it is a good idea to email the file to another computer. If you are able to watch and listen to the slide show successfully on the second computer, you will know that the audio files have been successfully embedded in the presentation. For Technical Support Below are specific recording instructions for some common tools for presentations: Record a Slide Show With Narration and Slide Timings in PowerPoint (https://support.office.com/en-us/article/record-a-slide-show-with-narration-andslide-timings-0b9502c6-5f6c-40ae-b1e7-e47d8741161c) Getting Started With Microsoft Sway (https://support.office.com/enus/article/getting-started-with-sway-2076c468-63f4-4a89-ae5f-424796714a8a) If you have technical difficulties with using PowerPoint, contact the UMGC 360 Help Desk, available 24/7 http://support.umgc.edu Phone: 1-888-360-UMUC (8682). © 2021 University of Maryland Global Campus All links to external sites were verified at the time of publication. UMGC is not responsible for the validity or integrity of information located at external sites. Creating a M365 Tenant and Privileged Identity Management (PIM) Prepared by: [Vulugho Temaah Valentine] Objective Create a test Microsoft 365 tenant for KCoder and prepare for Privileged Identity Management. The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted and all screenshots must include current data and time. Task 1: Create a Microsoft 365 Tenant • Step 9: Azure AD Account Task 2: Create Users in Azure AD • Step 2: Bulk Users in Azure AD Task 3: License Assignment in Azure AD • Step 2: License Assignment via Group Task 4: Enable Information Rights Management (IRM) for SharePoint Online • Step 5: IRM verification Task 5: Privilege Identity Management (PIM) • Step 11: PIM Role Setting verification Opportunity: Benefits of PIM Explain what would happen if Pam North was assigned to the Global Admin Role. Based on your readings and research, explain why KCoder would benefit from implementing PIM. Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft Intune. If Pam North is given the access, Pam will be able to manage, control and monitor access to important resources in the Organization. Resources Bulk create users in the Azure Active Directory portal | Microsoft Docs Assign licenses to a group - Azure Active Directory | Microsoft Docs References These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate. [1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available: https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020]. Microsoft 365 Threat Intelligence Prepared by: [Vulugho Temaah Valentine] Objective Demonstrate various security and compliance features of M365 for KCoder. The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted and all screenshots must include current data and time. Task 1: Implement a Safe Attachments Policy • Step 12: Safe Attachments Policy Task 2: Implement a Safe Link Policy • Step 11: Safe Link Policy Task 3: Create Anti-phishing Policy • Step 3: Anti-phishing policy Task 4: Create a Malware Policy • Step 3: Malware policy Task 5: Attack Simulator – Spear Phishing • • Step 10: Spear Phishing Simulation Step 16: Credential Harvest Task 6: Data Loss Prevention • Step 9: Data loss prevention Opportunity: Zero-Trust Most of the breaches occur due to credential theft that bad actors exploit using various different methods. In two to three paragraphs, discuss the different M365 services that can deter bad actors. Research and explain the concept of zero-trust. M365 services that can deter bad actors • Office 365 Advanced Threat Protection: Safe Attachments • Office 365 Advanced Threat Protection: Safe Links • Office 365 Advanced Threat Protection: Spoof Intelligence • Office ATP Anti-Phishing Capabilities in Office 365 • Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams Zero Trust Zero Trust is a security framework that requires all users, both inside and outside of an organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data. Explanation: M365 services that can deter bad actors Office 365 Advanced Threat Protection: Safe Attachments The Office 365 Advanced Threat Protection Safe Attachments feature verifies that any email attachments that arrive in your inbox are not malicious. If you have Office 365 Advanced Threat Protection enabled in your Office 365 environment, Safe Attachments automatically opens the file and tests it in a virtual environment that does not affect your real-time environment whenever someone checks an email with an attachment included. If the file is found to be safe, it will open normally. However, if the file is determined to be malicious, it is automatically deleted. Office 365 Advanced Threat Protection: Safe Links Enter Office 365 Advanced Threat Protection Safe Links, which verifies website addresses in email messages and Office documents at the moment of click. When you click on a link in an email that contains a URL, ATP Safe Links will automatically check the URL before opening it. This URL will be classified as either prohibited, malicious, or safe. If the URL is safe, it will open normally without any additional procedures. Instead of exposing your user to the potentially harmful link, it will open a warning page if the URL has been blocked or detected as malicious. When a link within an Office document is clicked, a similar process occurs. Office 365 Advanced Threat Protection: Spoof Intelligence There are occasions when spoofing is important. For example, if you have third-party vendors sending bulk mail on your behalf, or if you've hired an assistant who needs to send emails from another person within your organization, or if you've hired an external company to do lead generation, product updates, or send sales emails that appear to be from you. For these reasons, it's critical not to eliminate spoofing from your company. But how can you be sure that these emails claiming to be from your company are legitimate? More significantly, as phishers frequently utilize spoofing to determine user credentials, how do you ensure that folks spoofing your domain are not phishers? Office ATP Anti-Phishing Capabilities in Office 365 Office 365 Advanced Threat Protection Anti-Phishing uses machine learning models and impersonation detection algorithms to keep your organization safe from potential phishing attacks. Your security team can set up Office 365 ATP's Anti-Phishing to check all your incoming communications for any sign that it could be a phishing attempt using the Anti-Phishing capabilities. Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams Once a file has been identified as harmful, Office 365 Advanced Threat Protection helps to detect and restrict it from entering your document libraries or team sites, as well as locking it and preventing anyone from accessing it once it has been detected as dangerous. The prohibited file will not be able to be opened, moved, copied, or shared, even though it will still appear on your site (but you can delete it). They will also appear on a quarantined objects list, allowing your security team to download, release, report and delete them from the system. Zero Trust Concept Zero Trust is a security framework that requires all users, both inside and outside of an organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data. Resources Bulk create users in the Azure Active Directory portal | Microsoft Docs Assign licenses to a group - Azure Active Directory | Microsoft Docs References These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate. [1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available: https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020]. Management Presentation Prepared by: [insert your name] Objective Create a presentation to demonstrate the capabilities of security and compliance of M365. Deliverable The presentation must meet the following requirements: • • • 11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is Information Technology leadership. voice annotation for every slide (excluding the reference slide) at least two references The presentation can incorporate screenshots from Project 1 and Project 2 along with additional screenshots as needed. Content should include all the concepts of Project 1 and Project 2 deliverable, Cloud App Security, Mobile Device Management, Multi-Factor Authentication, Zero Trust, Microsoft Information Protection, and Data Governance. At a minimum, the presentation should address your recommendations for the following items: • • • • • • M365 Services Key Policies Zero Trust Concepts MFA Mobile Device Management Cloud App Security Resources: Presentation Resources (umgc.edu) Chapter & Lessons : Microsoft 365: Mobility and Security (MS-101) [based on Microsoft 365: Mobility and Security (MS-101)] -uCertify Course Resource Presentation Resources A narrated presentation is for a specific audience to which you would ideally present in person or online in real time, but for practical reasons, you need to record for later viewing. While Microsoft PowerPoint is considered the default presentation tool for presentations, you may consider using other presentation platforms or tools. Just be sure the tool supports prerecorded narration. Preparing for Your Presentation As with any project, it is good to begin by creating an outline. This will help you determine how many slides you will need to develop and how much information you will need to present on each slide. It should also help determine a logical order in which to present material. Be sure to dedicate enough time to the narrated presentation to get the timing for transitions right, and ensure that the sound is clear and the narration is at the right volume. Creating Slides A good recorded presentation shares most of the same traits as a good live presentation. Your presentation should not be an academic paper cut into text-filled slides. You are giving a talk to an audience, so the narrative should provide most of your ideas and argumentation. Be sure the themes either flow or transition appropriately from slide to slide. Here are some recommendations: Keep slides uncluttered by using brief bullet points—only a few key words each. An easy way to make your presentation look more appealing is to use one of the designs provided within PowerPoint. Adding images and/or clip art is another good way to add visual interest to your presentation, but don't overuse slide transitions or animations, as these can be distracting. When you are citing sources of information on a slide, use a small font size so the citations don't detract from the primary points. Be sure to proofread carefully: Any errors on a slide will be particularly noticeable because of the relatively small number of words. When you record audio for each slide, a loudspeaker icon will appear in the middle of the slide. You can drag this icon to a better position (often the bottom right corner of the slide) so it doesn't interfere with the text. Writing the Script The script for your presentation can be a complete word-for-word documentation of what you intend to say as each slide is displayed, or it can be a much briefer set of notes to use as a reminder while you are recording to ensure that you cover all the points. The latter approach is preferable, because this makes it less likely that you will sound rushed or overly scripted when speaking. Keep in mind that if you were making the presentation in person, you would not want to be reading your comments; instead, you would want to make eye contact with the audience. Here are some additional recommendations for your script: Try to keep the amount of narration to less than two minutes per slide. If you need to say more than that, create another slide so the audience doesn't get bored. Make sure the script and what appears on the slide are closely related so the audience can easily follow what you have to say. Don't simply read the material on the slide—add value by providing additional information. Recording the Narration At this point, you have created and saved slides as a PowerPoint presentation, and you have the script ready. Now it's time to record the audio. Here are a few general recommendations before you record: If you are using a computer to record, use a headset/microphone combination rather than using the computer's built-in speakers and microphone for better audio quality. It isn't necessary to spend a lot on a headset/mic (typically $20 or less), and you will be rewarded with better sound quality and less background noise. Make sure the headset/mic is installed and working. There are simple programs on both Macs and PCs that allow you to test whether recording is occurring and whether the sound quality is acceptable. Choose a quiet location to record so that background noise is minimal. When you begin recording, speak clearly and conversationally without rushing. Remember that it's easy to redo the audio for a slide. If you're not happy with the way it sounds, you can do it again. Once you have completed and narrated the presentation, it is a good idea to email the file to another computer. If you are able to watch and listen to the slide show successfully on the second computer, you will know that the audio files have been successfully embedded in the presentation. For Technical Support Below are specific recording instructions for some common tools for presentations: Record a Slide Show With Narration and Slide Timings in PowerPoint (https://support.office.com/en-us/article/record-a-slide-show-with-narration-andslide-timings-0b9502c6-5f6c-40ae-b1e7-e47d8741161c) Getting Started With Microsoft Sway (https://support.office.com/enus/article/getting-started-with-sway-2076c468-63f4-4a89-ae5f-424796714a8a) If you have technical difficulties with using PowerPoint, contact the UMGC 360 Help Desk, available 24/7 http://support.umgc.edu Phone: 1-888-360-UMUC (8682). © 2021 University of Maryland Global Campus All links to external sites were verified at the time of publication. UMGC is not responsible for the validity or integrity of information located at external sites. Project 1: Creating a new Microsoft 365 Tenant Guide Before you can create a tenant, you need an email account. It is best to create a free Outlook account at https://outlook.live.com/owa/ Name the account: firstnameInitial.lastnameUMGC422@outlook.com (i.e. JSmithUMGC422@outlook.com) Task 1 – Create a Microsoft 365 Tenant • Step 1: Go to https://products.office.com/en-us/business/office-365-enterprise-e5business-software and click on Free Trial • Step 2: Set up your account o Use the email account created in Step 1. • Step 3: Tell us about yourself o Enter you First and Last Name o Enter 8008888682 for Business Phone o Enter Your First and Last Name for a Company Name o Select 25-49 for Company size o Check to see if the US is selected for Country or Region • Step 4: Verification/Tell us about yourself o Enter a real phone number for verification. Note: This is for verification and it will not be used for any other purpose. • Step 5: Create your business identity o Enter your first name, last name, and UMGC. If the domain is unavailable use a number after your last name. You need to record the name for future reference. • Step 6: Create a user ID and Password for the tenant. This becomes your Global Admin account so be sure to write it down in a safe place. o Use your first name initial and last name. i.e. jsmith o Create a password that you will remember. o Leave the box unchecked for sharing information. • Step 7: Finish Installation. o • Click go to setup. It will take you to https://portal.office.com If you get an Office setup screen, exit the setup Step 8: Microsoft 365 Admin Center o Click show all to see all the admin centers and go to Azure Active Directory • Step 9: Azure Active Directory Account o Verify that the account is present and take a screenshot. Paste the screenshot in the Task 1 – Step 9 of the Project 1 Deliverable document. • Step 10: Start Enterprise Mobility + Security E5 Trial o Click on Azure Active Directory in the left pane and select Licenses o Click on All products, Try/Buy, expand Enterprise Mobility + Security E5. Click on the Activate button o o Logout and login again with the account you created in Step 6. You should now see your EMS E5 licenses under all products Task 2: Create Users in Azure AD • • Step 1: Create the following user accounts in Azure AD using bulk creation process. o Julia Childs o Nate Huang o Chad Walters o Pam North o Jeff Wilson o Nick Mullens o Tyler Gurley o Jerick Coleman o Carla Watson o Richie James Step 2: Once all users are created, take a screenshot of all users showing current date and time. Paste the screenshot in the Task 2 – Step 2 of the Project 1 Deliverable document. Bulk create users in the Azure Active Directory portal | Microsoft Docs Task 3: Assign Office 365 & EMS E5 License • • Step 1: Assign all users the Office 365 and Enterprise Mobility + Security E5 licenses based on a Group. Step 2: Show the group and the license assignment. Take screenshot of the group and the license assignment and paste both screenshots in Task 3 – Step 2 of the Project 1 Deliverable document. Assign licenses to a group - Azure Active Directory | Microsoft Docs Task 4: Enable Information Rights Management (IRM) for SharePoint Online • Step 1: In the Microsoft 365 admin center (https://admin.microsoft.com), select Show all (if necessary) in the left-hand navigation pane to see all the navigation options. Under Admin centers, select SharePoint. This will open the SharePoint admin center. • Step 2: In the SharePoint admin center, in the left-hand navigation pane, select Settings. • Step 3: At the bottom of the Settings page is a sentence that says Can’t find the setting you’re looking for? Go to the classic settings page. In this sentence, select the hyperlinked text: classic settings page. • Step 4: On the classic Settings page, scroll down to the Information Rights Management (IRM) section, select the Use the IRM service specified in your configuration option, and then select the Refresh IRM Settings button. • Step 5: This will return you to the top of the Settings page. You must scroll to the bottom of the page to select the OK button. In doing so, when you get to the Information Rights Management (IRM) section, verify the Use the IRM service specified in your configuration option is selected and a We successfully refreshed your settings message appears below the Refresh IRM Settings button. Take a screenshot and paste it in the Task 4 – Step 5 of the Project 1 Deliverable document. Task 5: Privilege Identity Management (PIM) • Step 1: In your browser, select the Microsoft 365 admin center tab. In the left-hand navigation pane under the Admin centers section, select Azure Active Directory • Step 2: In the Azure Active Directory admin center, in the left-hand navigation pane, select All services. • Step 3: In the All services window, the services are separated into three sections - General, Identity, and Services. Under the Identity section, select Azure AD Privileged Identity Management. • Step 4: In the Privileged Identity Management | Quick start window, note how the window is divided into three parts - the navigation pane on the left, the middle pane (which provides navigation options for this page), and the detail pane on the right. • Step 5: In the middle pane under the Manage section, select Azure AD roles. • Step 6: In the Quick start window, in the middle pane under the Manage section, select Settings. • Step 7: In the Settings window, select the Global Administrator role. • Step 8: In the Role setting details - Global Administrator window, select Edit on the menu bar at the top of the page. • Step 9: In the Edit role setting - Global Administrator window, select the Require Approval to activate check box. • Step 10: In the Select approver(s) section, no specific approver has been selected. Your admin account should be the approver for this role, assign yourself as the approver for this role, so select this section. In the Select a member pane that opens on the right, scroll down through the list of users and select your admin account, and then select the Select button. • Step 11: In the Edit role setting - Global Administrator window, select Update. Take a screenshot and paste it in the Task 5 – Step 6 of the Project 1 Deliverable document. Resources: https://www.ucertify.com/?func=video&type=ebook https://www.youtube.com/watch?v=_gLDEbka-3Y
Purchase answer to see full attachment
Explanation & Answer:
10 Slides
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.Find the attached outline and Presentation in response to your assignment requirements.

An Outline for Data Loss Prevention using Microsoft 365
This project provides a step-by-step process for setting up data loss prevention policies in an
organization using Microsoft 365. Each slide provides information regarding the procedure of
setting up various policies. The screenshots of the final step of each process are attached for
illustration purposes. These slides follow the format shown below:
Slide 1: The project title and student’s personal information.
Slide 2: Setting up Microsoft 365 tenant and Customizing your Organization.
Slide 3: Creating a Microsoft 365 Tenant and Privileged Identity Management (PIM)
Task 1: Create Microsoft 365 Tenant
Slide 4: Task 2: Creating Users in Azure
Slide 5: Task 3: Assign Office 365 & EMS E5 License
Slide 6: Task 4: Enable Information Rights Management (IRM) for SharePoint Online
Slide 7: Task 5: Privilege Identity Management (PIM)
Slide 8: Microsoft 365 Threat Intelligence
Task 1: Impl...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags