SlideShare a Scribd company logo
1 of 1
Download to read offline
© 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com.
Capability grid
Use this grid of information protection capabilities to plan your
strategy for protecting data. Capabilities are categorized by protect
scenario (row). Capabilities increase in control and protection as you
move to the right.
Information
Protection for
Office 365
Capabilities for enterprise
organizations to protect corporate
assets
Empower users and enable collaboration while
protecting your corporate assets
Microsoft provides the most complete set of capabilities to protect your corporate assets. This model helps
organizations take a methodical approach to information protection.
Many organizations classify
data sensitivity by level
Three levels is a good starting point if your
organization doesn t already have defined
standards.
Example
Level 1 Level 2
Data is encrypted and
available only to
authenticated users
This level of protection is provided by
default for data stored in Office 365
services. Data is encrypted while it
resides in the service and in transit
between the service and client devices.
For some organizations, this level of
protection meets the minimum standard.
Additional data and identity
protection applied broadly
Capabilities such as multi-factor
authentication (MFA), mobile device
management, Exchange Online Advanced
Threat Protection, and Microsoft Cloud
App Security increase protection and
substantially raise the minimum standard
for protecting devices, identities, and
data. Many organizations will require one
or more of these features to meet a
minimum standard.
Level 3
Sophisticated protection
applied to specific data sets
Capabilities such as Azure Information
Protection and Office 365 Data Loss
Prevention (DLP) can be used to
enforce permissions and other policies
that protect sensitive data. You can also
implement Azure AD Identity Protection
policies to protect identities with access
to sensitive data.
Strongest protection and
separation
You can achieve the highest levels of
protection with encryption key
solutions, Advanced Data
Governance, and more protective
policies using Azure AD Identity
Protection. Also consider using SQL
Server Always Encrypted for partner
solutions that interact with Office
365. Not all organizations require the
highest level of protection.
Level 1 Level 2
Data is encrypted and
available only to
authenticated users
This level of protection is provided by
default for data stored in Office 365
services. Data is encrypted while it
resides in the service and in transit
between the service and client devices.
For some organizations, this level of
protection meets the minimum standard.
Additional data and identity
protection applied broadly
Capabilities such as multi-factor
authentication (MFA), mobile device
management, Exchange Online Advanced
Threat Protection, and Microsoft Cloud
App Security increase protection and
substantially raise the minimum standard
for protecting devices, identities, and
data. Many organizations will require one
or more of these features to meet a
minimum standard.
Level 3
Sophisticated protection
applied to specific data sets
Capabilities such as Azure Information
Protection and Office 365 Data Loss
Prevention (DLP) can be used to
enforce permissions and other policies
that protect sensitive data. You can also
implement Azure AD Identity Protection
policies to protect identities with access
to sensitive data.
Strongest protection and
separation
You can achieve the highest levels of
protection with encryption key
solutions, Advanced Data
Governance, and more protective
policies using Azure AD Identity
Protection. Also consider using SQL
Server Always Encrypted for partner
solutions that interact with Office
365. Not all organizations require the
highest level of protection.
Establish information
protection priorities
A
The first step of protecting information is identifying what to protect. Develop
clear, simple, and well-communicated guidelines to identify, protect, and monitor
the most important data assets anywhere they reside.
Set organization
minimum standards
B
Establish minimum standards for devices and accounts accessing any data assets
belonging to the organization. This can include device configuration compliance,
device wipe, enterprise data protection capabilities, user authentication strength, and
user identity.
Find and protect
sensitive data
C
Identify and classify sensitive assets. Define the technologies and processes to
automatically apply security controls.
Protect high value
assets (HVAs)
D
Establish the strongest protection for assets that have a disproportionate impact on
the organizations mission or profitability. Perform stringent analysis of HVA lifecycle
and security dependencies, establish appropriate security controls and conditions.
Deploy Password Management and
train users. Azure Active Directory
Premium password management
includes on-premises write-back.
Enable self-service password reset in
Azure Active Directory
Enable users to reset their
Azure AD passwords
Enable users to reset their
Azure AD passwords
Start here More control & protectionCapabilities increase in control and protection as you move to the right.
Protect your environment against
advanced threats, including malicious
links, unsafe attachments, and
malware campaigns. Gain insights
with reporting and URL trace
capabilities. Configure settings for
your organization s objectives.
Add Exchange Online Advanced
Threat Protection for your
organization
Exchange Online Advanced Threat
Protection (Features)
Exchange Online Advanced Threat
Protection (Features)
Service Description (TechNet)Service Description (TechNet)
How it works (TechNet)How it works (TechNet)
Use dedicated administrative
accounts for administrators. Use a
naming convention to make them
discoverable.
Protect administrative identities and
credentials by using workstations
that are hardened for this purpose.
Use dedicated administrative
workstations and accounts for
managing cloud services
Securing privileged accessSecuring privileged access
Take a prescribed approach to
securing privileged access. Cyber-
attackers are targeting these
accounts and other elements of
privileged access to rapidly gain
access to targeted data and systems
using credential theft attacks like
Pass-the-Hash and Pass-the-Ticket
Secure privileged access
Securing Privileged AccessSecuring Privileged Access
Validate the configuration of your
Office 365 tenant against your
organization s policy. Regularly
monitor critical settings for
unauthorized changes.
Focus first on administrative control
of the tenant and controls that allow
broad access to data in the Office
365 tenant.
Validate and monitor your security
configuration
In case of a problem with federated
authentication, create online
administrator accounts that can be
used in scenarios where federated
access is not possible.
Create pure online administration
accounts
Designate several admins who serve
different functions. This segments
permissions to ensure that a single
administrator doesn t have greater
access than necessary.
Separate duties of administrators by
role — SharePoint Online, Exchange
Online, and Skype for Business Online
Assigning admin roles in Office 365Assigning admin roles in Office 365
Manage, control, and monitor your
privileged identities and their access
to resources in Azure AD and in other
Microsoft services such as Office 365
or Microsoft Intune. Implement just
in time elevation for privileged
actions.
Use Azure AD Privileged Identity
Management to control and
monitor your privileged identities
Azure AD Privileged Identity
Management
Azure AD Privileged Identity
Management
Track the cause of unexpected
behavior, identify a malicious
administrator, investigate leaks, or
verify that compliance requirements
are being met.
Review the Office 365 administrator
audit logs
View the administrator audit logView the administrator audit log
Find out which accounts were used for
administrative actions that cause
unexpected behavior or to verify that
compliance requirements are met.
Use Exchange Online auditing
capabilities to search administrator
audit logs
Exchange auditing reportsExchange auditing reports
Customer Lockbox requires approval
from you before a service engineer
can access your SharePoint Online,
OneDrive for Business, or Exchange
Online information. It gives you
explicit control over access to your
content. In a rare event where you
need Microsoft support to resolve an
issue, customer lockbox lets you
control whether an engineer can
access your data and for how long.
Use Customer Lockbox for Office
365 to require mandatory approval
for service engineer work
Office 365 Customer Lockbox
Requests
Office 365 Customer Lockbox
Requests
Simplify and
protect access
1
Allow
collaboration
and prevent
leaks
2
Stop external
threats
3
Stay compliant4
Secure admin
access
5
Mapping service capabilities
to data sensitivity levels
Some information protection capabilities
apply broadly and can be used to set a
higher minimum standard for protecting all
data. Other capabilities can be targeted to
specific data sets for protecting sensitive
data and HVAs.
March 2017
Use Office 365 Advanced Security
Management to evaluate risk, to alert
on suspicious activity, and to
automatically take action. Requires
Office 365 E5 plan. Or, use Microsoft
Cloud App Security to obtain deeper
visibility even after access is granted,
comprehensive controls, and improved
protection for all your cloud
applications, including Office 365.
Requires EMS E5 plan.
Use Office 365 Advanced Security
Management or Microsoft Cloud
App Security
Overview of Advanced Security
Management in Office 365
Overview of Advanced Security
Management in Office 365
Whitepaper: Microsoft Password
Guidance
Whitepaper: Microsoft Password
Guidance
Reduce the number of active
identities to reduce licensing costs
and the identity attack surface.
Periodically check for inactive users
and disable accounts that are not
active. For example, you can identify
Exchange Online mailboxes that have
not been accessed for at least the last
30 days and then disable these
accounts in Azure Active Directory.
Manage inactive mailboxes in
Exchange Online
Manage inactive mailboxes in
Exchange Online
Blog: Office 365 – How to
Handle Departed Users
Blog: Office 365 – How to
Handle Departed Users
Disable identities in Azure Active
Directory that are not active
Reduce the number of active
identities to reduce licensing costs
and the identity attack surface.
Periodically check for inactive users
and disable accounts that are not
active. For example, you can identify
Exchange Online mailboxes that have
not been accessed for at least the last
30 days and then disable these
accounts in Azure Active Directory.
Manage inactive mailboxes in
Exchange Online
Blog: Office 365 – How to
Handle Departed Users
Disable identities in Azure Active
Directory that are not active
Use permissions in SharePoint to
provide or restrict user access to a
site or its contents. SharePoint sites
come with several default groups
that you can use to manage
permissions. These are not related to
Office 365 groups. Encourage users
to apply permissions to documents in
their OneDrive for Business libraries.
Configure permissions for
SharePoint and OneDrive for
Business libraries and documents
Use permissions in SharePoint to
provide or restrict user access to a
site or its contents. SharePoint sites
come with several default groups
that you can use to manage
permissions. These are not related to
Office 365 groups. Encourage users
to apply permissions to documents in
their OneDrive for Business libraries.
Configure permissions for
SharePoint and OneDrive for
Business libraries and documents
Understanding permission levels in
SharePoint
Understanding permission levels in
SharePoint
Understanding SharePoint groupsUnderstanding SharePoint groups
Use permissions in SharePoint to
provide or restrict user access to a
site or its contents. SharePoint sites
come with several default groups
that you can use to manage
permissions. These are not related to
Office 365 groups. Encourage users
to apply permissions to documents in
their OneDrive for Business libraries.
Configure permissions for
SharePoint and OneDrive for
Business libraries and documents
Understanding permission levels in
SharePoint
Understanding SharePoint groups
An external user is someone outside
of your organization who is invited to
access your SharePoint Online sites
and documents but does not have a
license for your SharePoint Online or
Microsoft Office 365 subscription.
External sharing policies apply to
both SharePoint Online and OneDrive
for Business.
Configure external sharing policies
to support your collaboration and
file protection objectives
An external user is someone outside
of your organization who is invited to
access your SharePoint Online sites
and documents but does not have a
license for your SharePoint Online or
Microsoft Office 365 subscription.
External sharing policies apply to
both SharePoint Online and OneDrive
for Business.
Configure external sharing policies
to support your collaboration and
file protection objectives
An external user is someone outside
of your organization who is invited to
access your SharePoint Online sites
and documents but does not have a
license for your SharePoint Online or
Microsoft Office 365 subscription.
External sharing policies apply to
both SharePoint Online and OneDrive
for Business.
Configure external sharing policies
to support your collaboration and
file protection objectives
Manage external sharing for your
SharePoint Online environment
Manage external sharing for your
SharePoint Online environment
Share sites or documents with people
outside your organization
Share sites or documents with people
outside your organization
Conditional access and network
location policies in SharePoint admin
let you determine whether access to
data is limited to a browser-only
experience or blocked.
Configure device access policies for
SharePoint Online and OneDrive for
Business
Conditional access and network
location policies in SharePoint admin
let you determine whether access to
data is limited to a browser-only
experience or blocked.
Configure device access policies for
SharePoint Online and OneDrive for
Business
Conditional access and network
location policies in SharePoint admin
let you determine whether access to
data is limited to a browser-only
experience or blocked.
Configure device access policies for
SharePoint Online and OneDrive for
Business
Enforce policies and analyze how users
adhere. Use built-in templates and
customizable policies. Policies include
transport rules, actions, and exceptions
that you create. Inform mail senders
that they are about to violate a policy.
Set up policies for SharePoint Online
and OneDrive for Business that
automatically apply to Word, Excel, and
PowerPoint 2016 applications.
Configure Data Loss Prevention
(DLP) across Office 365 services and
applications
Overview of data loss prevention
policies
Overview of data loss prevention
policies
Data loss prevention in
Exchange Online
Data loss prevention in
Exchange Online
Use Office 365 labels and Azure
Information Protection labels to
classify and protect your data.
Classification can be fully automatic,
user-driven, or both. Once data is
classified and labeled, protection can
be applied automatically on that
basis.
Use labels to implement
classification-based protection
Use Office 365 labels and Azure
Information Protection labels to
classify and protect your data.
Classification can be fully automatic,
user-driven, or both. Once data is
classified and labeled, protection can
be applied automatically on that
basis.
Use labels to implement
classification-based protection
Use Office 365 labels and Azure
Information Protection labels to
classify and protect your data.
Classification can be fully automatic,
user-driven, or both. Once data is
classified and labeled, protection can
be applied automatically on that
basis.
Use labels to implement
classification-based protection
File Protection Solutions in Office 365
(coming soon)
File Protection Solutions in Office 365
(coming soon)
What is Azure Information Protection?What is Azure Information Protection?
BlogBlog
Manage applications on mobile devices
regardless of whether the devices are
enrolled for mobile device
management. Deploy apps, including
LOB apps. Restrict actions like copy,
cut, paste, and save as, to only apps
managed by Intune. Enable secure web
browsing using the Intune Managed
Browser App. Enforce PIN and
encryption requirements, offline access
time, and other policy settings.
Use Intune to manage applications
on mobile devices
Configure and deploy mobile
application management policies
Configure and deploy mobile
application management policies
Intune application partnersIntune application partners
Manage applications on mobile devices
regardless of whether the devices are
enrolled for mobile device
management. Deploy apps, including
LOB apps. Restrict actions like copy,
cut, paste, and save as, to only apps
managed by Intune. Enable secure web
browsing using the Intune Managed
Browser App. Enforce PIN and
encryption requirements, offline access
time, and other policy settings.
Use Intune to manage applications
on mobile devices
Configure and deploy mobile
application management policies
Intune application partners
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Ask Cortana or type Windows
Defender in the task bar search box.
If you see a PC status: Protected
message, you re good to go. If
Windows Defender is turned off,
uninstall other antivirus solutions and
check again. Windows 10 will enable
Windows Defender automatically.
Keep Windows Defender enabled on
Windows 10 computers
Keep your PC safe with Windows
Defender
Keep your PC safe with Windows
Defender
Windows Defender in Windows 10
(TechNet)
Windows Defender in Windows 10
(TechNet)
Ask Cortana or type Windows
Defender in the task bar search box.
If you see a PC status: Protected
message, you re good to go. If
Windows Defender is turned off,
uninstall other antivirus solutions and
check again. Windows 10 will enable
Windows Defender automatically.
Keep Windows Defender enabled on
Windows 10 computers
Keep your PC safe with Windows
Defender
Windows Defender in Windows 10
(TechNet)
Use Microsoft Edge when browsing
the Internet. It helps block known
support scam sites using Windows
Defender SmartScreen. Microsoft
Edge also helps stop pop-up
dialogue loops used by these sites.
Use Microsoft Edge for browsing
Microsoft Edge Deployment Guide for
IT Pros (TechNet)
Microsoft Edge Deployment Guide for
IT Pros (TechNet)
Blog: Evolving Microsoft SmartScreen
to protect you from drive-by attacks
Blog: Evolving Microsoft SmartScreen
to protect you from drive-by attacks
Blog: Mitigating arbitrary native code
execution in Microsoft Edge
Blog: Mitigating arbitrary native code
execution in Microsoft Edge
Use Microsoft Edge when browsing
the Internet. It helps block known
support scam sites using Windows
Defender SmartScreen. Microsoft
Edge also helps stop pop-up
dialogue loops used by these sites.
Use Microsoft Edge for browsing
Microsoft Edge Deployment Guide for
IT Pros (TechNet)
Blog: Evolving Microsoft SmartScreen
to protect you from drive-by attacks
Blog: Mitigating arbitrary native code
execution in Microsoft Edge
Use Windows Defender ATP service
to help detect, investigate, and
respond to advanced and targeted
attacks on your networks.
Use Windows Defender Advanced
Threat Protection (ATP) to protect
your network
Windows Defender ATP User Guide
(TechNet)
Windows Defender ATP User Guide
(TechNet)
Use Windows Defender ATP service
to help detect, investigate, and
respond to advanced and targeted
attacks on your networks.
Use Windows Defender Advanced
Threat Protection (ATP) to protect
your network
Windows Defender ATP User Guide
(TechNet)
Device Guard is a combination of
enterprise-related hardware and
software security features that, when
configured together, will lock a
device down so that it can only run
trusted applications. Device Guard
prevents tampering by users or
malware that are running with
administrative privileges.
Use Device Guard to ensure only
trusted software is run on Windows
10 Enterprise
Device Guard overview (TechNet)Device Guard overview (TechNet)
Blog: What is Windows 10
Device Guard?
Blog: What is Windows 10
Device Guard?
Device Guard is a combination of
enterprise-related hardware and
software security features that, when
configured together, will lock a
device down so that it can only run
trusted applications. Device Guard
prevents tampering by users or
malware that are running with
administrative privileges.
Use Device Guard to ensure only
trusted software is run on Windows
10 Enterprise
Device Guard overview (TechNet)
Blog: What is Windows 10
Device Guard?
Monitor and gain insights into your
on-premises identity infrastructure
with the Azure AD Connect tool used
with Office 365.
Implement Azure AD Connect
Health
Monitor your on-premises identity
infrastructure and synchronization
services in the cloud
Monitor your on-premises identity
infrastructure and synchronization
services in the cloud
Monitor and gain insights into your
on-premises identity infrastructure
with the Azure AD Connect tool used
with Office 365.
Implement Azure AD Connect
Health
Monitor your on-premises identity
infrastructure and synchronization
services in the cloud
Identify suspicious user and device
activity. Build an Organizational
Security Graph and detect advanced
attacks in near real time.
Implement Advanced Threat
Analytics (ATA) on premises to
monitor your network.
Microsoft Advanced Threat
Analytics (TechNet)
Microsoft Advanced Threat
Analytics (TechNet)
Blog: Microsoft Advanced Threat
Analytics
Blog: Microsoft Advanced Threat
Analytics
Identify suspicious user and device
activity. Build an Organizational
Security Graph and detect advanced
attacks in near real time.
Implement Advanced Threat
Analytics (ATA) on premises to
monitor your network.
Microsoft Advanced Threat
Analytics (TechNet)
Blog: Microsoft Advanced Threat
Analytics
Keep managed computers secure by
ensuring the latest patches and
software updates are quickly
installed.
Use Intune to keep client software
up to date
Keep Windows PCs up to date with
software updates in Microsoft Intune
Keep Windows PCs up to date with
software updates in Microsoft Intune
Add a second-layer of security to
user sign-ins and transactions by
using multi-factor authentication
(MFA).
Configure Multi-Factor
Authentication (MFA)
Multi-Factor Authentication
documentation
Multi-Factor Authentication
documentation
Compare MFA features: Office 365
vs. Azure AD Premium
Compare MFA features: Office 365
vs. Azure AD Premium
Ensure device policy compliance
using configurable conditional access
policies for Office 365 to apply to
Exchange Online, SharePoint Online,
OneDrive for Business, and Skype for
Business. Configure secure access
with certificates, Wi-Fi, VPN and
email profiles.
Use Intune to protect data on
mobile devices, desktop computers,
and in applications
Microsoft Intune OverviewMicrosoft Intune Overview
Many SaaS apps are pre-integrated
with Azure Active Directory.
Configure your environment to use
single-sign on with these apps.
Office 365 plans include up to 10
SaaS apps per user. Azure Active
Directory Premium is not limited.
Configure single sign-on to other
SaaS apps in your environment
Configure your favorite SaaS cloud
application on Azure Active Directory
for single sign-on and easier user
account management
Configure your favorite SaaS cloud
application on Azure Active Directory
for single sign-on and easier user
account management
Define a license template and
assign it to a security group in Azure
AD. Azure AD will automatically
assign and remove licenses as users
join and leave the group.
Use Group-based Licensing to
assign licenses to users
Group-based licensing basics in
Azure Active Directory
Group-based licensing basics in
Azure Active Directory
Big Updates to Office 365 Identity
(licensing and how to try group-
based licensing)
Big Updates to Office 365 Identity
(licensing and how to try group-
based licensing)
Define a license template and
assign it to a security group in Azure
AD. Azure AD will automatically
assign and remove licenses as users
join and leave the group.
Use Group-based Licensing to
assign licenses to users
Group-based licensing basics in
Azure Active Directory
Big Updates to Office 365 Identity
(licensing and how to try group-
based licensing)
Create access policies that evaluate
the context of a user's login to make
real-time decisions about which
applications they should be allowed
to access. For example you can
require multi-factor authentication
per application or only when users
are not at work. Or you can block
access to specific applications when
users are not at work.
Configure Azure AD conditional
access to configure rules for access
to applications
Working with conditional accessWorking with conditional access
Windows Hello for Business replaces
passwords with strong two-factor
authentication on PCs and mobile
devices. This authentication consists
of a new type of user credential that
is tied to a device and uses a
biometric or PIN.
Enable Windows Hello for Business
on all Windows 10 PCs
Windows Hello for BusinessWindows Hello for Business
Windows Hello for Business replaces
passwords with strong two-factor
authentication on PCs and mobile
devices. This authentication consists
of a new type of user credential that
is tied to a device and uses a
biometric or PIN.
Enable Windows Hello for Business
on all Windows 10 PCs
Windows Hello for Business
Configure a MDM product to allow or
deny access to secure resources
based on device health attestation.
The Health Attestation Service is a
trusted cloud service operated by
Microsoft that reports what security
features are enabled on the device.
Use device health attestation
features with Windows 10 devices
Control the health of Windows 10-
based devices
Control the health of Windows 10-
based devices
Configure a MDM product to allow or
deny access to secure resources
based on device health attestation.
The Health Attestation Service is a
trusted cloud service operated by
Microsoft that reports what security
features are enabled on the device.
Use device health attestation
features with Windows 10 devices
Control the health of Windows 10-
based devices
Configure a MDM product to allow or
deny access to secure resources
based on device health attestation.
The Health Attestation Service is a
trusted cloud service operated by
Microsoft that reports what security
features are enabled on the device.
Use device health attestation
features with Windows 10 devices
Control the health of Windows 10-
based devices
External accounts on premises are a
threat that you can mitigate by
moving the accounts to Azure AD
B2B collaboration.
Azure AD B2B Collaboration enables
secure collaborate between business-
to-business partners. Any accounts
that are needed for SaaS application
access or SharePoint Online
collaboration can be moved to Azure
AD B2B.
Migrate your external accounts to
Azure AD B2B collaboration
Azure Active Directory B2B
collaboration
Azure Active Directory B2B
collaboration
External accounts on premises are a
threat that you can mitigate by
moving the accounts to Azure AD
B2B collaboration.
Azure AD B2B Collaboration enables
secure collaborate between business-
to-business partners. Any accounts
that are needed for SaaS application
access or SharePoint Online
collaboration can be moved to Azure
AD B2B.
Migrate your external accounts to
Azure AD B2B collaboration
Azure Active Directory B2B
collaboration
Enable Identity Protection (even in
trial mode) to see the user and sign
in risk of logins. Even without
enabling policies, you will gain
insights from the signals. After you
have enabled it for some time, we
recommend you activate Identity
Protection policies. For example,
require MFA on sign in when the risk
of a login is medium or higher. Or,
reset a user s password if the user s
risk is marked as high.
Enable Azure AD Identity Protection
Policies for your users
Azure Active Directory Identity
Protection
Azure Active Directory Identity
Protection
Enable Identity Protection (even in
trial mode) to see the user and sign
in risk of logins. Even without
enabling policies, you will gain
insights from the signals. After you
have enabled it for some time, we
recommend you activate Identity
Protection policies. For example,
require MFA on sign in when the risk
of a login is medium or higher. Or,
reset a user s password if the user s
risk is marked as high.
Enable Azure AD Identity Protection
Policies for your users
Azure Active Directory Identity
Protection
Risk level is calculated for every user
and every sign-in attempt. Risk-
based conditional access policies can
be applied to all apps protected by
Azure Active Directory.
Administrators can set policies that
trigger specific controls based on
various levels of risk. Actions can
include block, enforce MFA, or
password reset for the user.
Configure Azure AD risk-based
conditional access for greater
protection
Azure Active Directory risk eventsAzure Active Directory risk events
Risk level is calculated for every user
and every sign-in attempt. Risk-
based conditional access policies can
be applied to all apps protected by
Azure Active Directory.
Administrators can set policies that
trigger specific controls based on
various levels of risk. Actions can
include block, enforce MFA, or
password reset for the user.
Configure Azure AD risk-based
conditional access for greater
protection
Azure Active Directory risk events
Product key
Office 365 Enterprise E5
Plan or standalone add-on
Office 365 Enterprise
E3 Plan
All Office 365
Enterprise plans
Windows 10
Enterprise Mobility + Security
(EMS) E3 Plan
EMS plans include Azure AD Premium,
Intune, and Azure Rights Management
Test lab environments
You can create your own dev/test
environment with Office 365 Enterprise
E5, EMS, and Azure trial subscriptions.
Look for the test lab guide (TLG) icon in the
grid for capabilities that can be tested within
these environments. Here s the current set:
Simplified intranet in Azure IaaS to simulate an
enterprise configuration
Simplified intranet in Azure IaaS to simulate an
enterprise configuration
Enroll iOS and Android devices in your
Office 365 and EMS dev/test environment
Enroll iOS and Android devices in your
Office 365 and EMS dev/test environment
Enroll and manage these devices remotelyEnroll and manage these devices remotely
Enroll iOS and Android devices in your
Office 365 and EMS dev/test environment
Enroll and manage these devices remotely
MAM policies for your Office 365 and
EMS dev/test environment
MAM policies for your Office 365 and
EMS dev/test environment
Create MAM policies for iOS and Android devicesCreate MAM policies for iOS and Android devices
MAM policies for your Office 365 and
EMS dev/test environment
Create MAM policies for iOS and Android devices
Office 365 and EMS dev/test
environment
Office 365 and EMS dev/test
environment
Add an EMS trial subscription to your Office 365
trial environment
Add an EMS trial subscription to your Office 365
trial environment
Office 365 and EMS dev/test
environment
Add an EMS trial subscription to your Office 365
trial environment
Advanced Threat Protection for your
Office 365 dev/test environment
Advanced Threat Protection for your
Office 365 dev/test environment
Keep malware out of your emailKeep malware out of your email
Advanced Threat Protection for your
Office 365 dev/test environment
Keep malware out of your email
Advanced Security Management for your
Office 365 dev/test environment
Advanced Security Management for your
Office 365 dev/test environment
Create policies and monitor your environmentCreate policies and monitor your environment
Advanced Security Management for your
Office 365 dev/test environment
Create policies and monitor your environment
Multi-factor authentication for your
Office 365 dev/test environment
Multi-factor authentication for your
Office 365 dev/test environment
Demonstrate MFA with a verification code sent to
your smart phone
Demonstrate MFA with a verification code sent to
your smart phone
Multi-factor authentication for your
Office 365 dev/test environment
Demonstrate MFA with a verification code sent to
your smart phone
Office 365 dev/test environmentOffice 365 dev/test environment
Create and Office 365 E5 trial subscriptionCreate and Office 365 E5 trial subscription
Office 365 dev/test environment
Create and Office 365 E5 trial subscription
Base configuration dev/test environmentBase configuration dev/test environmentBase configuration dev/test environment
Advanced eDiscovery for your Office 365
dev/test environment
Advanced eDiscovery for your Office 365
dev/test environment
Add example data and demonstrate these
capabilities
Add example data and demonstrate these
capabilities
Advanced eDiscovery for your Office 365
dev/test environment
Add example data and demonstrate these
capabilities
Enterprise Mobility + Security
(EMS) E5 Plan
Data classification and labeling in the
Office 365 dev/test environment
Data classification and labeling in the
Office 365 dev/test environment
Classify files with the Azure Information
Protection client
Classify files with the Azure Information
Protection client
Data classification and labeling in the
Office 365 dev/test environment
Classify files with the Azure Information
Protection client
Using Office 365 Secure
Score
You can use Secure Score to learn more
about capabilities recommended for your
Office 365 environment.
Introducing the Office 365 Secure ScoreIntroducing the Office 365 Secure Score
BitLocker Drive Encryption protects
data when devices are lost or stolen.
WIP protects business content on
devices with file level encryption that
helps prevent accidental data leaks to
non-business documents,
unauthorized apps, and unapproved
locations.
Use Windows 10 BitLocker and
Windows Information Protection
(WIP)
BitLocker Drive Encryption protects
data when devices are lost or stolen.
WIP protects business content on
devices with file level encryption that
helps prevent accidental data leaks to
non-business documents,
unauthorized apps, and unapproved
locations.
Use Windows 10 BitLocker and
Windows Information Protection
(WIP)
Bitlocker overviewBitlocker overview
Protect your enterprise data using
Windows Information Protection (WIP)
Protect your enterprise data using
Windows Information Protection (WIP)
BitLocker Drive Encryption protects
data when devices are lost or stolen.
WIP protects business content on
devices with file level encryption that
helps prevent accidental data leaks to
non-business documents,
unauthorized apps, and unapproved
locations.
Use Windows 10 BitLocker and
Windows Information Protection
(WIP)
Bitlocker overview
Protect your enterprise data using
Windows Information Protection (WIP)
Use this tool to manage your own
applications on mobile devices with
the Mobile Application Management
policies.
Use the Intune App Wrapping Tool
to apply policies to line-of-business
applications
Configure and deploy mobile
application management policies in
the Microsoft Intune console
Configure and deploy mobile
application management policies in
the Microsoft Intune console
To help customers meet their
compliance requirements, customers
have the option to manage and
control their own encryption keys for
Office 365. Encrypting at the service
level offers an added layer of
protection for files in SharePoint
Online and OneDrive for Business
and for Exchange Online mailboxes.
Customer Key is applied tenant-wide
for all files in SharePoint Online and
OneDrive for Business.
Configure Office 365 service
encryption with Customer Key
(coming soon)
To help customers meet their
compliance requirements, customers
have the option to manage and
control their own encryption keys for
Office 365. Encrypting at the service
level offers an added layer of
protection for files in SharePoint
Online and OneDrive for Business
and for Exchange Online mailboxes.
Customer Key is applied tenant-wide
for all files in SharePoint Online and
OneDrive for Business.
Configure Office 365 service
encryption with Customer Key
(coming soon)
Encrypt keys and passwords using
keys stored in hardware security
modules (HSMs). Import or generate
your keys in HSMs that are validated
to FIPS 140-2 Level 2 standards—so
that your keys stay within the HSM
boundary. Microsoft does not see or
extract your keys. Monitor and audit
key use. Use Azure Key Vault for
workloads both on premises and
cloud hosted.
Use Azure Key Vault for line of
business solutions that interact with
Office 365
Azure Key VaultAzure Key Vault
Encrypt keys and passwords using
keys stored in hardware security
modules (HSMs). Import or generate
your keys in HSMs that are validated
to FIPS 140-2 Level 2 standards—so
that your keys stay within the HSM
boundary. Microsoft does not see or
extract your keys. Monitor and audit
key use. Use Azure Key Vault for
workloads both on premises and
cloud hosted.
Use Azure Key Vault for line of
business solutions that interact with
Office 365
Azure Key Vault
Protect sensitive data, such as credit
card numbers or identification numbers,
stored in Azure SQL Database or SQL
Server databases. Clients encrypt
sensitive data inside client applications
and never reveal the encryption keys to
the Database Engine (SQL Database or
SQL Server). This provides separation
between those who own the data (and
can view it) and those who manage the
data (but should have no access).
Protect sensitive data, such as credit
card numbers or identification numbers,
stored in Azure SQL Database or SQL
Server databases. Clients encrypt
sensitive data inside client applications
and never reveal the encryption keys to
the Database Engine (SQL Database or
SQL Server). This provides separation
between those who own the data (and
can view it) and those who manage the
data (but should have no access).
Use SQL Server Always Encrypted
for partner solutions using a SQL
database
Always Encrypted (Database Engine)Always Encrypted (Database Engine)
Blog: SQL Server 2016 includes new
advances that keep data safer
Blog: SQL Server 2016 includes new
advances that keep data safer
Protect sensitive data, such as credit
card numbers or identification numbers,
stored in Azure SQL Database or SQL
Server databases. Clients encrypt
sensitive data inside client applications
and never reveal the encryption keys to
the Database Engine (SQL Database or
SQL Server). This provides separation
between those who own the data (and
can view it) and those who manage the
data (but should have no access).
Use SQL Server Always Encrypted
for partner solutions using a SQL
database
Always Encrypted (Database Engine)
Blog: SQL Server 2016 includes new
advances that keep data safer
You can protect a sub-set of your
files at a very high level by using
Azure Information Protection
together with a Bring Your Own Key
(BYOK) or Hold Your Own Key (HYOK)
encryption solution.
For trade-secret or classified files,
implement BYOK or HYOK
encryption and protection
You can protect a sub-set of your
files at a very high level by using
Azure Information Protection
together with a Bring Your Own Key
(BYOK) or Hold Your Own Key (HYOK)
encryption solution.
For trade-secret or classified files,
implement BYOK or HYOK
encryption and protection
You can protect a sub-set of your
files at a very high level by using
Azure Information Protection
together with a Bring Your Own Key
(BYOK) or Hold Your Own Key (HYOK)
encryption solution.
For trade-secret or classified files,
implement BYOK or HYOK
encryption and protection
File Protection Solutions in Office 365
(coming soon)
File Protection Solutions in Office 365
(coming soon)
Keep messages needed to comply
with company policy, government
regulations, or legal needs, and
remove content that has no legal or
business value.
Use Message records management
(MRM) in Exchange Online to manage
email lifecycle and reduce legal risk
Message records managementMessage records management
Compliance officers can apply
policies that define when sites or
documents are retained, expire, close,
or are deleted.
Use retention policies in SharePoint
and OneDrive for sites and documents
Retention in the Office 365
Compliance Center
Retention in the Office 365
Compliance Center
Require encryption, digitally sign
messages, and monitor or restrict
forwarding. Create partner connectors
to apply a set of restrictions to
messages exchanged with a partner
organization or service provider.
Apply security restrictions in Exchange
Online to protect messages
Encryption in Office 365Encryption in Office 365
Set up connectors for secure mail
flow with a partner organization
Set up connectors for secure mail
flow with a partner organization
Set-RemoteDomainSet-RemoteDomain
Meet your organizational compliance
requirements by leveraging machine
assisted insights to help you import,
find, classify, set policies, and take
action on the data that is most
important to your organization. High-
value content across Exchange
Online, SharePoint Online, OneDrive
for Business, and Skype for Business
is efficiently protected for as long as
you need it to be.
Use Office 365 Advanced Data
Governance to classify, retain, and
take action on your data
Blog: New Office 365 capabilities to
manage security and compliance risk
Blog: New Office 365 capabilities to
manage security and compliance risk
Capabilities vary by planCapabilities vary by plan
Meet your organizational compliance
requirements by leveraging machine
assisted insights to help you import,
find, classify, set policies, and take
action on the data that is most
important to your organization. High-
value content across Exchange
Online, SharePoint Online, OneDrive
for Business, and Skype for Business
is efficiently protected for as long as
you need it to be.
Use Office 365 Advanced Data
Governance to classify, retain, and
take action on your data
Blog: New Office 365 capabilities to
manage security and compliance risk
Capabilities vary by plan
Identify, preserve, search, analyze, and
export email, documents, messages,
and other types of content to
investigate and meet legal obligations.
Conduct eDiscovery in Office 365
Compliance Search in the Office 365
Compliance Center
Compliance Search in the Office 365
Compliance Center
Perform analysis on discovered data
by applying the text analytics,
machine learning, and Relevance/
predictive coding capabilities of
Advanced eDiscovery. These
capabilities help organizations quickly
reduce the data set of items that are
most likely relevant to a specific case.
Use Advanced eDiscovery to speed
up the document review process
Office 365 Advanced eDiscoveryOffice 365 Advanced eDiscovery
Search and remove leaked data in
mailboxes, SharePoint Online sites,
and OneDrive for Business.
Use data spillage features in Office 365
eDiscovery in Office 365eDiscovery in Office 365
Use the Office 365 Security &
Compliance Center to search the
unified audit log to view user and
administrator activity in your Office
365 organization.
Audit user and administrator actions
in Office 365 for compliance
Search the audit log in the Office
365 Security & Compliance Center
Search the audit log in the Office
365 Security & Compliance Center
Preserve former employees email
after they leave your organization. A
mailbox becomes inactive when a
Litigation Hold or an In-Place Hold is
placed on the mailbox before the
corresponding Office 365 user
account is deleted. The contents of
an inactive mailbox are preserved for
the duration of the hold that was
placed on the mailbox before it was
made inactive.
Retain inactive mailboxes in
Exchange Online
Manage inactive mailboxes in
Exchange Online
Manage inactive mailboxes in
Exchange Online
Control access from unmanaged
devices
Control access from unmanaged
devices

More Related Content

Similar to MSFT Cloud Architecture Information Protection

Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
MJ Ferdous
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 

Similar to MSFT Cloud Architecture Information Protection (20)

Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And Compliance
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 

More from Kesavan Munuswamy

More from Kesavan Munuswamy (18)

Surviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebookSurviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebook
 
Windows_Server_2016_Virtualization White Paper By Veeam
Windows_Server_2016_Virtualization White Paper By VeeamWindows_Server_2016_Virtualization White Paper By Veeam
Windows_Server_2016_Virtualization White Paper By Veeam
 
Ms cloud identity and access infographic 2015
Ms cloud identity and access infographic 2015Ms cloud identity and access infographic 2015
Ms cloud identity and access infographic 2015
 
Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015
 
Microsoft azure infographic 2015 2.5
Microsoft azure infographic 2015 2.5Microsoft azure infographic 2015 2.5
Microsoft azure infographic 2015 2.5
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
 
Azure security infographic 2014 sec
Azure security infographic 2014 secAzure security infographic 2014 sec
Azure security infographic 2014 sec
 
MCSA Exam paper 70-412 PDF
MCSA Exam paper 70-412 PDFMCSA Exam paper 70-412 PDF
MCSA Exam paper 70-412 PDF
 
Windows Server 2012 Exam Paper 70-411 PDF
Windows Server 2012 Exam Paper 70-411 PDFWindows Server 2012 Exam Paper 70-411 PDF
Windows Server 2012 Exam Paper 70-411 PDF
 
MCSA Server 2012 Exam Paper 1- Ms 70 410
MCSA Server 2012  Exam Paper 1- Ms 70 410MCSA Server 2012  Exam Paper 1- Ms 70 410
MCSA Server 2012 Exam Paper 1- Ms 70 410
 
Inside the sql server query optimizer
Inside the sql server query optimizer Inside the sql server query optimizer
Inside the sql server query optimizer
 
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
 
SQL Server Source Control Basics
SQL Server Source Control BasicsSQL Server Source Control Basics
SQL Server Source Control Basics
 
Tips for Database Performance
Tips for Database PerformanceTips for Database Performance
Tips for Database Performance
 
Fundamentals of sql server 2012 replication e book
Fundamentals of sql server 2012 replication e bookFundamentals of sql server 2012 replication e book
Fundamentals of sql server 2012 replication e book
 
SQL Server Backup and Restore
SQL Server Backup and RestoreSQL Server Backup and Restore
SQL Server Backup and Restore
 
Extending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL ServerExtending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL Server
 
SQL High Availability solutions E Book
SQL High Availability solutions E BookSQL High Availability solutions E Book
SQL High Availability solutions E Book
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 

MSFT Cloud Architecture Information Protection

  • 1. © 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com. Capability grid Use this grid of information protection capabilities to plan your strategy for protecting data. Capabilities are categorized by protect scenario (row). Capabilities increase in control and protection as you move to the right. Information Protection for Office 365 Capabilities for enterprise organizations to protect corporate assets Empower users and enable collaboration while protecting your corporate assets Microsoft provides the most complete set of capabilities to protect your corporate assets. This model helps organizations take a methodical approach to information protection. Many organizations classify data sensitivity by level Three levels is a good starting point if your organization doesn t already have defined standards. Example Level 1 Level 2 Data is encrypted and available only to authenticated users This level of protection is provided by default for data stored in Office 365 services. Data is encrypted while it resides in the service and in transit between the service and client devices. For some organizations, this level of protection meets the minimum standard. Additional data and identity protection applied broadly Capabilities such as multi-factor authentication (MFA), mobile device management, Exchange Online Advanced Threat Protection, and Microsoft Cloud App Security increase protection and substantially raise the minimum standard for protecting devices, identities, and data. Many organizations will require one or more of these features to meet a minimum standard. Level 3 Sophisticated protection applied to specific data sets Capabilities such as Azure Information Protection and Office 365 Data Loss Prevention (DLP) can be used to enforce permissions and other policies that protect sensitive data. You can also implement Azure AD Identity Protection policies to protect identities with access to sensitive data. Strongest protection and separation You can achieve the highest levels of protection with encryption key solutions, Advanced Data Governance, and more protective policies using Azure AD Identity Protection. Also consider using SQL Server Always Encrypted for partner solutions that interact with Office 365. Not all organizations require the highest level of protection. Level 1 Level 2 Data is encrypted and available only to authenticated users This level of protection is provided by default for data stored in Office 365 services. Data is encrypted while it resides in the service and in transit between the service and client devices. For some organizations, this level of protection meets the minimum standard. Additional data and identity protection applied broadly Capabilities such as multi-factor authentication (MFA), mobile device management, Exchange Online Advanced Threat Protection, and Microsoft Cloud App Security increase protection and substantially raise the minimum standard for protecting devices, identities, and data. Many organizations will require one or more of these features to meet a minimum standard. Level 3 Sophisticated protection applied to specific data sets Capabilities such as Azure Information Protection and Office 365 Data Loss Prevention (DLP) can be used to enforce permissions and other policies that protect sensitive data. You can also implement Azure AD Identity Protection policies to protect identities with access to sensitive data. Strongest protection and separation You can achieve the highest levels of protection with encryption key solutions, Advanced Data Governance, and more protective policies using Azure AD Identity Protection. Also consider using SQL Server Always Encrypted for partner solutions that interact with Office 365. Not all organizations require the highest level of protection. Establish information protection priorities A The first step of protecting information is identifying what to protect. Develop clear, simple, and well-communicated guidelines to identify, protect, and monitor the most important data assets anywhere they reside. Set organization minimum standards B Establish minimum standards for devices and accounts accessing any data assets belonging to the organization. This can include device configuration compliance, device wipe, enterprise data protection capabilities, user authentication strength, and user identity. Find and protect sensitive data C Identify and classify sensitive assets. Define the technologies and processes to automatically apply security controls. Protect high value assets (HVAs) D Establish the strongest protection for assets that have a disproportionate impact on the organizations mission or profitability. Perform stringent analysis of HVA lifecycle and security dependencies, establish appropriate security controls and conditions. Deploy Password Management and train users. Azure Active Directory Premium password management includes on-premises write-back. Enable self-service password reset in Azure Active Directory Enable users to reset their Azure AD passwords Enable users to reset their Azure AD passwords Start here More control & protectionCapabilities increase in control and protection as you move to the right. Protect your environment against advanced threats, including malicious links, unsafe attachments, and malware campaigns. Gain insights with reporting and URL trace capabilities. Configure settings for your organization s objectives. Add Exchange Online Advanced Threat Protection for your organization Exchange Online Advanced Threat Protection (Features) Exchange Online Advanced Threat Protection (Features) Service Description (TechNet)Service Description (TechNet) How it works (TechNet)How it works (TechNet) Use dedicated administrative accounts for administrators. Use a naming convention to make them discoverable. Protect administrative identities and credentials by using workstations that are hardened for this purpose. Use dedicated administrative workstations and accounts for managing cloud services Securing privileged accessSecuring privileged access Take a prescribed approach to securing privileged access. Cyber- attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using credential theft attacks like Pass-the-Hash and Pass-the-Ticket Secure privileged access Securing Privileged AccessSecuring Privileged Access Validate the configuration of your Office 365 tenant against your organization s policy. Regularly monitor critical settings for unauthorized changes. Focus first on administrative control of the tenant and controls that allow broad access to data in the Office 365 tenant. Validate and monitor your security configuration In case of a problem with federated authentication, create online administrator accounts that can be used in scenarios where federated access is not possible. Create pure online administration accounts Designate several admins who serve different functions. This segments permissions to ensure that a single administrator doesn t have greater access than necessary. Separate duties of administrators by role — SharePoint Online, Exchange Online, and Skype for Business Online Assigning admin roles in Office 365Assigning admin roles in Office 365 Manage, control, and monitor your privileged identities and their access to resources in Azure AD and in other Microsoft services such as Office 365 or Microsoft Intune. Implement just in time elevation for privileged actions. Use Azure AD Privileged Identity Management to control and monitor your privileged identities Azure AD Privileged Identity Management Azure AD Privileged Identity Management Track the cause of unexpected behavior, identify a malicious administrator, investigate leaks, or verify that compliance requirements are being met. Review the Office 365 administrator audit logs View the administrator audit logView the administrator audit log Find out which accounts were used for administrative actions that cause unexpected behavior or to verify that compliance requirements are met. Use Exchange Online auditing capabilities to search administrator audit logs Exchange auditing reportsExchange auditing reports Customer Lockbox requires approval from you before a service engineer can access your SharePoint Online, OneDrive for Business, or Exchange Online information. It gives you explicit control over access to your content. In a rare event where you need Microsoft support to resolve an issue, customer lockbox lets you control whether an engineer can access your data and for how long. Use Customer Lockbox for Office 365 to require mandatory approval for service engineer work Office 365 Customer Lockbox Requests Office 365 Customer Lockbox Requests Simplify and protect access 1 Allow collaboration and prevent leaks 2 Stop external threats 3 Stay compliant4 Secure admin access 5 Mapping service capabilities to data sensitivity levels Some information protection capabilities apply broadly and can be used to set a higher minimum standard for protecting all data. Other capabilities can be targeted to specific data sets for protecting sensitive data and HVAs. March 2017 Use Office 365 Advanced Security Management to evaluate risk, to alert on suspicious activity, and to automatically take action. Requires Office 365 E5 plan. Or, use Microsoft Cloud App Security to obtain deeper visibility even after access is granted, comprehensive controls, and improved protection for all your cloud applications, including Office 365. Requires EMS E5 plan. Use Office 365 Advanced Security Management or Microsoft Cloud App Security Overview of Advanced Security Management in Office 365 Overview of Advanced Security Management in Office 365 Whitepaper: Microsoft Password Guidance Whitepaper: Microsoft Password Guidance Reduce the number of active identities to reduce licensing costs and the identity attack surface. Periodically check for inactive users and disable accounts that are not active. For example, you can identify Exchange Online mailboxes that have not been accessed for at least the last 30 days and then disable these accounts in Azure Active Directory. Manage inactive mailboxes in Exchange Online Manage inactive mailboxes in Exchange Online Blog: Office 365 – How to Handle Departed Users Blog: Office 365 – How to Handle Departed Users Disable identities in Azure Active Directory that are not active Reduce the number of active identities to reduce licensing costs and the identity attack surface. Periodically check for inactive users and disable accounts that are not active. For example, you can identify Exchange Online mailboxes that have not been accessed for at least the last 30 days and then disable these accounts in Azure Active Directory. Manage inactive mailboxes in Exchange Online Blog: Office 365 – How to Handle Departed Users Disable identities in Azure Active Directory that are not active Use permissions in SharePoint to provide or restrict user access to a site or its contents. SharePoint sites come with several default groups that you can use to manage permissions. These are not related to Office 365 groups. Encourage users to apply permissions to documents in their OneDrive for Business libraries. Configure permissions for SharePoint and OneDrive for Business libraries and documents Use permissions in SharePoint to provide or restrict user access to a site or its contents. SharePoint sites come with several default groups that you can use to manage permissions. These are not related to Office 365 groups. Encourage users to apply permissions to documents in their OneDrive for Business libraries. Configure permissions for SharePoint and OneDrive for Business libraries and documents Understanding permission levels in SharePoint Understanding permission levels in SharePoint Understanding SharePoint groupsUnderstanding SharePoint groups Use permissions in SharePoint to provide or restrict user access to a site or its contents. SharePoint sites come with several default groups that you can use to manage permissions. These are not related to Office 365 groups. Encourage users to apply permissions to documents in their OneDrive for Business libraries. Configure permissions for SharePoint and OneDrive for Business libraries and documents Understanding permission levels in SharePoint Understanding SharePoint groups An external user is someone outside of your organization who is invited to access your SharePoint Online sites and documents but does not have a license for your SharePoint Online or Microsoft Office 365 subscription. External sharing policies apply to both SharePoint Online and OneDrive for Business. Configure external sharing policies to support your collaboration and file protection objectives An external user is someone outside of your organization who is invited to access your SharePoint Online sites and documents but does not have a license for your SharePoint Online or Microsoft Office 365 subscription. External sharing policies apply to both SharePoint Online and OneDrive for Business. Configure external sharing policies to support your collaboration and file protection objectives An external user is someone outside of your organization who is invited to access your SharePoint Online sites and documents but does not have a license for your SharePoint Online or Microsoft Office 365 subscription. External sharing policies apply to both SharePoint Online and OneDrive for Business. Configure external sharing policies to support your collaboration and file protection objectives Manage external sharing for your SharePoint Online environment Manage external sharing for your SharePoint Online environment Share sites or documents with people outside your organization Share sites or documents with people outside your organization Conditional access and network location policies in SharePoint admin let you determine whether access to data is limited to a browser-only experience or blocked. Configure device access policies for SharePoint Online and OneDrive for Business Conditional access and network location policies in SharePoint admin let you determine whether access to data is limited to a browser-only experience or blocked. Configure device access policies for SharePoint Online and OneDrive for Business Conditional access and network location policies in SharePoint admin let you determine whether access to data is limited to a browser-only experience or blocked. Configure device access policies for SharePoint Online and OneDrive for Business Enforce policies and analyze how users adhere. Use built-in templates and customizable policies. Policies include transport rules, actions, and exceptions that you create. Inform mail senders that they are about to violate a policy. Set up policies for SharePoint Online and OneDrive for Business that automatically apply to Word, Excel, and PowerPoint 2016 applications. Configure Data Loss Prevention (DLP) across Office 365 services and applications Overview of data loss prevention policies Overview of data loss prevention policies Data loss prevention in Exchange Online Data loss prevention in Exchange Online Use Office 365 labels and Azure Information Protection labels to classify and protect your data. Classification can be fully automatic, user-driven, or both. Once data is classified and labeled, protection can be applied automatically on that basis. Use labels to implement classification-based protection Use Office 365 labels and Azure Information Protection labels to classify and protect your data. Classification can be fully automatic, user-driven, or both. Once data is classified and labeled, protection can be applied automatically on that basis. Use labels to implement classification-based protection Use Office 365 labels and Azure Information Protection labels to classify and protect your data. Classification can be fully automatic, user-driven, or both. Once data is classified and labeled, protection can be applied automatically on that basis. Use labels to implement classification-based protection File Protection Solutions in Office 365 (coming soon) File Protection Solutions in Office 365 (coming soon) What is Azure Information Protection?What is Azure Information Protection? BlogBlog Manage applications on mobile devices regardless of whether the devices are enrolled for mobile device management. Deploy apps, including LOB apps. Restrict actions like copy, cut, paste, and save as, to only apps managed by Intune. Enable secure web browsing using the Intune Managed Browser App. Enforce PIN and encryption requirements, offline access time, and other policy settings. Use Intune to manage applications on mobile devices Configure and deploy mobile application management policies Configure and deploy mobile application management policies Intune application partnersIntune application partners Manage applications on mobile devices regardless of whether the devices are enrolled for mobile device management. Deploy apps, including LOB apps. Restrict actions like copy, cut, paste, and save as, to only apps managed by Intune. Enable secure web browsing using the Intune Managed Browser App. Enforce PIN and encryption requirements, offline access time, and other policy settings. Use Intune to manage applications on mobile devices Configure and deploy mobile application management policies Intune application partners Microsoft Cloud App SecurityMicrosoft Cloud App Security Ask Cortana or type Windows Defender in the task bar search box. If you see a PC status: Protected message, you re good to go. If Windows Defender is turned off, uninstall other antivirus solutions and check again. Windows 10 will enable Windows Defender automatically. Keep Windows Defender enabled on Windows 10 computers Keep your PC safe with Windows Defender Keep your PC safe with Windows Defender Windows Defender in Windows 10 (TechNet) Windows Defender in Windows 10 (TechNet) Ask Cortana or type Windows Defender in the task bar search box. If you see a PC status: Protected message, you re good to go. If Windows Defender is turned off, uninstall other antivirus solutions and check again. Windows 10 will enable Windows Defender automatically. Keep Windows Defender enabled on Windows 10 computers Keep your PC safe with Windows Defender Windows Defender in Windows 10 (TechNet) Use Microsoft Edge when browsing the Internet. It helps block known support scam sites using Windows Defender SmartScreen. Microsoft Edge also helps stop pop-up dialogue loops used by these sites. Use Microsoft Edge for browsing Microsoft Edge Deployment Guide for IT Pros (TechNet) Microsoft Edge Deployment Guide for IT Pros (TechNet) Blog: Evolving Microsoft SmartScreen to protect you from drive-by attacks Blog: Evolving Microsoft SmartScreen to protect you from drive-by attacks Blog: Mitigating arbitrary native code execution in Microsoft Edge Blog: Mitigating arbitrary native code execution in Microsoft Edge Use Microsoft Edge when browsing the Internet. It helps block known support scam sites using Windows Defender SmartScreen. Microsoft Edge also helps stop pop-up dialogue loops used by these sites. Use Microsoft Edge for browsing Microsoft Edge Deployment Guide for IT Pros (TechNet) Blog: Evolving Microsoft SmartScreen to protect you from drive-by attacks Blog: Mitigating arbitrary native code execution in Microsoft Edge Use Windows Defender ATP service to help detect, investigate, and respond to advanced and targeted attacks on your networks. Use Windows Defender Advanced Threat Protection (ATP) to protect your network Windows Defender ATP User Guide (TechNet) Windows Defender ATP User Guide (TechNet) Use Windows Defender ATP service to help detect, investigate, and respond to advanced and targeted attacks on your networks. Use Windows Defender Advanced Threat Protection (ATP) to protect your network Windows Defender ATP User Guide (TechNet) Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. Device Guard prevents tampering by users or malware that are running with administrative privileges. Use Device Guard to ensure only trusted software is run on Windows 10 Enterprise Device Guard overview (TechNet)Device Guard overview (TechNet) Blog: What is Windows 10 Device Guard? Blog: What is Windows 10 Device Guard? Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. Device Guard prevents tampering by users or malware that are running with administrative privileges. Use Device Guard to ensure only trusted software is run on Windows 10 Enterprise Device Guard overview (TechNet) Blog: What is Windows 10 Device Guard? Monitor and gain insights into your on-premises identity infrastructure with the Azure AD Connect tool used with Office 365. Implement Azure AD Connect Health Monitor your on-premises identity infrastructure and synchronization services in the cloud Monitor your on-premises identity infrastructure and synchronization services in the cloud Monitor and gain insights into your on-premises identity infrastructure with the Azure AD Connect tool used with Office 365. Implement Azure AD Connect Health Monitor your on-premises identity infrastructure and synchronization services in the cloud Identify suspicious user and device activity. Build an Organizational Security Graph and detect advanced attacks in near real time. Implement Advanced Threat Analytics (ATA) on premises to monitor your network. Microsoft Advanced Threat Analytics (TechNet) Microsoft Advanced Threat Analytics (TechNet) Blog: Microsoft Advanced Threat Analytics Blog: Microsoft Advanced Threat Analytics Identify suspicious user and device activity. Build an Organizational Security Graph and detect advanced attacks in near real time. Implement Advanced Threat Analytics (ATA) on premises to monitor your network. Microsoft Advanced Threat Analytics (TechNet) Blog: Microsoft Advanced Threat Analytics Keep managed computers secure by ensuring the latest patches and software updates are quickly installed. Use Intune to keep client software up to date Keep Windows PCs up to date with software updates in Microsoft Intune Keep Windows PCs up to date with software updates in Microsoft Intune Add a second-layer of security to user sign-ins and transactions by using multi-factor authentication (MFA). Configure Multi-Factor Authentication (MFA) Multi-Factor Authentication documentation Multi-Factor Authentication documentation Compare MFA features: Office 365 vs. Azure AD Premium Compare MFA features: Office 365 vs. Azure AD Premium Ensure device policy compliance using configurable conditional access policies for Office 365 to apply to Exchange Online, SharePoint Online, OneDrive for Business, and Skype for Business. Configure secure access with certificates, Wi-Fi, VPN and email profiles. Use Intune to protect data on mobile devices, desktop computers, and in applications Microsoft Intune OverviewMicrosoft Intune Overview Many SaaS apps are pre-integrated with Azure Active Directory. Configure your environment to use single-sign on with these apps. Office 365 plans include up to 10 SaaS apps per user. Azure Active Directory Premium is not limited. Configure single sign-on to other SaaS apps in your environment Configure your favorite SaaS cloud application on Azure Active Directory for single sign-on and easier user account management Configure your favorite SaaS cloud application on Azure Active Directory for single sign-on and easier user account management Define a license template and assign it to a security group in Azure AD. Azure AD will automatically assign and remove licenses as users join and leave the group. Use Group-based Licensing to assign licenses to users Group-based licensing basics in Azure Active Directory Group-based licensing basics in Azure Active Directory Big Updates to Office 365 Identity (licensing and how to try group- based licensing) Big Updates to Office 365 Identity (licensing and how to try group- based licensing) Define a license template and assign it to a security group in Azure AD. Azure AD will automatically assign and remove licenses as users join and leave the group. Use Group-based Licensing to assign licenses to users Group-based licensing basics in Azure Active Directory Big Updates to Office 365 Identity (licensing and how to try group- based licensing) Create access policies that evaluate the context of a user's login to make real-time decisions about which applications they should be allowed to access. For example you can require multi-factor authentication per application or only when users are not at work. Or you can block access to specific applications when users are not at work. Configure Azure AD conditional access to configure rules for access to applications Working with conditional accessWorking with conditional access Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. Enable Windows Hello for Business on all Windows 10 PCs Windows Hello for BusinessWindows Hello for Business Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. Enable Windows Hello for Business on all Windows 10 PCs Windows Hello for Business Configure a MDM product to allow or deny access to secure resources based on device health attestation. The Health Attestation Service is a trusted cloud service operated by Microsoft that reports what security features are enabled on the device. Use device health attestation features with Windows 10 devices Control the health of Windows 10- based devices Control the health of Windows 10- based devices Configure a MDM product to allow or deny access to secure resources based on device health attestation. The Health Attestation Service is a trusted cloud service operated by Microsoft that reports what security features are enabled on the device. Use device health attestation features with Windows 10 devices Control the health of Windows 10- based devices Configure a MDM product to allow or deny access to secure resources based on device health attestation. The Health Attestation Service is a trusted cloud service operated by Microsoft that reports what security features are enabled on the device. Use device health attestation features with Windows 10 devices Control the health of Windows 10- based devices External accounts on premises are a threat that you can mitigate by moving the accounts to Azure AD B2B collaboration. Azure AD B2B Collaboration enables secure collaborate between business- to-business partners. Any accounts that are needed for SaaS application access or SharePoint Online collaboration can be moved to Azure AD B2B. Migrate your external accounts to Azure AD B2B collaboration Azure Active Directory B2B collaboration Azure Active Directory B2B collaboration External accounts on premises are a threat that you can mitigate by moving the accounts to Azure AD B2B collaboration. Azure AD B2B Collaboration enables secure collaborate between business- to-business partners. Any accounts that are needed for SaaS application access or SharePoint Online collaboration can be moved to Azure AD B2B. Migrate your external accounts to Azure AD B2B collaboration Azure Active Directory B2B collaboration Enable Identity Protection (even in trial mode) to see the user and sign in risk of logins. Even without enabling policies, you will gain insights from the signals. After you have enabled it for some time, we recommend you activate Identity Protection policies. For example, require MFA on sign in when the risk of a login is medium or higher. Or, reset a user s password if the user s risk is marked as high. Enable Azure AD Identity Protection Policies for your users Azure Active Directory Identity Protection Azure Active Directory Identity Protection Enable Identity Protection (even in trial mode) to see the user and sign in risk of logins. Even without enabling policies, you will gain insights from the signals. After you have enabled it for some time, we recommend you activate Identity Protection policies. For example, require MFA on sign in when the risk of a login is medium or higher. Or, reset a user s password if the user s risk is marked as high. Enable Azure AD Identity Protection Policies for your users Azure Active Directory Identity Protection Risk level is calculated for every user and every sign-in attempt. Risk- based conditional access policies can be applied to all apps protected by Azure Active Directory. Administrators can set policies that trigger specific controls based on various levels of risk. Actions can include block, enforce MFA, or password reset for the user. Configure Azure AD risk-based conditional access for greater protection Azure Active Directory risk eventsAzure Active Directory risk events Risk level is calculated for every user and every sign-in attempt. Risk- based conditional access policies can be applied to all apps protected by Azure Active Directory. Administrators can set policies that trigger specific controls based on various levels of risk. Actions can include block, enforce MFA, or password reset for the user. Configure Azure AD risk-based conditional access for greater protection Azure Active Directory risk events Product key Office 365 Enterprise E5 Plan or standalone add-on Office 365 Enterprise E3 Plan All Office 365 Enterprise plans Windows 10 Enterprise Mobility + Security (EMS) E3 Plan EMS plans include Azure AD Premium, Intune, and Azure Rights Management Test lab environments You can create your own dev/test environment with Office 365 Enterprise E5, EMS, and Azure trial subscriptions. Look for the test lab guide (TLG) icon in the grid for capabilities that can be tested within these environments. Here s the current set: Simplified intranet in Azure IaaS to simulate an enterprise configuration Simplified intranet in Azure IaaS to simulate an enterprise configuration Enroll iOS and Android devices in your Office 365 and EMS dev/test environment Enroll iOS and Android devices in your Office 365 and EMS dev/test environment Enroll and manage these devices remotelyEnroll and manage these devices remotely Enroll iOS and Android devices in your Office 365 and EMS dev/test environment Enroll and manage these devices remotely MAM policies for your Office 365 and EMS dev/test environment MAM policies for your Office 365 and EMS dev/test environment Create MAM policies for iOS and Android devicesCreate MAM policies for iOS and Android devices MAM policies for your Office 365 and EMS dev/test environment Create MAM policies for iOS and Android devices Office 365 and EMS dev/test environment Office 365 and EMS dev/test environment Add an EMS trial subscription to your Office 365 trial environment Add an EMS trial subscription to your Office 365 trial environment Office 365 and EMS dev/test environment Add an EMS trial subscription to your Office 365 trial environment Advanced Threat Protection for your Office 365 dev/test environment Advanced Threat Protection for your Office 365 dev/test environment Keep malware out of your emailKeep malware out of your email Advanced Threat Protection for your Office 365 dev/test environment Keep malware out of your email Advanced Security Management for your Office 365 dev/test environment Advanced Security Management for your Office 365 dev/test environment Create policies and monitor your environmentCreate policies and monitor your environment Advanced Security Management for your Office 365 dev/test environment Create policies and monitor your environment Multi-factor authentication for your Office 365 dev/test environment Multi-factor authentication for your Office 365 dev/test environment Demonstrate MFA with a verification code sent to your smart phone Demonstrate MFA with a verification code sent to your smart phone Multi-factor authentication for your Office 365 dev/test environment Demonstrate MFA with a verification code sent to your smart phone Office 365 dev/test environmentOffice 365 dev/test environment Create and Office 365 E5 trial subscriptionCreate and Office 365 E5 trial subscription Office 365 dev/test environment Create and Office 365 E5 trial subscription Base configuration dev/test environmentBase configuration dev/test environmentBase configuration dev/test environment Advanced eDiscovery for your Office 365 dev/test environment Advanced eDiscovery for your Office 365 dev/test environment Add example data and demonstrate these capabilities Add example data and demonstrate these capabilities Advanced eDiscovery for your Office 365 dev/test environment Add example data and demonstrate these capabilities Enterprise Mobility + Security (EMS) E5 Plan Data classification and labeling in the Office 365 dev/test environment Data classification and labeling in the Office 365 dev/test environment Classify files with the Azure Information Protection client Classify files with the Azure Information Protection client Data classification and labeling in the Office 365 dev/test environment Classify files with the Azure Information Protection client Using Office 365 Secure Score You can use Secure Score to learn more about capabilities recommended for your Office 365 environment. Introducing the Office 365 Secure ScoreIntroducing the Office 365 Secure Score BitLocker Drive Encryption protects data when devices are lost or stolen. WIP protects business content on devices with file level encryption that helps prevent accidental data leaks to non-business documents, unauthorized apps, and unapproved locations. Use Windows 10 BitLocker and Windows Information Protection (WIP) BitLocker Drive Encryption protects data when devices are lost or stolen. WIP protects business content on devices with file level encryption that helps prevent accidental data leaks to non-business documents, unauthorized apps, and unapproved locations. Use Windows 10 BitLocker and Windows Information Protection (WIP) Bitlocker overviewBitlocker overview Protect your enterprise data using Windows Information Protection (WIP) Protect your enterprise data using Windows Information Protection (WIP) BitLocker Drive Encryption protects data when devices are lost or stolen. WIP protects business content on devices with file level encryption that helps prevent accidental data leaks to non-business documents, unauthorized apps, and unapproved locations. Use Windows 10 BitLocker and Windows Information Protection (WIP) Bitlocker overview Protect your enterprise data using Windows Information Protection (WIP) Use this tool to manage your own applications on mobile devices with the Mobile Application Management policies. Use the Intune App Wrapping Tool to apply policies to line-of-business applications Configure and deploy mobile application management policies in the Microsoft Intune console Configure and deploy mobile application management policies in the Microsoft Intune console To help customers meet their compliance requirements, customers have the option to manage and control their own encryption keys for Office 365. Encrypting at the service level offers an added layer of protection for files in SharePoint Online and OneDrive for Business and for Exchange Online mailboxes. Customer Key is applied tenant-wide for all files in SharePoint Online and OneDrive for Business. Configure Office 365 service encryption with Customer Key (coming soon) To help customers meet their compliance requirements, customers have the option to manage and control their own encryption keys for Office 365. Encrypting at the service level offers an added layer of protection for files in SharePoint Online and OneDrive for Business and for Exchange Online mailboxes. Customer Key is applied tenant-wide for all files in SharePoint Online and OneDrive for Business. Configure Office 365 service encryption with Customer Key (coming soon) Encrypt keys and passwords using keys stored in hardware security modules (HSMs). Import or generate your keys in HSMs that are validated to FIPS 140-2 Level 2 standards—so that your keys stay within the HSM boundary. Microsoft does not see or extract your keys. Monitor and audit key use. Use Azure Key Vault for workloads both on premises and cloud hosted. Use Azure Key Vault for line of business solutions that interact with Office 365 Azure Key VaultAzure Key Vault Encrypt keys and passwords using keys stored in hardware security modules (HSMs). Import or generate your keys in HSMs that are validated to FIPS 140-2 Level 2 standards—so that your keys stay within the HSM boundary. Microsoft does not see or extract your keys. Monitor and audit key use. Use Azure Key Vault for workloads both on premises and cloud hosted. Use Azure Key Vault for line of business solutions that interact with Office 365 Azure Key Vault Protect sensitive data, such as credit card numbers or identification numbers, stored in Azure SQL Database or SQL Server databases. Clients encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). This provides separation between those who own the data (and can view it) and those who manage the data (but should have no access). Protect sensitive data, such as credit card numbers or identification numbers, stored in Azure SQL Database or SQL Server databases. Clients encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). This provides separation between those who own the data (and can view it) and those who manage the data (but should have no access). Use SQL Server Always Encrypted for partner solutions using a SQL database Always Encrypted (Database Engine)Always Encrypted (Database Engine) Blog: SQL Server 2016 includes new advances that keep data safer Blog: SQL Server 2016 includes new advances that keep data safer Protect sensitive data, such as credit card numbers or identification numbers, stored in Azure SQL Database or SQL Server databases. Clients encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). This provides separation between those who own the data (and can view it) and those who manage the data (but should have no access). Use SQL Server Always Encrypted for partner solutions using a SQL database Always Encrypted (Database Engine) Blog: SQL Server 2016 includes new advances that keep data safer You can protect a sub-set of your files at a very high level by using Azure Information Protection together with a Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) encryption solution. For trade-secret or classified files, implement BYOK or HYOK encryption and protection You can protect a sub-set of your files at a very high level by using Azure Information Protection together with a Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) encryption solution. For trade-secret or classified files, implement BYOK or HYOK encryption and protection You can protect a sub-set of your files at a very high level by using Azure Information Protection together with a Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) encryption solution. For trade-secret or classified files, implement BYOK or HYOK encryption and protection File Protection Solutions in Office 365 (coming soon) File Protection Solutions in Office 365 (coming soon) Keep messages needed to comply with company policy, government regulations, or legal needs, and remove content that has no legal or business value. Use Message records management (MRM) in Exchange Online to manage email lifecycle and reduce legal risk Message records managementMessage records management Compliance officers can apply policies that define when sites or documents are retained, expire, close, or are deleted. Use retention policies in SharePoint and OneDrive for sites and documents Retention in the Office 365 Compliance Center Retention in the Office 365 Compliance Center Require encryption, digitally sign messages, and monitor or restrict forwarding. Create partner connectors to apply a set of restrictions to messages exchanged with a partner organization or service provider. Apply security restrictions in Exchange Online to protect messages Encryption in Office 365Encryption in Office 365 Set up connectors for secure mail flow with a partner organization Set up connectors for secure mail flow with a partner organization Set-RemoteDomainSet-RemoteDomain Meet your organizational compliance requirements by leveraging machine assisted insights to help you import, find, classify, set policies, and take action on the data that is most important to your organization. High- value content across Exchange Online, SharePoint Online, OneDrive for Business, and Skype for Business is efficiently protected for as long as you need it to be. Use Office 365 Advanced Data Governance to classify, retain, and take action on your data Blog: New Office 365 capabilities to manage security and compliance risk Blog: New Office 365 capabilities to manage security and compliance risk Capabilities vary by planCapabilities vary by plan Meet your organizational compliance requirements by leveraging machine assisted insights to help you import, find, classify, set policies, and take action on the data that is most important to your organization. High- value content across Exchange Online, SharePoint Online, OneDrive for Business, and Skype for Business is efficiently protected for as long as you need it to be. Use Office 365 Advanced Data Governance to classify, retain, and take action on your data Blog: New Office 365 capabilities to manage security and compliance risk Capabilities vary by plan Identify, preserve, search, analyze, and export email, documents, messages, and other types of content to investigate and meet legal obligations. Conduct eDiscovery in Office 365 Compliance Search in the Office 365 Compliance Center Compliance Search in the Office 365 Compliance Center Perform analysis on discovered data by applying the text analytics, machine learning, and Relevance/ predictive coding capabilities of Advanced eDiscovery. These capabilities help organizations quickly reduce the data set of items that are most likely relevant to a specific case. Use Advanced eDiscovery to speed up the document review process Office 365 Advanced eDiscoveryOffice 365 Advanced eDiscovery Search and remove leaked data in mailboxes, SharePoint Online sites, and OneDrive for Business. Use data spillage features in Office 365 eDiscovery in Office 365eDiscovery in Office 365 Use the Office 365 Security & Compliance Center to search the unified audit log to view user and administrator activity in your Office 365 organization. Audit user and administrator actions in Office 365 for compliance Search the audit log in the Office 365 Security & Compliance Center Search the audit log in the Office 365 Security & Compliance Center Preserve former employees email after they leave your organization. A mailbox becomes inactive when a Litigation Hold or an In-Place Hold is placed on the mailbox before the corresponding Office 365 user account is deleted. The contents of an inactive mailbox are preserved for the duration of the hold that was placed on the mailbox before it was made inactive. Retain inactive mailboxes in Exchange Online Manage inactive mailboxes in Exchange Online Manage inactive mailboxes in Exchange Online Control access from unmanaged devices Control access from unmanaged devices