Solved

O365 IT Support Roles and Permissions

Posted on 2016-08-31
1
23 Views
Last Modified: 2016-09-01
As Office 365 Global Admins, what role/permissions are you generally assigning your level one or level two support teams at your companies? Right now, during the migration to O365, I haven't allowed anyone but very senior engineers access, but want to allow some features and abilities to level 1 and 2 support personnel in the near future as I wrap up another O365 migration project.

For instance, verifying licenses, adding/removing user info such as alias SMTP addresses, etc. pretty basic things.
0
Comment
Question by:Christian Hans
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 41

Accepted Solution

by:
Vasil Michev (MVP) earned 500 total points
ID: 41779288
It really depends on your processes/policies. Definitely keep the Global admins to a minimum, in most cases you can give permissions to specific workloads only. In case of Exchange, take advantage of the RBAC model and only give access to what's really needed.

An example configuration will be something like: 2-3 Global admins, few User admins, few people granted View-Only recipient management for reporting tasks, probably some people with access to eDiscovery, etc.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
This article describes how to import an Outlook PST file to Office 365 using a third party product to avoid Microsoft's Azure command line tool, saving you time.
This Experts Exchange lesson shows how to use VBA to loop through rows in Excel.  In order to sort, filter, and use database features, there needs to be a value in each column for every row. When data arrives with values missing, code to copy values…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question