Service Life CycleScenarioEXOLYOSPOOffice365 (suite wide) BuyProvisioning Licenses Storage ConsumeDevice – Software Device – Connections User.

Slides:



Advertisements
Similar presentations
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Advertisements

Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of servers Across dozens of.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
Fact check True or False: Over half of the messages received today in Exchange Online are spam True. About 67 % of all messages are spam True or False:
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Security challenges Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Exchange 2007 Overview. What Will We Cover? New features in Microsoft® Exchange 2007 The Exchange Management Console The Exchange Management Shell New.
Protect communications Multi-engine anti-malware and enhanced spam filtering to help protect your environment from threats Enforce policy Flexible.
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
Overview of Exchange 2013 Architecture Transport components shipping with Exchange 2013 Mail Routing Scenarios Transport High Availability SMTP Client.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
Message Trace Office 365 May 2013.
TechEd /20/2017 2:02 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Exchange 2010 Recipient and Mailbox Management IT:Network:Applications.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
EXL311: Exchange Server 2013 Architecture Deep Dive Scott Schnoll Microsoft Corporation EXL311.
SIM309. Connection Analysis (IP-based edge blocks) Reputation Analysis Connection Filtering Protect businesses from receiving –borne viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
 2:00 pm - 2:15 p.m. ◦ Intro, Welcome and Overview of Agenda  2:15 p.m. - 3:00 p.m. – Admin Training ◦ Introduction to Live at EDU and roadmap.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
MEC /22/2017 5:53 AM © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
Exchange Online Protection. About Speaker Prabhat Nigam Microsoft MVP: Exchange Server MCSE: Messaging 2013, MCITP 2010/2007, MS Ex – Microsoft Exchange.
Inbox and Mobile People and Groups CalendarAuthentication.
Module 9 Configuring Messaging Policy and Compliance.
Module 6 Planning and Deploying Messaging Security.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Content Control Stewart Duncan Technical Manager.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Understanding Microsoft Forefront Online Protection for Exchange Nathan Winters Microsoft Corporation EXL201.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 9 Securing internet messaging.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
11 MICROSOFT OFFICE OUTLOOK 2003 AND MICROSOFT OUTLOOK EXPRESS Chapter 4.
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Information explosion 1.4X 44X Protect communications.
Redmond Protocols Plugfest 2016 Andrew Davidoff Exchange 2016 Protocol Overview Senior Software Engineer.
FermiMail Migration to Cloud Services Ray Pasetes For BA and CS Liaisons 23 Nov 2015.
Intro to the Office 365 Security & Compliance Center
VP, Software Development
12 | Monitoring Office 365 Anthony Steven | Principal Technologist, Content Master Martin Coetzer | Portfolio Architect, Microsoft.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Managing Exchange Online using Office 365 Admin Console
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Demo Advanced Threat Protection
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Managing Exchange Online using PowerShell
06 | Planning Exchange Online and Configuring DNS Records
Managing Exchange Online using Office 365 Admin Console
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Office 365 Security & Compliance: Exchange Online Protection
Managing Exchange Online using Office 365 Admin Console
Managing Exchange Online using PowerShell
Managing Exchange Online using PowerShell
Comodo Dome Data Protection
Presentation transcript:

Service Life CycleScenarioEXOLYOSPOOffice365 (suite wide) BuyProvisioning Licenses Storage ConsumeDevice – Software Device – Connections User - activity User - Docs activity User - Meetings activity User - External Sharing

Portal Definition Number of active and inactive mailboxes over time. A mailbox is considered inactive if a user has not logged in for more than 30 days. Number of inactive mailboxes are grouped by the number of days the user has not logged in Technical Definition – Active Mailbox Mailbox is connected Mailbox has been logged into in past 30 days (from store) OR Mailbox has been created in past 30 days (from AD) Technical Definition – InActive Mailbox Mailbox is connected Mailbox has not been logged into in past 30 days (from store) Mailbox was created more than 30 days ago (from AD) Mailbox Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API Stal box Stal boxDetail CMDLets Get-Stal boxReport Get-Stal boxDetailReport Note! Inactive Mailbox here does not refer to the “inactive” mailbox state as defined by ligation hold. Yes, we know this is very confusing.

Portal Definition Shows the number of total number of mailboxes, inactive mailboxes, mailboxes exceeding their storage quota, and mailboxes using less than 25% of their storage limit. Technical Definition – Total Mailbox Source (AD) All connected Mailboxes Technical Definition – InActive Mailbox Mailbox is connected Mailbox has not been logged into in past 30 days (from store) Mailbox was created more than 30 days ago (from AD) Technical Definition – Exceeds Storage Limit Source AD (MBX limits) Source Store (MBX size) Over limit if MBX total item size is over IssueWarningQuota Technical Definition – < 25% storage Source AD (MBX limits) Source Store (MBX size) < 25% of ProhibitSendReceiveQuota Mailbox Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailboxUsage MailboxUsageDetail CMDLets Get-MailboxUsageReport Get-MailboxUsageDetailReport

Portal Definition Shows the number of mailbox connections made over time, grouped by connection types. Technical Definition – Protocols MAPI, OWA, EAS, EWS, IMAP, POP3 Technical Definition – Protocol Count Café (CAS) logs for each protocol Distinct MBX accessed per day Aggregated daily Mailbox Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API ConnectionByClientType (daily, weekly, monthly, yearly) ConnectionbyClientTypeDetail CMDLets Get-ConnectionByClientTypeReport Get-ConnectionByClientTypeDetailReport

Portal Definition Shows the number of active mailboxes, and the number of mailboxes created and deleted. A mailbox is considered active if a user has accessed it at least once in the last 30 days. Technical Definition – Total Active Mailbox Mailbox is connected Mailbox has been logged into in past 30 days (from store) OR Mailbox has been created in past 30 days (from AD) Technical Definition –Mailbox Created Source (AD) Mailbox was created or reconnected in a day Does not count inter-day soft-deletes/restores Aggregated daily Technical Definition –Mailbox Deleted Source (AD) Mailbox was soft deleted or removed in a day Does not count inter-day soft-deletes/restores Aggregated daily Mailbox Level Details – Not Available Summary Via Reporting Web Service and CMDLets Web Service/ODATA API MailBoxActivity (daily, weekly, monthly, yearly) CMDLets Get-MailboxActivityReport

Portal Definition Shows the number of groups created and deleted. Technical Definition – Group Created Source (AD) Groups created daily (WhenCreated==Today) Does not currently include DDGs (planned) Aggregated daily. Technical Definition –Mailbox Deleted Source (AD) Groups deleted daily (WhenDeleted==Today) Does not currently include DDGs (planned) Aggregated Daily. Group Level Details – Not Available Summary Via Reporting Web Service and CMDLets Web Service/ODATA API GroupActivity (daily, weekly, monthly, yearly) CMDLets Get-GroupActivityReport

Portal Definition Shows received mail based on traffic type Technical Definitions Good Mail - messages that were received and not identified as spam or malware Spam - messages identified as spam Malware - messages that contained malware Transport rules - messages that matched at least one rule DLP - messages that matched at least one DLP policy Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventTypes GoodMail Malware TransportRuleHits SpamEnvelopeBlock SpamIPBlock SpamContentFiltered

Portal Definition Shows what spam was detected, grouped by spam filtering type. Technical Definitions SMTP Blocked- Sender and recipient filtering IP Blocked -The reputation of the connecting IP address is evaluated by means of lists from partners and third- party providers Content filtered - content is checked for terminology or properties common to spam Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventTypes SpamEnvelopeBlock SpamIPBlock SpamContentFiltered

Portal Definition Shows the number of malware detections in received mail, before the malware action was applied Technical Definitions Viruses infect other programs and data, and they spread throughout your computer looking for programs to infect. Spyware refers to malware that gathers your personal information, such as sign- in information and personal data, and sends it back to its author. Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventType Malware

Portal Definition Shows the number of transport rule matches in received mail, grouped by severity. Technical Definitions Severity is defined by the admin for each transport rule created Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventType TransportRuleHits

Portal Definition Shows the number of transport rule matches in received mail, grouped by severity. Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventType DLPPolicyHits DLPPolicyOverride DLPPolicyFalsePositive Technical Definitions Policy Matches: daily count of DLP policies that were matched. Overrides: daily count of the DLP Policies that were overridden by the user. False Positive: Daily count of DLP Policies that were reported as False Positive

Portal Definition Shows the number of DLP rule matches in received mail, grouped by severity. Technical Definitions Severity is defined by the admin for each transport rule created Mail Level Details Via Reporting Web Service and CMDLets Web Service/ODATA API MailTraffic CMDLets Get-MailTraffic EventType DLPPolicyRuleHits

SessionTitleTimingRoom SPR.202Encryption in ExchangeTue 10:45 AM - 12:00 PMBallroom E SPR.201 Eliminate the Regulatory Compliance NightmareTue 9:00 AM-10:15 AMMR 19ab SPR.UN.305 Exchange Online Protection: Notes from the field Wed 10:15 AM – 11:30 AMBallroom G SPR.UN.304 Experts Unplugged: EOP & Encryption Wed 8:30-9:45 AM Wed 1:00-2:15 PM MR 18d MR 17b SPR.401 Extending Data Loss Prevention For Your BusinessWed 4:45 PM- 6:00 PMMR 18bc SPR.203 Protect your Organization with Exchange Online Protection (EOP)Mon 4:30 PM - 5:45 PMMR 18bc SPR.301 So how does Microsoft handle my spam?Tue 4:45 PM – 6:00 PMMR 19ab SPR.401 Using Connectors & Mail RoutingWed 2:45 PM - 4:00 PMMR 18bc

SessionTitleTimingRoom SPR.202Encryption in ExchangeTue 10:45 AM - 12:00 PMBallroom E ARC.304 Exchange Server 2013 Transport ArchitectureTues 9:00 AM - 10:15 AMBallroom F EDC.302 Advanced Data Loss Prevention in ExchangeTues 1:30 PM-2:45 PMBallroom F EDC.UN.301 Experts Unplugged: Data Loss Prevention Tue 3:00 PM-4:15 PM Wed 10:15 AM-11:30 AM MR 18d MR 13ab EDC.204 Data Loss Prevention in Exchange, Outlook, OWAMon 2:45 Pm-4:00PMMR 18bc MNG.304 Reporting On O365 Mail flow and Mailbox DataWed 1:00 PM-2:15 PMMR 17a MNG.301Exchange Admin Center - getting administration done Wed 10:15 AM - 11:30 AMMR 18bc