SIM318. Protect Sensitive Information Reduce risk associated with information leaks Improve regulatory compliance Centrally manage information protection.

Slides:



Advertisements
Similar presentations
Admin: Simple to provision and configure Policy driven via Transport Rules Customizable branding of encrypted s and mail reading portal Allows.
Advertisements

WCL211. A specialized Windows product portfolio. Licensing adapted to meet embedded scenarios. Supported by a specialized partner ecosystem Distributors.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
Mohan Atreya Sr. Product Manager RSA Corporation SIA311 Marcio Mello Sr. Program Manager Lead Microsoft Corporation.
SIM Separate solution install paths can be taken, stand alone and SCOM integrated. Both require core AVIcode web apps and DB’s.
Joe Schulman Program Manager, Forefront For Office
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Business Productivity Online Suite Enterprise class software delivered via subscription services hosted by Microsoft and sold with partners.
DBI207 3 Data QualityIssueSample Data Problem Standard Are data elements consistently defined and understood ? Gender code = M, F, U in one system and.
OSP206. Experience Office as it was meant to be… without the complexity of setting up servers.
WCL209. GA3/23GA3/23 Manage & Secure PCs Anywhere All you need is an internet connection The Best Windows Experience Standardize your OS on the latest.
SIM346. General information about the software application.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
WCL309. Demo.
SIM329. Certificate Enrollment Without CEP/CES Certificate Authority Active Directory Client Workstations LDAP RPC/DCOM.
OSP219. Experience Office as it was meant to be… without the complexity of setting up servers.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
OSP312 Beauty is, it’s entirely up to you.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
SIM 320. Contoso customer premises AD MS Online Directory Sync Identity Services Provisioning platform Provisioning platform Lync Online Lync Online.
SIM314 Introduction Transport Layer Summary Network Layer.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
DPR302.
SIM328. Access Control List Perimeter No Yes Firewall Perimeter Authorized Users Unauthorized Users Information Leakage Unauthorized Users …but.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
About Colligo Networks Multi-award winning Colligo Contributor solution suite for management in SharePoint customers in 55 countries Multiple.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
DEP350 Windows ® Rights Management (Part 1): Introduction, Concepts, And Technology Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
DPR305. Controller Model View Client Business Objects Server Business Objects Data.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
SIM333 Microsoft Confidential Simplified Management Manage FPE 2010 and FPSP 2010 Server Discovery and Grouping FPSMC agent deployment Deploy.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
WPH301. announcement Overview Roadmap for Business Risk Management (security model, application security, security management) Deploying Windows Phone.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
DEV351.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
DEV203. Coded workflows Declarative workflows Web part hook-up Professional developerBusiness Analyst/Process Designer List definitions Event receivers.
09:45-10:30 – Windows Mobile Update 10:30-11:30 – System Center Mobile Device Manager :30-11:45 - Break 11:45-12:30 -Deploying SCMDM and Customer.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
User and Device Management
OSP319. Many Office integration options Excel & Excel Services REST InfoPath & Forms Services Access & Access Services Visio & SharePoint Designer.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
EXL Lync ‘out-of-the-box’ Add a little SDK magic…
OSP208. Initiate Deployment Deployment POC What’s on the POC Server What does it deploy.
Secure Services Shared Hosted MS Exchange 2010.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Connecting people in new ways, anytime, anywhere Quick adoption through Ease of use and Microsoft Office Ease deployment through interoperability and.
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
Office Power Hour New developer APIs and features for Apps for Office
RMS with Microsoft SharePoint
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Wade Bumgarner AD RMS at UNC Wade Bumgarner
Developing and Managing SharePoint Solutions with Visual Studio 2012
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Presentation transcript:

SIM318

Protect Sensitive Information Reduce risk associated with information leaks Improve regulatory compliance Centrally manage information protection policies Integrated Throughout The Enterprise Built into core components of Microsoft infrastructure Extensible platform to support third-party applications, document formats, and devices through the entire information lifecycle Provide Secure Messaging and Collaboration Protection of and documents between internal users Secure collaboration with external partners and customers Automated protection for and collaboration applications

Move to the cloud Accelerate MSFT cloud adoption Increase RMS adoption and market reach Build a great Information Protection platform Support key formats/devices through ISVs/Partners Simplify developer experience Continue RMS investments with Microsoft applications/platforms On-premises and online Support secure collaboration across organizations

Author sends protected mail to recipient at Fabrikam 2. Exchange (Fabrikam) receives message and performs service discovery against Contoso’s RMS Server 3. Exchange (Fabrikam) requests a token from the OFG 4. OFG validates the claims and returns the token to Exchange (Fabrikam) 5. Exchange (Fabrikam) creates a bootstrapping request including the token to the RMS server. 6. RMS Server validates the token and then returns a RAC for Exchange(Fabrikam) 7. Exchange (Fabrikam ) then requests a token on behalf of the recipient from the OFG 8. Repeat Steps 4-6 for a licensing request 9. The message is delivered and the recipient can consume the content via OWA Contoso Fabrikam Exchange 3 57 UL 9 1 Scenario AD RMS Integration with Online Federation Gateway Scenario RMS 4 5

demo

Import TPD

demo

Accelerate the integration by making the development of RMS- aware applications easier Delight developers with a simplified API to address pain points from current SDK Provide competitive differentiation for your product, making it easier for customers to collaborate with it safely. Make RMS applications better by improving the user experience, performance, and topology support Simplified discoverability for complex environments New SDK simplifies the most common RMS functions, some scenarios no requires no code.

Improved cryptographic support and enabling continuing innovation No loss of functionality from current SDK Publishing, consuming, and collaborating scenarios all continue to work Compatible with down-level ADRMS servers

MSDRM (User Activation) hr = DRMCreateClientSession( &StatusCallback, 0, DRM_DEFAULTGROUPIDTYPE_WINDOWSAUTH, wszUserId, &hClient ); if ( FAILED( hr ) ) { wprintf( L"\nDRMCreateClientSession failed. hr = 0x%x\n", hr ); goto e_Exit; } hr = DRMIsActivated( hClient, DRM_ACTIVATE_MACHINE, NULL ); if ( E_DRM_NEEDS_MACHINE_ACTIVATION == hr ) { // // 3. Call DoMachineActivation to activate the machine if // it's not activated // hr = DoMachineActivation( hClient, wszActivationSvr ); if ( FAILED( hr ) ) { goto e_Exit; } else if ( hr == S_OK ) { wprintf( L"The machine is already activated.\n" ); } else { goto e_Exit; } hr = DRMIsActivated( hClient, DRM_ACTIVATE_GROUPIDENTITY, NULL ); if ( SUCCEEDED( hr ) ) { wprintf( L"The user is already activated.\n" ); goto e_Exit; } else if ( E_DRM_NEEDS_GROUPIDENTITY_ACTIVATION != hr ) { goto e_Exit; } else { if ( NULL == ( context.hEvent = CreateEvent( NULL, FALSE, FALSE, NULL ) ) ) { wprintf( L"\ncontext.hEvent was NULL after the CreateEvent call." ); goto e_Exit; }

MSIPC (User Activation)

ADRMS – “Crypto Mode 2” Remove blocker for some segments Public Sector Keep FIPS compliance status, increased key length Updates Planned Moving to 2048-bit key support for RSA Moving from SHA1 to SHA2 Support for current and new SDK

AD RMS Client Clients should be updated first with Crypto Mode 2 update Client is interoperable with both ADRMS Cryptographic Modes AD RMS Server Server can be deployed or upgraded to Crypto Mode -2 Requires all servers to be running in the same Cryptographic mode within an organization Access to content protected using Crypto Mode 1 is preserved Application Compatibility QFE’s required for Office, SharePoint, and Exchange ISV applications, must check with vendor.

Container based generic file protection Create a fall back solution for any file type (*.jpg, *.pdf, *.anything) User experience similar to.zip packages Support all file types (no application integration required) Encrypted containers RMS evaluates if a user has access to the container and that it has not expired Once user has been granted access, the user will be able to extract files from the container Users can now access files without any app usage restrictions

Generic File Protection is not a complete replacement for native application integration Native application integration is the most secure and best user experience New RMS client SDK will simplify development for ISV’s Supported Platforms Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2 Requires.NET 4.0

demo

Untethered bootstrapping 6.5 required initialization via tethering Supports Outlook Uses Exchange Active Sync for IRM protected messages Can compose and read IRM protected Supports Office Mobile Applications Excel, Word, PPT Can consume IRM protected files Will support updated ADRMS Crypto Mode

Updated rules and alerts Compatible with SCOM 2007 Supports ADRMS on Windows Server 2008 and 2008 R2

Today Subject to Change Support for Cloud Cross premise support for RMS on-premises and Exchange Online RMS Platform Crypto: 2048-bit key support Container level Generic file protection New RMS Client SDK IRM support on Windows Phone 7 Updated ADRMS SCOM Pack Applications Office MAC Office 2011 FCI (WS08 R2) Windows Mobile 6.5 Secure / messaging Exchange Secure collaboration SharePoint UAG 2010 SP1 RMS Platform Windows Client (XP – Win7 ) Windows Server ( R2) Future

Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers Connect. Share. Discuss.

Scan the Tag to evaluate this session now on myTechEd Mobile