Solved

O365 IT Support Roles and Permissions

Posted on 2016-08-31
1
26 Views
Last Modified: 2016-09-01
As Office 365 Global Admins, what role/permissions are you generally assigning your level one or level two support teams at your companies? Right now, during the migration to O365, I haven't allowed anyone but very senior engineers access, but want to allow some features and abilities to level 1 and 2 support personnel in the near future as I wrap up another O365 migration project.

For instance, verifying licenses, adding/removing user info such as alias SMTP addresses, etc. pretty basic things.
0
Comment
Question by:Christian Hans
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 41

Accepted Solution

by:
Vasil Michev (MVP) earned 500 total points
ID: 41779288
It really depends on your processes/policies. Definitely keep the Global admins to a minimum, in most cases you can give permissions to specific workloads only. In case of Exchange, take advantage of the RBAC model and only give access to what's really needed.

An example configuration will be something like: 2-3 Global admins, few User admins, few people granted View-Only recipient management for reporting tasks, probably some people with access to eDiscovery, etc.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question