Enterprise IT Operations with Microsoft Ecosystem

Introduction:

This course is designed to provide hands-on, real-world knowledge of managing enterprise IT
environments using Microsoft technologies. From Windows Server infrastructure to user
productivity tools in Office 365, the course integrates server management, identity services,
endpoint administration, automation, and collaboration tools used in modern organizations

Pre-Requisites:

• Basic computer literacy
• Understanding of networking fundamentals
• Familiarity with Windows OS (client version)
• Internet access and a laptop/PC for lab work

Target Audience:

• IT Support Professionals
• System Administrators
• Network Engineers
• Helpdesk Technicians
• IT Students and Freshers aiming for Microsoft 365 or system administration roles

Eaze-IT enables businesses to execute projects successfully, combining strategic insight with practical expertise to drive measurable outcomes.

Course Modules Overview:

1. What is Windows Server and its role
2. Different versions and editions
3. Installing Windows Server
4. Configuring Server Manager
5. Server Core vs Desktop Experience
6. Server roles and features
7. Licensing and activation
8. Introduction to Hyper-V

1. Creating local users and groups
2. Managing user profiles
3. Setting permissions
4. Using Group Policy for user control
5. Understanding NTFS vs Share permissions
6. Password policies
7. Account lockout settings
8. Administrative best practices

1. What is Active Directory
2. Installing AD DS role
3. Creating and managing domains
4. Organizational Units (OUs)
5. User, Group, and Computer accounts
6. Group Policy Objects (GPOs)
7. Domain trust relationships
8. Active Directory best practices

1. Installing DNS and DHCP roles
2. Creating and managing DNS zones
3. Forwarders and conditional forwarding
4. DHCP scopes and leases
5. DHCP options and reservations
6. DNS record types
7. Dynamic DNS
8. Troubleshooting name resolution

1. Introduction to SCCM
2. SCCM architecture overview
3. Installing SCCM server
4. Adding site roles
5. Device collection and grouping
6. Application deployment
7. Patch management
8. Monitoring and reporting

1. What is Intune?
2. Microsoft Endpoint Manager portal
3. Device enrollment methods
4. App deployment
5. Compliance policies
6. Conditional access
7. Role-based access control (RBAC)
8. Intune vs SCCM comparison

1. What is Microsoft 365 (formerly O365)?
2. Overview of productivity apps
3. Office 365 licensing and subscription
4. Installation and deployment
5. Admin portal walkthrough
6. Account and license management
7. Security and compliance overview
8. Integration with Windows Server

1. Introduction to Teams
2. Creating teams and channels
3. Scheduling and managing meetings
4. File sharing and co-authoring
5. Using apps and connectors
6. Admin settings and policies
7. Chat, calls, and presence features
8. Teams for hybrid work scenarios

1. Setting up Outlook accounts
2. Email management features
3. Calendar and scheduling
4. Contacts and people
5. Rules and mailbox cleanup
6. Shared mailboxes
7. Using Outlook on web
8. Troubleshooting Outlook issues

1. Introduction to cloud storage
2. File sync and sharing
3. Version history and file recovery
4. Access control and permissions
5. OneDrive vs SharePoint
6. Admin configuration
7. Integration with Office apps
8. Troubleshooting sync issues

1. File Services Role
2. Configuring shares
3. Storage pools and spaces
4. Quotas and file screening
5. Access-based enumeration
6. Distributed File System (DFS)
7. Shadow copies
8. SMB settings and tuning

1. Introduction to PowerShell
2. Cmdlets, Aliases, and Syntax
3. Running scripts and policies
4. Managing users and groups
5. Working with services and processes
6. Using pipeline and filtering
7. Creating functions and loops
8. Scripting best practices

1. Task Manager and Resource Monitor
2. Event Viewer basics
3. Performance Monitor
4. Disk and memory tuning
5. Task Scheduler
6. Using PowerShell for monitoring
7. Logging and alerting
8. Troubleshooting tools

1. Windows Backup tools
2. System Restore
3. Volume Shadow Copy
4. Backup schedule automation
5. Disaster recovery planning
6. Bare metal recovery
7. Recovery using installation media
8. Cloud backup options

1. Windows Firewall and Defender
2. BitLocker and encryption
3. User account control (UAC)
4. Security baselines
5. Threat detection tools
6. Auditing and logging
7. Role-based access
8. Compliance in Microsoft 365

1. What is ITIL and service desk
2. Introduction to ticketing systems
3. Using ServiceNow (SNOW)
4. Creating, assigning, and closing tickets
5. Automating workflows
6. IT service catalog basics
7. SLAs and escalation
8. Integration with Microsoft tools

How Can We Support You?

Reach out to our EAZE IT team anytime or send us your inquiry online — we’re here 24/7 to assist with your IT needs.

“At EAZE-IT, we see technology as a bridge to growth and innovation. By combining precision with creativity, our team delivers reliable, future-ready solutions that help clients stay ahead in a fast-changing digital world.”

Yoshinobu Shijo
CTO, EAZE IT JAPAN

Ready to Enroll This Course?

This website uses cookies and asks your personal data to enhance your browsing experience. We are committed to protecting your privacy and ensuring your data is handled in compliance with the General Data Protection Regulation (GDPR).