1
00:00:00,330 --> 00:00:06,153
When we're in Microsoft 365, we have user accounts that are

2
00:00:06,153 --> 00:00:10,470
enabled for various Microsoft 365 workloads.

3
00:00:10,470 --> 00:00:14,905
All of those user accounts are actually user accounts that also

4
00:00:14,905 --> 00:00:16,980
reside in Microsoft Entra ID.

5
00:00:16,980 --> 00:00:22,126
Microsoft Entra ID is the new name for Azure Active Directory,

6
00:00:22,126 --> 00:00:27,392
one of the first workloads associated with Microsoft 365 that

7
00:00:27,392 --> 00:00:32,657
provides all of the authorization and authentication services

8
00:00:32,657 --> 00:00:33,886
for Microsoft 365.

9
00:00:33,886 --> 00:00:38,580
Microsoft Entra ID is Microsoft's identity and access

10
00:00:38,580 --> 00:00:42,435
management solution, and it has its own portal,

11
00:00:42,435 --> 00:00:44,110
its own admin center.

12
00:00:44,110 --> 00:00:48,849
So to access the Microsoft Entry ID admin center,

13
00:00:48,849 --> 00:00:53,120
I'm going to go down my list of admin centers and go

14
00:00:53,120 --> 00:00:54,293
into Identity.

15
00:00:54,293 --> 00:00:58,259
When I click on "Identity", I'm entering the Entra admin

16
00:00:58,259 --> 00:01:02,674
center and I'm entering the tenant that's associated with my

17
00:01:02,674 --> 00:01:04,695
Microsoft 365 subscription.

18
00:01:04,695 --> 00:01:07,271
When you first subscribe to Microsoft 365,

19
00:01:07,271 --> 00:01:12,410
you will have an Entra ID tenant that uses the Entra

20
00:01:12,410 --> 00:01:14,054
ID-free license.

21
00:01:14,054 --> 00:01:15,140
It is a free tenant.

22
00:01:15,140 --> 00:01:17,911
There's no additional cost associated to that,

23
00:01:17,911 --> 00:01:22,475
and it is where all of your users and groups will be stored.

24
00:01:22,475 --> 00:01:26,847
Not all your groups, only your Microsoft 365 groups and

25
00:01:26,847 --> 00:01:29,195
your security-enabled groups.

26
00:01:29,195 --> 00:01:33,066
The distribution list, those are still lists that

27
00:01:33,066 --> 00:01:34,921
reside for in Exchange.

28
00:01:34,921 --> 00:01:38,357
So this is where we will see all of our users and groups.

29
00:01:38,357 --> 00:01:42,290
You will see all the member users, all guests, invited users,

30
00:01:42,290 --> 00:01:46,852
and all the various groups that you create in Microsoft 365 you

31
00:01:46,852 --> 00:01:50,678
will see them represented here in Microsoft Entra ID.

32
00:01:50,678 --> 00:01:55,056
So different pieces of information that are relevant when we look at

33
00:01:55,056 --> 00:01:56,820
this specific admin center.

34
00:01:56,820 --> 00:01:58,750
First of all, if I click under users,

35
00:01:58,750 --> 00:02:03,137
all users, I see all of the users in my tenant.

36
00:02:03,137 --> 00:02:06,275
Now all of these names are blurred out for you on your screen.

37
00:02:06,275 --> 00:02:08,935
However, if you are an administrator and you

38
00:02:08,935 --> 00:02:10,111
are accessing this,

39
00:02:10,111 --> 00:02:13,106
you would be able to see all of these usernames and

40
00:02:13,106 --> 00:02:14,064
email addresses.

41
00:02:14,064 --> 00:02:19,499
This is also where we're going to enable multi-factor authentication

42
00:02:19,499 --> 00:02:20,472
or per-user

43
00:02:20,472 --> 00:02:23,581
MFA, per-user multifactor authentication will be

44
00:02:23,581 --> 00:02:26,758
enabled from here, and it is something that will

45
00:02:26,758 --> 00:02:30,408
allow you to force your users to use more than one form

46
00:02:30,408 --> 00:02:31,625
of authentication.

47
00:02:31,625 --> 00:02:34,973
And we'll be doing that in a later video in this course.

48
00:02:34,973 --> 00:02:38,923
This is where we can also reset password for users and do other

49
00:02:38,923 --> 00:02:40,580
tasks that we can also do

50
00:02:40,580 --> 00:02:43,711
from the Microsoft 365 admin center.

51
00:02:43,711 --> 00:02:47,606
It's important to note that whatever change you do for a user

52
00:02:47,606 --> 00:02:51,046
that relates to its password, its contact information,

53
00:02:51,046 --> 00:02:54,390
or any of its Entra settings, if you're making those

54
00:02:54,390 --> 00:02:55,195
changes here,

55
00:02:55,195 --> 00:02:58,855
those changes are actually done on the same object that exists

56
00:02:58,855 --> 00:02:59,635
in Microsoft 365.

57
00:02:59,635 --> 00:03:02,645
The underlying infrastructure is the same.

58
00:03:02,645 --> 00:03:06,305
We're using the same technology, the Microsoft Entra ID tenant,

59
00:03:06,305 --> 00:03:11,739
whether we are using this admin center or we are using the

60
00:03:11,739 --> 00:03:14,313
Microsoft 365 admin center.

61
00:03:14,313 --> 00:03:16,520
So here I see all of my users.

62
00:03:16,520 --> 00:03:20,845
I can check my sign-in logs as well to see when was the last time

63
00:03:20,845 --> 00:03:22,805
that my users have signed in,

64
00:03:22,805 --> 00:03:26,928
and which devices that they've signed in from, in which location,

65
00:03:26,928 --> 00:03:30,688
what was their IP address, what service they accessed,

66
00:03:30,688 --> 00:03:34,052
whether it was successful or a failed access?

67
00:03:34,052 --> 00:03:36,932
All of this information is accessible through

68
00:03:36,932 --> 00:03:38,045
the sign-in logs.

69
00:03:38,045 --> 00:03:43,661
I can also find here my groups, all groups that are accessed

70
00:03:43,661 --> 00:03:45,279
in Microsoft 365,

71
00:03:45,279 --> 00:03:49,571
whether they be Security, Distribution, or Microsoft 365

72
00:03:49,571 --> 00:03:53,458
groups, are accessible here in Microsoft Entra ID.

73
00:03:53,458 --> 00:03:58,155
So Microsoft Entra ID is also where I'm going to be able to

74
00:03:58,155 --> 00:04:00,017
specify my domain name,

75
00:04:00,017 --> 00:04:03,757
even though my domain name is something that already

76
00:04:03,757 --> 00:04:05,224
exists in Microsoft

77
00:04:05,224 --> 00:04:07,137
365, I see them here as well.

78
00:04:07,137 --> 00:04:11,230
You can add the custom domain name as we did in Microsoft 365,

79
00:04:11,230 --> 00:04:14,201
or we can add it here in Microsoft Entra ID.

80
00:04:14,201 --> 00:04:18,119
Both tools allow you to perform the exact same task.

81
00:04:18,119 --> 00:04:22,356
So it's important to note that Microsoft Entra ID has some

82
00:04:22,356 --> 00:04:25,850
duplication with the Microsoft 365 admin center,

83
00:04:25,850 --> 00:04:27,340
and that is by design.

84
00:04:27,340 --> 00:04:33,006
These are two tools that have overlap when it comes to settings

85
00:04:33,006 --> 00:04:35,930
such as naming, users, and groups.

86
00:04:35,930 --> 00:04:39,279
However, some things can only be done in one portal as

87
00:04:39,279 --> 00:04:40,479
opposed to another.

88
00:04:40,479 --> 00:04:45,059
Multifactor authentication is one of those things that relates only

89
00:04:45,059 --> 00:04:46,794
to Entra ID admin center.

90
00:04:46,794 --> 00:04:50,847
Anything else that relates to authentication actually is managed

91
00:04:50,847 --> 00:04:54,000
through the Microsoft Entra admin center.


