11/27/2018 11:16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.

Slides:



Advertisements
Similar presentations
Services Course Windows Live SkyDrive Participant Guide.
Advertisements

Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
One Drive for Business: More Than a File Share Erica Toelle
Microsoft Virtual Academy Chris Oakman | Managing Partner Infrastructure Team | Eastridge Technology Curtis Sawin | Technical Solutions Professional |
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Office 365 Upsell Paths.
Active Directory Modernization Technical competitive comparison
Implementing and Managing Azure Multi-factor Authentication
The time to address enterprise mobility is now
Deployment Planning Services
Deployment Planning Services
Conduct a successful pilot deployment of Microsoft Intune
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Mobile Data Solutions Inc
Manage Windows devices in the complex hybrid cloud world of today
Cloud-First, Modern Windows Management and Security
Azure Information Protection Strategy and Roadmap
Conduct a successful pilot deployment of Microsoft Intune
Exam Prep : Section 2: Design for Device Access and Protection
Azure AD for the client management guy (or gal!)
Mobile Device Management options in Office 365 and beyond
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Virtual Academy
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Power BI Security Best Practices
Extending classification ,labeling , and protection to 3rd party applications Kartik Microsoft Tony Digital Guardian Amit Cohen.
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Enable external sharing and collaboration with OneDrive and SharePoint
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Microsoft 365 Business Customer Targeting 2/6/18
Microsoft Intune MAM without Device Enrollment
Welcome! Microsoft Tech Talks - Charlotte, NC
Microsoft Virtual Academy
Application Delivery & MAM Policy
Protect your OneDrive and SharePoint files on mobile devices
Office 365 Identity Management
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Ignite /20/2018 2:21 PM
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Getting Started.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Getting Started.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Five mistakes to avoid when deploying Enterprise Mobility + Security
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/3/2019 3:20 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
OneDrive for Business: Administration, Security and Compliance
Azure Multi-Factor Authentication (MFA)
Microsoft Virtual Academy
Microsoft Data Insights Summit
Strengthening the GDPR business opportunity with Microsoft 365
External Sharing in Office 365
Microsoft Virtual Academy
Presentation transcript:

11/27/2018 11:16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

How to deal with external sharing in Office 365 11/27/2018 11:16 AM THR2128 How to deal with external sharing in Office 365 Nicki Borell © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/27/2018 11:16 AM GDPR © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

GDPR from an IT perspective 11/27/2018 11:16 AM GDPR from an IT perspective Chapter 1: General Provisions Chapter 2: Principles Chapter 3: Rights of the Data Subject Chapter 4: Controller and Processor Chapter 5: Transfer of personal data to third countries of international organizations Chapter 6: Independent Supervisory Authorities Chapter 7: Co-operation and Consistency Chapter 8: Remedies, Liability, and Sanctions Chapter 9: Provisions relating to specific data processing situations Chapter 10: Delegated Acts and Implementing Acts Chapter 11: Final provisions © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

GDPR from an IT perspective 11/27/2018 11:16 AM GDPR from an IT perspective Chapter 1: General Provisions Chapter 2: Principles Chapter 3: Rights of the Data Subject Chapter 4: Controller and Processor Chapter 5: Transfer of personal data to third countries of international organizations Chapter 6: Independent Supervisory Authorities Chapter 7: Co-operation and Consistency Chapter 8: Remedies, Liability, and Sanctions Chapter 9: Provisions relating to specific data processing situations Chapter 10: Delegated Acts and Implementing Acts Chapter 11: Final provisions more details: https://bit.ly/2MNyeTQ © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

The Office 365 security settings matrix Level Explanation Licensing Default Default settings of Office 365 No additional license required Medium Adjustments of the default Office 365 settings without the use of additional functions / licenses. Configuring Office 365 MFA and Office 365 MDM High like "Medium" plus: Use Cloud App Security to monitor Office 365 and configure actions. Use Azure AD Premium to enforce MFA and conditional access rules for external users, apps and devices. Cloud App Security Azure AD Premium P1 or P2 (part of EMS or M365 and can also be purchased separately) Very High Like "High" plus: use Intune to control device access and access to applications and manage devices. Intune (part of EMS or M365 and can also be purchased separately) Deactivating all external accesses

11/27/2018 11:16 AM Level: Medium © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Medium Level – OneDrive for Business 11/27/2018 11:16 AM Medium Level – OneDrive for Business   Setting Details / Options OneDrive sharing settings Default link type *Shareable: Anyone with this link *Internal links *Direct links: Specific people Change sharing link settings Advanced settings for shareable links *Links expire within drop-down list *choose whether shareable links can give people permission to edit shared files and folders External Sharing *Anyone *New and existing external users *Existing external users *Only people in your organization Specify any advanced settings for external sharing *Allow or block sharing with people on specific domains *External users must accept sharing invitations using the same account that the invitations were sent to *Let external users share items they don't own Other settings Display to owners the names of people who viewed their files Syncing Show the sync button on the OneDrive website Allow syncing only on PCs joined to specific domains Block syncing of specific filetypes Accessing OneDrive for Business Control access based on network location Allow access only from specific IP address locations Control access from apps that don't use modern authentication YES or NO Control access to features in the OneDrive mobile apps Needs to have an Intune license assigned to change these settings in the OneDrive admin center. Notifications Display notifications to users when OneDrive files are shared with them Email OneDrive owners when…: *Other users invite additional users to shared files *External users accept invitations to access files *An anonymous access link is created or changed © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Medium Level – SharePoint 11/27/2018 11:16 AM Medium Level – SharePoint   Setting Details / Options SharePoint Online sharing settings Sharing outside your organization *Don't allow sharing outside your organization *Allow sharing only with the external users that already exist in your organization's directory *Allow users to invite and share with authenticated external users *Allow sharing to authenticated external users and using anonymous access links **Anonymous access links expire in this many days: **Anonymous access links allow recipients to: Who can share outside your organization *Let only users in selected security groups share with authenticated external users *Let only users in selected security groups share with authenticated external users and using anonymous links Default link type *Direct - specific people *Internal - only people in your organization *Anonymous Access - anyone with the link Default link permission *View *Edit Additional settings *Limit external sharing using domains (applies to all future sharing invitations). Separate multiple domains with spaces. Learn more. *Prevent external users from sharing files, folders, and sites that they don’t own *External users must accept sharing invitations using the same account that the invitations were sent to *Require recipients to continually prove account ownership when they access shared items Unmanaged devices *Allow full access from desktop apps, mobile apps, and the web *Allow limited, web-only access *Block Access Control access based on network location Only allow access from specific IP address locations Apps that don't use modern authentication YES or NO © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Medium Level – PowerShell: Set-SPOTenant 11/27/2018 11:16 AM Medium Level – PowerShell: Set-SPOTenant   Setting Details / Options Useful settings with PowerShell BccExternalSharingInvitations All external sharing invitations will be bcc e-mail to: BccExternalSharingInvitationsList DisallowInfectedFileDownload Prevents the Download button from being displayed on the Virus Found warning page NotificationsInSharePointEnabled ODBAccessRequests Set a policy on re-sharing behavior in OneDrive for Business UserVoiceForFeedbackEnabled © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Security & Compliance Center 11/27/2018 11:16 AM Security & Compliance Center © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/27/2018 11:16 AM Medium Level – MFA & MDM Multi-factor Authentication for Office 365 users You get a free version of Azure multi-factor authentication as part of your Office 365 subscription. Mobile Device Management in Office 365 The built-in Mobile Device Management (MDM) for Office 365 helps you secure and manage your users' mobile devices like iPhones, iPads, Androids, and Windows phones. Device management is part of the Security & Compliance Center so you'll need to go there to kick off MDM setup. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/27/2018 11:16 AM Level: High © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

High – Cloud App Security 11/27/2018 11:16 AM High – Cloud App Security Cloud App Security provides access security and auditing at application level. Integration with DLP and AIP enables extensive data control. Cloud App Security is availible as: Office 365 Cloud App Security Microsoft Cloud App Security Typical scenarios: Detect threats and automatically take action Protect data and enforce integrated or custom data sharing policies Control access in real time Discovering and assessing risks and Identify cloud apps used on the network. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

I want to protect and control data in cloud apps Identifies document tagged INTERNAL being shared publicly Uploaded to public share USER CLOUD APP SECURITY PORTAL Move to quarantine Restricted to owner Role: Finance Group: Contoso Finance Office: London, UK INTERNAL Azure information protection Admin notified about problem.

High – Azure AD Premium MFA 11/27/2018 11:16 AM High – Azure AD Premium MFA By default, Office 365 comes with standalone multi-factor authentication options included in user licenses. This is a limited version of MFA and only covers basic functions. Feature MFA for Azure AD Administrators Azure MFA Protect Azure AD admin accounts with MFA ● Mobile app as a second factor Phone call as a second factor SMS as a second factor App passwords for clients that don't support MFA Admin control over verification methods Protect non-admin accounts with MFA   PIN mode Fraud alert MFA Reports One-Time Bypass Custom greetings for phone calls Custom caller ID for phone calls Trusted IPs Remember MFA for trusted devices MFA SDK MFA for on-premises applications © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/27/2018 11:16 AM Level: Very High © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Very High – Microsoft Intune 11/27/2018 11:16 AM Very High – Microsoft Intune Intune helps enable your workforce to be productive while keeping your corporate data protected. With Intune, you can: Manage the mobile devices & apps Protect information by controlling how it is accesses and shares Ensure devices and apps are compliant By default, Office 365 comes with standalone options for managing mobile devices and mobile access that are included in user licenses. This is a limited version of MDM and only covers basic functions. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Very High – Microsoft Intune vs. MDM for Office 365 11/27/2018 11:16 AM Very High – Microsoft Intune vs. MDM for Office 365 Functional area MDM for Office 365 Microsoft Intune Device management Devices are managed through the Security and Compliance Center in Office 365. Intune management console in Azure or integration in System Center Manageable devices Cloud-based management iOS, Android and Windows devices. Cloud-based management for iOS, Mac OS X, Android, Windows 8.1 (phone and computer) and later included in Windows 10 Important functions Ensure that corporate e-mail and documents in Office 365 can only be accessed from smartphones and tablets that are managed by the company and fit to IT policies. Set and manage security policies such as device-level PIN locking and jailbreak detection to prevent unauthorized users from accessing corporate email and data from a device if it is lost or stolen. Remove company data from an employee's device while preserving personal data. MDM for Office 365 functions and the following additional functions: Secure user access to corporate resources with certificates, Wi-Fi, VPN and email profiles Register and manage company devices to deploy policies and apps Providing Apps for Users More secure access to corporate data while ensuring data security by limiting actions such as "Copy", "Cut", "Paste" and "Save As" to Apps managed by Intune. Manage PCs, Macs, Linux and UNIX servers, and mobile devices © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Very High – Microsoft Intune & MAM MAM (Mobile Application Management) and MDM (Mobile Device Management) are usually combined. The two solutions can be distinguished as follows: MDM: addresses lack of control over corporate and personal devices, and lost device security Ensures device compliance through user and device registration, configuration and passcode management Secures devices on the network so you can monitor, report, track and update devices – and even locate, lock and wipe devices, if lost or stolen MAM: addresses lack of compliance with data and privacy requirements, and lost data retrieval User identity policy, single sign-on and conditional access tailored by role and device (with Intune or Active Directory on premises or in the cloud) Monitors and pushes App updates, including mobile document management for online or cloud-provisioned apps like SharePoint and OneDrive With Azure AD Premium you have the option to combine MAM and MDM (Intune) or to use MAM without MDM (Intune) or MDM with a 3rd party solution. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Device & Application Management* Personal apps Personal apps Managed apps Managed apps User IT * based on official material and slides

Device & Application Management* Personal apps Managed apps User Email Attachment copy past save copy to privat App Save to private data store * based on official material and slides

Device & Application Management* Personal apps IT Managed apps IT * based on official material and slides

Cloud App Security Azure Active Directory Microsoft Intune 11/27/2018 11:16 AM Cloud App Security Azure Active Directory Microsoft Intune Nicki Borell © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Roundup & usefull links Download “A quick guide to secure Office 365” https://bit.ly/2x9iRA7 Talk to your process owners and decision maker about the sharing scenarios they have Talk to you data security officer about his needs Use the matrix in “A quick guide to secure Office 365” to fined the features and licenses you need

Please evaluate this session Your feedback is important to us! 11/27/2018 11:16 AM Please evaluate this session Your feedback is important to us! Please evaluate this session through MyEvaluations on the mobile app or website. Download the app: https://aka.ms/ignite.mobileApp Go to the website: https://myignite.techcommunity.microsoft.com/evaluations © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/27/2018 11:16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.