About Office 365 [PLACEHOLDER]
|
|
- Dora Hensley
- 5 years ago
- Views:
Transcription
1 Office 365 [PLACEHOLDER] Service Description Applies to: Office 365 [PLACEHOLDER] Topic Last Modified: 22-Apr-2016 In response to the unique and evolving requirements of the United States federal government and its defense agencies and contractors, Microsoft has created Office 365 [PLACEHOLDER] for qualified government entities and customers. This document provides an overview of features that are specific to Microsoft Office 365 [PLACEHOLDER]. It is recommended that you read this supplementary document alongside the general Office 365 Service Descriptions. About Office 365 [PLACEHOLDER] Office 365 [PLACEHOLDER] E1 and E3 subscription plans are available to qualified entities that meet one or more of the following criteria: US Federal Government entities requiring certification of cloud services in accordance with DoD Cloud Computing Security Requirements Guide (SRG) for information up to Impact Level 5 (L5). US Government entities comprised of Federal Government, State & Local Government, and Federally Recognized Indian Tribal Government requiring certification of cloud services in accordance with the Federal Risk and Authorization Management Program (FedRAMP Moderate). US Government contractors who hold US Government Controlled data. Controlled data types include ITAR, NCUI, and CUI. In addition to the features and capabilities of Office 365, your organization benefits from the following features: Your organization s customer data is logically and/or physically segregated from commercial Office 365 customer content. Your organization s customer data is stored at rest within the continental United States. Page 1 of 6
2 Customer data in transit within Office 365 [PLACEHOLDER] is contained within the continental United States. Access to your organization s customer data is restricted to select Microsoft personnel who have successfully passed additional screening and qualifications Office 365 [PLACEHOLDER] complies with and maintains certifications and accreditations that are required for U.S. Federal and Department of Defense agencies. Office 365 [PLACEHOLDER] compliance commitments Office 365 [PLACEHOLDER] is committed to meeting the compliance requirements for the following certifications and accreditations: The Federal Risk and Authorization Management Program at a Moderate baseline (FedRAMP Moderate), including those security controls and control enhancements as outlined in the National Institute of Standards and Technology (NIST) Special Publication The security controls and control enhancements for United States Department of Defense Cloud Computing Security Requirements Guide (SRG) for information up to Impact Level 5 (L5) Office 365 [PLACEHOLDER] services may be provided from an environment that satisfies the Location and Separation Requirements as outlined in SRG Impact Level 5. Restricted data access by administrators Access to Office 365 [PLACEHOLDER] customer data by Microsoft personnel is restricted to personnel who are U.S. citizens in accordance with U.S. International Traffic in Arms Regulations. In addition, all Microsoft personnel who have access to customer data that are hosted in Office 365 [PLACEHOLDER] environments must successfully complete the background checks and screenings as described in the following table: Microsoft Personnel Screening and Background Checks U.S. Citizenship Employment History Check Education Verification Description Verification of U.S. citizenship. Verification of seven (7) year employment history. Verification of highest degree attained. Page 2 of 6
3 Social Security Number (SSN) Search Criminal History Check Office of Foreign Assets Control List (OFAC) Bureau of Industry and Security List (BIS) Office of Defense Trade Controls Debarred Persons List (DDTC) Fingerprinting Check U.S. Department of Defense Background Screening Verification that the provided SSN is valid. A seven (7) year criminal record check for felony and misdemeanor offenses at the state, county, and local level and at the federal level. Validation against the Department of Treasury list of groups with whom U.S. persons are not allowed to engage in trade or financial transactions. Validation against the Department of Commerce list of individuals and entities barred from engaging in export activities. Validation against the Department of State list of individuals and entities barred from engaging in export activities related to the defense industry. Fingerprint background check against FBI databases. National Agency Check with Local Agency Check and Credit Check (NAC-LC) background investigation. Selected background checks will be repeated on a recurring basis for Microsoft personnel that have access to customer data. Office 365 [PLACEHOLDER] and Azure dependencies Office 365 provides several services through integration with Microsoft Azure services. For any features that involve the storage, processing, or transmission of customer content in Azure systems, Office 365 [PLACEHOLDER] uses Azure U.S. Government services to ensure alignment of compliance and data protection commitments. Note that new Office 365 [PLACEHOLDER] features may release to Office 365 Commercial first based on availability of Azure Commercial service dependencies. For more information on Azure s U.S. Government service offerings and their compliance commitments, please visit the Microsoft Trust Center online at Page 3 of 6
4 Office 365 [PLACEHOLDER] and SRG L5-eligible customer considerations Customers meeting the eligibility requirements for SRG Impact Level 5 may have Office 365 [PLACEHOLDER] services provided from an environment that satisfies the Location and Separation Requirements as outlined in the Department of Defense Cloud Computing Security Requirements Guide for Impact Level 5 Office 365 features not available in Office 365 [PLACEHOLDER] Office 365 [PLACEHOLDER] includes the core Exchange Online, Exchange Online Protection, SharePoint Online, and Skype for Business features. Given the increased certification and accreditation commitments of Office 365 [PLACEHOLDER], some features that are available in the general commercial Office 365 offerings are not available: Delve Information Rights Management 1 Office 365 Planner Office 365 Video Mobile Device Management (MDM) Power BI Sway Unified Compliance Center Yammer Office 365 [PLACEHOLDER] feature differences 1 Information Rights Management using Azure Rights Management Services is not available. Exchange Online can use on-premises Active Directory Rights Management Services for Integrated Rights Management functionality. Page 4 of 6
5 Office 365 [PLACEHOLDER] includes the core Exchange Online, SharePoint Online, and Skype for Business features. Given the increased certification and accreditation of the Office 365 [PLACEHOLDER] service, there are some feature differences between the general commercial Office 365 offerings and those available in Office 365 [PLACEHOLDER]. Exchange Online Exchange Online Unified Messaging Support for On-Premises IP-PBX Support for integrating onpremises IP-PBX systems with Exchange Online Unified Messaging is not supported in Office 365 [PLACEHOLDER]. SharePoint Online External Sharing: External Access / Guest Link: Any user-initiated invitations to people outside of your organization will be restricted to the system security boundary for your cloud services and to any mail routing restrictions in your environment; tenant administrators can set the appropriate restrictions via administrative actions. External Application Access: Connections to external applications such as data sources for Add-Ins are limited to sources that are located within the system security boundaries supported by Office 365 [PLACEHOLDER] Business Connectivity Services BCS functionality is supported for connectivity scenarios where the data sources remain reachable within the security boundary for your cloud service. Sandbox Solutions This feature has been deprecated is not available in Office 365 [PLACEHOLDER]. Any sandboxed solutions should be migrated to the SharePoint Add-In extensibility model Skype for Business Online PSTN Calling & PSTN Conferencing Due to the requirement to utilize the Public Switched Telephone Network (PSTN) for telephony-oriented services, PSTN Calling & PSTN Conferencing services are currently not available in Office 365 [PLACEHOLDER]. Page 5 of 6
6 The information contained in this document represents the current view of Microsoft Corporation on the topics described as of the date of publication. Because Microsoft must respond to changing market conditions, the content of this document should not be interpreted to be a commitment on the part of Microsoft. The accuracy of any information presented after the date of publication cannot be guaranteed by Microsoft. The Information is provided for marketing purposes only and cannot be incorporated within, or attached to, any type of agreement. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give the user (you) any license to these patents, trademarks, copyrights, or other intellectual property. Page 6 of 6
Introduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationEDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying
What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification
More informationCourse Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing
More informationCOURSE OUTLINE: A Advanced Technologies of SharePoint 2016
Course Name 20339-2A Advanced Technologies of Course Duration 5 Days Course Structure Instructor-Led Course Overview This five-day course will teach you how to plan, configure, and manage the advanced
More informationNS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director
NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments Hunter Downey, Cloud Solution Director Why Organizations are investing in the Cloud Pressure on IT and business
More informationSDBOR Technology Control Plan (TCP) Project Title:
SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?
More informationMindManager Server App for SharePoint Release Notes
MindManager Server App for SharePoint Release Notes June 11, 2018 Release version: 1.0.0.87 2018 Corel Corporation All Rights Reserved. Version 1.0.0.87, June 11, 2018 1 Contents WHAT S NEW IN MINDMANAGER
More informationHow To Embed EventTracker Widget to an External Site
How To Embed EventTracker Widget to an External Site Publication Date: March 27, 2018 Abstract This guide will help the user(s) to configure an EventTracker Widget to an External Site like SharePoint.
More informationReceive and Forward syslog events through EventTracker Agent. EventTracker v9.0
Receive and Forward syslog events through EventTracker Agent EventTracker v9.0 Publication Date: July 23, 2018 Abstract The purpose of this document is to help users to receive syslog messages from various
More informationTechnology / Export Control Plan (T/ECP)
Technology / Export Control Plan (T/ECP) Technology Control Plan Template This project/activity involves the use of Export-Controlled Information (ECI). As a result, the project/activity comes under the
More informationMindManager Server App for SharePoint Release Notes
MindManager Server App for SharePoint Release Notes October 1, 2018 Release version: 1.0.0.95 2018 Corel Corporation All Rights Reserved. Version 1.0.0.95, October 1, 2018 1 Contents WHAT S NEW IN MINDMANAGER
More informationCOMPLIANCE IN THE CLOUD
COMPLIANCE IN THE CLOUD 3:45-4:30PM Scott Edwards, President, Summit 7 Dave Harris Society for International Affairs COMPLIANCE IN THE CLOUD Scott Edwards scott.edwards@summit7systems.com 256-541-9638
More informationA: Advanced Technologies of SharePoint 2016
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationMicrosoft Exchange Server SMTPDiag
Microsoft Exchange Server SMTPDiag Contents Microsoft Exchange Server SMTPDiag...1 Contents... 2 Microsoft Exchange Server SMTPDiag...3 SMTPDiag Arguments...3 SMTPDiag Results...4 SMTPDiag Tests...5 Copyright...5
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationE-CST Return for Gujarat FORM III (B)
FORM III (B) November 2009 The information contained in this document represents the current view of Tally Solutions Pvt. Ltd., ( Tally in short) on the topics discussed as of the date of publication.
More informationEnabling Business Productivity with Office 365
Enabling Business Productivity with Office 365 Darryl Wright Darryl.Wright@tcsc.com SharePoint Consultant Agenda Overview What is Office 365? Release Options Office Products Closing What is Office 365
More informationUCOP ITS Systemwide CISO Office Systemwide IT Policy
UCOP ITS Systemwide CISO Office Systemwide IT Policy Revision History Date: By: Contact Information: Description: 08/16/17 Robert Smith robert.smith@ucop.edu Initial version, CISO approved Classification
More informationPrice list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016
Price list for Microsoft Office 365 from Swisscom Valid from 1 may, 2016 2 Overview General part 3 Plans Business (1 300 users) 4 > Office 365 Business > Office 365 Business Essentials > Office 365 Business
More informationAimetis Symphony Mobile Bridge. 2.7 Installation Guide
Aimetis Symphony Mobile Bridge 2.7 Installation Guide Contents Contents Introduction...3 Installation... 4 Install the Mobile Bridge... 4 Upgrade the Mobile Bridge...4 Network configuration... 4 Configuration...
More informationMicrosoft Dynamics NAV
Microsoft Dynamics NAV Requirements for Microsoft Dynamics NAV 2013 System Requirements for Microsoft Dynamics NAV 2013...1 System Requirements for the Microsoft Dynamics NAV Windows Client...1 System
More informationOffice 365: What to Expect When Moving to the Cloud
Office 365: What to Expect When Moving to the Cloud Presentation by Nicole Lawrence Unified Communications Solution Specialist, SHI MCSE Productivity Biography Unified Communications Solution Specialist
More informationCHECK PROCESSING. A Select Product of Cougar Mountain Software
CHECK PROCESSING A Select Product of Cougar Mountain Software Check Processing Copyright Notification At Cougar Mountain Software, Inc., we strive to produce high-quality software at reasonable prices.
More informationMB MCSA Microsoft Dynamics 365. A Success Guide to Prepare- Microsoft Dynamics 365 customer engagement Online Deployment. edusum.
MB2-715 MCSA Microsoft Dynamics 365 A Success Guide to Prepare- Microsoft Dynamics 365 customer engagement Online Deployment edusum.com Table of Contents Introduction to MB2-715 Exam on Microsoft Dynamics
More informationNetwork Service Description
Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network
More informationLicensing Expert Series. Licensing Office 2013 & Office 365
Licensing Expert Series Licensing Office 2013 & Office 365 1 Agenda Trends The New Office and Office 365 Project 2013 & Visio 2013 Office 2013 Servers, CALs & CAL Suites Software Assurance Migrations and
More informationPrivacy Policy on the Responsibilities of Third Party Service Providers
Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationCRM to Exchange Synchronization
CRM to Exchange Synchronization Installation Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2013 Brite Global, Incorporated. All rights reserved. The information contained
More informationUpgrade Guide. Upgrading to EventTracker v7.1 Enterprise. Upgrade Guide Centre Park Drive Publication Date: Apr 11, 2011.
Upgrading to EventTracker v7.1 Enterprise Upgrade Guide 8815 Centre Park Drive Publication Date: Apr 11, 2011 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to
More informationSession 6A: Export Controls and Cloud Computing. Key Regulatory Issues
Export Controls and Cloud Computing Bureau of Industry and Security U.S. Department of Commerce Key Regulatory Issues Control system was devised before the development of highbandwidth telecommunications,
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationSanction Checks Potential Match Verification Procedures for Vendors
Sanction Checks Potential Match Verification Procedures for Vendors 1. Name/State Review Compare University vendor s full name to the name of the individual/business name identified as a high level potential
More informationIntegrate Citrix Access Gateway
Publication Date: September 3, 2015 Abstract This guide provides instructions to configure Citrix Access Gateway to transfer logs to EventTracker. Scope The configurations detailed in this guide are consistent
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationMCSA Office 365 Bootcamp
MCSA Office 365 Bootcamp Length: 6 days Format: Bootcamp Time: Day About This Course Demonstrate your skills in transitioning to and administering cloud-hosted business applications with Microsoft Office
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationDesign Insights Enhanced Cue Functionality
Design Insights Enhanced Cue Functionality May 2014 Contents Introduction 3 Basics of Implementing Cue Controls 3 Best Practices for Implementing Cue Controls: Enabling End User Customization of Indicators
More informationOverview... 3 Microsoft Dynamics GP 2013 and Microsoft Dynamics NAV 2013 Transition Upgrade Policy... 4
Published July 11, 2012 Contents Overview... 3 Transition Upgrade Policy... 4 License Migration Transition Upgrade (LMT Upgrade)... 5 License Credit Transition Upgrade (LCT Upgrade)... 5 Use of Old Product
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 20339-2; 5 Days; Instructor-led Course Description This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 Course 20339-2A 5 Days Instructor-led, Hands on Course Information This five-day course will teach you how to plan, configure, and manage the advanced features
More informationExecutive Order 13556
Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program
More informationDepartment of Defense Cybersecurity Requirements: What Businesses Need to Know?
Department of Defense Cybersecurity Requirements: What Businesses Need to Know? Why is Cybersecurity important to the Department of Defense? Today, more than ever, the Department of Defense (DoD) relies
More informationPort Configuration. Configure Port of EventTracker Website
Port Configuration Configure Port of EventTracker Website Publication Date: May 23, 2017 Abstract This guide will help the end user to change the port of the Website, using the Port Configuration tool,
More informationPRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.
PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy
More informationNATIONAL ASSOCIATION OF LEGAL INVESTIGATORS, INC. Certified Legal Investigator EXAMINATION APPLICATION
NATIONAL ASSOCIATION OF LEGAL INVESTIGATORS, INC. Certified Legal Investigator EXAMINATION APPLICATION Elevating the Standards of the Profession The National Association of Legal Investigators, Inc. offers
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationSecurity Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationIntegrate Grizzly steppe attacks detection script
Integrate Grizzly steppe attacks detection script EventTracker Enterprise Publication Date: Jan. 24, 2017 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide
More informationOracle. Financials Cloud Implementing Subledger Accounting. Release 12. This guide also applies to on-premises implementations
Oracle Financials Cloud Release 12 This guide also applies to on-premises implementations Oracle Financials Cloud Part Number E73067-03 Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved.
More informationDeploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)
Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure
More informationMicrosoft Dynamics AX Team Server (ID Server) Setup Whitepaper for Microsoft. Dynamics AX 2009.
Setup Microsoft Dynamics AX 2009 Team Server (ID Server) Setup Whitepaper for Microsoft Dynamics AX 2009 White Paper This document describes how to set up Team Server for Microsoft Dynamics AX 2009. Date:
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationAimetis Symphony Mobile ios Mobile Application
Aimetis Symphony Mobile ios Mobile Application 2.7 2.8 Disclaimers and Legal Information Copyright 2016-2017 Aimetis Inc. All rights reserved. This material is for informational purposes only. AIMETIS
More informationAdvanced Solutions of Microsoft SharePoint Server 2013
Course Duration: 4 Days + 1 day Self Study Course Pre-requisites: Before attending this course, students must have: Completed Course 20331: Core Solutions of Microsoft SharePoint Server 2013, successful
More informationAdvanced Technologies of SharePoint 2016 ( )
Advanced Technologies of SharePoint 2016 (20339-2) Formato do curso: Presencial e Live Training Com certificação: MCSE: Productivity Preço: 1740 Nível: Intermédio Duração: 35 horas This five-day course
More informationWhat is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1
What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1 Risk Assessments - Datasets Dataset Definition A dataset (or data set) is a collection
More informationProduct Update: ET82U16-029/ ET81U EventTracker Enterprise
Product Update: ET82U16-029/ ET81U16-033 EventTracker Enterprise Publication Date: Oct. 18, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Update: ET82U16-029/ ET81U16-033
More informationAimetis Android Mobile Application. 2.x Release Notes
Aimetis Android Mobile Application 2.x Release Notes Contents Contents Release 2.10 (July 2018)... 3 Release 2.7.8 (August 2017)... 4 Release 2.7.7 (November 2016)... 5 Release 2.7.6 (October 2016)...6
More informationCompliance with CloudCheckr
DATASHEET Compliance with CloudCheckr Introduction Security in the cloud is about more than just monitoring and alerts. To be truly secure in this ephemeral landscape, organizations must take an active
More informationa completed Verification of Interior Designer Examination and Certification Form to provide evidence of having passed the NCIDQ Examination.
Commonwealth of Virginia Department of Professional and Occupational Regulation 9960 Mayland Drive, Suite 400 Richmond, Virginia 23233-1485 (804) 367-8506 www.dpor.virginia.gov BOARD FOR ARCHITECTS, PROFESSIONAL
More informationNAVIGATION GUIDE FEDERAL REGISTRY. Reports
NAVIGATION GUIDE FEDERAL REGISTRY Reports Purpose This navigation guide is designed to provide a general understanding of the Report functionality in NMLS. Copyright 2014 SRR. All rights reserved. Materials
More information55238 SharePoint Online for Administrators. Module 1: Introduction to Office 365 and SharePoint Online
55238 for Administrators 55238 For Administrators Duration: 3 Days Overview: This course will introduce the audience to Administration in Office 365 and explain and demonstrate the configuration options
More informationCYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA
CYBER SECURITY BRIEF Presented By: Curt Parkinson DCMA September 20, 2017 Agenda 2 DFARS 239.71 Updates Cybersecurity Contracting DFARS Clause 252.204-7001 DFARS Clause 252.239-7012 DFARS Clause 252.239-7010
More informationAll rights reserved. All trademarks are the property of their respective owners.
2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationCOLORADO DEPARTMENT OF LABOR AND EMPLOYMENT Arapahoe Street Denver, CO
STANDARD PROCEDURE COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT 1515 Arapahoe Street Denver, CO 80202-2117 Number... Effective Date...12/13/90 Supersedes... Revision Date... Executive Director's SP-71 Approval...
More informationInternational Fire Service Accreditation Congress Delegation of Certification Authority
International Fire Service Accreditation Congress Delegation of Certification Authority PURPOSE The purpose of this paper is to explain the various types of delegation related to an International Fire
More informationONVIF Server for Aimetis Symphony. Installation and Usage
ONVIF Server for Aimetis Symphony Installation and Usage Disclaimers and Legal Information Copyright 2015 Aimetis Corp. All rights reserved. This material is for informational purposes only. Aimetis makes
More informationIntegrate Microsoft ATP. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: August 20, 2018 Abstract This guide provides instructions to configure a Microsoft ATP to send its syslog to EventTracker Enterprise. Scope The configurations
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationAdvanced Technologies of SharePoint 2016 ( )
SharePoint Course - 203392 Advanced Technologies of SharePoint 2016 (20339-2) Length 5 days Audience The course is targeted at experienced IT Professionals who are interested in learning how to install,
More informationCourse Outline. Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led
Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led About this course This is a 5-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in
More informationPlanning Guide for Deploying Relevos For First-time Users
Relevos Planning Guide for Deploying Relevos For First-time Users www.wmsoftware.com/relevos Contents Installation... 1 Setup... 2 Licensing... 3 Hardware and Software Requirements... 5 1 Installation
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationPrograms that Work. March 7,
Programs that Work March 7, 2017 www.workforcedqc.org @workforcedqc Panelists Jenna Leventoff, Workforce Data Quality Campaign Kermit Kaleba, National Skills Coalition David W. Ramsay, Office of Research
More informationAdvanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours
Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332 36 Contact Hours Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment.
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationSOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust
More informationDocumentation Accessibility. Access to Oracle Support
Oracle Fusion Middleware Known Issues for Oracle Data Visualization Desktop E72027-15 December 2017 Data Visualization Desktop Known Issues This chapter lists and describes known Oracle Data Visualization
More informationSECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above
SECURE FILE TRANSFER PROTOCOL EventTracker v8.x and above Publication Date: January 02, 2019 Abstract This guide provides instructions to configure SFTP logs for User Activities and File Operations. Once
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationLegal notice and Privacy policy
Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains
More informationFederal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats
May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph
More informationOffer Description : Cisco Webex
: Cisco Webex This (the ) describes Cisco Webex (the Cloud Service ). Your subscription is governed by this and the Cisco Universal Cloud Agreement located at www.cisco.com/go/uca (or similar terms existing
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationIntegrating Microsoft Forefront Unified Access Gateway (UAG)
Integrating Microsoft Forefront Unified Access Gateway (UAG) EventTracker v7.x Publication Date: Sep 17, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide
More informationPipeliner CRM Arithmetica Guide Importing Accounts & Contacts Pipelinersales Inc.
Importing Accounts & Contacts 205 Pipelinersales Inc. www.pipelinersales.com Importing Accounts & Contacts Learn how to import accounts and contacts into Pipeliner Sales CRM Application. CONTENT. Creating
More informationIntroduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS September 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationIntegrate Aventail SSL VPN
Publication Date: July 24, 2014 Abstract This guide provides instructions to configure Aventail SSL VPN to send the syslog to EventTracker. Once syslog is being configured to send to EventTracker Manager,
More informationCloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility
A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility IBM provides end-to-end strategy, migration, infrastructure and managed services on secure government premises
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationAimetis Crowd Detection. 1.x User Guide
Aimetis Crowd Detection x User Guide Contents Contents Legal information... 3 Introduction...4 Installation...5 Requirements... 5 Install Crowd Detection...5 Open Crowd Detection... 5 Add a license...
More informationEducation and Support for SharePoint, Office 365 and Azure
Education and Support for SharePoint, Office 365 and Azure www.combined-knowledge.com COURSE OUTLINE ENABLING AND MANAGING OFFICE 365 Course Duration: 5 Days Course Code: 20347A Overview Course Code: 20347A
More informationEXAMPLE AUDIO OR VIDEO SCRIPTS
Contact: Arlee Colman The Florida Bar Legal Specialization & Education Department (850) 561-5805 Florida Bar Board Certification 651 East Jefferson Street Tallahassee, FL 32399-2300 FloridaBar.org/certification
More information