Managing today’s risks and threats so you can sleep

Let our Certified Technology experts manage your internal and external systems support and security

Here is a more detailed explanation of how our Microsoft Gold Certified Technology experts help and secure your organization


Advisicon Microsoft 365 Administration Services

With the addition of many new modern advanced features and the extension of those features into the complex and threat rich environment of the cloud, the complexity for safely managing the environment has grown exponentially.

Advisicon’s Microsoft 365 Support delivers remote, telephone-based expert technical support for Customers who are subscribed to the following Microsoft Online Services:

  1. Microsoft 365
    1. Business
    2. Enterprise
    3. Education
    4. Non-profit
  2. Separate Subscriptions
    1. Office 365
    2. Enterprise Mobility & Security
    3. Windows 10

Managing and Monitoring Services

  1. Monitor user activities on your Office 365 accounts to analyze usage patterns as well as identify behavioral trends. For example, you can extract specific usage scenarios, such as files that are shared outside your organization or the most popular SharePoint sites.
  2. Monitor administrator activities to track configuration changes or high privilege operations.
  3. Detect and investigate unwanted user behavior, which can be customized for your organizational needs.
  4. Demonstrate audit and compliance. For example, you can monitor file access operations on confidential files, which can help you with the audit and compliance process.
  5. Perform operational troubleshooting by using log queries on top of Office 365 activity data of your organization.


Technical Description Non-Technical Title Value Description (Why is this Important) Key Benefits Key Pain Points Solved Key High-Level Deliverables or Tasks we Do when Delivering this Service Key Pricing or Package Ideas (i.e. bundles or time/cost blocks)
Monitor and troubleshoot Office 365 availability and usage


System Health Is the system functioning properly? Knowing if and when there are system issues ·        Troubleshooting system issues

·        Analyzing failure modes

·        Predicting system failures

·        Maintaining system health

·        Analyze reports

·        Monitor service health

·        Isolate service interruption

Manage Cloud Identities


Administer Users Ensure only authorized people have access Keep unauthorized people out of system No unauthorized access to system ·        Configure password management

·        Manage/Add/Remove/Restore users

·        Manage/Add/Remove security groups

·        Shared Mailboxes

·        Office 365 Groups

·        Manage Administrator Roles

Manage Subscriptions Provide access to software Control access to functionality Control subscription costs Software subscription management ·        Add/Monitor/Remove Organization Subscriptions

·        Add/Modify/Remove user licenses

Manage Tenant Settings Manage Applications Manage which applications are available Control system features Manage application inventory ·        Service Add-Ins (Apps and Settings)

·        Microsoft Business Apps (e.g. Bookings)

Security and Privacy Information Access Allow secure sharing of information Secure collaboration Managing individual and group access to data ·        Sharing Policy

·        Privacy Policy

Exchange email Provide email services Secure granular access to all email capabilities Simplifies managing multiple email identities and permissions ·        Mail Flow

·        Connectors

·        Archiving

·        Distribution Lists

·        Mailbox Aliases

Office Applications Use apps in browser Provide browser-based access to office applications Apps work on devices that do not have the app locally installed on them No need to install application software on devices Office Online Applications
Access Management Limit Access Control who can see what, and on what device Assign access based upon defined rules Keeping data private and controlled across multiple heterogeneous devices and operating systems ·        Conditional Access

·        Mobile Device Management

·        Role Based Access Control (RBAC)

Advanced Threat Protection Protect from attacks Defend from hackers and malware Prevents system and data breaches Protects from unwanted system intrusion by sophisticated attackers ·        Exchange Online Protection

·        Office 365 Advanced Threat Protection

·        Managing Safe Attachments

·        Managing Safe Links

·        Azure Advanced Threat Protection

·        Windows Defender Advanced Threat Protection

Mobility Phone & Tablet Access Provide access to mobile devices Users can access the system from their own personal devices anywhere and anytime Fixes no access or poor access to system when users are not physically at the office and inside the firewall Enroll Devices to Mobile Device Management
Data Loss Prevention Data survivability Protect sensitive information Keep sensitive information private Prevents privacy and financial information from being compromised Audit Data Loss Prevention Policies
Data Governance Manage data appropriately Apply compliance policies for data sensitivity or regulatory reasons Meet regulatory requirements for data retention Makes sure that historic data remains accessible as required by law ·        Archiving Polices

·        Retention Polices

Managing Search and Investigations Understand search access Manage search access and see who is looking Make sure that sensitive information can’t be discovered without explicit permissions Prevents search from disclosing information to people not authorized to view that information ·        eDiscovery

·        Audit Log Monitor

Device Enrollment Control device access Add or remove devices from your network Automates a complex multi-faceted access problem Automates a process that may need to manage thousands of devices with diverse security parameters ·        Autopilot

·        Azure AD Join

Remote Support Manage Centrally Manage applications, features, and security remotely, without having to access devices Centralized administration by authorized administrators Administrators can see ALL users, devices, and permissions from one central location, and do not have to physically administer individual devices ·        Install Apps

·        Monitor and configure authentication

·        Monitor and manage device security


Microsoft 365 Migration Services

Office 365 Planning, configuration and migration services

Provision Office 365 ·        Provision tenants

·        Add and configure custom domains

Plan and implement network security in Office 365 ·        Configure DNS records for services

·        Enable client connectivity to Office 365

·        Azure Rights Management Service (RMS)

·        Office 365 Multi-Factor Authentication

Implement and manage identities using Azure AD Connect: ·        Prepare on-premises Active Directory for Azure AD Connect

·        Set up Azure AD Connect tool

Exchange Online Migration ·        Configure and implement mailbox migration from On-Premise Exchange or other cloud-based providers (e.g. Google Mail)

·        Configure anti-malware, anti-spam and advanced threat protection policies,

OneDrive Migration ·        Plan and implement user storage to Microsoft Cloud
Plan for Office clients


·        Configure Outlook, Skype for Business client, Teams client, Office Online, and Visio Online; choosing between Click-to-Run or Windows Installer (MSI); implement modern authentication for Office 365 clients


Security Administration auditing, planning and configuration services

Security Audit ·        Review Microsoft 365 Tenant for security threats and compliance standards

·        Use Best Practice Standards, Microsoft Secure Score and Data Compliance Standards to audit tenant.

Plan and Implement Advanced Threat Protection ·        Exchange Online Protection

·        Office 365 Advanced Threat Protection

·        Safe Attachments

·        Safe Links

·        Azure Advanced Threat Protection

·        Windows Defender Advanced Threat Protection

Threat Intelligence Configuration ·        Microsoft 365 Threat Intelligence

·        Advanced Threat Analytics

Plan and configure Access Management ·        Conditional Access Policies

·        Device Access Policies

·        Role Based Access Control (RBAC)

·        Solutions for External Access (B2C, B2B)

Information Protection ·        Information Rights Management

·        Office 365 Message Encryption

·        Azure Information Protection

·        Advanced Information Protection

·        Windows Information Protection

·        Data Loss Prevention Policies

·        Office 365 Cloud App Security

Data Governance ·        Retention Policies

·        Archiving Policies

·        Compliance Policies

Mobility ·        Plan for Mobile Application Management

·        Plan for Mobile Device Management

·        Deploy Mobile Device Management

·        Enroll Devices to Mobile Device Management

Windows 10 as a service: planning and implementing services

Deployment Planning ·        Windows Autopilot configuration

·        Device compliance plan

·        Device deployment plan

Application deployment ·        Application Deployment plan
Environment Readiness Audit ·        Network Audit

·        Device Readiness Audit

Security Planning ·        Device protection planning and implementation

·        Access Management

Advisicon is a Project, Program & Portfolio Management Company. We transform your organization's project management with a mix of methodology and technology that delivers results. Our team specializes in technology implementations, application and workflow development, training and consulting.
5411 NE 107th Ave, Suite 200
United States