Creating a M365 Tenant and
Privileged Identity
Management (PIM)
Prepared by:
[Vulugho Temaah Valentine]
Objective
Create a test Microsoft 365 tenant for KCoder and prepare for Privileged Identity Management.
The recommended format is to provide screenshots incorporated within the written narrative. No
external sources are required for this phase of the project; however, the screenshots must be your
own. Screenshots from external sources are not permitted and all screenshots must include current
data and time.
Task 1: Create a Microsoft 365 Tenant
•
Step 9: Azure AD Account
Task 2: Create Users in Azure AD
•
Step 2: Bulk Users in Azure AD
Task 3: License Assignment in Azure AD
•
Step 2: License Assignment via Group
Task 4: Enable Information Rights Management (IRM) for SharePoint Online
•
Step 5: IRM verification
Task 5: Privilege Identity Management (PIM)
•
Step 11: PIM Role Setting verification
Opportunity: Benefits of PIM
Explain what would happen if Pam North was assigned to the Global Admin Role. Based on your
readings and research, explain why KCoder would benefit from implementing PIM.
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to
manage, control, and monitor access to important resources in your organization. These resources
include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft
Intune. If Pam North is given the access, Pam will be able to manage, control and monitor access to
important resources in the Organization.
Resources
Bulk create users in the Azure Active Directory portal | Microsoft Docs
Assign licenses to a group - Azure Active Directory | Microsoft Docs
References
These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as
appropriate.
[1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020].
Microsoft 365 Threat
Intelligence
Prepared by:
[Vulugho Temaah Valentine]
Objective
Demonstrate various security and compliance features of M365 for KCoder.
The recommended format is to provide screenshots incorporated within the written narrative. No
external sources are required for this phase of the project; however, the screenshots must be your
own. Screenshots from external sources are not permitted and all screenshots must include current
data and time.
Task 1: Implement a Safe Attachments Policy
•
Step 12: Safe Attachments Policy
Task 2: Implement a Safe Link Policy
•
Step 11: Safe Link Policy
Task 3: Create Anti-phishing Policy
•
Step 3: Anti-phishing policy
Task 4: Create a Malware Policy
•
Step 3: Malware policy
Task 5: Attack Simulator – Spear Phishing
•
•
Step 10: Spear Phishing Simulation
Step 16: Credential Harvest
Task 6: Data Loss Prevention
•
Step 9: Data loss prevention
Opportunity: Zero-Trust
Most of the breaches occur due to credential theft that bad actors exploit using various different
methods. In two to three paragraphs, discuss the different M365 services that can deter bad actors.
Research and explain the concept of zero-trust.
M365 services that can deter bad actors
•
Office 365 Advanced Threat Protection: Safe Attachments
•
Office 365 Advanced Threat Protection: Safe Links
•
Office 365 Advanced Threat Protection: Spoof Intelligence
•
Office ATP Anti-Phishing Capabilities in Office 365
•
Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams
Zero Trust
Zero Trust is a security framework that requires all users, both inside and outside of an organization's
network, to be authenticated, authorized, and continuously validated for security configuration and
posture before being granted or maintaining access to applications and data.
Explanation:
M365 services that can deter bad actors
Office 365 Advanced Threat Protection: Safe Attachments
The Office 365 Advanced Threat Protection Safe Attachments feature verifies that any email
attachments that arrive in your inbox are not malicious. If you have Office 365 Advanced Threat
Protection enabled in your Office 365 environment, Safe Attachments automatically opens the file and
tests it in a virtual environment that does not affect your real-time environment whenever someone
checks an email with an attachment included. If the file is found to be safe, it will open normally.
However, if the file is determined to be malicious, it is automatically deleted.
Office 365 Advanced Threat Protection: Safe Links
Enter Office 365 Advanced Threat Protection Safe Links, which verifies website addresses in email
messages and Office documents at the moment of click. When you click on a link in an email that
contains a URL, ATP Safe Links will automatically check the URL before opening it. This URL will be
classified as either prohibited, malicious, or safe. If the URL is safe, it will open normally without any
additional procedures. Instead of exposing your user to the potentially harmful link, it will open a
warning page if the URL has been blocked or detected as malicious. When a link within an Office
document is clicked, a similar process occurs.
Office 365 Advanced Threat Protection: Spoof Intelligence
There are occasions when spoofing is important. For example, if you have third-party vendors sending
bulk mail on your behalf, or if you've hired an assistant who needs to send emails from another person
within your organization, or if you've hired an external company to do lead generation, product updates,
or send sales emails that appear to be from you. For these reasons, it's critical not to eliminate spoofing
from your company. But how can you be sure that these emails claiming to be from your company are
legitimate? More significantly, as phishers frequently utilize spoofing to determine user credentials, how
do you ensure that folks spoofing your domain are not phishers?
Office ATP Anti-Phishing Capabilities in Office 365
Office 365 Advanced Threat Protection Anti-Phishing uses machine learning models and impersonation
detection algorithms to keep your organization safe from potential phishing attacks. Your security team
can set up Office 365 ATP's Anti-Phishing to check all your incoming communications for any sign that it
could be a phishing attempt using the Anti-Phishing capabilities.
Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams
Once a file has been identified as harmful, Office 365 Advanced Threat Protection helps to detect and
restrict it from entering your document libraries or team sites, as well as locking it and preventing
anyone from accessing it once it has been detected as dangerous. The prohibited file will not be able to
be opened, moved, copied, or shared, even though it will still appear on your site (but you can delete it).
They will also appear on a quarantined objects list, allowing your security team to download, release,
report and delete them from the system.
Zero Trust Concept
Zero Trust is a security framework that requires all users, both inside and outside of an organization's
network, to be authenticated, authorized, and continuously validated for security configuration and
posture before being granted or maintaining access to applications and data.
Resources
Bulk create users in the Azure Active Directory portal | Microsoft Docs
Assign licenses to a group - Azure Active Directory | Microsoft Docs
References
These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as
appropriate.
[1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020].
Management Presentation
Prepared by:
[insert your name]
Objective
Create a presentation to demonstrate the capabilities of security and compliance of M365.
Deliverable
The presentation must meet the following requirements:
•
•
•
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is
Information Technology leadership.
voice annotation for every slide (excluding the reference slide)
at least two references
The presentation can incorporate screenshots from Project 1 and Project 2 along with additional
screenshots as needed. Content should include all the concepts of Project 1 and Project 2 deliverable,
Cloud App Security, Mobile Device Management, Multi-Factor Authentication, Zero Trust, Microsoft
Information Protection, and Data Governance.
At a minimum, the presentation should address your recommendations for the following items:
•
•
•
•
•
•
M365 Services
Key Policies
Zero Trust Concepts
MFA
Mobile Device Management
Cloud App Security
Resources:
Presentation Resources (umgc.edu)
Chapter & Lessons : Microsoft 365: Mobility and Security (MS-101) [based on Microsoft 365: Mobility
and Security (MS-101)] -uCertify
1
Data Loss Prevention
Vulugho Temaah Valentine
UMGC
CMIT 422
Professor Hugg
01/24/2022
2
Data Loss Prevention
In the contemporary age when the value for information is constantly increasing, data
security and privacy is vital factor of consideration for individuals and organizations. Recent
trends depict a constant increase in the volume and complexity of information, which further
raises the need for entities to apply stringent measures for effective information management and
governance. As such, institutions are mandated with complying proactively with the standardized
industry regulations, and other internal policies, reducing the risks associated with litigation and
security breaches and enabling the entity to effectively share garnered knowledge, for instance,
by ensuring that users only share data that is current and relevant to them.
Setting the Landscape
Data governance is a requirement, and entities should optimize the benefits that are
garnered from Microsoft 365, for market success. A company should begin by evaluating the
strategies they leverage in maintaining the security measures and compliance across Microsoft
365 workloads, for instance, the presence or absence of record retention requirements through
the corporate and regulatory policies. A data governance suite, encompassing retention and
sensitivity labels should be effectively standardized as they are a part of the requisite governance
logical structure that is required for optimal data security and privacy (Abraham et al., 2019). It
is noteworthy that content retention is largely dependent on the nature of the element, hence
different contents require different types of retention, to help them comply with existing policies
and regulations. Industries may apply manual, or automatic retention labels.
Creating and Configuring Retention Policies
Retention policies enable organizations to effectively manage data, for instance, by
deciding to retain or delete the content. Leveraging the retention policies entails assigning similar
3
retention settings by default, such as at the container level, such that they are automatically
inherited by any content that enters the container. Retention policies are applicable to a range of
locations, and professionals have the chance to either apply a single policy to multiple locations,
or to a specific location. As outlined, centralizing the retention policies encompasses setting
them to be automatically applied to any content that matches specified conditions. As such,
workers do not need to apply the respective retention labels since Microsoft 365 helps in
performing the task. Notably, auto-applying labels are beneficial, as it reduces the overall costs
that could have been used in user training. Besides, organizations do not have to rely on users for
task completion and confer users an opportunity to focus on their work, hence increasing their
potential for enhanced productivity. Importantly, companies can apply retention labels in data
that previously did not have a functional label, and when the nature of the contained information
is identified as sensitive.
How to ensure that Data Stored in SharePoint must be encrypted Even if the User Dopes
Not encrypt it
Encryption is a vital attribute in increasing data security when in transit, and at rest. A
vast amount of data is managed online, and subsequently stored in the cloud, and servers, while
still connected to the web. However, despite its benefits, encryption can be detrimental to
corporate performance and outcomes, for instance, when it is used by ransomware to commit
crimes. Prior to ensuring data encryption in SharePoint, there are some security measures that
entities must be conversant with and adhere to as the preliminary security approaches. They
include installing trusted security software for all devices, keeping them up to date, and updating
the user’s operating system and other software (Khumalo & Mearns, 2019). Companies should
also have a functional data back-up, as it would be instrumental in facilitating data recovery, and
4
consider leveraging the services of the cloud, as they are identified to be effective in mitigating
ransomware infections.
Users should implement a standard encryption, such as NIST as a preliminary in
enhancing encryption in SharePoint and is also useful in protecting disks and backup drives. It is
also imperative for users to properly protect encryption keys, for instance, by actualizing dual
control and separation of duties. Notable security tips that users must actualize in the platform
include using groups to manage users, which could be enhanced by SharePoint’s flexibility.
Standard SharePoint security best practices also emphasize the need of using groups, especially
when assigning permissions, as this helps in creating a maintainable security model, and
increases the ease of removing, or adding users without worrying about specific levels of
performance. Users should also avoid using document-level permissions, as it increases the
future risk of maintenance failure. It is also noteworthy that SharePoint security best works
through inheritance, which cannot be facilitated by item-level permission. It is also important for
users to assign one person as admin for each site collection. Implementing SharePoint security
practices is a vital approach to improving and enhancing system robustness against potential
insider and external threats that could ultimately compromise data security.
The encryption process should apply to the data at rest, and when in transit, for instance,
during client communication with the server, and the movement of data between the respective
datacenters. In present-day society, most organizations are using centralized security servers in
enhancing policy administration, and in automating encryption key management. The attribute is
responsible for the enforcement of the security policies for documents. This ensures that as
information is being uploaded to SharePoint servers, it is immediately encrypted and remains so
5
throughout, such that only users allowed by the centrally managed security policies could access
the data.
6
References
Abraham, R., Schneider, J., & Vom Brocke, J. (2019). Data governance: A conceptual
framework, structured review, and research agenda. International Journal of Information
Management, 49, 424-438.
Khumalo, S., & Mearns, M. (2019). SharePoint as enabler for collaboration and efficient project
knowledge sharing. SA Journal Of Information Management, 21(1).
https://doi.org/10.4102/sajim.v21i1.1044
Course Resource
Presentation Resources
A narrated presentation is for a specific audience to which you would ideally present in
person or online in real time, but for practical reasons, you need to record for later
viewing.
While Microsoft PowerPoint is considered the default presentation tool for presentations,
you may consider using other presentation platforms or tools. Just be sure the tool
supports prerecorded narration.
Preparing for Your Presentation
As with any project, it is good to begin by creating an outline. This will help you
determine how many slides you will need to develop and how much information you will
need to present on each slide. It should also help determine a logical order in which to
present material.
Be sure to dedicate enough time to the narrated presentation to get the timing for
transitions right, and ensure that the sound is clear and the narration is at the right
volume.
Creating Slides
A good recorded presentation shares most of the same traits as a good live
presentation. Your presentation should not be an academic paper cut into text-filled
slides. You are giving a talk to an audience, so the narrative should provide most of your
ideas and argumentation. Be sure the themes either flow or transition appropriately from
slide to slide.
Here are some recommendations:
Keep slides uncluttered by using brief bullet points—only a few key words each.
An easy way to make your presentation look more appealing is to use one of the
designs provided within PowerPoint.
Adding images and/or clip art is another good way to add visual interest to your
presentation, but don't overuse slide transitions or animations, as these can be
distracting.
When you are citing sources of information on a slide, use a small font size so the
citations don't detract from the primary points.
Be sure to proofread carefully: Any errors on a slide will be particularly noticeable
because of the relatively small number of words.
When you record audio for each slide, a loudspeaker icon will appear in the middle
of the slide. You can drag this icon to a better position (often the bottom right
corner of the slide) so it doesn't interfere with the text.
Writing the Script
The script for your presentation can be a complete word-for-word documentation of
what you intend to say as each slide is displayed, or it can be a much briefer set of notes
to use as a reminder while you are recording to ensure that you cover all the points. The
latter approach is preferable, because this makes it less likely that you will sound rushed
or overly scripted when speaking. Keep in mind that if you were making the presentation
in person, you would not want to be reading your comments; instead, you would want to
make eye contact with the audience.
Here are some additional recommendations for your script:
Try to keep the amount of narration to less than two minutes per slide. If you need
to say more than that, create another slide so the audience doesn't get bored.
Make sure the script and what appears on the slide are closely related so the
audience can easily follow what you have to say.
Don't simply read the material on the slide—add value by providing additional
information.
Recording the Narration
At this point, you have created and saved slides as a PowerPoint presentation, and you
have the script ready. Now it's time to record the audio.
Here are a few general recommendations before you record:
If you are using a computer to record, use a headset/microphone combination rather
than using the computer's built-in speakers and microphone for better audio quality.
It isn't necessary to spend a lot on a headset/mic (typically $20 or less), and you will
be rewarded with better sound quality and less background noise.
Make sure the headset/mic is installed and working. There are simple programs on
both Macs and PCs that allow you to test whether recording is occurring and
whether the sound quality is acceptable.
Choose a quiet location to record so that background noise is minimal.
When you begin recording, speak clearly and conversationally without rushing.
Remember that it's easy to redo the audio for a slide. If you're not happy with the
way it sounds, you can do it again.
Once you have completed and narrated the presentation, it is a good idea to email
the file to another computer. If you are able to watch and listen to the slide show
successfully on the second computer, you will know that the audio files have been
successfully embedded in the presentation.
For Technical Support
Below are specific recording instructions for some common tools for presentations:
Record a Slide Show With Narration and Slide Timings in PowerPoint
(https://support.office.com/en-us/article/record-a-slide-show-with-narration-andslide-timings-0b9502c6-5f6c-40ae-b1e7-e47d8741161c)
Getting Started With Microsoft Sway (https://support.office.com/enus/article/getting-started-with-sway-2076c468-63f4-4a89-ae5f-424796714a8a)
If you have technical difficulties with using PowerPoint, contact the UMGC 360 Help
Desk, available 24/7 http://support.umgc.edu Phone: 1-888-360-UMUC (8682).
© 2021 University of Maryland Global Campus
All links to external sites were verified at the time of publication. UMGC is not responsible for the validity or integrity
of information located at external sites.
Creating a M365 Tenant and
Privileged Identity
Management (PIM)
Prepared by:
[Vulugho Temaah Valentine]
Objective
Create a test Microsoft 365 tenant for KCoder and prepare for Privileged Identity Management.
The recommended format is to provide screenshots incorporated within the written narrative. No
external sources are required for this phase of the project; however, the screenshots must be your
own. Screenshots from external sources are not permitted and all screenshots must include current
data and time.
Task 1: Create a Microsoft 365 Tenant
•
Step 9: Azure AD Account
Task 2: Create Users in Azure AD
•
Step 2: Bulk Users in Azure AD
Task 3: License Assignment in Azure AD
•
Step 2: License Assignment via Group
Task 4: Enable Information Rights Management (IRM) for SharePoint Online
•
Step 5: IRM verification
Task 5: Privilege Identity Management (PIM)
•
Step 11: PIM Role Setting verification
Opportunity: Benefits of PIM
Explain what would happen if Pam North was assigned to the Global Admin Role. Based on your
readings and research, explain why KCoder would benefit from implementing PIM.
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to
manage, control, and monitor access to important resources in your organization. These resources
include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft
Intune. If Pam North is given the access, Pam will be able to manage, control and monitor access to
important resources in the Organization.
Resources
Bulk create users in the Azure Active Directory portal | Microsoft Docs
Assign licenses to a group - Azure Active Directory | Microsoft Docs
References
These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as
appropriate.
[1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020].
Microsoft 365 Threat
Intelligence
Prepared by:
[Vulugho Temaah Valentine]
Objective
Demonstrate various security and compliance features of M365 for KCoder.
The recommended format is to provide screenshots incorporated within the written narrative. No
external sources are required for this phase of the project; however, the screenshots must be your
own. Screenshots from external sources are not permitted and all screenshots must include current
data and time.
Task 1: Implement a Safe Attachments Policy
•
Step 12: Safe Attachments Policy
Task 2: Implement a Safe Link Policy
•
Step 11: Safe Link Policy
Task 3: Create Anti-phishing Policy
•
Step 3: Anti-phishing policy
Task 4: Create a Malware Policy
•
Step 3: Malware policy
Task 5: Attack Simulator – Spear Phishing
•
•
Step 10: Spear Phishing Simulation
Step 16: Credential Harvest
Task 6: Data Loss Prevention
•
Step 9: Data loss prevention
Opportunity: Zero-Trust
Most of the breaches occur due to credential theft that bad actors exploit using various different
methods. In two to three paragraphs, discuss the different M365 services that can deter bad actors.
Research and explain the concept of zero-trust.
M365 services that can deter bad actors
•
Office 365 Advanced Threat Protection: Safe Attachments
•
Office 365 Advanced Threat Protection: Safe Links
•
Office 365 Advanced Threat Protection: Spoof Intelligence
•
Office ATP Anti-Phishing Capabilities in Office 365
•
Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams
Zero Trust
Zero Trust is a security framework that requires all users, both inside and outside of an organization's
network, to be authenticated, authorized, and continuously validated for security configuration and
posture before being granted or maintaining access to applications and data.
Explanation:
M365 services that can deter bad actors
Office 365 Advanced Threat Protection: Safe Attachments
The Office 365 Advanced Threat Protection Safe Attachments feature verifies that any email
attachments that arrive in your inbox are not malicious. If you have Office 365 Advanced Threat
Protection enabled in your Office 365 environment, Safe Attachments automatically opens the file and
tests it in a virtual environment that does not affect your real-time environment whenever someone
checks an email with an attachment included. If the file is found to be safe, it will open normally.
However, if the file is determined to be malicious, it is automatically deleted.
Office 365 Advanced Threat Protection: Safe Links
Enter Office 365 Advanced Threat Protection Safe Links, which verifies website addresses in email
messages and Office documents at the moment of click. When you click on a link in an email that
contains a URL, ATP Safe Links will automatically check the URL before opening it. This URL will be
classified as either prohibited, malicious, or safe. If the URL is safe, it will open normally without any
additional procedures. Instead of exposing your user to the potentially harmful link, it will open a
warning page if the URL has been blocked or detected as malicious. When a link within an Office
document is clicked, a similar process occurs.
Office 365 Advanced Threat Protection: Spoof Intelligence
There are occasions when spoofing is important. For example, if you have third-party vendors sending
bulk mail on your behalf, or if you've hired an assistant who needs to send emails from another person
within your organization, or if you've hired an external company to do lead generation, product updates,
or send sales emails that appear to be from you. For these reasons, it's critical not to eliminate spoofing
from your company. But how can you be sure that these emails claiming to be from your company are
legitimate? More significantly, as phishers frequently utilize spoofing to determine user credentials, how
do you ensure that folks spoofing your domain are not phishers?
Office ATP Anti-Phishing Capabilities in Office 365
Office 365 Advanced Threat Protection Anti-Phishing uses machine learning models and impersonation
detection algorithms to keep your organization safe from potential phishing attacks. Your security team
can set up Office 365 ATP's Anti-Phishing to check all your incoming communications for any sign that it
could be a phishing attempt using the Anti-Phishing capabilities.
Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft Teams
Once a file has been identified as harmful, Office 365 Advanced Threat Protection helps to detect and
restrict it from entering your document libraries or team sites, as well as locking it and preventing
anyone from accessing it once it has been detected as dangerous. The prohibited file will not be able to
be opened, moved, copied, or shared, even though it will still appear on your site (but you can delete it).
They will also appear on a quarantined objects list, allowing your security team to download, release,
report and delete them from the system.
Zero Trust Concept
Zero Trust is a security framework that requires all users, both inside and outside of an organization's
network, to be authenticated, authorized, and continuously validated for security configuration and
posture before being granted or maintaining access to applications and data.
Resources
Bulk create users in the Azure Active Directory portal | Microsoft Docs
Assign licenses to a group - Azure Active Directory | Microsoft Docs
References
These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as
appropriate.
[1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365overview?view=o365-worldwide [Accessed January 1, 2020].
Management Presentation
Prepared by:
[insert your name]
Objective
Create a presentation to demonstrate the capabilities of security and compliance of M365.
Deliverable
The presentation must meet the following requirements:
•
•
•
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is
Information Technology leadership.
voice annotation for every slide (excluding the reference slide)
at least two references
The presentation can incorporate screenshots from Project 1 and Project 2 along with additional
screenshots as needed. Content should include all the concepts of Project 1 and Project 2 deliverable,
Cloud App Security, Mobile Device Management, Multi-Factor Authentication, Zero Trust, Microsoft
Information Protection, and Data Governance.
At a minimum, the presentation should address your recommendations for the following items:
•
•
•
•
•
•
M365 Services
Key Policies
Zero Trust Concepts
MFA
Mobile Device Management
Cloud App Security
Resources:
Presentation Resources (umgc.edu)
Chapter & Lessons : Microsoft 365: Mobility and Security (MS-101) [based on Microsoft 365: Mobility
and Security (MS-101)] -uCertify
Course Resource
Presentation Resources
A narrated presentation is for a specific audience to which you would ideally present in
person or online in real time, but for practical reasons, you need to record for later
viewing.
While Microsoft PowerPoint is considered the default presentation tool for presentations,
you may consider using other presentation platforms or tools. Just be sure the tool
supports prerecorded narration.
Preparing for Your Presentation
As with any project, it is good to begin by creating an outline. This will help you
determine how many slides you will need to develop and how much information you will
need to present on each slide. It should also help determine a logical order in which to
present material.
Be sure to dedicate enough time to the narrated presentation to get the timing for
transitions right, and ensure that the sound is clear and the narration is at the right
volume.
Creating Slides
A good recorded presentation shares most of the same traits as a good live
presentation. Your presentation should not be an academic paper cut into text-filled
slides. You are giving a talk to an audience, so the narrative should provide most of your
ideas and argumentation. Be sure the themes either flow or transition appropriately from
slide to slide.
Here are some recommendations:
Keep slides uncluttered by using brief bullet points—only a few key words each.
An easy way to make your presentation look more appealing is to use one of the
designs provided within PowerPoint.
Adding images and/or clip art is another good way to add visual interest to your
presentation, but don't overuse slide transitions or animations, as these can be
distracting.
When you are citing sources of information on a slide, use a small font size so the
citations don't detract from the primary points.
Be sure to proofread carefully: Any errors on a slide will be particularly noticeable
because of the relatively small number of words.
When you record audio for each slide, a loudspeaker icon will appear in the middle
of the slide. You can drag this icon to a better position (often the bottom right
corner of the slide) so it doesn't interfere with the text.
Writing the Script
The script for your presentation can be a complete word-for-word documentation of
what you intend to say as each slide is displayed, or it can be a much briefer set of notes
to use as a reminder while you are recording to ensure that you cover all the points. The
latter approach is preferable, because this makes it less likely that you will sound rushed
or overly scripted when speaking. Keep in mind that if you were making the presentation
in person, you would not want to be reading your comments; instead, you would want to
make eye contact with the audience.
Here are some additional recommendations for your script:
Try to keep the amount of narration to less than two minutes per slide. If you need
to say more than that, create another slide so the audience doesn't get bored.
Make sure the script and what appears on the slide are closely related so the
audience can easily follow what you have to say.
Don't simply read the material on the slide—add value by providing additional
information.
Recording the Narration
At this point, you have created and saved slides as a PowerPoint presentation, and you
have the script ready. Now it's time to record the audio.
Here are a few general recommendations before you record:
If you are using a computer to record, use a headset/microphone combination rather
than using the computer's built-in speakers and microphone for better audio quality.
It isn't necessary to spend a lot on a headset/mic (typically $20 or less), and you will
be rewarded with better sound quality and less background noise.
Make sure the headset/mic is installed and working. There are simple programs on
both Macs and PCs that allow you to test whether recording is occurring and
whether the sound quality is acceptable.
Choose a quiet location to record so that background noise is minimal.
When you begin recording, speak clearly and conversationally without rushing.
Remember that it's easy to redo the audio for a slide. If you're not happy with the
way it sounds, you can do it again.
Once you have completed and narrated the presentation, it is a good idea to email
the file to another computer. If you are able to watch and listen to the slide show
successfully on the second computer, you will know that the audio files have been
successfully embedded in the presentation.
For Technical Support
Below are specific recording instructions for some common tools for presentations:
Record a Slide Show With Narration and Slide Timings in PowerPoint
(https://support.office.com/en-us/article/record-a-slide-show-with-narration-andslide-timings-0b9502c6-5f6c-40ae-b1e7-e47d8741161c)
Getting Started With Microsoft Sway (https://support.office.com/enus/article/getting-started-with-sway-2076c468-63f4-4a89-ae5f-424796714a8a)
If you have technical difficulties with using PowerPoint, contact the UMGC 360 Help
Desk, available 24/7 http://support.umgc.edu Phone: 1-888-360-UMUC (8682).
© 2021 University of Maryland Global Campus
All links to external sites were verified at the time of publication. UMGC is not responsible for the validity or integrity
of information located at external sites.
Project 1: Creating a new Microsoft 365 Tenant Guide
Before you can create a tenant, you need an email account. It is best to create a free Outlook
account at https://outlook.live.com/owa/
Name the account: firstnameInitial.lastnameUMGC422@outlook.com (i.e.
JSmithUMGC422@outlook.com)
Task 1 – Create a Microsoft 365 Tenant
•
Step 1: Go to https://products.office.com/en-us/business/office-365-enterprise-e5business-software and click on Free Trial
•
Step 2: Set up your account
o Use the email account created in Step 1.
•
Step 3: Tell us about yourself
o Enter you First and Last Name
o Enter 8008888682 for Business Phone
o Enter Your First and Last Name for a Company Name
o Select 25-49 for Company size
o Check to see if the US is selected for Country or Region
•
Step 4: Verification/Tell us about yourself
o Enter a real phone number for verification. Note: This is for verification and it will
not be used for any other purpose.
•
Step 5: Create your business identity
o Enter your first name, last name, and UMGC. If the domain is unavailable use a
number after your last name. You need to record the name for future reference.
•
Step 6: Create a user ID and Password for the tenant. This becomes your Global Admin
account so be sure to write it down in a safe place.
o Use your first name initial and last name. i.e. jsmith
o Create a password that you will remember.
o Leave the box unchecked for sharing information.
•
Step 7: Finish Installation.
o
•
Click go to setup. It will take you to https://portal.office.com If you get an Office
setup screen, exit the setup
Step 8: Microsoft 365 Admin Center
o Click show all to see all the admin centers and go to Azure Active Directory
•
Step 9: Azure Active Directory Account
o Verify that the account is present and take a screenshot. Paste the screenshot in the
Task 1 – Step 9 of the Project 1 Deliverable document.
•
Step 10: Start Enterprise Mobility + Security E5 Trial
o Click on Azure Active Directory in the left pane and select Licenses
o Click on All products, Try/Buy, expand Enterprise Mobility + Security E5. Click on the
Activate button
o
o
Logout and login again with the account you created in Step 6.
You should now see your EMS E5 licenses under all products
Task 2: Create Users in Azure AD
•
•
Step 1: Create the following user accounts in Azure AD using bulk creation process.
o Julia Childs
o Nate Huang
o Chad Walters
o Pam North
o Jeff Wilson
o Nick Mullens
o Tyler Gurley
o Jerick Coleman
o Carla Watson
o Richie James
Step 2: Once all users are created, take a screenshot of all users showing current date and
time. Paste the screenshot in the Task 2 – Step 2 of the Project 1 Deliverable document.
Bulk create users in the Azure Active Directory portal | Microsoft Docs
Task 3: Assign Office 365 & EMS E5 License
•
•
Step 1: Assign all users the Office 365 and Enterprise Mobility + Security E5 licenses based
on a Group.
Step 2: Show the group and the license assignment. Take screenshot of the group and the
license assignment and paste both screenshots in Task 3 – Step 2 of the Project 1
Deliverable document.
Assign licenses to a group - Azure Active Directory | Microsoft Docs
Task 4: Enable Information Rights Management (IRM) for SharePoint Online
•
Step 1: In the Microsoft 365 admin center (https://admin.microsoft.com), select Show all (if
necessary) in the left-hand navigation pane to see all the navigation options. Under Admin
centers, select SharePoint. This will open the SharePoint admin center.
•
Step 2: In the SharePoint admin center, in the left-hand navigation pane, select Settings.
•
Step 3: At the bottom of the Settings page is a sentence that says Can’t find the setting
you’re looking for? Go to the classic settings page. In this sentence, select the hyperlinked
text: classic settings page.
•
Step 4: On the classic Settings page, scroll down to the Information Rights Management
(IRM) section, select the Use the IRM service specified in your configuration option, and
then select the Refresh IRM Settings button.
•
Step 5: This will return you to the top of the Settings page. You must scroll to the bottom of
the page to select the OK button. In doing so, when you get to the Information Rights
Management (IRM) section, verify the Use the IRM service specified in your
configuration option is selected and a We successfully refreshed your settings message
appears below the Refresh IRM Settings button. Take a screenshot and paste it in the Task 4
– Step 5 of the Project 1 Deliverable document.
Task 5: Privilege Identity Management (PIM)
•
Step 1: In your browser, select the Microsoft 365 admin center tab. In the left-hand
navigation pane under the Admin centers section, select Azure Active Directory
•
Step 2: In the Azure Active Directory admin center, in the left-hand navigation pane,
select All services.
•
Step 3: In the All services window, the services are separated into three sections - General,
Identity, and Services. Under the Identity section, select Azure AD Privileged Identity
Management.
•
Step 4: In the Privileged Identity Management | Quick start window, note how the window
is divided into three parts - the navigation pane on the left, the middle pane (which provides
navigation options for this page), and the detail pane on the right.
•
Step 5: In the middle pane under the Manage section, select Azure AD roles.
•
Step 6: In the Quick start window, in the middle pane under the Manage section,
select Settings.
•
Step 7: In the Settings window, select the Global Administrator role.
•
Step 8: In the Role setting details - Global Administrator window, select Edit on the menu
bar at the top of the page.
•
Step 9: In the Edit role setting - Global Administrator window, select the Require Approval to
activate check box.
•
Step 10: In the Select approver(s) section, no specific approver has been selected. Your
admin account should be the approver for this role, assign yourself as the approver for this
role, so select this section. In the Select a member pane that opens on the right, scroll down
through the list of users and select your admin account, and then select the Select button.
•
Step 11: In the Edit role setting - Global Administrator window, select Update. Take a
screenshot and paste it in the Task 5 – Step 6 of the Project 1 Deliverable document.
Resources:
https://www.ucertify.com/?func=video&type=ebook
https://www.youtube.com/watch?v=_gLDEbka-3Y
Purchase answer to see full
attachment