SlideShare a Scribd company logo
How to protect my data in Office 365?
Dutch Microsoft & Security Meetup – 23 mei 2019
Maarten Eekels
Contact
@maarteneekels
meekels@portiva.nl
www.eekels.net
Agenda
• Data encryption
• Multi-factor authentication
• Azure AD identity protection
• Conditional access
• Azure AD privileged identity management
• Office 365 unified labelling
• Data loss prevention
Data encryption
Data at rest
• BitLocker drive encryption
• Per-file encryption (for SharePoint Online and OneDrive for Business)
• Files are spread across multiple Azure Storage containers
• Map with file locations is also encrypted
• Encryptions keys are physically located somewhere else
Data in transit
• TLS across all workloads
• TLS 1.2 support
• SSL 3.0 / TLS 1.0 and 1.1 support already withdrawn
• 3DES support withdrawn per July 10, 2019
Multi-factor authentication
Why MFA?
Because you will stop 99%
of all phishing attacks!
Azure AD vs Office 365
• Fraud alert
• Custom greetings
• Trusted IPs
• Hardware tokens
DEMO
Azure AD identity protection
Detect vulnerabilities and risky accounts
DEMO
Conditional access
Implement automated access control decisions
Access concerns:
• Sign-in risk
• Network location
• Device management
• Client application
DEMO
Azure AD privileged identity management
Minimize the number of people who have access to secure information or resources
Manage:
• Azure AD roles
• Azure resources
DEMO
Office 365 unified labelling
Unified labelling pros vs cons
Pros
• Custom sensitive information types
• Keyword dictionaries
• Complex conditions
• Mobile client and Mac support
Cons
• No custom permissions in Office apps
• No track and revoke
• No Do Not Forward button in Outlook
DEMO
Data loss prevention
Goals of DLP:
• Identify sensitive information across
Office 365
• Prevent the accidental sharing of
sensitive information
DLP policies contain:
• Locations
• Conditions
• Actions
DEMO
• Sensitivity labels for SharePoint sites
• Sensitivity label integration support
• External access expiration
• DLP restricted access (block external sharing until DLP scan
has been completed)
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Updates-to-SharePoint-security-
administration-and-migration/ba-p/549585
Announcements at SPC
That’s all folks!
@maarteneekels

More Related Content

What's hot

aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
Albert Hoitingh
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
Robert Crane
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
LaurenWendler
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
BizTalk360
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
Seclore
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
David Strom
 
Microsoft TechDays Netherlands 2017 - Azure Information Protection Scanner
Microsoft TechDays Netherlands 2017 - Azure Information Protection ScannerMicrosoft TechDays Netherlands 2017 - Azure Information Protection Scanner
Microsoft TechDays Netherlands 2017 - Azure Information Protection Scanner
Albert Hoitingh
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
Seclore
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
Akeyless
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
Seclore
 
Tuga it 2018 advanced data governance
Tuga it 2018   advanced data governanceTuga it 2018   advanced data governance
Tuga it 2018 advanced data governance
Albert Hoitingh
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
gori4
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureNancy DaCorsi
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365
Albert Hoitingh
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
Joanne Klein
 
Microsoft TechDays Netherlands 2017 - Azure Information Protection
Microsoft TechDays Netherlands 2017 - Azure Information ProtectionMicrosoft TechDays Netherlands 2017 - Azure Information Protection
Microsoft TechDays Netherlands 2017 - Azure Information Protection
Albert Hoitingh
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key Vault
Alberto Diaz Martin
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
LaurenWendler
 

What's hot (20)

aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
 
Microsoft TechDays Netherlands 2017 - Azure Information Protection Scanner
Microsoft TechDays Netherlands 2017 - Azure Information Protection ScannerMicrosoft TechDays Netherlands 2017 - Azure Information Protection Scanner
Microsoft TechDays Netherlands 2017 - Azure Information Protection Scanner
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Tuga it 2018 advanced data governance
Tuga it 2018   advanced data governanceTuga it 2018   advanced data governance
Tuga it 2018 advanced data governance
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect Brochure
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
Microsoft TechDays Netherlands 2017 - Azure Information Protection
Microsoft TechDays Netherlands 2017 - Azure Information ProtectionMicrosoft TechDays Netherlands 2017 - Azure Information Protection
Microsoft TechDays Netherlands 2017 - Azure Information Protection
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key Vault
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 

Similar to Dutch Microsoft & Security Meetup - How to protect my data in Office 365?

Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
Alert Logic
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Sonja Madsen
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
David J Rosenthal
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Robert Crane
 
Cloud - aber sicher
Cloud - aber sicherCloud - aber sicher
Cloud - aber sicher
Trivadis
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Morgan Simonsen
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep dive
Albert Hoitingh
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
kovec2684
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
Robert Crane
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
Microsoft Österreich
 
Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365
Albert Hoitingh
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
itnewsafrica
 
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
European Collaboration Summit
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
NCCOMMS
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
Albert Hoitingh
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
Erick Alejandro Antonio
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
Vignesh Ganesan I Microsoft MVP
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
GenericName6
 

Similar to Dutch Microsoft & Security Meetup - How to protect my data in Office 365? (20)

Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Cloud - aber sicher
Cloud - aber sicherCloud - aber sicher
Cloud - aber sicher
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep dive
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
 
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 

More from Maarten Eekels

ESPC19 - Office 365 Labels Deep Dive
ESPC19 - Office 365 Labels Deep DiveESPC19 - Office 365 Labels Deep Dive
ESPC19 - Office 365 Labels Deep Dive
Maarten Eekels
 
ESPC19 - Microsoft Teams Architecture Deep Dive
ESPC19 - Microsoft Teams Architecture Deep DiveESPC19 - Microsoft Teams Architecture Deep Dive
ESPC19 - Microsoft Teams Architecture Deep Dive
Maarten Eekels
 
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
Maarten Eekels
 
Experts Live 2019 - Microsoft Teams Architecture Deep Dive
Experts Live 2019 - Microsoft Teams Architecture Deep DiveExperts Live 2019 - Microsoft Teams Architecture Deep Dive
Experts Live 2019 - Microsoft Teams Architecture Deep Dive
Maarten Eekels
 
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep DiveEuropean Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
Maarten Eekels
 
SPSWarsaw - Teams Architecture Deep Dive
SPSWarsaw - Teams Architecture Deep DiveSPSWarsaw - Teams Architecture Deep Dive
SPSWarsaw - Teams Architecture Deep Dive
Maarten Eekels
 
NACS - Microsoft Stream - Your Video Portal Unleashed
NACS - Microsoft Stream - Your Video Portal UnleashedNACS - Microsoft Stream - Your Video Portal Unleashed
NACS - Microsoft Stream - Your Video Portal Unleashed
Maarten Eekels
 
Office 365 Connect 2018 - Modern news publishing with SharePoint
Office 365 Connect 2018 - Modern news publishing with SharePointOffice 365 Connect 2018 - Modern news publishing with SharePoint
Office 365 Connect 2018 - Modern news publishing with SharePoint
Maarten Eekels
 
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashedSPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
Maarten Eekels
 
SPSIstanbul18 - Microsoft Teams Deep Dive
SPSIstanbul18 - Microsoft Teams Deep DiveSPSIstanbul18 - Microsoft Teams Deep Dive
SPSIstanbul18 - Microsoft Teams Deep Dive
Maarten Eekels
 
SPSCambridge18 - Modern news publishing with SharePoint
SPSCambridge18 - Modern news publishing with SharePointSPSCambridge18 - Modern news publishing with SharePoint
SPSCambridge18 - Modern news publishing with SharePoint
Maarten Eekels
 
Experts Live NL 2018 - Extern delen van data in Office 365
Experts Live NL 2018 - Extern delen van data in Office 365Experts Live NL 2018 - Extern delen van data in Office 365
Experts Live NL 2018 - Extern delen van data in Office 365
Maarten Eekels
 
Microsoft Stream - Your Enterprise Video Portal Unleashed
Microsoft Stream - Your Enterprise Video Portal UnleashedMicrosoft Stream - Your Enterprise Video Portal Unleashed
Microsoft Stream - Your Enterprise Video Portal Unleashed
Maarten Eekels
 
SPSZurich18 - Microsoft Teams Deep Dive
SPSZurich18 - Microsoft Teams Deep DiveSPSZurich18 - Microsoft Teams Deep Dive
SPSZurich18 - Microsoft Teams Deep Dive
Maarten Eekels
 
SPSHEL18 - Modern News Publishing with SharePoint
SPSHEL18 - Modern News Publishing with SharePointSPSHEL18 - Modern News Publishing with SharePoint
SPSHEL18 - Modern News Publishing with SharePoint
Maarten Eekels
 
SPSHEL18 - Microsoft Teams Deep Dive
SPSHEL18 - Microsoft Teams Deep DiveSPSHEL18 - Microsoft Teams Deep Dive
SPSHEL18 - Microsoft Teams Deep Dive
Maarten Eekels
 
SPSDENORTH18 - Modern News Publishing with SharePoint
SPSDENORTH18 - Modern News Publishing with SharePointSPSDENORTH18 - Modern News Publishing with SharePoint
SPSDENORTH18 - Modern News Publishing with SharePoint
Maarten Eekels
 
InSpark Ignite Recap Office 365
InSpark Ignite Recap Office 365InSpark Ignite Recap Office 365
InSpark Ignite Recap Office 365
Maarten Eekels
 
SPSVIE17 - Microsoft Flow And PowerApps - End-To-End
SPSVIE17 - Microsoft Flow And PowerApps - End-To-EndSPSVIE17 - Microsoft Flow And PowerApps - End-To-End
SPSVIE17 - Microsoft Flow And PowerApps - End-To-End
Maarten Eekels
 
ESPC17 - The Microsoft On-premises Data Gateway
ESPC17 - The Microsoft On-premises Data GatewayESPC17 - The Microsoft On-premises Data Gateway
ESPC17 - The Microsoft On-premises Data Gateway
Maarten Eekels
 

More from Maarten Eekels (20)

ESPC19 - Office 365 Labels Deep Dive
ESPC19 - Office 365 Labels Deep DiveESPC19 - Office 365 Labels Deep Dive
ESPC19 - Office 365 Labels Deep Dive
 
ESPC19 - Microsoft Teams Architecture Deep Dive
ESPC19 - Microsoft Teams Architecture Deep DiveESPC19 - Microsoft Teams Architecture Deep Dive
ESPC19 - Microsoft Teams Architecture Deep Dive
 
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
Dutch Microsoft & Security Meetup - Ignite recap Microsoft 365 Security and C...
 
Experts Live 2019 - Microsoft Teams Architecture Deep Dive
Experts Live 2019 - Microsoft Teams Architecture Deep DiveExperts Live 2019 - Microsoft Teams Architecture Deep Dive
Experts Live 2019 - Microsoft Teams Architecture Deep Dive
 
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep DiveEuropean Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
European Collaboration Summit 2019 - Microsoft Teams Architecture Deep Dive
 
SPSWarsaw - Teams Architecture Deep Dive
SPSWarsaw - Teams Architecture Deep DiveSPSWarsaw - Teams Architecture Deep Dive
SPSWarsaw - Teams Architecture Deep Dive
 
NACS - Microsoft Stream - Your Video Portal Unleashed
NACS - Microsoft Stream - Your Video Portal UnleashedNACS - Microsoft Stream - Your Video Portal Unleashed
NACS - Microsoft Stream - Your Video Portal Unleashed
 
Office 365 Connect 2018 - Modern news publishing with SharePoint
Office 365 Connect 2018 - Modern news publishing with SharePointOffice 365 Connect 2018 - Modern news publishing with SharePoint
Office 365 Connect 2018 - Modern news publishing with SharePoint
 
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashedSPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
SPSBE18 - Microsoft Stream - Your enterprise video portal unleashed
 
SPSIstanbul18 - Microsoft Teams Deep Dive
SPSIstanbul18 - Microsoft Teams Deep DiveSPSIstanbul18 - Microsoft Teams Deep Dive
SPSIstanbul18 - Microsoft Teams Deep Dive
 
SPSCambridge18 - Modern news publishing with SharePoint
SPSCambridge18 - Modern news publishing with SharePointSPSCambridge18 - Modern news publishing with SharePoint
SPSCambridge18 - Modern news publishing with SharePoint
 
Experts Live NL 2018 - Extern delen van data in Office 365
Experts Live NL 2018 - Extern delen van data in Office 365Experts Live NL 2018 - Extern delen van data in Office 365
Experts Live NL 2018 - Extern delen van data in Office 365
 
Microsoft Stream - Your Enterprise Video Portal Unleashed
Microsoft Stream - Your Enterprise Video Portal UnleashedMicrosoft Stream - Your Enterprise Video Portal Unleashed
Microsoft Stream - Your Enterprise Video Portal Unleashed
 
SPSZurich18 - Microsoft Teams Deep Dive
SPSZurich18 - Microsoft Teams Deep DiveSPSZurich18 - Microsoft Teams Deep Dive
SPSZurich18 - Microsoft Teams Deep Dive
 
SPSHEL18 - Modern News Publishing with SharePoint
SPSHEL18 - Modern News Publishing with SharePointSPSHEL18 - Modern News Publishing with SharePoint
SPSHEL18 - Modern News Publishing with SharePoint
 
SPSHEL18 - Microsoft Teams Deep Dive
SPSHEL18 - Microsoft Teams Deep DiveSPSHEL18 - Microsoft Teams Deep Dive
SPSHEL18 - Microsoft Teams Deep Dive
 
SPSDENORTH18 - Modern News Publishing with SharePoint
SPSDENORTH18 - Modern News Publishing with SharePointSPSDENORTH18 - Modern News Publishing with SharePoint
SPSDENORTH18 - Modern News Publishing with SharePoint
 
InSpark Ignite Recap Office 365
InSpark Ignite Recap Office 365InSpark Ignite Recap Office 365
InSpark Ignite Recap Office 365
 
SPSVIE17 - Microsoft Flow And PowerApps - End-To-End
SPSVIE17 - Microsoft Flow And PowerApps - End-To-EndSPSVIE17 - Microsoft Flow And PowerApps - End-To-End
SPSVIE17 - Microsoft Flow And PowerApps - End-To-End
 
ESPC17 - The Microsoft On-premises Data Gateway
ESPC17 - The Microsoft On-premises Data GatewayESPC17 - The Microsoft On-premises Data Gateway
ESPC17 - The Microsoft On-premises Data Gateway
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Dutch Microsoft & Security Meetup - How to protect my data in Office 365?

  • 1. How to protect my data in Office 365? Dutch Microsoft & Security Meetup – 23 mei 2019
  • 3.
  • 4. Agenda • Data encryption • Multi-factor authentication • Azure AD identity protection • Conditional access • Azure AD privileged identity management • Office 365 unified labelling • Data loss prevention
  • 5. Data encryption Data at rest • BitLocker drive encryption • Per-file encryption (for SharePoint Online and OneDrive for Business) • Files are spread across multiple Azure Storage containers • Map with file locations is also encrypted • Encryptions keys are physically located somewhere else Data in transit • TLS across all workloads • TLS 1.2 support • SSL 3.0 / TLS 1.0 and 1.1 support already withdrawn • 3DES support withdrawn per July 10, 2019
  • 6. Multi-factor authentication Why MFA? Because you will stop 99% of all phishing attacks! Azure AD vs Office 365 • Fraud alert • Custom greetings • Trusted IPs • Hardware tokens
  • 8. Azure AD identity protection Detect vulnerabilities and risky accounts
  • 10. Conditional access Implement automated access control decisions Access concerns: • Sign-in risk • Network location • Device management • Client application
  • 11. DEMO
  • 12. Azure AD privileged identity management Minimize the number of people who have access to secure information or resources Manage: • Azure AD roles • Azure resources
  • 13. DEMO
  • 14. Office 365 unified labelling
  • 15. Unified labelling pros vs cons Pros • Custom sensitive information types • Keyword dictionaries • Complex conditions • Mobile client and Mac support Cons • No custom permissions in Office apps • No track and revoke • No Do Not Forward button in Outlook
  • 16. DEMO
  • 17. Data loss prevention Goals of DLP: • Identify sensitive information across Office 365 • Prevent the accidental sharing of sensitive information DLP policies contain: • Locations • Conditions • Actions
  • 18. DEMO
  • 19. • Sensitivity labels for SharePoint sites • Sensitivity label integration support • External access expiration • DLP restricted access (block external sharing until DLP scan has been completed) https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Updates-to-SharePoint-security- administration-and-migration/ba-p/549585 Announcements at SPC

Editor's Notes

  1. Fraud alert: user can report fraud. Conf option: block user, code to report Hardware tokens: Yubikey support
  2. Help protect from stealing a user’s identity Gives recommendations, calculate sign-in risk levels, calculate user risk levels Admin roles: Global admin, security admin, security reader Azure AD Premium P2
  3. Azure AD Premium P1
  4. Admin roles: Global admin, security admin, privileged role admin Provide just-in-time privileged access to Azure AD and Azure resources Assign time-bound access to resources using start and end dates Require approval to activate privileged roles Enforce multi-factor authentication to activate any role Use justification to understand why users activate Get notifications when privileged roles are activated Conduct access reviews to ensure users still need roles Download audit history for internal or external audit Azure AD Premium P2