You are on page 1of 1

Microsoft 365 for enterprise Build a firm IT foundation upon which Microsoft 365 applications and

Foundation Infrastructure services can unlock creativity and teamwork in a secure environment.

Microsoft 365 for enterprise


brings together: Deployment phases
Office 365 Enterprise

Windows 10 Enterprise

Enterprise Mobility + Mobile Device Information


Networking Identity Windows 10 Enterprise Office 365 ProPlus
Security (EMS) Management Protection

Admins: The infrastructure is in


Admins: The organization network is Admins: Authentication is secured and identities are Admins: The infrastructure is in place to Admins: The infrastructure is in place to Admins: The infrastructure is in
place to deploy Office 365 ProPlus
optimized for access to the Microsoft protected and managed at scale using hybrid and deploy Windows 10 Enterprise to new enroll devices, use application and place to implement and monitor
to Windows 10 Enterprise and other

Goals
network. governance. and existing Windows devices and keep conditional access policies, and secure data compliance and
devices and keep it updated.
them updated. my organization's resources. information protection.
Users: I get consistent performance Users: Authentication is secured and it's easy to
Users: My version of Office client
when accessing Microsoft 365 cloud manage my authentication methods, such as Users: It’s easy to upgrade and ongoing Users: I can easily and safely access my Users: It’s easy to apply
applications always have the latest
services. passwords and other factors. update installation is transparent. work email and files on my device. sensitivity labels to documents.
features.

• Cloud-only with Intune (part of EMS)


• Secure user accounts • Windows Analytics • Office 365 sensitivity and
• Co-management with Intune and

Services,
• Multi-factor authentication (MFA) or password-less • Microsoft Endpoint Configuration Manager retention labels
Microsoft Endpoint Configuration
• Azure Active Directory (Azure AD) Privileged Identity • Microsoft Deployment Toolkit (MDT) • Office 365 Data Loss Prevention
Manager (part of EMS)
Management (PIM) for admin accounts (E5 only) • Deployment Image Servicing and • Office Deployment Tool (ODT) (DLP)
• Mobile device management for

features,
Network connectivity, • Azure AD Connect with password hash synchronization (PHS) Management (DISM) • Office Customization Tool • Microsoft Cloud App Security
enrolled devices
performance, and latency or pass-through authentication (PTA) • Windows Autopilot • Readiness Toolkit (E5 only)
• Mobile application management for
measuring tools • Authentication and password maintenance with password • Windows Update for Business • Microsoft Endpoint Configuration • Office 365 Advanced Threat
all devices

and tools
protection, Azure AD Seamless Single Sign-On (SSO), self- • Windows Defender Antivirus Manager Protection (ATP) (E5 only)
• Conditional access using Azure AD
service password reset, password writeback • Windows Defender Exploit Guard • Secure Score
Premium P1 and P2 (part of EMS)
• Dynamic and self-service group membership, automatic • Windows Defender Advanced Threat • Office 365 privileged access
• Compliance policies and control
license assignment, access reviews Protection (E5 only) management (E5 only)
device features

• How to manage licenses and address


• Which identity model: cloud-only or hybrid • Choose a deployment strategy
network capability and application
• Which authentication method: PHS, PTA, or federated • In-place upgrade
compatibility • Choose cloud-only or co- • Which security and information
• Use of Azure AD Seamless SSO • PC imaging
• How to install: upgrade or clean install management device management protection levels
• Which conditional access policies to enforce MFA, force • Autopilot
• How to deploy: • Choose how Android, macOS, iOS, • How to use sensitivity labels and
• Which local offices need Internet password resets, etc. • Choose deployment and configuration tools:

Key design
• Microsoft Endpoint Configuration and Windows devices are managed Azure Information Protection
connections • Which MFA methods to support • Microsoft Endpoint Configuration Manager
Manager • Use Azure AD groups for app and labels
• Which network hairpins to bypass • How to protect global admin accounts (MFA, Azure AD • MDT
• Office Deployment Tool device access • Which sensitive information types
and for what types of traffic Privileged Identity Management [E5 only]) • Intune

decisions
• Self-install from the Office portal • Deploy Office, Win32, and other apps for DLP
• Which edge devices to configure • How to simplify password management (password writeback • Group Policy
• Where to deploy from: cloud or local to devices • Which Office 365 ATP policies
traffic bypass and for what types of and self-service password reset) • Windows PowerShell
source on your network • Force compliance with conditional • How to use Microsoft Cloud App
traffic • Which custom words to prevent in passwords • Create a phased deployment plan
• What to include in Office installation access rules Security (E5 only)
• How to manage group membership: Manual, dynamic, or • Plan a servicing strategy
packages: which Office apps, languages, • Allow or block device features and • How to use privileged access
self-service • Assign devices to update rings
and architectures settings management (E5 only)
• How to manage licenses: manual or group-based • Optimize update delivery
• How to manage updates and which
• Which groups to manage for access reviews • Analyze and validate updates
update channels to use

• Information protection levels


• Deployment infrastructure is in place • Access is controlled using new or
• Azure AD Connect settings for PHS, PTA, SSO, password Infrastructure and settings for: • Sensitive information types
• Update management infrastructure is in existing Azure AD groups

Configuration
• All offices have local Internet writeback • Deploying new devices • Sensitivity or Azure Information
place • Devices are enrolled, and apps, features,
connections with local DNS servers • Global admin account protection with MFA and Azure AD PIM • Deploying OS upgrades Protection labels
• Installation packages are defined and settings are applied
• Appropriate network hairpins are (E5 only) • Deploying OS updates • Retention labels
• All client devices are assigned to • Users with personal devices get secure

results
bypassed • Security groups for: • Enabling Windows Defender Antivirus • DLP policies
deployment groups access to organization apps, such as
• Edge devices and browsers are • Identity-based conditional access policies • Deploying Windows Defender Advanced • Microsoft Cloud App Security
• Office applications, architectures, and email
configured for traffic bypass • Password writeback and self-service reset enabled Threat Protection settings (E5 only)
languages are assigned to go to client • Conditional access is enforced when
• Dynamic group membership and automatic licensing • Deploying attack surface reduction rules • Privileged access management
devices devices are compliant with IT rules
policies (E5 only)

Onboard a
• Add users to your Azure AD security
Add computer account/HW ID/other or group • Add user accounts to security
Add user account to the Azure AD security groups for: groups
Connect them to an on- to the appropriate security groups for: groups for sensitivity or Azure
• Identity-based conditional access policies Add the client device to the appropriate • Add devices to your Azure AD security
premises network (wired or • Windows Autopilot Information Protection labels

new user
• Password reset deployment group. groups
wireless) • Device upgrades • Train users on how to apply
• Automatic licensing • Assign licenses
• Windows 10 Enterprise security features labels to documents
• Enroll devices to receive policies

• Monitor device health and compliance with • Get inventory of devices accessing

Monitor and
• If updates are automatic, they’ll occur
Windows Analytics organization services Monitor with:
• Monitor directory synchronization health with Azure AD without any administrative overhead
Check bandwidth utilization for each • Monitor Windows antivirus and intrusion activity • Use Intune reports to monitor apps, • Microsoft Secure Score
Connect Health • To manage updates directly, download
office monthly and increase or with Microsoft Endpoint Configuration Manager device compliance, and configuration • Office 365 DLP dashboard

update
• Monitor sign-in activity with Azure AD Identity Protection the updates and deploy them from
decrease as needed. or Microsoft Intune profiles • Microsoft Cloud App Security
(E5 only) and Azure AD reporting distribution points with Microsoft
• Manage and deploy updates for Windows 10 • Use Power BI and the Intune Data dashboard (E5 only)
Endpoint Configuration Manager
Enterprise Warehouse

http://aka.ms/m365edeployfoundation December 2019 © 2019 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at M365docs@microsoft.com.

You might also like