This document provides tips for migrating from SharePoint and file servers to Microsoft Teams. It discusses baselining existing file shares, SharePoint sites, and other content sources. Planning considerations include records management, retention policies, digital asset management, and enterprise search. The document also covers moving user profiles and files to OneDrive, auto-mounting SharePoint libraries in Windows Explorer, maintaining version history, sharing capabilities, and security and data governance best practices like classification, labeling, encryption and access controls. It emphasizes that there is no single solution and recommends structured planning, communication, training and focus on user experience during the transition.
2. Alistair Pugin @alistairpugin
Azure and Office MVP | Blogger | Podcaster | Speaker | Strategic Advisor
2 Guys and SharePoint
Regarding 365
365 Unplugged
Alistair has worked in various capacities in multiple verticals from retail – manufacturing to government, spanning 50 to
50000 users utilizing all aspects of pure Enterprise Information Management. His current position as an Office Apps and
Services MVP in Johannesburg, South Africa, provides him with a mechanism to assist companies with designing their
Microsoft productivity stack using “best of breed”, proven methodologies to foster innovation and growth through an
ECM framework while incorporating a Knowledge Management strategy.
3. M365 - What’s Available
Baselining
Planning
Final Thoughts
How do you get stuff in?
5. Data is exploding across the digital estate
Energy
systems
Supply
chains
Citizens
Sensors
Cloud
Mobile
devices
On-premises
Partners
Customers
Manufacturers
Marketplaces
Equipment
Vehicles
Smart cities
31. Protect your sensitive data–
wherever it travels.
Secure identities,
control access
Identity & access
management
Discover and
respond
Information
protection
Manage
risks
Data
governance
Identify, collect and
produce content
Manage content lifecycle Enforce communication
compliance policies, detect
malicious content
32. Corporate
Network
Geo-location
Microsoft
Cloud App Security
MacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset
******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Zero Trust Architecture
33. Label
Discover Classify
Sensitivity Retention
Data growing at exponential rate
Encryption
Restrict Access
Watermark
Header/Footer
Retention
Deletion
Records Management
Archiving
Sensitive data discovery
Data at risk
Policy violations
Policy recommendations
Proactive alerts
Information
Protection & Governance
Comprehensive policies to protect and govern your
most important data – throughout its lifecycle
Unified approach to discover, classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations
Apply label
Unified approach
Monitor
This is the world that many of our customers are moving to in their digital transformation. And when it comes to being compliant in the intelligent cloud, intelligent edge era, we really have to consider what is our digital estate? How do we think about where our most sensitive data is? How do we protect it? How do we find what’s most relevant? This is a little bit different now than it was 5 or 10 years ago. IT organizations now find themselves responsible for finding and protecting data across a wide spectrum of devices and environments. For example, user-owned mobile devices that access corporate data. It also includes systems and devices that your partners and customers use to access your information. And any one of these situations can be a point of compliance risk for your overall estate. That changes the game when it comes to compliance: You can no longer draw perimeters around your organization. This is the challenge that we all struggle with in compliance. And it's a challenge we at Microsoft think that we can uniquely fix.
THIS SLIDE HAS A BUILD
To remove it: CTRL+A (select all) Animations None
SharePoint sites are the building blocks of the modern intranet. You can create all of these experiences with SharePoint. And with the innovations we’ve brought to SharePoint over the last three years, you can build sites in minutes, not months, that are fast, beautiful, and natively mobile.
[CLICK TO BUILD]
For those of you that are newer to SharePoint, sites let you share files, news, and data in the form of lists. They let you tell stories and create solutions with web pages, and deliver apps that solve business problems. And last year we unveiled SharePoint spaces, which in 2019 will let anyone create immersive, mixed reality experiences.
And SharePoint is integrated with and across Microsoft 365.
In another session we cover integration with Microsoft Teams, so that shared content and solutions created with SharePoint can be delivered either on the intranet, in a browser, or right inside Teams.
[CLICK TO BUILD]
In this session, as we look at building employee experiences for your organization, we’ll see how SharePoint integrations with Yammer and Stream drive engagement and effective communication and learning.
Expanded view of all the conditions that are taken into account for access and the controls that you have based on the risk.
Our 40 TB of data from all the conditions, integrated EMS/M365 apps, and our security intelligence network are analyzed in real-time to determine the right policy.
Example: If an ADFS user signs in on a Windows machine with Windows Defender ATP we can take into account the health of the account and the device, as well as their location and if they are on the corporate network and what type of app they are trying to access. If they are on the corporate network in their normal office then the data produces a low risk score. The effective policy is to all access to the app. If, however, the person was logging in from a location across the world (in a short amount of time – impossible travel) and/or the Windows Defender ATP finds that the machine has been infected, the access can be blocked. If the user login and device are healthy, but it was a location they haven’t signed in from before (on a trip or other computer) then the user could be prompted with MFA or have limited access to certain applications.