Microsoft 365 productivity illustrations

The Microsoft 365 enterprise solution series provides guidance for implementing Microsoft 365 capabilities, especially where capabilities cross technologies, including Teams architecture diagrams.

The logical architecture of productivity services in Microsoft 365, leading with Microsoft Teams.

Item Description
Teams logical architecture poster
PDF | Visio
Updated January 2021
Microsoft provides a suite of productivity services that work together to provide collaboration experiences with data governance, security, and compliance capabilities.

This series of illustrations provides a view into the logical architecture of productivity services for enterprise architects, leading with Microsoft Teams.

Groups in Microsoft 365 for IT Architects

This illustration includes information for IT architects about Microsoft 365 Groups. To learn about configuring and administering Microsoft 365 Groups and teams for collaboration in your organization, see Set up secure collaboration with Microsoft 365 and What is collaboration governance?.

Item Description
Thumb image for groups infographic
PDF | Visio
Updated May 2020
These illustrations detail the different types of groups, how these are created and managed, and a few governance recommendations.

Migrate to Microsoft 365

Microsoft provides tools to migrate your on-premises network file shares and SharePoint Server sites to Microsoft 365 with an emphasis on protecting and ensuring your content's security during migration. This set of illustrations demonstrates the various methods available to move your content to SharePoint, Teams, and OneDrive and how your data flows through the process.

Item Description
Model poster: Migrate to Microsoft 365
PDF|Visio
Updated March 2021
Includes:
  • File share migration
  • SharePoint Server migration

For more information, see Migrate your content to Microsoft 365.

Microsoft 365 information protection and compliance capabilities

Microsoft 365 includes a broad set of information protection and compliance capabilities. Together with Microsoft’s productivity tools, these capabilities are designed to help organizations collaborate in real time while adhering to stringent regulatory compliance frameworks.

This set of illustrations uses one of the most regulated industries, financial services, to demonstrate how these capabilities can be applied to address common regulatory requirements. Feel free to adapt these illustrations for your own use.

Item Description
Model poster: Microsoft 365 information protection and compliance capabilities
English: Download as a PDF | Download as a Visio
Japanese: Download as a PDF | Download as a Visio
Updated November 2020
Includes:
  • Microsoft information protection and data loss prevention
  • Retention policies and retention labels
  • Information barriers
  • Communication compliance
  • Insider risk
  • Third-party data ingestion

Security and Information Protection for Multi-Region Organizations

Security and information protection for multi-region organizations with a single Microsoft 365 tenant

Item Description
Multi-region infographic
PDF | Visio
Updated March 2020
Using a single Microsoft 365 tenant for your global organization is the best choice and experience for many reasons. However, many architects wrestle with how to meet security and information protection objectives across different regions. This set of topics provides recommendations.

Microsoft Defender for Endpoint deployment strategy

Depending on your environment, some tools are better suited for certain architectures.

Item Description
Thumb image for Microsoft Defender for Endpoint deployment strategy
PDF | Visio
Updated February 2020
The architectural material helps you plan your deployment for the following architectures:
  • Cloud-native
  • Co-management
  • On-premise
  • Evaluation and local onboarding

Identity and device protection for Microsoft 365

Recommended capabilities for protecting identities and devices that access Microsoft 365, other SaaS services, and on-premises applications published with Azure AD Application Proxy.

Item Description
Model poster: Identity and device protection for Microsoft 365
View as a PDF | Download as a PDF | Download as a Visio
Updated September 2020
It's important to use consistent levels of protection across your data, identities, and devices. This model shows you which capabilities are comparable with more information on capabilities to protect identities and devices.

Advanced eDiscovery architecture in Microsoft 365

Advanced eDiscovery end-to-end workflow and data flow, including within Microsoft 365 Multi-Geo environments.

Item Description
Model poster: Advanced eDiscovery Architecture in Microsoft 365
View as an image | Download as a PDF | Download as a Visio
Updated October 2020
Includes:
  • End-to-end workflow in a single environment
  • End-to-end workflow in a Microsoft 365 Multi-Geo environment
  • End-to-end data flow supporting the EDRM workflow

Microsoft Telephony Solutions

Microsoft supports several options as you begin your journey to Teams in the Microsoft cloud. This poster helps you decide which Microsoft telephony solution (Phone System in the cloud or Enterprise Voice on-premises) is right for users in your organization, and how your organization can connect to the Public Switched Telephone Network (PSTN).

Item Description
Microsoft Telephony Solutions poster
PDF | Visio
Updated March 2021
For more information, see Plan your Teams voice solution.

Set up your infrastructure for hybrid work

With Microsoft 365 and other Microsoft cloud technologies, you can provide your workers with secure access to your organization's on-premises and cloud-based information, tools, and resources from their homes.

Set up your infrastructure for hybrid work poster
PDF | PowerPoint
Updated June 2021

For more information, see the article for this poster: Set up your infrastructure for hybrid work with Microsoft 365.

Microsoft Teams with security isolation

With Microsoft 365, you can configure a private team in Microsoft Teams and use SharePoint site security settings and a unique sensitivity label to encrypt files so that only team members can decrypt them.

Microsoft Teams with security isolation poster
PDF | PowerPoint
Updated August 2020

For more information, see the article for this poster: Configure a team with security isolation.

See Also

Architectural models for SharePoint, Exchange, Skype for Business, and Lync

Cloud adoption Test Lab Guides (TLGs)