SlideShare a Scribd company logo
Forefront Online Protection for Exchange Encryption Overview Curtis Parker Product Manager Microsoft Corporation al 1
Agenda Microsoft® Forefront®Online Protection for Exchange overview Forefront Online Protection for Exchange encryption overview Identity-based email encryption Forefront Online Protection for Exchange encryption demo Administrator experience Sender experience First time recipient experience After first time recipient experience Mail flow drill down Forefront Online Protection for Exchange encryption licensing
Forefront Online Protection for Exchange Overview
Forefront Online Protection for Exchange Multilayer spam and virus protection and policy enforcement Corporate network External senders/ recipients Microsoft® Exchange Server Legitimate email Antivirus Inbound filteredemail Policy Edge Blocking Active Directory * Encryption Forefront Online Protection for Exchange Directory Synchronization Tool Anti-spam Outbound filtered email Junk email Automatic spooling Messaging administrator Administrator console Employees About 90 percent of email is junk End user quarantine Also incorporates technology from… *Requires additional Exchange Hosted Encryption License
Forefront Online Protection for Exchange Encryption Overview
Forefront Online Protection for Exchange Encryption TLS network encryption Forced inbound transport layer security (TLS) is used to secure all routing channels with business regulated partners Email encryption Policy-based encryption from sender to recipient with no end-user training or software installation provided through Microsoft Exchange hosted encryption
Forced TLS Connection Scenario Forefront Online Protection for Exchange Inbound Connector Edge Virus Outbound Connector Policy Spam woodgrovebank.com Business Partner Mailboxes Mailboxes contoso.com
TLS Network Layer Encryption Opportunistic TLS is on by default for Microsoft Office 365 customers  Forced TLS can be enabled for inbound connections, outbound connections, or both Forefront Online Protection for Exchange attempts to set up a TLS connection If TLS cannot be established, email is not sent or received
Exchange Hosted Services Encryption GLOBAL DATA CENTER NETWORK SECURE REPLY VIA ZDM TLS ENCRYPTED EMAIL Send encrypted email to any recipient without prior setup Encryption is performed by policy rules and enforced in the Forefront Online Protection for Exchange cloud Identity-based encryption (IBE) uses email address as ID for public key Exchange hosted encryption saves public keys so users should use strong passwords as their credentials No cost for recipient non licensed user All replies and forwards remain encrypted for any mail recipient Encrypted emails are not saved by Exchange hosted encryption
Forefront Online Protection for Exchange Encryption Prerequisites Requires Forefront Online Protection for Exchange Exchange hosted encryption is purchased separately from Forefront Online Protection for Exchange Administrator of domain sets policy rules for encryption Policy rules can trigger based on: Specific header values Keywords in subject  Keywords in body Sender address Recipient address Attachment type Email encryption can be triggered by information workers: Specify keyword in subject line
Zero Download Manager Recipients use a secure, web-based decryption provided by the Zero Download Manager (ZDM) ZDM is an HTML attachment that contains encrypted messages in encoded form When a user clicks to access the message, the encrypted message is sent back to Exchange hosted encryption via POST method No software installed on sender/recipient machines
Identity-Based Email Encryption
What Is Identity-Based Encryption (IBE)? IBE is a form of asymmetric encryption All entities have a public and private key pair In IBE: A key server has a master public and private key pair Anyone can derive a user’s public key from the email address (eliminates need for prior key establishment) and encrypt messages A key server decrypts messages with the user’s private key
How IBE Works Send message back to Exchange hosted encryption for decryption Get’s the public key based on Alice’s Email address Exchange hosted encryption server 1. Request Alice’s public key 4. Send the message for decryption  2. Alice’s public key is returned 3. Send Alice the encrypted mail bob@contosocorp.com alice@fabrikam.com Encrypt message using public key
Forefront Online Protection for Exchange Encryption Administrator Experience
Administrator Setup Prerequisites Requires Forefront Online Protection for Exchange Exchange hosted encryption is purchased separately from Forefront Online Protection for Exchange Administrator setup steps Log in to the Administration Center On the Administration tab, confirm that Exchange hosted encryption is purchased Create a new policy rule for outbound mail Under Action, select Encrypt
Forefront Online Protection for Exchange Encryption Sender Experience
Sender Setup All encryption is transparent to the sender The sender drafts and sends a message with sensitive information Exchange hosted encryption identifies the sensitive information and encrypts the message in the cloud
Forefront Online Protection for Exchange Encryption First Time Recipient Experience
First Time Recipient Experience Recipient receives an encrypted message as an attachment Recipient opens the attachment and clicks Read Message Recipient enters and confirms a password of his or her choice Exchange hosted encryption emails a confirmation message to the recipient Recipient opens the confirmation message and clicks the link Recipient views the encrypted message All replies and forwards remain encrypted
Forefront Online Protection for Exchange Encryption After First Time Recipient Experience
After First Time Recipient Experience Recipient receives an encrypted message as an attachment Recipient opens the attachment and enters his or her password ,[object Object],Recipient opens the confirmation message and views the encrypted message All replies and forwards remain encrypted
Forefront Online Protection for Exchange Encryption Summary
Forefront Online Protection for Exchange Encryption Licensing
Forefront Online Protection for Exchange Encryption [Exchange Hosted Encryption] Licensing Add-on to Forefront Online Protection for Exchange or add-on to suites that contain Forefront Online Protection for Exchange (Office 365, ECAL, EECAL with services, FPS) Available through the following licensing programs: Enterprise Agreement Enterprise Agreement Subscription Select Academic and Government Select Open Value Open Value Subscription Service Provider License Agreement (SPLA) Campus and School Agreement UCES (Telco) Pricing starts at $1.88/user/month
Additional Resources/Announcements
Introducing Business Ready Security Demo 4.0i Business Ready Security 4.0i  New! Forefront Protection Server Management Console RTW included New! Forefront Protection Server Management Console hands-on labs New! Forefront Protection for Exchange/Forefront Protection for SharePoint rollup updates End-to-end demo environment All identity and security solutions/technologies  7 GB zipped/installer package  Demo scripts/architecture overview documentation provided Available as download: http://go.microsoft.com/fwlink/?LinkId=190269 Distribution list: msvmtalk@microsoft.com
Business Ready Security Demo 4.0i
Business Ready Security Demo 4.0i
Links and Resources
Questions and Answers Submit text questions by using the Ask button Don’t forget to fill out the survey For upcoming and previously live webcasts, visit www.microsoft.com/webcast Got webcast content ideas? Contact us at http://go.microsoft.com/fwlink/?LinkId=41781
52

More Related Content

Viewers also liked

Forohabilidad
ForohabilidadForohabilidad
Forohabilidadwilpbt
 
VERTEX ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMO
VERTEX  ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMOVERTEX  ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMO
VERTEX ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMOGregory Brown
 
Msc.1 circ.1482 steering geer solas
Msc.1 circ.1482 steering geer solasMsc.1 circ.1482 steering geer solas
Msc.1 circ.1482 steering geer solas
Marcelo Borba
 
iTeam World 网路系统平台
iTeam World 网路系统平台iTeam World 网路系统平台
iTeam World 网路系统平台
iTeam World
 
12 case studies on doctor reputation management teaser
12 case studies on doctor reputation management teaser12 case studies on doctor reputation management teaser
12 case studies on doctor reputation management teaser
Healthcare Marketing Center
 
Sécuriser votre site web azure, c'est simple maintenant!
Sécuriser votre site web azure, c'est simple maintenant!Sécuriser votre site web azure, c'est simple maintenant!
Sécuriser votre site web azure, c'est simple maintenant!
Chourouk HJAIEJ
 
Llantas OTR - Mantenimiento
Llantas OTR - MantenimientoLlantas OTR - Mantenimiento
Llantas OTR - Mantenimientoreptell
 
Cadenced flow overview
Cadenced flow overviewCadenced flow overview
Cadenced flow overview
LeanDog
 
创业角度看人性 Workface 分享
创业角度看人性 Workface 分享创业角度看人性 Workface 分享
创业角度看人性 Workface 分享
Hui Li (李辉)
 

Viewers also liked (11)

Presentación1
Presentación1Presentación1
Presentación1
 
Forohabilidad
ForohabilidadForohabilidad
Forohabilidad
 
VERTEX ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMO
VERTEX  ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMOVERTEX  ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMO
VERTEX ORGANIZATIONAL BRIDGES LLC POWERPOINT OVERVIEW- JB.pptx CAFLMO
 
Msc.1 circ.1482 steering geer solas
Msc.1 circ.1482 steering geer solasMsc.1 circ.1482 steering geer solas
Msc.1 circ.1482 steering geer solas
 
iTeam World 网路系统平台
iTeam World 网路系统平台iTeam World 网路系统平台
iTeam World 网路系统平台
 
12 case studies on doctor reputation management teaser
12 case studies on doctor reputation management teaser12 case studies on doctor reputation management teaser
12 case studies on doctor reputation management teaser
 
Sécuriser votre site web azure, c'est simple maintenant!
Sécuriser votre site web azure, c'est simple maintenant!Sécuriser votre site web azure, c'est simple maintenant!
Sécuriser votre site web azure, c'est simple maintenant!
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Llantas OTR - Mantenimiento
Llantas OTR - MantenimientoLlantas OTR - Mantenimiento
Llantas OTR - Mantenimiento
 
Cadenced flow overview
Cadenced flow overviewCadenced flow overview
Cadenced flow overview
 
创业角度看人性 Workface 分享
创业角度看人性 Workface 分享创业角度看人性 Workface 分享
创业角度看人性 Workface 分享
 

Similar to Forefront Online Protection for Exchange Encryption Overview

10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003
Armando Leon
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
vncson
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
CoLaboraDK
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Gina Montgomery, V-TSP
 
3. email relay fpe
3. email relay   fpe3. email relay   fpe
3. email relay fpe
Fabrizio Volpe
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
Infinity Tech Solutions
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
Curtis Parker
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
AmnaNadeem27
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__sslUnderstanding transport-layer_security__ssl
Understanding transport-layer_security__ssl
Mainak Goswami
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Oliver Pfaff
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange WhitepaperMicrosoft Private Cloud
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
Louis Göhl
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafe
tlloyduk
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
AGATSoftware
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
Harold Wong
 

Similar to Forefront Online Protection for Exchange Encryption Overview (20)

10135 a 06
10135 a 0610135 a 06
10135 a 06
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Email security
Email securityEmail security
Email security
 
Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003Optimer Sikkerheden Exchange Server 2003
Optimer Sikkerheden Exchange Server 2003
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
3. email relay fpe
3. email relay   fpe3. email relay   fpe
3. email relay fpe
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__sslUnderstanding transport-layer_security__ssl
Understanding transport-layer_security__ssl
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange Whitepaper
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafe
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Forefront Online Protection for Exchange Encryption Overview

  • 1. Forefront Online Protection for Exchange Encryption Overview Curtis Parker Product Manager Microsoft Corporation al 1
  • 2. Agenda Microsoft® Forefront®Online Protection for Exchange overview Forefront Online Protection for Exchange encryption overview Identity-based email encryption Forefront Online Protection for Exchange encryption demo Administrator experience Sender experience First time recipient experience After first time recipient experience Mail flow drill down Forefront Online Protection for Exchange encryption licensing
  • 3. Forefront Online Protection for Exchange Overview
  • 4. Forefront Online Protection for Exchange Multilayer spam and virus protection and policy enforcement Corporate network External senders/ recipients Microsoft® Exchange Server Legitimate email Antivirus Inbound filteredemail Policy Edge Blocking Active Directory * Encryption Forefront Online Protection for Exchange Directory Synchronization Tool Anti-spam Outbound filtered email Junk email Automatic spooling Messaging administrator Administrator console Employees About 90 percent of email is junk End user quarantine Also incorporates technology from… *Requires additional Exchange Hosted Encryption License
  • 5. Forefront Online Protection for Exchange Encryption Overview
  • 6. Forefront Online Protection for Exchange Encryption TLS network encryption Forced inbound transport layer security (TLS) is used to secure all routing channels with business regulated partners Email encryption Policy-based encryption from sender to recipient with no end-user training or software installation provided through Microsoft Exchange hosted encryption
  • 7. Forced TLS Connection Scenario Forefront Online Protection for Exchange Inbound Connector Edge Virus Outbound Connector Policy Spam woodgrovebank.com Business Partner Mailboxes Mailboxes contoso.com
  • 8. TLS Network Layer Encryption Opportunistic TLS is on by default for Microsoft Office 365 customers Forced TLS can be enabled for inbound connections, outbound connections, or both Forefront Online Protection for Exchange attempts to set up a TLS connection If TLS cannot be established, email is not sent or received
  • 9. Exchange Hosted Services Encryption GLOBAL DATA CENTER NETWORK SECURE REPLY VIA ZDM TLS ENCRYPTED EMAIL Send encrypted email to any recipient without prior setup Encryption is performed by policy rules and enforced in the Forefront Online Protection for Exchange cloud Identity-based encryption (IBE) uses email address as ID for public key Exchange hosted encryption saves public keys so users should use strong passwords as their credentials No cost for recipient non licensed user All replies and forwards remain encrypted for any mail recipient Encrypted emails are not saved by Exchange hosted encryption
  • 10. Forefront Online Protection for Exchange Encryption Prerequisites Requires Forefront Online Protection for Exchange Exchange hosted encryption is purchased separately from Forefront Online Protection for Exchange Administrator of domain sets policy rules for encryption Policy rules can trigger based on: Specific header values Keywords in subject Keywords in body Sender address Recipient address Attachment type Email encryption can be triggered by information workers: Specify keyword in subject line
  • 11. Zero Download Manager Recipients use a secure, web-based decryption provided by the Zero Download Manager (ZDM) ZDM is an HTML attachment that contains encrypted messages in encoded form When a user clicks to access the message, the encrypted message is sent back to Exchange hosted encryption via POST method No software installed on sender/recipient machines
  • 13. What Is Identity-Based Encryption (IBE)? IBE is a form of asymmetric encryption All entities have a public and private key pair In IBE: A key server has a master public and private key pair Anyone can derive a user’s public key from the email address (eliminates need for prior key establishment) and encrypt messages A key server decrypts messages with the user’s private key
  • 14. How IBE Works Send message back to Exchange hosted encryption for decryption Get’s the public key based on Alice’s Email address Exchange hosted encryption server 1. Request Alice’s public key 4. Send the message for decryption 2. Alice’s public key is returned 3. Send Alice the encrypted mail bob@contosocorp.com alice@fabrikam.com Encrypt message using public key
  • 15. Forefront Online Protection for Exchange Encryption Administrator Experience
  • 16. Administrator Setup Prerequisites Requires Forefront Online Protection for Exchange Exchange hosted encryption is purchased separately from Forefront Online Protection for Exchange Administrator setup steps Log in to the Administration Center On the Administration tab, confirm that Exchange hosted encryption is purchased Create a new policy rule for outbound mail Under Action, select Encrypt
  • 17.
  • 18.
  • 19.
  • 20. Forefront Online Protection for Exchange Encryption Sender Experience
  • 21. Sender Setup All encryption is transparent to the sender The sender drafts and sends a message with sensitive information Exchange hosted encryption identifies the sensitive information and encrypts the message in the cloud
  • 22.
  • 23. Forefront Online Protection for Exchange Encryption First Time Recipient Experience
  • 24. First Time Recipient Experience Recipient receives an encrypted message as an attachment Recipient opens the attachment and clicks Read Message Recipient enters and confirms a password of his or her choice Exchange hosted encryption emails a confirmation message to the recipient Recipient opens the confirmation message and clicks the link Recipient views the encrypted message All replies and forwards remain encrypted
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Forefront Online Protection for Exchange Encryption After First Time Recipient Experience
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Forefront Online Protection for Exchange Encryption Summary
  • 44. Forefront Online Protection for Exchange Encryption Licensing
  • 45. Forefront Online Protection for Exchange Encryption [Exchange Hosted Encryption] Licensing Add-on to Forefront Online Protection for Exchange or add-on to suites that contain Forefront Online Protection for Exchange (Office 365, ECAL, EECAL with services, FPS) Available through the following licensing programs: Enterprise Agreement Enterprise Agreement Subscription Select Academic and Government Select Open Value Open Value Subscription Service Provider License Agreement (SPLA) Campus and School Agreement UCES (Telco) Pricing starts at $1.88/user/month
  • 47. Introducing Business Ready Security Demo 4.0i Business Ready Security 4.0i New! Forefront Protection Server Management Console RTW included New! Forefront Protection Server Management Console hands-on labs New! Forefront Protection for Exchange/Forefront Protection for SharePoint rollup updates End-to-end demo environment All identity and security solutions/technologies 7 GB zipped/installer package Demo scripts/architecture overview documentation provided Available as download: http://go.microsoft.com/fwlink/?LinkId=190269 Distribution list: msvmtalk@microsoft.com
  • 51. Questions and Answers Submit text questions by using the Ask button Don’t forget to fill out the survey For upcoming and previously live webcasts, visit www.microsoft.com/webcast Got webcast content ideas? Contact us at http://go.microsoft.com/fwlink/?LinkId=41781
  • 52. 52