Office 365: Everything You Wanted to Know How to Use this Document?


Office 365 Developer Patterns and Practices



Download 0.81 Mb.
Page38/39
Date20.06.2017
Size0.81 Mb.
#21123
1   ...   31   32   33   34   35   36   37   38   39

Office 365 Developer Patterns and Practices


The Office 365 Developer Patterns and Practices program provides samples and documentation to help you transition your development solutions from full-trust code to the app model. Start by reading Transforming your SharePoint customizations to add-in model - Resources.

You can use the code samples and guidance in the Office 365 Developer Patterns and Practices project to help you develop business solutions for your organization or your customers. The project includes code samples that show you how to use provider-hosted add-ins to address key scenarios, as well as other resources that illustrate best practices for add-in model development.



Must Read: The Office 365 development patterns and practices solution guidance on MSDN provides samples and documentation to help you to implement typical customizations for Office 365 or for SharePoint Online based on your functional requirements.

The GitHub repo - Office 365 Development Training Content houses all of the training content for Office 365 Development training courses. Videos related to the guidance are available on the Office 365 Developer Patterns and Practices channel on Channel 9.



PnP weekly web casts are quick videos recorded around key topics for the Office 365 and SharePoint add-in model development. These are around 30-45 min long recordings on different resources, guidance and other patterns and practices. All web casts will be published to PnP YouTube channel.

Office 365 Dev PnP releases are done typically first Friday of each month. Details on monthly releases are covered in the monthly community calls. Download calendar invite (ics) to save the call details to your calendar.

Resources


  • Transforming your SharePoint customizations to add-in model - Resources

  • PnP under dev.office.com. One location for all the latest resources and announcements

  • PnP GitHub. Main repository

  • PnP MSDN pages

  • PnP Yammer group

  • PnP Videos at Channel 9

  • PnP training package

  • PnP Guidance Repository




Enterprise Mobility + Security (EMS)




Microsoft Enterprise Mobility + Security (EMS) is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. EMS enables Digital transformation with freedom and peace of mind.

Solutions

Identity and access management




Control identity + access in the cloud

Centrally manage single sign-on across devices, your datacenter, and the cloud



Azure AD is more than a “domain controller running on a cloud-hosted server,” and more than a directory in the cloud. It is an Identity and Access Management Solution as a Service.

Azure AD offers several capabilities that can allow customers to expand their identity footprint from on-premises into the cloud:



  • Synchronizing with AD DS

  • Federating with AD DS

  • Cloud-Only Authentication

  • Pre-integrated SaaS apps for SSO and allowing corporate credentials to “just work”

  • Custom line-of-business (LOB) app support and developer features

  • User self-service capabilities like password reset and group management

By using Azure AD, your organization will be well positioned to adopt cloud-first or Hybrid Identity scenarios.

Refer to: Identity and access management


Benefits


  • Create and manage a single identity for each user across your hybrid enterprise, keeping users, groups and devices in sync

  • Provide single sign-on access to your applications including thousands of pre-integrated SaaS apps

  • Enable application access security by enforcing rules-based Multi-Factor Authentication for both on-premises and cloud applications

  • Improve user productivity with self-service password reset and application access requests for directories in the datacenter and the cloud

  • Provide secure remote access to on-premises web applications through Azure AD Application Proxy

  • Take advantage of the high-availability and reliability of a worldwide, enterprise-grade, cloud-based identity and access management solution

Identity-driven security




Get identity-driven security

Comprehensive, intelligent protection against today's advanced attacks



Microsoft Identity-Driven Security addresses the security challenges of today and tomorrow across users, devices, apps, data, and platforms. Each of your employees receive a single protected common identity for secure, risk-based conditional access to thousands of apps—on-premises and in the cloud. Innovative technologies safeguard your network at the front door.

Deep visibility into apps, devices, and data activity uncovers suspicious activities, user mistakes, and potential threats before they become real ones. And with behavioral analytics, machine learning, and unique Microsoft security intelligence, you can secure your corporate files and data while freeing your employees to get their work done on the go.

Refer to: Identity-driven security

Benefits


  • Protect your organization at the front door with secure single sign-on, multi-factor authentication, and risk-based conditional access.

  • Provide one common identity for accessing thousands of apps, and manage privileged identities and identity protection.

  • Gain deeper visibility for your cloud apps and start controlling data with granular policies.

  • Enable secure internal and external file sharing that lets you classify and label files at creation, track their usage, and protect them wherever they go.

  • Help prevent data loss in iOS and Android devices with an unparalleled ability to manage Microsoft Office mobile apps.

  • Identify advanced persistent threats by using behavioral analytics to detect suspicious user or entity behavior, both on-premises and in the cloud.

  • Draw from vast Microsoft threat intelligence and security research data to detect anomalies and prevent threats right away

Mobile device and application management




Manage mobile devices + apps

Securely manage apps and data on iOS, Android, and Windows from one place.



Leveraging Microsoft Intune, you can deliver application and device management completely from the cloud, or on-premises through integration with System Center Configuration Manager, all via a single management console.

Microsoft has also incorporated manageability and data protection directly into the Intune-managed Office mobile apps to help maximize productivity while providing the flexibility to extend these same management capabilities to your existing line-of-business apps through the Intune App Wrapping Tool. You can choose to manage the Office mobile apps with or without enrolling the device for management to protect corporate information without the risk of intruding on a user’s personal life.

Refer to: Mobile device and application management

Benefits


  • Deliver and manage apps across a broad range of devices, including iOS, Android, Windows and Windows Phone all from a single management console

  • Simplify administration by deploying required apps automatically during enrollment and allowing users to easily install corporate apps from the self-service Company Portal

  • Help maximize productivity with the Office mobile apps your employees know and love while preventing the leakage of company data by restricting actions such as copy/cut/paste/save in your managed app ecosystem, and extend these capabilities to existing line-of-business apps

  • Deploy certificates, WiFi, VPN, and email profiles automatically once a device is enrolled, enabling users to seamlessly access corporate resources with the appropriate security configurations

  • Provide comprehensive settings management for mobile devices, including remote actions such as passcode reset, device lock, and data encryption

  • Remove corporate data and applications when a device is unenrolled, noncompliant, lost, stolen, or retired from use

  • Extend your System Center Configuration Manager infrastructure through integration with Microsoft Intune to provide a consistent management experience across devices located on-premises and in the cloud

Information security and data protection




Protect your information

Intelligently safeguard your corporate data and enable secured collaboration.



Microsoft Azure Information Protection helps you classify and label your data at the time of creation. Protection (encryption + authentication + use rights) can then be applied to sensitive data.

Classification labels and protection are persistent, traveling with the data so that it’s identifiable and protected at all times – regardless of where it’s stored or with whom it’s shared. The interface is simple and intuitive and does not interrupt your normal working experience. You also have deep visibility and control over shared data.

Refer to: Information security and data protection.

Benefits


  • Policies classify and label data at time of creation or modification based on source, context, and content. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation.

  • Embed classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with.

  • Track activities on shared data and revoke access if necessary. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data.

  • Share data safely with coworkers as well as your customers and partners. Define who can access data and what they can do with it—such as allowing to view and edit files but not print or forward.

  • Data classification and protection controls are integrated into Microsoft Office and common applications to secure the data you’re working on with one click. In-product notifications such as recommended classification help users make right decisions.

  • Help protect your data whether it’s stored in the cloud or in on-premises infrastructures. You have the flexibility to choose how your encryption keys are managed, including Bring Your Own Key (BYOK) options.

Desktop virtualization




Virtualize your desktops

Efficiently deliver and manage Windows desktops and apps on all devices.



Workspace virtualization, whether through apps or full desktops, has been a trusted method to achieve these objectives. The key to your success is investing in a secure platform that will provide the necessary capabilities to serve varied use cases while allowing for flexibility and choice of deployment. Microsoft Remote Desktop Services (RDS) has been your trusted platform for delivering virtualized workspaces. Refer to: Desktop virtualization.

Benefits


  • Choose different deployment models to meet your needs: on-premises or in Azure

  • Deliver Windows apps on any device: Windows, Mac, iOS, Android

  • Scale up or down to meet dynamic business needs by delivering apps from the Azure cloud

  • Provide a rich remote user experience similar to applications running on a local PC

  • Maintain data compliance by keeping sensitive corporate resources off user devices




Download 0.81 Mb.

Share with your friends:
1   ...   31   32   33   34   35   36   37   38   39




The database is protected by copyright ©ininet.org 2024
send message

    Main page