http://ignite.office.com
Spam
Protect communications Enforce policy Streamlined management
On Premise Corporate Network EOP O365 Exchange Online Every Office 365 customer is an EOP customer Easy transition from EOP stand-alone to Office 365 On-premises server - Inbound and Outbound email filtered through EOP
Spam Analysts Email is routed to EOP DC s based on MX record resolution (mail.messaging.microsoft.com) Customer Feedback IP-based edge blocking Reputation Blocking Virus Scanning AV Engine 1 Policy Enforcement Custom Rules SPAM Protection Safe Sender/Recipient Content scanning and Heuristics False +ve / -ve Regular Expressions URL Block lists AV Engine 2 AV Engine 3 Allows/Rejects SPF & Sender ID Filter Bulk Mail filtering *International Spam* Corporate Network Envelope blocks Advanced SPAM management Forefront blocks Quarantine
Outbound Pool Outbound Pool Outbound Pool Corporate Network Virus Scanning AV Engine 1 AV Engine 2 Policy Enforcement Custom Rules Email Encryption SPAM Protection Content scanning and Heuristics Low Score Bulk Mail Bulk Delivery Pool AV Engine 3 Advanced SPAM management High Score High Risk Delivery Pool Spam Analysts Quarantine Internet
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing email environment
Bulk Mail control Mark all bulk messages as spam Block external threats quickly Advanced fingerprinting technologies that identify and stop new spam and phishing vectors in real time.
Block email based on language Block unwanted email based on language or geographic origin Block email based on geography
Recommendation: Send suspected junk mail to the Outlook junk mail folder. Spam quarantine managed by administrators. Users can manage safe senders and block lists through Outlook.
Set Frequency from 1-15 days Localized ESN
Outlook Junk Mail Reporting Tool for missed spam http://www.microsoft.com/enus/download/details.aspx?id=18275 Send spam email as an attachment to abuse@messaging.microsoft.com Send false positive messages to false_positive@messaging.microsoft.com
Delete messages Delete attachments Robust, customizable notifications Sender notifications Admin notifications
Delete messages Delete attachments Robust, customizable notifications Sender notifications Admin notifications
Conditions Actions Built on Exchange transport rules engine Exceptions Conditions Actions Exceptions
Encryption
EHE Encryption Send Encrypted email to any recipient without prior setup Encryption is performed via policy rules and enforced in the EOP cloud Identity-Based Encryption (IBE) uses email address as ID for public key EHE saves public keys so users should use strong passwords as their credentials No cost for recipient non-licensed user All replies and forwards remain encrypted for any mail recipient Encrypted emails are not saved by EHE
Data Protection in motion Data Protection in motion Information can be protected with RMS at rest or in motion Data protection at rest Data protection at rest Data protection at rest Data protection at rest
Functionality RMS in Office 365 S/MIME ACLs (Access Control Lists) BitLocker Cloud Encryption Gateways (CEGs) Data is encrypted in the cloud Encryption persists with content Protection tied to user identity Protection tied to Policy (edit, print, do not forward, expire after 30 days) Secure collaboration with teams and individuals Native integration with my services (Content Indexing, ediscovery, BI, Virus/Malware scanning) Lost or stolen hard disk
RMS can be activated right inside Office 365 Admin console Enable Rights Management in the tenant admin
Apply RMS to content RMS can be applied to Emails RMS can be applied to SharePoint libraries Files are protected if they are viewed using Webapps or downloaded to a local machine RMS can be applied to any Office documents
Office 365 Trust Center
Protect communications Enforce policy Streamlined management
All statements in this report attributable to Gartner represent Microsoft interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.