Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.

Slides:



Advertisements
Similar presentations
Admin: Simple to provision and configure Policy driven via Transport Rules Customizable branding of encrypted s and mail reading portal Allows.
Advertisements

Services Course Windows Live SkyDrive Participant Guide.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Joe Schulman Program Manager, Forefront For Office
Understanding Active Directory
As Never Seen Before Ronen Gabbay Microsoft Exchange Regional Director U-BTech & Hi-Tech CTO.
03 | Administering Office 365 Anthony Steven | Principal Technologist, Content Master Martin Coetzer | Portfolio Architect, Microsoft.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Understanding Active Directory
1 Outlook Live Live Messenger SkyDrive Office Live Live Spaces Live Groups.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
02 | Install and Configure Team Foundation Server Anthony Borton | ALM Consultant, Enhance ALM Steven Borg | Co-founder & Strategist, Northwest Cadence.
Module 9 Configuring Messaging Policy and Compliance.
Module 9 Configuring Messaging Policy and Compliance.
What’s new for the Exchange 2010 Developer? Developing Exchange-enabled Enterprise Applications Creating “Cloud Ready” Exchange-enabled Applications Deploying.
Module 7 Planning and Deploying Messaging Compliance.
customer.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
03 | Word Templates Brian Meier| Senior Lead Program Manager.
Microsoft Virtual Academy Windows Intune for IT Pros Jump Start M05: Windows Intune Policies David Tesar Richard Harrison.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
04 | Business Analyzer Brian Meier| Senior Lead Program Manager.
Demo Fest of Some Leading Store Apps Module 2.
demo User Signs Up Temporary Account is Created with Verification Link Sent User Clicks Link Account is Activated Login.Register(userName,
Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.
Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.
Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.
Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Microsoft Virtual Academy Chris Oakman | Managing Partner Infrastructure Team | Eastridge Technology Curtis Sawin | Technical Solutions Professional |
SharePoint Online Hybrid Troubleshooting Tips and Tricks Manas Biswas Sr. Support Escalation Engineer, SharePoint Online Escalation Services Microsoft.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Microsoft Virtual Academy
Microsoft Azure Deployment Planning Services
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Deployment Planning Services
6/17/2018 5:54 AM OSP322 Getting the best of both worlds, making the most of SharePoint hybrid search solutions Shyam Narayan Microsoft © 2013 Microsoft.
Microsoft Virtual Academy
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Enhancing the Office 365 Multi-Factor Authentication and RM Online
Microsoft Virtual Academy
Rights Management Services (RMS)
Region One Information Technology
SharePoint Online Management and Control
RMS with Microsoft SharePoint
11/11/2018 Desktop Virtualization Corey Hynes Kyle Rosenthal President Technical Lead HynesITe Inc Spider Consulting @windowspcguy.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Virtual Academy
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Office Mac /30/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft Virtual Academy
Microsoft Office 365 ProPlus Deployment for IT Pros
Microsoft Virtual Academy
Microsoft Virtual Academy
2/27/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Virtual Academy
Microsoft Virtual Academy
One Marketing Template
Microsoft Virtual Academy
Deploying and Managing Windows To Go
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Data Insights Summit
Presentation transcript:

Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers

Course Topics Solving Office 365 Client Deployment Scenarios 01 | System Center Configuration Manager (SCCM) Deployment Best Practices 02 | Multi-language Deployment Considerations for Office 365 ProPlus 03 | Office 365 ProPlus with Azure Rights Management Services for IRM/Encryption 04 | Controlling access to Office 365 ProPlus & Services 05 | Office 365 and Exchange Migration Troubleshooting Common Gotchas 06 | New Office 365 ProPlus Customizations via Group Policy or XML 07 | New Updating and Repair Command-Line Options for Office 365 ProPlus

Microsoft Virtual Academy Module 3: Office 365 ProPlus with Azure Rights Management Services for IRM/Encryption Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers

Azure Rights Management for Office 365 Office 365 Message Encryption Customizing Office 365 Message Encryption Module Overview

Azure Rights Management for Office 365

About Microsoft Azure Rights Management Prevent unauthorized access to information, using Microsoft encryption and rights management technology. ARM enables: –Information Rights Management (IRM) Policy-based permissions rules to help protect data across different workloads such as SharePoint, Exchange, and Office documents. –Office 365 Message Encryption Deliver confidential business communications with enhanced security, allowing users to send and receive encrypted as easily as regular directly from their desktops.

Requirements for Azure RM in Office 365 Setup An active Exchange Online or Exchange Online Protection subscription Administrator must be part of the following role groups under Office 365 Exchange Online –Compliance Management –Organization Management –Records Management Azure Rights Management Administration Tool installed

Activating Azure Rights Management on Office 365

Configure IRM to Use Microsoft Azure RM 1. Configure the RMS online key-sharing in Exchange Online: 2. Import the Trusted Publishing Domain (TPD) from RMS Online 3. Enable IRM for Exchange Online 4. OPTIONAL – Disable IRM templates in OWA and Outlook

Rights Management Services Key Sharing URLs LocationRMS key sharing location North Americahttps://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc European Unionhttps://sp-rms.eu.aadrm.com/TenantManagement/ServicePartner.svc Asiahttps://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc South Americahttps://sp-rms.sa.aadrm.com/TenantManagement/ServicePartner.svc Office 365 for Government (Government Community Cloud) * Note: * Only customers who have purchased Office 365 for Government SKUs (Government Community Cloud) should use this RMS key sharing location.

CONFIGURING IRM FOR OFFICE 365 WITH POWERSHELL demo

Configure IRM to Use Microsoft Azure RM with PowerShell StepsPowerShell Cmdlet Enable-OrganizationCustomization Configure the RMS online key- sharing in Exchange Online Set-IRMConfiguration -RMSOnlineKeySharingLocation " rms.na.aadrm.com/TenantManagement/ServicePartner.svc" Import the Trusted Publishing Domain (TPD) from RMS Online Import-RMSTrustedPublishingDomain -RMSOnline -name "RMS Online“ Enable IRM for Exchange OnlineSet-IRMConfiguration -InternalLicensingEnabled $true OPTIONAL – Disable IRM templates in OWA and Outlook Set-IRMConfiguration –ClientAccessServerEnabled $false

Default Azure Rights Management Templates Read-only viewing for the protected content –Display name: - Confidential View Only –Specific permission: View Content Read or Modify permissions for the protected content –Display name: - Confidential –Specific permissions: View Content, Save File, Edit Content, View Assigned Rights, Allow Macros, Forward, Reply, Reply All Do Not Forward

DEFAULT INFORMATION RIGHTS MANAGEMENT TEMPLATES IN OUTLOOK AND OWA demo

Default Azure Rights Management Templates

Office 365 Message Encryption

About Office 365 Message Encryption Office 365 Message Encryption is an online service that’s built on Microsoft Azure Rights Management (Azure RMS) and available through Exchange Online –Admins enable message encryption by defining transport rules that determine the conditions for encryption A rule can require the encryption of all messages addressed to a specific recipient

S/MIME Requires a certificate and publishing infrastructure Is often used in business-to- business (B2B) and business-to- consumer (B2C) scenarios Is a requirement for certain government business cases The user controls the keys Outlook searches the local client machine to for digital signing and verification Office 365 Message Encryption Policy-based encryption configured and enforced by an administrator Encrypts mail sent to anyone inside or outside of the organization. Includes the ability to customize the mail with organization’s brand Office 365 Message Encryption vs. S/MIME

About Office 365 Message Encryption

Send Encrypted Messages Two Ways Automatic –Admin-defined encryption rules that automatically encrypt all messages meeting specific criteria Manual –Admin-defined rules that allow the sender to encrypt messages at will

Requirements for Office 365 Message Encryption An active Exchange Online or Exchange Online Protection subscription Azure Rights Management must be activated Defined transport rules to trigger message encryption –Create transport rules to determine the conditions for encrypting messages –Create transport rules to define conditions where encryption should be removed from messages Microsoft Rights Management connector*

Microsoft Rights Management connector Enables existing on-premises servers to use their Information Rights Management (IRM) functionality with the cloud-based Microsoft Rights Management services Acts as a communications relay between the on-premises servers and the cloud service Supports Exchange Server, SharePoint Server, and file servers that run Windows Server and use File Classification Infrastructure to classify and apply policies to documents in a folder Small-footprint service runs on Windows Server 2008 R2 or later

Microsoft Rights Management connector

Create an Encrypted Message Rule in PowerShell Use the ApplyOME attribute New-TransportRule “Encrypt rule for drtoniramos" -SentTo - ApplyOME $true This parameterSpecifies: New-TransportRule “Encrypt rule for drtoniramos"Name of the new rule -SentTo 1 -SentToScope "NotinOrganization"Condition 2 -ApplyOME $trueEncrypt the message

Create an Encrypted Message Rule in EAC

CREATING MAIL ENCRYPTION RULES IN EXCHANGE ADMIN CENTER demo

Receiving an Encrypted Message The message is delivered to the recipient’s inbox It contains an HTML file attachment The recipient is required to sign in* or use a one-time passcode to view the message on the Office 365 Message Encryption Portal *The recipient can choose to sign in with a work account associated with Office 365 or with a Microsoft account.

RECEIVING AND OPENING AN ENCRYPTED MESSAGE demo

Receiving an Encrypted Message

The passcode expires after 15 minutes. If that happens, or if you can’t open the message for any reason, start over by opening the attachment again and following the steps

Customizing Office 365 Message Encryption

What can be customized Introductory text of the that contains the encrypted message Disclaimer text of the that contains the encrypted message Portal text that will appear in the message viewing portal Logo that will appear in the message and viewing portal

Customizing Office 365 Message Encryption Use the Set-OMEConfiguration cmdlet Feature of the encryption experienceUse these Windows PowerShell commands Default text that accompanies encrypted messages. The text appears above the instructions for viewing encrypted messages Set-OMEConfiguration -Identity - Text " " Disclaimer statement in the that contains the encrypted message Set-OMEConfiguration -Identity DisclaimerText " " Text that appears at the top of the encrypted mail viewing portal Set-OMEConfiguration -Identity - PortalText " " Logo Set-OMEConfiguration -Identity -Image Note 1.Supported file formats:.png,.jpg,.bmp, or.tiff 2.Optimal size of logo file: less than 40 KB 3.Optimal size of logo image: 170x70 pixels

CUSTOMIZING THE OFFICE 365 ENCRYPTED MESSAGE PORTAL AND MESSAGING demo

DEMO - Customizing Office 365 Message Encryption Set-OMEConfiguration -Identity "OME Configuration" - Text "Encrypted message from ContosoPharma secure messaging system“ Set-OMEConfiguration -Identity "OME Configuration" -DisclaimerText "This message is confidential for the use of the addressee only" Set-OMEConfiguration -Identity "OME Configuration" -PortalText "ContosoPharma secure portal" Set-OMEConfiguration -Identity "OME configuration" -Image (Get-Content "C:\Temp\contosologo.png" -Encoding byte)

DEMO - Customized Office 365 Message Encryption

You must accomplish the following three tasks: 1.Make sure that ALL messages sent to domains are encrypted 2.Make sure all encrypted replies are decrypted for users internally 3.Allow users to encrypt messages by typing “ENCRYPT” to the subject line Real World Scenario

CREATION OF MAIL FLOW RULES TO TRIGGER MESSAGE ENCRYPTION demo

Create the Outbound Message Encryption Rule

Create the Remove Encryption on Replies Rule New-transportrule -name "Remove encryption from incoming mail" -SentToScope "InOrganization" -RemoveOME $true

Create the “At Will” User Encryption Rule

Additional Resources passcode-to-view-an-encrypted-message.aspxhttp://msdn.microsoft.com/en-us/library/use-a-one-time- passcode-to-view-an-encrypted-message.aspx message-encryptionhttp://products.office.com/en-us/exchange/office-365- message-encryption

©2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Office, Azure, System Center, Dynamics and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.