Risk: Got anything to worry about? You probably don’t need to be here if.

Slides:



Advertisements
Similar presentations
Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
Advertisements

“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
One retention policy for Exchange, SP, OneDrive, Lync and Public Folders Time based policy Delete policies at item or folder level for.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
90% U.S. corporations currently engaged in litigation 147 Average number of active lawsuits for $1B+ companies $1M Average per case cost of eDiscovery.
Microsoft Ignite /17/2017 2:11 PM
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
PreserveDiscover In-Place Archive with secondary quota Available on-prem, online, or EOA Lync Archives into Exchange Search across Primary & Archive –
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
Archiving in the Cloud with Exchange Online Archiving BHARAT SUNEJA SR TECHNICAL WRITER | EXCHANGE MICROSOFT CORPORATION EXL301.
Service Life CycleScenarioEXOLYOSPOOffice365 (suite wide) BuyProvisioning Licenses Storage ConsumeDevice – Software Device – Connections User.
Version 2.0 for Office 365 Wave 15. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureAdministering.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
Module 9 Configuring Messaging Policy and Compliance.
Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of PST files stored outside of IT control.
Empower the User Outlook, Word, PowerPoint, SharePoint, Mobile Apps, etc. Exchange, SharePoint, Lync, AD, File Server, third parties, etc. Exchange/
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 9 Configuring Messaging Policy and Compliance.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Module 7 Planning and Deploying Messaging Compliance.
1 | SharePoint Saturday St. Louis 2015 EDISOVERY IN SHAREPOINT 2013 JODY SOCHA.
OFC309. Site MailboxesLync Archiving eDiscoveryIn-Place Hold.
The New Exchange - Archiving and Compliance Steve Chew Senior Technical Product Manager Microsoft Corporation EXL333.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
90% U.S. corporations currently engaged in litigation 147 Average number of active lawsuits for $1B+ companies $1M A verage per case cost of eDiscovery.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July Thierry Gasser TSP
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Morgan Stanley – $15 million Deutsche Bank Securities Inc., Goldman Sachs & Co., Morgan Stanley, Solomon Smith Barney Inc. and U.S. Bancorp Piper.
Kamal Janardhan Lead Program Manager Exchange Product Group Microsoft Corporation SESSION CODE: UNC307 Archiving, Retention and Discovery in Exchange Server.
User and Device Management
Microsoft Data Insights Summit March 22-23, 2016, Bellevue, Build 2016 March 30 – April 1,
One Drive for Business: More Than a File Share Erica Toelle
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
PreserveDiscover In-Place Archive with secondary quota Available on-prem, online, or EOA Storage Management Capture deleted & edited messages Preservation.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
Identify and Preserve Search and Process ReviewProduce In-Place eDiscovery Overview.
OFFICE 365 APP BUILDER PROFILE: Druva
Intro to the Office 365 Security & Compliance Center
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Data Loss Prevention (DLP) in Microsoft Office 365
Agenda Compliance Vision About Data Governance Demo
Data Loss Prevention in Office 365
eDiscovery Exchange, Lync & SharePoint Presented by Concurrency, Inc.
A Winning Combination !! and Good afternoon…
Understanding best practices in classifying sensitive data
Security and Compliance for Microsoft Teams
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
TechEd /17/2018 7:14 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Running a Tight Ship: Controlling Microsoft Teams
Managing Exchange Online using PowerShell
Top 10 Tips for GDPR Compliance in Office 365
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Managing Content: You Need To Think About More Than Office 365
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
03 | Basic Admin Capabilities
Partner Facing Demo.
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Risk: Got anything to worry about? You probably don’t need to be here if

Help me respond to this lawsuit Average number of active lawsuits for $1B+ companies: 147 $1M Average per case cost to find and cull evidence I’m regulated. Help me know and show we are doing the right thing Help me enforce internal policies Standards of Business Conduct, Confidentiality, Financial Integrity, Anti-Corruption… Subpoenas Regulations and Law Internal Policy

Bring the data home Ingestion Migrations from third party stores, more formats Go Big, Go Fast, Unify One Compliance Centre, Scale, Compliance Roadmap Built in (not bolt on) Compliance for Office In-Place Archiving Unified Experience Extensible Platform In-Place Immutability and in-place search, preservation, deletion Immutable Exchange Lync File shares Immutable SharePoint Bloomberg Immutable Exchange Lync 3rd Party Archives File Shares Immutable SharePoint Immutable Exchange Immutable SharePoint

How we plan to get there Build compliance into Exchange and SharePoint Index or Ingest to extend beyond these workloads Unify compliance experience and configuration across the suite Exchange SharePoint Others Traditional Archive eDiscovery and Compliance Bloomberg Immutable Exchange Lync 3rd Party Archives … Immutable SharePoint

AGENDA Risk, and how we can help Data Compliance Archive and Retention EDiscovery Data Flow and Data Access Compliance Data Loss Prevention Encryption Mobile Device Management Auditing and Reporting

Exchange In-Place Archive Outlook OWA Retain folder hierarchy Primary Immutable Deletions Inbox Purges Versions Audits Deleted Items … Archive Immutable Deletions “Inbox” Purges Versions Audits … User A ……

Exchange Deletion Policies SharePoint Document Deletion Policies

Exchange PreservationSharePoint Preservation

Exchange Preservation Architecture Mailbox Recoverable Items Deletions (1) Message delivered Deleted Items Inbox … (2) Message deleted by User (3) Message eliminated by User (4) Message purged by user Or Deleted Item Retention Period expires for that item Depending on Hold type, items are preserved or removed Mailbox Recoverable Items Deletions (1)Message delivered Deleted Items Inbox … (2) Message deleted by User (3) Message eliminated by User (4) Message purged by user Versions Purges Gone forever Versions Purges DiscoveryHolds Audits Delete Hold

Lync Preservation User A Mailbox Recoverable Items Deletions Deleted Items Inbox Versions Purges DiscoveryHolds Server side archiving All Lync modalities captured (PC, mobile, web, OWA) User A on hold Hold state synced Lync archives content into Exchange mailboxes when user is on Hold Includes instant messaging and meeting content

Ingestion Public Folder Hold Unified Preserve/Delete experiences And more… Future: Archiving

AGENDA Risk, and how we can help Data Compliance Archive and Retention EDiscovery Data Flow and Data Access Compliance Data Loss Prevention Encryption Mobile Device Management Auditing and Reporting

Identify and Preserve Search and Process ReviewProduce eDiscovery Overview 147 Average number of active lawsuits for $1B+ companies $1M A verage per case cost of eDiscovery

Today: Multi-Mailbox Search in EAC

Hold Capabilities Mailbox: John Doe Mailbox: Jane Doe Mail Items Query: SpaceX Conversations Query: SpaceX Site: SpaceX Site: Owner: John Doe Content: Query: SpaceX Attorney Discovery Center Hold: “SpaceX” Exchange 2013 Lync 2013 SharePoint 2013

Easy: download from SharePoint, Exchange, and file shares whether on premises or in Office 365 all at once EDRM XML Support: growing industry standard for data interchange, import into popular review tools Take it offline: Native files, PSTs, pages as.MHT, lists and feeds as.CSV Export Capabilities

Scale and Performance Search and Comply Future: Discovery FFO/EOP UCC – eDiscovery console Policy Store Policy WebService Policy cmdlet eDiscovery Results Sync Process Policy DAL eDiscovery cmdlets eDiscovery DAL Workload (Exchange) Backend Arbitration Mailbox (per tenant policy store) eDiscovery Results Store (per tenant) eDiscovery Results Service Policy Sync Service Backend 1 Backend N DAR Exchange Search Tasks 3 rd Party Data Sources … Federated Query Infra Workload (Sharepoint) Backend Policy Store (per tenant policy store) eDiscovery Results Store (per tenant) eDiscovery Results Service Policy Sync Service Backend 1 Backend N DAR SP Search Tasks Discovery Store (Aggregated result counts, metadata, case management etc)

AGENDA Risk, and how we can help Data Compliance Archive and Retention Ediscovery Data Flow and Data Access Compliance Data Loss Prevention Encryption Mobile Device Management Auditing and Reporting

Content analysis Get Content Regex Analysis Function Analysis Additional Evidence Verdict Policy Tips Outlook and OWA Document Fingerprinting Protect intellectual property like patents, company confidential information, and other standardized form content

CountryPIIFinancialHealth France EU data protection, Data Protection Act, National Id (INSEE), Drivers License, Passport EU Credit, Debit Card, IBAN, BIC, VAT, Swift Code US HIPPA, UK Health Service, Canada Health Insurance card Germany EU data protection, Drivers License, Passport National Id EU Credit, Debit Card, IBAN, VAT, BIC, Swift Code UK Data Protection Act, UK National Insurance, Tax Id, UK Driver License, Passport EU Credit, Debit Card, IBAN, BIC, VAT, Swift Code Canada PIPED Act, Social Insurance, Drivers License Credit Card, Swift Code US US State Security Breach Laws, US State Social Security Laws, COPPA GLBA & PCI-DSS (Credit, Debit Card, Checking and Savings, ABA, Swift Code) Japan PIPA, Resident Registration, Social Insurance, Passport, Driving License Credit Card, Bank Account, Swift Code Australia Drivers License, Passport, Social InsuranceCredit Card, Bank Account, Swift Code Beyond Regulations and Law: Prevent inappropriate content from entering or leaving Limit the interaction between specific recipients and senders (ethical firewall, school bully). Apply disclaimers to messages as they leave

OME IRM (RMS) Prevents sensitive information from being printed, forwarded, or copied by unauthorized people inside the organization S/MIME Sign and encrypt messages to users using certificates Encrypt messages to any SMTP address

Exchange Online Policy detection and Enforcement Tenant configuration O365 UserInternet User Send Microsoft account/Organization Account Mail Reading Portal Deliver Post

Microsoft Intune Built-In Device Management Conditional Access Selective Wipe Built-In Microsoft Intune LoB app User-centric approach

Before mobile devices can access Office 365 data, they must be enrolled and healthy. 1. A user downloads the public OneDrive app on a personal iPad 2. The user is shown a page that directs them to enroll the iPad 3. The user steps through the enrollment process 4. The OneDrive app is now MDM enabled 5. The user is able to access their OneDrive data Built-In Q1 2014

Office 365 Users on their devices Azure AD Report device compliance Enroll device, evaluate & enforce compliance with device management policies Microsoft Intune IT Admin

Device Polices Control what mobile devices can connect to Office 365 Data Set device configuration policies such as pin lock Enforce data encryption on devices Admin Controls Built-In management in console and PowerShell Configure device policies by groups Product level granular control Block non-compliant devices, or just report Device Reporting Device compliance reports Mobile usage and trends in our organization API support Built-In Q1 2014

Exchange Auditing SharePoint Auditing

Unified Logs, Unified XP Always On Auditing Better Together: Search, DLP, MDM FFO/EOP UCC – Auditing console Policy Store Policy WebService Policy cmdlet Policy DAL Workload (SharePoint) Backend Policy Store (per tenant policy store) Policy Sync Service Content FE SP Content Front End Node Audit Storage (EXO) Audit Long Term Storage FFO/EOP UCC – Auditing console Reporting cmdlets Reporting UX Reporting Web Service Content BE SQL Workload (Exchange) Backend Arbitration Mailbox (per tenant policy store) Local Queue, Uploader (per BE server) Policy Sync Service Backend 1 Backend N Exchange Auditing Hook Audit Upload Web Service Local Queue, Uploader (per BE server) Future: Auditing

sharepoint activity individual reports archiving reports devices data loss prevention eDiscovery retention Compliance admin center Jul 7: 9:45 pm Jul 7: 2:35 pm Jul 7: 1:00 pm Jul 7: 10:00 am Jul 7: 9:30 am Jul 7: 9:00 am Jul 6: 10:45 am Jul 6: 2:45 pm Jul 6: 9:45 pm Jul 5: 9:45 pm Jul 5: 2:35 pm Jul 5: 1:00 pm Jul 4: 10:00 am Jul 4: 9:30 am Viewed Deleted Viewed Created Shared Updated Shared Viewed Shared Viewed Deleted Viewed Created Shared ACTIONDATE HR.xlsx ssn.doc foo.doc apple.xls bar.list X.doc ssn.doc x.doc HR.xlsx ssn.doc foo.doc apple.xls FILE Bob Kirsten George Washington Howard Gonzales Isabel Monty Jay Hammer Laura Post Matej Peter Bob Kirsten George Washington Howard Gonzales Isabel Monty USER User or group nameFile name Event All search From date 2014/07/01 11:00 AM To date 2014/07/07 10:00 PM Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. activity log search Export results users Bob Kirsten 2 users Laura Post TARGET

sharepoint activity individual reports archiving reports devices data loss prevention eDiscovery retention Compliance admin center Date: Jul 6: 10:45 am User: Laura Post Action: Shared Service: SharePoint Entity: X.doc and others External Access: Yes Classification: HBI User Type: User Modified Property: N/A Details: N/A Laura shared X.doc and 19 other docs with an external user Jul 7: 9:45 pm Jul 7: 2:35 pm Jul 7: 1:00 pm Jul 7: 10:00 am Jul 7: 9:30 am Jul 7: 9:00 am Jul 6: 10:45 am Jul 6: 2:45 pm Jul 6: 9:45 pm Jul 5: 9:45 pm Jul 5: 2:35 pm Jul 5: 1:00 pm Jul 4: 10:00 am Jul 4: 9:30 am Viewed Deleted Viewed Created Shared Updated Shared Viewed Shared Viewed Deleted Viewed Created Shared ACTIONDATE HR.xlsx ssn.doc foo.doc apple.xls bar.list X.doc ssn.doc x.doc HR.xlsx ssn.doc foo.doc apple.xls FILE Bob Kirsten George Washington Howard Gonzales Isabel Monty Jay Hammer Laura Post Matej Peter Bob Kirsten George Washington Howard Gonzales Isabel Monty USER User or group nameFile name Event All search From date 2014/07/01 11:00 AM To date 2014/07/07 10:00 PM Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. activity log search Export results users Bob Kirsten 2 users Laura Post TARGET

In the Cloud? Compliance is easy HIPAA Business Associate Agreement (HIPAA BAA) FISMA authority to operate (ATO) from a federal agency FERPA use and disclosure restrictions related to student data EU model clause addressing international transfers of data CJIS Security Policy 5.2 requirements met for CA and TX law enforcement DPA (Data Processing Agreement) to address the privacy, security, and handling of customer data Supporting Customer Compliance ISO 27001: First major business productivity public cloud service to have implemented ISO mgmt. controls SAS 70 Type I and Type II attestation O365 Accreditations Protecting Against Government Snooping: snooping.aspx Transparency Advocacy: DC Ops Auditing Numbers of govt requests for data government-requests-for-customer-data.aspx Law enforcement requests report: us/reporting/transparency/ Transparency and Government Snooping “We are committed to notifying business and government customers if we receive legal orders related to their data. Where a gag order attempts to prohibit us from doing this, we challenge it in court. “

SAMPLE