SlideShare una empresa de Scribd logo
1 de 52
Descargar para leer sin conexión
Focusing on security with
Microsoft 365 Business
June 2018
@directorcia
http://about.me/ciaops
1Q48VMiR152XNuDEkfV3khFdiYoBPGH4V4
Support this content
via Bitcoin
• Security is a journey NOT a destination !
• Security is something that just can’t be turned on
• Nobody ever calls to tell you that everything is working
• Users just want the technology to work
• Security is about reducing risk
• Got access denied ? Good !
• You alone are responsible for your IT security
• The easiest way is not the most secure
• Cost of pro active security is less that post active recovery
• What is your security situation now ?
• Initial entry is everything
• What is the impact of failure ?
• Have you done a security assessment ?
Q. How many exploits do YOU have to defend
against ?
A. Every single one
Q. How many exploits does ANYONE need to
find ?
A. Just one !
The Security Dilemma
Complexity is enemy of security
What does today look
like for your customers?
Local Logins
/MSA
New PCs
bought adhoc
PCs refreshed
when dead
Employees
using personal
mobile devices
IT purchasing
decisions
made “on the spot”
“GOOD
ENOUGH”
PLATFORMS
LEGACY
BACK OFFICE
NO
TECHNOLOGY
STRATEGY
FRAGMENTED
END-POINT
SOLUTIONS
Notifiable Data Breaches (NDB) scheme in Australia
• Starting on 22nd February 2018
• Australian organisations are required to notify any
individuals likely to be at risk of serious harm by a data
breach.
• Examples of a data breach include when:
o a device containing customers’ personal
information is lost or stolen
o a database containing personal information is
hacked
o personal information is mistakenly provided to the
wrong person.
• For more information visit https://oaic.gov.au
Providing clarity and consistency for the
protection of personal data
Enhanced personal privacy rights
Increased duty for protecting data
Mandatory breach reporting
Significant penalties for non-compliance
The General Data Protection
Regulation (GDPR) imposes new
rules on organizations in the European
Union (EU) and those that offer goods
and services to people in the EU, or that
collect and analyze data tied to EU
residents, no matter where they are
located.
Office 365
Business Premium
Office Applications:
Word, Excel, PowerPoint, Outlook,
OneNote, Publisher, and Access
Online Services:
Exchange, OneDrive (1TB),
Skype for Business, SharePoint, Teams
Business Apps:
Bookings, Staff Hub,
Outlook Customer Manager
Includes upgrade benefits from Windows 7 Professional or Windows 8.1 Pro to Windows 10 Pro at no additional cost
Enhanced Security
Cross-platform
Consistent Security configuration across
Windows 10, Android and iOS devices
Documents encryption and enforced Multi
Factor Authentication and restricted copy/paste
Device data encryption with BitLocker and
remote wipe for lost or stolen devices
Information Rights Management, Intelligent
Labeling and Data Loss Prevention tips
Device protection against ransomware and
malicious websites with Windows Exploit Guard
Device Management &
Simplified Admin
Always up-to-date Office, Windows and
Windows Defender anti virus
Streamlined deployment of PCs
with Windows AutoPilot
Auto-installation of Office apps
on Windows 10 Devices
Mobile Device Management for Windows 10,
Android, iOS and Mac with Microsoft Intune
Exchange Online archiving & preservation
policies to recover data or remain compliant
Microsoft 365 Business
An integrated solution to securely run and grow your business
+ +
New features in Microsoft 365 Business (April 2018)
• Office 365 Advanced Threat Protection1
Attachment scanning & ML detection to catch
suspicious attachments
Link Scanning/Checking to prevent users from
clicking suspicious links
• Windows Exploit Guard Enforcement
Preventing devices from ransomware and malicious
websites at device end points
Cyber Threats
• Data Loss Prevention2
Does Deep Content Analysis to easily identify, monitor,
and protect sensitive information from leaving org
• Azure Information Protection P1
Controls & Manages how sensitive content is accessed
• Intune Availability
Protecting data across devices with E2E Device and
app management
• Exchange Online archiving
100GB Archiving & preservation policies to recover
data or remain compliant
• Bitlocker Enforcement
Encrypt Data on devices to protect data if device
lost or stolen
Safeguard Sensitive Information
1
2
3
Back End
• Hybrid Active Directory Deployment3
To support customers with on premise infrastructure
Microsoft 365 Business
One subscription for Productivity + Security + Device Management
3rd party
solutions
(bought separately,
expensive & hard to
integrate)
Archiving
Data Loss Prevention
Email
Email Threat Protection
Device Anti Virus
Email Filtering
Productivity Software
Storage
Online Chat & Meetings
Device Management
Data Loss Prevention
Email + Device Threat Protection
Archiving + Litigation Hold
Device & App Management
PCs, Macs, iOS & Android
Email Filtering
Windows Defender AV
1 TB File Storage
50 GB Cloud Email
Teams & Skype for Business
Office
(Word, PowerPoint, Excel, Outlook, Onenote)
Information Protection
vs.
AU$28 Per user
standalone
Microsoft 365
Business
(all included, seamlessly
integrated)
Features (new in blue)
Office 365
BP
Microsoft 365
Business
Microsoft 365
E3
Microsoft 365
E5
Estimated retail price per user per month $USD (with annual commitment) $17.49 $28.07 $49.06 $89.21
Maximum number of users 300 300 unlimited unlimited
Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote,
Access), Office Online
Business Business ProPlus ProPlus
Email & Calendar Outlook, Exchange Online 50GB 50GB unlimited unlimited
Chat-based
Workspace, Meetings
Microsoft Teams, Skype For Business ⚫ ⚫ ⚫ ⚫
File Storage OneDrive for Business 1 TB 1 TB unlimited unlimited
Social, Video, Sites Yammer, SharePoint Online, Planner ⚫ ⚫ ⚫ ⚫
Stream ⚫ ⚫ ⚫
Business Apps Scheduling Apps – Booking, StaffHub ⚫ ⚫ ⚫ ⚫
Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2
⚫ ⚫
Threat Protection Microsoft Advanced Threat Analytics, Device Guard, Credential Guard, App Locker, Enterprise Data Protection, ⚫ ⚫
Office 365 Advanced Threat Protection ⚫ ⚫
Windows Defender Advanced Threat Protection ⚫
Office 365 Threat Intelligence ⚫
Identity & Access
Management
Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps ⚫ ⚫ ⚫
Azure Active Directory - Conditional Access, SSPR Hybrid Identities, Cloud App Discovery, AAD Connect Health ⚫ ⚫
Credential Guard and Direct Access ⚫ ⚫
Azure Active Directory Plan 2 ⚫
Device & App
Management
Microsoft Intune, Windows AutoPilot ⚫ ⚫ ⚫
Microsoft Desktop Optimization Package, VDA ⚫ ⚫
Information
Protection
Unlimited Exchange Archiving3, Office 365 Data Loss Prevention*, Azure Information Protection Plan 1 ⚫ ⚫ ⚫
Azure Information Protection Plan 2, Microsoft Cloud App Security, O365 Cloud App Security ⚫
On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype, Windows, SCCM, Win. Rights Management) ⚫ ⚫
Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests ⚫ ⚫ ⚫
Advanced eDiscovery, Customer Lockbox, Advanced Data Governance ⚫
Analytics Power BI Pro, MyAnalytics ⚫
Voice PSTN Conferencing, Cloud PBX ⚫
[1] Available in US, UK, Canada; [2] Currently in public preview in US, UK, Canada; [3] Unlimited when auto-expanding turned on *Data Loss Prevention Features will be available summer 2018
Detailed comparison of plans
Microsoft 365
powered device
The best way to experience Microsoft 365
Some Standard Offerings
•Data in transit
• Strong SSL/TLS cipher suite
• Perfect Forward Secrecy
• Datacenter-to-datacenter encryption
•Data at rest
• BitLocker disk encryption
• Per-file encryption for customer
content
Default Encryption
Mobile Apps
Multi-factor authentication
Text MessagesPhone Calls
Push Notification
One-Time-Passcode
(OTP) Token
Phone Calls Text
One-Time Passcode
(OTP) by Text
Code
Code
One-Time app
passcode
Passwordless strong authentication via
multiple factors
▪ PC + PIN or Biometrics
▪ PC + Companion Device
▪ PC supported Biometrics: fingerprint & facial
▪ Companion Device can support other
biometrics options (e.g.: EKG)
Supported on any Windows 10 device
>100 devices supporting biometrics
WINDOWS HELLO FOR BUSINESS
Device
Management
Microsoft Intune
Mobile Device Management
Built-InMDM Office 365 Built-in Microsoft Intune
Conditional
Access
Selective
Wipe
LoB
app
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Security and Compliance
Center
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Safeguard your data:
Protectionfromthreats
AI-powered attachment scanning
detects malware previously not seen
Links are checked in real time to warn
you if the destination is a malicious site
Windows devices are monitored for
suspicious processes like ransomware
Safeguard your data:
Protectionfromdataleaks
Apply data loss prevention policies to
help keep sensitive information from
falling into the wrong hands*
Enforce BitLocker device encryption to
protect data if a computer is lost or
stolen
Manage all your devices—PCs, Mac, iOS,
and Android—with full-featured Intune
management
Safeguard your data:
Controldataaccess
​Apply encryption and restrictions like
do not forward to emails and
documents
Remotely wipe business data without
affecting personal information
Require PIN or fingerprint to access
business documents and data
Email archiving and retention
Preserve Search
Secondary mailbox with
separate quota
Managed through EAC or
PowerShell
Available on-premises,
online, or through EOA
Automated and time-
based criteria
Set policies at item or
folder level
Expiration date shown
in email message
Capture deleted and
edited email messages
Time-Based In-Place Hold
Granular Query-Based In-
Place Hold
Optional notification
Web-based eDiscovery Center
and multi-mailbox search
Search primary, In-Place Archive,
and recoverable items
Delegate through roles-based
administration
De-duplication after discovery
Auditing to ensure controls
are met
In-Place Archive Governance Hold eDiscovery
Data Loss Prevention (DLP)
Focusing on security with Microsoft 365 Business
Protectsensitive documentsfrom
being accidentlyshared outside
your organization
Nocodingrequired; simply upload
sample documentstocreate
fingerprints
Scan emailand attachments to
lookforpatterns that match
documenttemplates
DLP document fingerprinting
Access
control
Document
tracking
Data
encryption
Azure Active Directory
Share internally and externally
Authentication and collaborationAzure Rights
Management services
Lifecycle of a sensitive document
Data is created, imported,
& modified across
various locations
Data is detected
Across devices, cloud
services, on-prem
environments
Sensitive data is
classified & labeled
Based on sensitivity;
used for either
protection policies or
retention policies
Data is protected
based on policy
Protection may in the
form of encryption,
permissions, visual
markings, retention,
deletion, or a DLP action
such as blocking sharing
Data travels across
various locations, shared
Protection is persistent,
travels with the data
Data is monitored
Reporting on data
sharing, usage,
potential abuse; take
action & remediate
Retain, expire,
delete data
Via data
governance policies
Vendor 2
Azure Rights
Management
!
Sender Vendor
Username
Password
john@vendor.com
•••••••••••••
Username
Password
sarah@vendor.com
•••••••••••••
Mobile Device Management
(MDM)
ITUser
Enterprise
Mobility Suite
Identify and authorize
user
Apply device policies
Apply application policies
Apply content
policies
Active Directory Premium
Rights Management
Personal apps
Managed apps Company Portal
Are you sure you want to wipe
corporate data and applications
from the user’s device?
OK Cancel
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
ITIT
Personal apps
Managed apps
Maximize productivity while preventing leakage of company
data by restricting actions such as copy/cut/paste/save in
your managed app ecosystem
User
Focusing on security with Microsoft 365 Business
Hold and eDiscovery
Automated time-based criteria to
delete
Set policies at item or folder level
– admin or user
Set site level retention polices
Search across multiple
products
De-duplication & search
statistics
Case management
Export search results
Integrated tools to help you preserve, expire, and discover data
eDiscovery and In-Place Hold in Office 365
Data Held In-Place
Customize holds based on filters
Hold across multiple products in a
single action
Capture deleted & edited
messages
Conditional Access
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Resources
• Office 365 Trust Center - http://www.abc.net.au/news/2018-03-15/sensitive-data-stolen-from-
global-shipping-company-svitzer/9552600
• Office 365 Compliance - https://technet.microsoft.com/en-au/library/office-365-compliance.aspx
• Overview of DLP - https://support.office.com/en-us/article/Overview-of-data-loss-prevention-
policies-1966b2a7-d1e2-4d92-ab61-42efbb137f5e
• Create a DLP policy from a template - https://support.office.com/en-us/article/Create-a-DLP-
policy-from-a-template-59414438-99f5-488b-975c-5023f2254369
• What the DLP policy template includes - https://support.office.com/en-us/article/What-the-
DLP-policy-templates-include-c2e588d3-8f4f-4937-a286-8c399f28953a
• Office 365 Advanced Threat Protection - https://support.office.com/en-us/article/office-365-
advanced-threat-protection-e100fe7c-f2a1-4b7d-9e08-622330b83653
CIAOPS Resources
• Blog – http://blog.ciaops.com
• Free SharePoint Training via email – http://bit.ly/cia-gs-spo
• Free Office 365, Azure Administration newsletter – http://bit.ly/cia-o365-tech
• Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops
• Free documents, presentations, eBooks – http://docs.com/ciaops
• Office 365, Azure, Cloud podcast – http://ciaops.podbean.com
• Office 365, Azure online training courses – http://www.ciaopsacademy.com
• Office 365 and Azure community – http://www.ciaopspatron.com/
Twitter
@directorcia
Facebook
https://www.facebook.com/ciaops
Email
director@ciaops.com
Skype for Business
admin@ciaops365.com
1Q48VMiR152XNuDEkfV3khFdiYoBPGH4V4
Support this content via Bitcoin

Más contenido relacionado

La actualidad más candente

Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterDavid J Rosenthal
 
All Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 PlansAll Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 PlansGetMax DMCC
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Shift to a modern desktop with microsoft 365
Shift to a modern desktop with microsoft 365Shift to a modern desktop with microsoft 365
Shift to a modern desktop with microsoft 365DavidSimpsoncloudsol
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
August 2019 Microsoft 365 Need to Know Webinar
August 2019 Microsoft 365 Need to Know WebinarAugust 2019 Microsoft 365 Need to Know Webinar
August 2019 Microsoft 365 Need to Know WebinarRobert Crane
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...Jürgen Ambrosi
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
Productivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopProductivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopDavid J Rosenthal
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanDavid J Rosenthal
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Ronni Pedersen
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 

La actualidad más candente (20)

Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
All Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 PlansAll Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 Plans
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Shift to a modern desktop with microsoft 365
Shift to a modern desktop with microsoft 365Shift to a modern desktop with microsoft 365
Shift to a modern desktop with microsoft 365
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
August 2019 Microsoft 365 Need to Know Webinar
August 2019 Microsoft 365 Need to Know WebinarAugust 2019 Microsoft 365 Need to Know Webinar
August 2019 Microsoft 365 Need to Know Webinar
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
Productivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopProductivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern Desktop
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 

Similar a Focusing on security with Microsoft 365 Business

In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksIT Masterclasses
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha ChathurangaaOS Community
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365NovaQuantum
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceIT Masterclasses
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Microsoft 365 business
Microsoft 365 businessMicrosoft 365 business
Microsoft 365 businessayeshaurooj104
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationPatrick Leckie
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 

Similar a Focusing on security with Microsoft 365 Business (20)

In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR compliance
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Microsoft 365 business
Microsoft 365 businessMicrosoft 365 business
Microsoft 365 business
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 

Más de Robert Crane

September 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarRobert Crane
 
August 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarAugust 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarRobert Crane
 
July 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarJuly 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarRobert Crane
 
June 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarJune 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarRobert Crane
 
May 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarMay 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarRobert Crane
 
April 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarApril 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarRobert Crane
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarRobert Crane
 
January 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarJanuary 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarRobert Crane
 
December 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarDecember 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarRobert Crane
 
November 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarNovember 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarRobert Crane
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarRobert Crane
 
September 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarSeptember 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarRobert Crane
 
August 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarAugust 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarRobert Crane
 
July 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarJuly 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarRobert Crane
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarRobert Crane
 
May 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarMay 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarRobert Crane
 
April 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarApril 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarRobert Crane
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
March 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarMarch 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarRobert Crane
 

Más de Robert Crane (20)

202310
202310202310
202310
 
September 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know Webinar
 
August 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarAugust 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know Webinar
 
July 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarJuly 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know Webinar
 
June 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarJune 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know Webinar
 
May 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarMay 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know Webinar
 
April 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarApril 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know Webinar
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
January 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarJanuary 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know Webinar
 
December 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarDecember 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know Webinar
 
November 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarNovember 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know Webinar
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
 
September 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarSeptember 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know Webinar
 
August 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarAugust 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know Webinar
 
July 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarJuly 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know Webinar
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
 
May 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarMay 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know Webinar
 
April 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarApril 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know Webinar
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
March 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarMarch 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know Webinar
 

Último

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 

Último (12)

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 

Focusing on security with Microsoft 365 Business

  • 1. Focusing on security with Microsoft 365 Business June 2018 @directorcia http://about.me/ciaops 1Q48VMiR152XNuDEkfV3khFdiYoBPGH4V4 Support this content via Bitcoin
  • 2. • Security is a journey NOT a destination ! • Security is something that just can’t be turned on • Nobody ever calls to tell you that everything is working • Users just want the technology to work • Security is about reducing risk • Got access denied ? Good ! • You alone are responsible for your IT security
  • 3. • The easiest way is not the most secure • Cost of pro active security is less that post active recovery • What is your security situation now ? • Initial entry is everything • What is the impact of failure ? • Have you done a security assessment ?
  • 4. Q. How many exploits do YOU have to defend against ? A. Every single one Q. How many exploits does ANYONE need to find ? A. Just one !
  • 6. Complexity is enemy of security
  • 7. What does today look like for your customers? Local Logins /MSA New PCs bought adhoc PCs refreshed when dead Employees using personal mobile devices IT purchasing decisions made “on the spot” “GOOD ENOUGH” PLATFORMS LEGACY BACK OFFICE NO TECHNOLOGY STRATEGY FRAGMENTED END-POINT SOLUTIONS
  • 8. Notifiable Data Breaches (NDB) scheme in Australia • Starting on 22nd February 2018 • Australian organisations are required to notify any individuals likely to be at risk of serious harm by a data breach. • Examples of a data breach include when: o a device containing customers’ personal information is lost or stolen o a database containing personal information is hacked o personal information is mistakenly provided to the wrong person. • For more information visit https://oaic.gov.au
  • 9. Providing clarity and consistency for the protection of personal data Enhanced personal privacy rights Increased duty for protecting data Mandatory breach reporting Significant penalties for non-compliance The General Data Protection Regulation (GDPR) imposes new rules on organizations in the European Union (EU) and those that offer goods and services to people in the EU, or that collect and analyze data tied to EU residents, no matter where they are located.
  • 10. Office 365 Business Premium Office Applications: Word, Excel, PowerPoint, Outlook, OneNote, Publisher, and Access Online Services: Exchange, OneDrive (1TB), Skype for Business, SharePoint, Teams Business Apps: Bookings, Staff Hub, Outlook Customer Manager Includes upgrade benefits from Windows 7 Professional or Windows 8.1 Pro to Windows 10 Pro at no additional cost Enhanced Security Cross-platform Consistent Security configuration across Windows 10, Android and iOS devices Documents encryption and enforced Multi Factor Authentication and restricted copy/paste Device data encryption with BitLocker and remote wipe for lost or stolen devices Information Rights Management, Intelligent Labeling and Data Loss Prevention tips Device protection against ransomware and malicious websites with Windows Exploit Guard Device Management & Simplified Admin Always up-to-date Office, Windows and Windows Defender anti virus Streamlined deployment of PCs with Windows AutoPilot Auto-installation of Office apps on Windows 10 Devices Mobile Device Management for Windows 10, Android, iOS and Mac with Microsoft Intune Exchange Online archiving & preservation policies to recover data or remain compliant Microsoft 365 Business An integrated solution to securely run and grow your business + +
  • 11. New features in Microsoft 365 Business (April 2018) • Office 365 Advanced Threat Protection1 Attachment scanning & ML detection to catch suspicious attachments Link Scanning/Checking to prevent users from clicking suspicious links • Windows Exploit Guard Enforcement Preventing devices from ransomware and malicious websites at device end points Cyber Threats • Data Loss Prevention2 Does Deep Content Analysis to easily identify, monitor, and protect sensitive information from leaving org • Azure Information Protection P1 Controls & Manages how sensitive content is accessed • Intune Availability Protecting data across devices with E2E Device and app management • Exchange Online archiving 100GB Archiving & preservation policies to recover data or remain compliant • Bitlocker Enforcement Encrypt Data on devices to protect data if device lost or stolen Safeguard Sensitive Information 1 2 3 Back End • Hybrid Active Directory Deployment3 To support customers with on premise infrastructure
  • 12. Microsoft 365 Business One subscription for Productivity + Security + Device Management 3rd party solutions (bought separately, expensive & hard to integrate) Archiving Data Loss Prevention Email Email Threat Protection Device Anti Virus Email Filtering Productivity Software Storage Online Chat & Meetings Device Management Data Loss Prevention Email + Device Threat Protection Archiving + Litigation Hold Device & App Management PCs, Macs, iOS & Android Email Filtering Windows Defender AV 1 TB File Storage 50 GB Cloud Email Teams & Skype for Business Office (Word, PowerPoint, Excel, Outlook, Onenote) Information Protection vs. AU$28 Per user standalone Microsoft 365 Business (all included, seamlessly integrated)
  • 13. Features (new in blue) Office 365 BP Microsoft 365 Business Microsoft 365 E3 Microsoft 365 E5 Estimated retail price per user per month $USD (with annual commitment) $17.49 $28.07 $49.06 $89.21 Maximum number of users 300 300 unlimited unlimited Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote, Access), Office Online Business Business ProPlus ProPlus Email & Calendar Outlook, Exchange Online 50GB 50GB unlimited unlimited Chat-based Workspace, Meetings Microsoft Teams, Skype For Business ⚫ ⚫ ⚫ ⚫ File Storage OneDrive for Business 1 TB 1 TB unlimited unlimited Social, Video, Sites Yammer, SharePoint Online, Planner ⚫ ⚫ ⚫ ⚫ Stream ⚫ ⚫ ⚫ Business Apps Scheduling Apps – Booking, StaffHub ⚫ ⚫ ⚫ ⚫ Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2 ⚫ ⚫ Threat Protection Microsoft Advanced Threat Analytics, Device Guard, Credential Guard, App Locker, Enterprise Data Protection, ⚫ ⚫ Office 365 Advanced Threat Protection ⚫ ⚫ Windows Defender Advanced Threat Protection ⚫ Office 365 Threat Intelligence ⚫ Identity & Access Management Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps ⚫ ⚫ ⚫ Azure Active Directory - Conditional Access, SSPR Hybrid Identities, Cloud App Discovery, AAD Connect Health ⚫ ⚫ Credential Guard and Direct Access ⚫ ⚫ Azure Active Directory Plan 2 ⚫ Device & App Management Microsoft Intune, Windows AutoPilot ⚫ ⚫ ⚫ Microsoft Desktop Optimization Package, VDA ⚫ ⚫ Information Protection Unlimited Exchange Archiving3, Office 365 Data Loss Prevention*, Azure Information Protection Plan 1 ⚫ ⚫ ⚫ Azure Information Protection Plan 2, Microsoft Cloud App Security, O365 Cloud App Security ⚫ On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype, Windows, SCCM, Win. Rights Management) ⚫ ⚫ Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests ⚫ ⚫ ⚫ Advanced eDiscovery, Customer Lockbox, Advanced Data Governance ⚫ Analytics Power BI Pro, MyAnalytics ⚫ Voice PSTN Conferencing, Cloud PBX ⚫ [1] Available in US, UK, Canada; [2] Currently in public preview in US, UK, Canada; [3] Unlimited when auto-expanding turned on *Data Loss Prevention Features will be available summer 2018 Detailed comparison of plans
  • 14. Microsoft 365 powered device The best way to experience Microsoft 365
  • 16. •Data in transit • Strong SSL/TLS cipher suite • Perfect Forward Secrecy • Datacenter-to-datacenter encryption •Data at rest • BitLocker disk encryption • Per-file encryption for customer content Default Encryption
  • 17. Mobile Apps Multi-factor authentication Text MessagesPhone Calls Push Notification One-Time-Passcode (OTP) Token Phone Calls Text One-Time Passcode (OTP) by Text Code Code One-Time app passcode
  • 18. Passwordless strong authentication via multiple factors ▪ PC + PIN or Biometrics ▪ PC + Companion Device ▪ PC supported Biometrics: fingerprint & facial ▪ Companion Device can support other biometrics options (e.g.: EKG) Supported on any Windows 10 device >100 devices supporting biometrics WINDOWS HELLO FOR BUSINESS
  • 19. Device Management Microsoft Intune Mobile Device Management Built-InMDM Office 365 Built-in Microsoft Intune Conditional Access Selective Wipe LoB app
  • 30. Safeguard your data: Protectionfromthreats AI-powered attachment scanning detects malware previously not seen Links are checked in real time to warn you if the destination is a malicious site Windows devices are monitored for suspicious processes like ransomware
  • 31. Safeguard your data: Protectionfromdataleaks Apply data loss prevention policies to help keep sensitive information from falling into the wrong hands* Enforce BitLocker device encryption to protect data if a computer is lost or stolen Manage all your devices—PCs, Mac, iOS, and Android—with full-featured Intune management
  • 32. Safeguard your data: Controldataaccess ​Apply encryption and restrictions like do not forward to emails and documents Remotely wipe business data without affecting personal information Require PIN or fingerprint to access business documents and data
  • 33. Email archiving and retention Preserve Search Secondary mailbox with separate quota Managed through EAC or PowerShell Available on-premises, online, or through EOA Automated and time- based criteria Set policies at item or folder level Expiration date shown in email message Capture deleted and edited email messages Time-Based In-Place Hold Granular Query-Based In- Place Hold Optional notification Web-based eDiscovery Center and multi-mailbox search Search primary, In-Place Archive, and recoverable items Delegate through roles-based administration De-duplication after discovery Auditing to ensure controls are met In-Place Archive Governance Hold eDiscovery
  • 36. Protectsensitive documentsfrom being accidentlyshared outside your organization Nocodingrequired; simply upload sample documentstocreate fingerprints Scan emailand attachments to lookforpatterns that match documenttemplates DLP document fingerprinting
  • 37. Access control Document tracking Data encryption Azure Active Directory Share internally and externally Authentication and collaborationAzure Rights Management services
  • 38. Lifecycle of a sensitive document Data is created, imported, & modified across various locations Data is detected Across devices, cloud services, on-prem environments Sensitive data is classified & labeled Based on sensitivity; used for either protection policies or retention policies Data is protected based on policy Protection may in the form of encryption, permissions, visual markings, retention, deletion, or a DLP action such as blocking sharing Data travels across various locations, shared Protection is persistent, travels with the data Data is monitored Reporting on data sharing, usage, potential abuse; take action & remediate Retain, expire, delete data Via data governance policies
  • 39. Vendor 2 Azure Rights Management ! Sender Vendor Username Password john@vendor.com ••••••••••••• Username Password sarah@vendor.com •••••••••••••
  • 41. ITUser Enterprise Mobility Suite Identify and authorize user Apply device policies Apply application policies Apply content policies Active Directory Premium Rights Management
  • 42. Personal apps Managed apps Company Portal Are you sure you want to wipe corporate data and applications from the user’s device? OK Cancel Perform selective wipe via self-service company portal or admin console Remove managed apps and data Keep personal apps and data intact ITIT
  • 43. Personal apps Managed apps Maximize productivity while preventing leakage of company data by restricting actions such as copy/cut/paste/save in your managed app ecosystem User
  • 46. Automated time-based criteria to delete Set policies at item or folder level – admin or user Set site level retention polices Search across multiple products De-duplication & search statistics Case management Export search results Integrated tools to help you preserve, expire, and discover data eDiscovery and In-Place Hold in Office 365 Data Held In-Place Customize holds based on filters Hold across multiple products in a single action Capture deleted & edited messages
  • 50. Resources • Office 365 Trust Center - http://www.abc.net.au/news/2018-03-15/sensitive-data-stolen-from- global-shipping-company-svitzer/9552600 • Office 365 Compliance - https://technet.microsoft.com/en-au/library/office-365-compliance.aspx • Overview of DLP - https://support.office.com/en-us/article/Overview-of-data-loss-prevention- policies-1966b2a7-d1e2-4d92-ab61-42efbb137f5e • Create a DLP policy from a template - https://support.office.com/en-us/article/Create-a-DLP- policy-from-a-template-59414438-99f5-488b-975c-5023f2254369 • What the DLP policy template includes - https://support.office.com/en-us/article/What-the- DLP-policy-templates-include-c2e588d3-8f4f-4937-a286-8c399f28953a • Office 365 Advanced Threat Protection - https://support.office.com/en-us/article/office-365- advanced-threat-protection-e100fe7c-f2a1-4b7d-9e08-622330b83653
  • 51. CIAOPS Resources • Blog – http://blog.ciaops.com • Free SharePoint Training via email – http://bit.ly/cia-gs-spo • Free Office 365, Azure Administration newsletter – http://bit.ly/cia-o365-tech • Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops • Free documents, presentations, eBooks – http://docs.com/ciaops • Office 365, Azure, Cloud podcast – http://ciaops.podbean.com • Office 365, Azure online training courses – http://www.ciaopsacademy.com • Office 365 and Azure community – http://www.ciaopspatron.com/ Twitter @directorcia Facebook https://www.facebook.com/ciaops Email director@ciaops.com Skype for Business admin@ciaops365.com