Mcs Uat Form
Mcs Uat Form
Mcs Uat Form
MICROSOFT 365
Prepared To:
Prepared By:
Customer: Ministry of Civil Services
Title: User acceptance Test
Document Name: User acceptance Test documentation
Preparation
Release
2. On premise setup
Test approach
To see whether the hardware/software configurations are meet the business requirements and as
the project kicked-off. It confirms whether the solution works well or not.
Verify the above activities and confirm passed or failed. Passed Failed
2.2. Creating AD Organizational Units
Verify below activities and confirm passed or failed. Passed Failed
To create OU under MCS domain. Right click on MCS.gov > New > Organizational Unit and give the OU
name as your organization needs. Following are OUs were created as per MCS requirements.
Page 1 of 12
2.3. Creating AD Users
Verify below activities and confirm passed or failed. Passed Failed
To create user, select OU that users might resize right click on that OU > New > User give the user
information, First name, Last name, User logon name and password.
The sync service consists of two components, the on-premises Microsoft Entra Connect Sync component
and the service side in Microsoft Entra ID called Microsoft Entra Connect Sync service.
Page 2 of 12
OU filtering, select the OU that you want to sync the objects to Entra ID. We only sync objects under
“Ministry of Civil Service” OUs
To verify and ensure the synchronization is successful, login to Microsoft 365 admin center. On the
dashboard “Microsoft Entra Connect” all status should be green. And users should appear on the tenant.
Page 3 of 12
3. Configuring Microsoft 365 tenant
Page 4 of 12
3.2. Creating users on Office 365 and assign licenses
Verify below activities and confirm passed or failed. Passed Failed
You must be a global, license, or a user admin to add users and assign licenses.
• Go to the Microsoft 365 admin center at https://admin.microsoft.com/
• Go to Users > Active users and select Add a user.
In the Assign product licenses pane, select the location and the appropriate license for the user. Select
available licenses (you can also leave this blank and assign license later). Select Next.
You can assign or unassign licenses for users in the Microsoft 365 admin center on either the Active users
page, or on the Licenses page. Navigate to Billing > Licenses
From Licenses page select the license you want to assign > Assign license > search for user to assign.
Page 5 of 12
3.3. Creating groups on Office 365
Verify below activities and confirm passed or failed. Passed Failed
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
• Microsoft 365 Groups are used for collaboration between users, both inside and outside your
company. They include collaboration services such as SharePoint and Planner. Microsoft Teams uses
Microsoft 365 Groups for membership.
• Distribution groups are used for sending email notifications to a group of people.
• Security groups are used for granting access to resources such as SharePoint sites.
• Mail-enabled security groups are used for granting access to resources such as SharePoint and
emailing notifications to those users.
• Shared mailboxes are used when multiple people need access to the same mailbox, such as a
company information or support email address.
In the admin center, expand Teams & groups, and then select Active teams & groups.
Page 6 of 12
3.4. Configure Entra ID Conditional access policy MFA
Verify below activities and confirm passed or failed. Passed Failed
Use Conditional Access policies to apply the right access controls when needed to keep your organization
secure.
Creating a Conditional Access policy to enforce all admin users to do multifactor authentication.
• Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
• Browse to Protection > Conditional Access > Policies.
• Select New policy.
• Give your policy a name. We recommend that organizations create a meaningful standard for the
names of their policies. In this case we use “Require MFA for admins”
• Under Assignments, select Users or workload identities.
▪ Under Include, select admin users where you want to enforce.
▪ Under Exclude, select Users and groups and choose your organization's emergency access or
break-glass accounts.
• Under Target resources > Cloud apps > Include, select All cloud apps.
• Under Exclude, select any applications that don't require multifactor authentication.
• Under Access controls > Grant, select Grant access, Require multifactor authentication
• Confirm your settings and set Enable policy to Report-only.
• Select Create to create to enable your policy.
• After administrators confirm the settings using report-only mode, they can move the Enable policy
toggle from Report-only to On.
Page 7 of 12
3.5. Configure self-service password reset
Verify below activities and confirm passed or failed. Passed Failed
This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an
application.
• Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
• Browse to Protection > Password reset from the menu on the left side.
• From the Properties page, under the option Self-service password reset enabled, choose All. This
enabled for all users.
The following steps help create a Compliance policy for windows devices:
Page 8 of 12
• Browse to Devices
• From the Devices page, under the Manage devices section select Compliance.
• From the Compliance page, under Policies tap click Create policy, choose the device platform
“Windows 10 and later” click Create.
From Basics configuration page, give the policy name and meaningful description and click Next.
To begin creating Compliance policies for other devices platforms, following the instructions and choose the
respective device platforms to configure.
Page 9 of 12
With Intune, administrators can efficiently manage Microsoft Defender Antivirus updates across the
organization’s devices, ensuring that all devices have the latest protection against emerging threats. Here’s an
overview of how you can use Intune to manage Microsoft Defender Antivirus updates.
Page 10 of 12
o Profile, choose Endpoint detection and response
o Click Create.
Page 11 of 12
3.10. Configure defender Next-generation protection
Verify below activities and confirm passed or failed. Passed Failed
Microsoft Defender for Endpoint includes next-generation protection to catch and block all types of emerging
threats. The majority of modern malware is polymorphic, meaning it constantly mutates to evade detection. As
soon as one variant is identified, another takes its place. This rapid evolution underscores the need for agile and
innovative security solutions.
Next-generation protections, such as Microsoft Defender Antivirus blocks malware using local and cloud-
based machine learning models, behavior analysis, and heuristics. Microsoft Defender Antivirus uses
predictive technologies, machine learning, applied science, and artificial intelligence to detect and block
malware at the first sign of abnormal behavior.
• From Microsoft Intune admin center navigate to Endpoint security
• Under Manage, select Antivirus > Create policy
o Device platform, choose Windows
o Profile, choose Microsoft Defender Antivirus
o Click Create.
4. Acceptance sheet
Here by I confirm acceptance and agreement of this document and the contained.
Signature : Signature :
Position : Position :
Date : Date :
Page 12 of 12