Similar documents
Targeted Attacks. Identitycentric. Compliance. Cloud BYOD

CAS Quick Deployment Guide January 2018

Office 365 Standalone Security

GLBA Compliance. with O365 Manager Plus.

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

What s New in Exchange Online. Scott Schnoll Senior Program Manager Office 365 CXP Microsoft Corporation

Step 2 - Deploy Advanced Security for Exchange Server

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

On the Surface. Security Datasheet. Security Datasheet

HIPAA Compliance. with O365 Manager Plus.

NaviSite Managed Office 365 Productivity Suite Powered by Microsoft

Setting up Microsoft Office 365

Microsoft Office 365 TM & Zix Encryption

GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate

6 Ways Office 365 Keeps Your and Business Secure

Single Sign-On. Introduction

Innovation IT Services Price List

Managing Microsoft 365 Identity and Access

Symantec Security.cloud

Extract of Summary and Key details of Symantec.cloud Health check Report

Using Trustwave SEG Cloud with Exchange Online

FISMA Compliance. with O365 Manager Plus.

Microsoft Exchange Server 2013 Hybrid Deployments Documentation Help

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Using Trustwave SEG Cloud with Cloud-Based Solutions

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

SolarWinds Mail Assure

Vision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server

Open Mic: IBM SmartCloud Notes Mail Hygiene. Robert Newell SmartCloud Notes Support July, 20 th 2016

Office 365 Integration Guide Software Version 6.7

Symantec ST0-250 Exam

Competitive Matrix - IRONSCALES vs Alternatives

Dataprise Managed Anti-Spam Console

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

SOLUTION MANAGEMENT GROUP

TOTAL CONTROL SECURITY END USER GUIDE

Virtru Microsoft Protection

MDaemon Vs. Kerio Connect

MDaemon Vs. Microsoft Exchange Server 2016 Standard


How to Configure Esva for Office365

MDaemon Vs. Zimbra Network Edition Professional

Protection Service with Continuity

MDaemon Vs. SmarterMail Enterprise Edition

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Consolidated Hygiene and Encryption Service E-Hub. Slide 1

Basic. $5/user per mo.

MDaemon Vs. Kerio Connect

MDaemon Vs. Microsoft Exchange Server 2016 Standard

Managing Graymail. Overview of Graymail. Graymail Management Solution in Security Appliance

WeCloud Security. Administrator's Guide

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. MailEnable Enterprise Premium

Evaluating Encryption Products

Integrate Barracuda Spam Firewall

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Cirius Secure Messaging Single Sign-On

You should not have any other MX records for your domain name (subdomain MX records are OK).

CloudSOC and Security.cloud for Microsoft Office 365


You can find more information about the service at

PCI Compliance. with O365 Manager Plus.

MDaemon Vs. IceWarp Unified Communications Server

Securing Office 365 with Symantec

MDaemon Vs. MailEnable Enterprise Premium

Protection FAQs

Cisco Encryption

Symantec ST Symantec Messaging Gateway Download Full Version :

MDaemon Vs. SmarterMail Enterprise Edition

TrendMicro Hosted Security. Best Practice Guide

Power Tools. Mimecast Training. Student Workbook. V 1.2

Single Sign-On. Introduction. Feature Sheet

2 User Guide. Contents

Update on new Microsoft Cloud Technology

Secure Recipient Guide

GSX 365 Usage Reports & Security Audit

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

Total Control End User Guide

County of El Paso Purchasing Department 800 E. Overland Room 300 El Paso, Texas (915) / Fax: (915)

Office 365: Modern Workplace

MailCleaner Extended FAQ

Service Level Agreement for Microsoft Online Services

Sophos Central Partner. help

MODERN DESKTOP SECURITY

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

Connecting to Mimecast

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Student Lab Manual MS101.1x: Microsoft 365 Security Management

Getting Started 2 Logging into the system 2 Your Home Page 2. Manage your Account 3 Account Settings 3 Change your password 3

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Using Centralized Security Reporting

TREND MICRO. InterScan VirusWall 6. FTP and POP3 Configuration Guide. Integrated virus and spam protection for your Internet gateway.

Symantec Enterprise Solution Product Guide

========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version

Introduction. Logging in. WebQuarantine User Guide

Barracuda Security Gateway User 's Guide 6 and Above

Comodo Antispam Gateway Software Version 2.12

Step 1 - Set Up Essentials for Office 365

MDaemon Vs. SmarterMail Enterprise Edition

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Transcription:

http://ignite.office.com

Spam

Protect communications Enforce policy Streamlined management

On Premise Corporate Network EOP O365 Exchange Online Every Office 365 customer is an EOP customer Easy transition from EOP stand-alone to Office 365 On-premises server - Inbound and Outbound email filtered through EOP

Spam Analysts Email is routed to EOP DC s based on MX record resolution (mail.messaging.microsoft.com) Customer Feedback IP-based edge blocking Reputation Blocking Virus Scanning AV Engine 1 Policy Enforcement Custom Rules SPAM Protection Safe Sender/Recipient Content scanning and Heuristics False +ve / -ve Regular Expressions URL Block lists AV Engine 2 AV Engine 3 Allows/Rejects SPF & Sender ID Filter Bulk Mail filtering *International Spam* Corporate Network Envelope blocks Advanced SPAM management Forefront blocks Quarantine

Outbound Pool Outbound Pool Outbound Pool Corporate Network Virus Scanning AV Engine 1 AV Engine 2 Policy Enforcement Custom Rules Email Encryption SPAM Protection Content scanning and Heuristics Low Score Bulk Mail Bulk Delivery Pool AV Engine 3 Advanced SPAM management High Score High Risk Delivery Pool Spam Analysts Quarantine Internet

On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing email environment

Bulk Mail control Mark all bulk messages as spam Block external threats quickly Advanced fingerprinting technologies that identify and stop new spam and phishing vectors in real time.

Block email based on language Block unwanted email based on language or geographic origin Block email based on geography

Recommendation: Send suspected junk mail to the Outlook junk mail folder. Spam quarantine managed by administrators. Users can manage safe senders and block lists through Outlook.

Set Frequency from 1-15 days Localized ESN

Outlook Junk Mail Reporting Tool for missed spam http://www.microsoft.com/enus/download/details.aspx?id=18275 Send spam email as an attachment to abuse@messaging.microsoft.com Send false positive messages to false_positive@messaging.microsoft.com

Delete messages Delete attachments Robust, customizable notifications Sender notifications Admin notifications

Delete messages Delete attachments Robust, customizable notifications Sender notifications Admin notifications

Conditions Actions Built on Exchange transport rules engine Exceptions Conditions Actions Exceptions

Encryption

EHE Encryption Send Encrypted email to any recipient without prior setup Encryption is performed via policy rules and enforced in the EOP cloud Identity-Based Encryption (IBE) uses email address as ID for public key EHE saves public keys so users should use strong passwords as their credentials No cost for recipient non-licensed user All replies and forwards remain encrypted for any mail recipient Encrypted emails are not saved by EHE

Data Protection in motion Data Protection in motion Information can be protected with RMS at rest or in motion Data protection at rest Data protection at rest Data protection at rest Data protection at rest

Functionality RMS in Office 365 S/MIME ACLs (Access Control Lists) BitLocker Cloud Encryption Gateways (CEGs) Data is encrypted in the cloud Encryption persists with content Protection tied to user identity Protection tied to Policy (edit, print, do not forward, expire after 30 days) Secure collaboration with teams and individuals Native integration with my services (Content Indexing, ediscovery, BI, Virus/Malware scanning) Lost or stolen hard disk

RMS can be activated right inside Office 365 Admin console Enable Rights Management in the tenant admin

Apply RMS to content RMS can be applied to Emails RMS can be applied to SharePoint libraries Files are protected if they are viewed using Webapps or downloaded to a local machine RMS can be applied to any Office documents

Office 365 Trust Center

Protect communications Enforce policy Streamlined management

All statements in this report attributable to Gartner represent Microsoft interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.