 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Consumer / personal data Individual work data Team / group work data Personal devices Data location SkyDrive Public cloud SkyDrive Pro SharePoint.
Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
<presentation month/year>
Build /15/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
Introducing Windows Server 2012 R2 Work Folders:
Microsoft Ignite /16/2017 2:48 PM
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
IMAP migration Cutover migration Staged migration 2010 Hybrid2013 Hybrid Exchange 5.5 Exchange 2000 Exchange 2003 Exchange 2007 Exchange 2010 Exchange.
Module 6: Configuring AD RMS
1 Enabling Secure Internet Access with ISA Server.
TechEd /20/2017 2:02 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Alan Burchill Senior Consultant – Avanade
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Basic Instructions on how to use One Drive and share files. ONE Drive Your LogoYour own footer.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
CensorNet Ltd An introduction to CensorNet Professional On-premise web filtering & management An introduction to CensorNet Professional On-premise web.
User ProfileDescriptionPercentage of users Offline usersNo device currently turned on20% Inactive usersDevices are online, but no data changes.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 7 Planning and Deploying Messaging Compliance.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Getting Started with your Cloud File Sync Tool. Part I: Getting Started.
WCL305. Technical Editor Alan Burchill.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
OneDrive for Home. Office 365 and OneDrive: Services available to staff for home use.
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
EMS in action Hugh Simpson-Wells and Mark Riley 2016 Redmond Summit | Identity Without Boundaries
Productivity Architect Meet Chris Bortlik Author, Blogger, Speaker.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Enabling Secure Internet Access with TMG
Information Protection
Wait, Microsoft is in the Security Game?
10982B 10: Troubleshooting Resource Access for Clients That Are Not Domain Members Module 10 Presentation: 75 minutes Lab: 75 minutes After completing.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Welcome To : Group 1 VC Presentation
Introduction to Soonr by ….
Case Study – Novartis, Global Healthcare Company, Switzerland
Azure AD Application Proxy
Encryption in Office 365 Shobhit Sahay Technical Product Manager
TechEd /6/2018 1:14 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
TechEd /8/2018 7:24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
How to use Office 365 for Students.
TechEd /24/ :20 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Azure Information Protection
eCopy ShareScan Scan to OneDrive Chris Pearce-King
eCopy ShareScan Scan to Google Drive Chris Pearce-King
Presentation transcript:

 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server deployments and migrations  monitoring and reporting

Trusted File Servers

Consumer / personal data Individual work data Team / group work data Personal devices Data location OneDrive Public cloud OneDrive for Business SharePoint / Office 365 Work Folders File server Offline Files / Folder Redirection File server

Data management Quotas File screens Reporting Classification RMS protection Device management policy Limit access to registered devices File encryption / selective wipe Require password / device lock Authentication Kerberos (Windows Auth) Digest (Windows Auth) ADFS (OAuth)

1.Local change detected 2.Initiate sync session with server 3.Upload file to server 4.Server applies change to data dir 5.Sync initiated by second client 6.Download file from server 7.Client applies change to data dir Client limited to 1 partnership per user per device Client always drives sync Device applying the change responsible for conflict resolution

Limit to registered devices (seamless MFA) Data leak prevention (FCI/RMS) FCI enhancements like from RSA Anti-malware on server Sync Share permission + NTFS permissions Secure transport (SSL) File encryption + selective wipe (EFS/MDM) Password + device lock policies (EAS)

? ? How does Joe connect to the right Work Folders server? Some simple options: him a URL Configuration management tools When we migrate Joe to a different server he needs a new URL…

1 1.Client resolves a standard URL:

1 2 2.DNS returns a server address for discovery (Sync1)

1 2 1.Client resolves a standard URL: 2.DNS returns a server address for discovery (Sync1) 3.Client sends discovery request to server 3

1 2 1.Client resolves a standard URL: 2.DNS returns a server address for discovery (Sync1) 3.Client sends discovery request to server 4.Server retrieves user property: MSDS-SyncServerURL (Sync3) 4 3

1 2 1.Client resolves a standard URL: 2.DNS returns a server address for discovery (Sync1) 3.Client sends discovery request to server 4.Server retrieves user property: MSDS-SyncServerURL (Sync3) 5.Client receives and stores its sync server URL for use in all future sync sessions 4 3 5

1 2 1.Client resolves a standard URL: 2.DNS returns a server address for discovery (Sync1) 3.Client sends discovery request to server 4.Server retrieves user property: MSDS-SyncServerURL (Sync3) 5.Client receives and stores its sync server URL for use in all future sync sessions 6.Client syncs with designated server