SlideShare a Scribd company logo
1 of 37
Jethro Seghers




@jseghers – http://www.j-solutions.be/blog
J-Solutions.be
 Located in Belgium
 Provides IT Business Consultancy - Evangelism
   SharePoint 2010/2013 and Online
   Cloud Services – Office 365, Windows Intune & Azure
   IT as a service – MOF and ITIL v3




@jseghers – http://www.j-solutions.be/blog
Agenda
   Terminology
   Infrastructure settings
   Exchange Online
   Lync Online
   SharePoint Online
   Sources of Information




@jseghers – http://www.j-solutions.be/blog
Data Security
The protection of data from
unauthorized (accidental or intentional)
modification, destruction, or disclosure
Data Compliance
Compliance is either a state of being in
accordance with established
guidelines, specifications, or legislation
or the process of becoming so
BRINGING TOGETHER CLOUD VERSIONS OF OUR MOST TRUSTED COMMUNICATIONS
AND COLLABORATION PRODUCTS WITH THE LATEST VERSION OF OUR DESKTOP SUITE
                      FOR BUSINESSES OF ALL SIZES.
Infrastructure
Overview
   Microsoft Datacenters & their locations
   DataFlow
   Privacy
   Encryption
   Identity Protection
   Password Policies




@jseghers – http://www.j-solutions.be/blog
Microsoft Datacenters .
 Physical Security
   Secure physical access for authorized personnel only
   State of the Art datacenters
 Hosted Applications Security
   Anti SPAM
   Encryption Mail
 Security Development Lifecycle
   Potential threats while running a service
   Exposed aspects of the service that are open to attack


@jseghers – http://www.j-solutions.be/blog
Microsoft Datacenters ..
 Secured Office 365 Services Infrastructure
   Server Monitoring via System Center
   Secure Remote Access via RDS
   Intrusion Detection
 Network-level Security Measures
   Customer Access via SSL
   Uptime 99,9 %
 Identity & Access Management
   Access control follows the separation of duties principle and
    granting least privilege.
@jseghers – http://www.j-solutions.be/blog
Where is our data stored: Example: EMEA
 A primary data center is where the application software
    and the customer data running on the application
    software are hosted.
   A backup data center is used for failover purposes
   Data center Dublin: Primary for F.O.P.E.
   Data center The Netherlands: SharePoint Online
   Dublin + The Netherlands: interchangeably Exchange
    Online + Lync Online


@jseghers – http://www.j-solutions.be/blog
What is stored in the US: EMEA
   Customer Information
   Microsoft Online Portal
   Routing Lync Online Communications
   Office 365 Authentication

 Additionally, Microsoft abides by the Safe Harbor
    Framework for transfer of data between the European
    Union and the United States.


@jseghers – http://www.j-solutions.be/blog
Privacy .
Microsoft Online  Usage Data                Account and    Customer Data     Core
Services Customer                           Address Book   (excluding Core   Customer Data
Data                                        Data           Customer Data)
Operating and         Yes                   Yes            Yes               Yes
Troubleshooting the
Service
Security, Spam and    Yes                   Yes            Yes               Yes
Malware Prevention
Improving the         Yes                   Yes            Yes               No
Purchased Service,
Analytics
Personalization,      No                    Yes            No                No
User Profile
Promotions
Communications        No                     Yes           No                No
(Tips, Advice,
Surveys,
Promotions) – http://www.j-solutions.be/blog
  @jseghers
Privacy ..
Microsoft Online  Usage Data                  Account and    Customer Data     Core
Services Customer                             Address Book   (excluding Core   Customer Data
Data                                          Data           Customer Data)
Voluntary            No                       No             No                No
Disclosure to Law
Enforcement
Advertising          No                       No             No                No




 @jseghers – http://www.j-solutions.be/blog
Encryption
 HTTPS Communication with portal.microsoftonline.com
 HTTPS Communication between clients and Exchange
  Online for all protocols
 PGP: Transportation and storage of Exchange Online
  Messages
 Lync Online: Instant Messaging, IM Federation
 SharePoint Online: HTTPS Connection (only for
  Enterprise & Academic)


@jseghers – http://www.j-solutions.be/blog
Identity Protection
   Identity stored in Microsoft Online
   Identity federation via SSO
   Granular Licenses
   Different Administrator Roles




@jseghers – http://www.j-solutions.be/blog
Identity options comparison
               1. MS Online IDs                           2. Federated IDs + Dir Sync
• Authentication is done by Microsoft      • Authentication is done by Corporate Infrastructure
                                            • Larger enterprise organizations with AD on-premise
Pros
 • Bound to the SLA of 99,9% of MSFT.      Pros
 • Users and groups mastered on-premise     • SSO with corporate cred
                                            • Users and groups mastered on-premise
Cons                                        • Password policy controlled on-premise
 • 2 sets of credentials that need to be    • Enables co-existence scenarios
   maintained
 • Different Password policies             Cons
                                            • High availability server deployments required
Password Policy
 Password Restriction: 8 characters minimum and 16
    characters maximum
           Values allowed:
               A-Z
               a-z
               0-9
               !@#$%^&*-_+=[]{}|:‘,.?/`~“<>();
               No UNICODE
           Cannot contain the username alias (part before @ symbol)
 Password expiry duration:
           This is set to 90 days and is not configurable


@jseghers – http://www.j-solutions.be/blog
Password Policy
 Password expiry:
           Can be enabled/disable via powershell at user level
 Password strength
           Strong passwords require 3 out of 4 of the following:
               Lowercase characters
               Uppercase characters
               Numbers (0-9)
               Symbols (see password restrictions above)
 Password history
           Last password cannot be used again



@jseghers – http://www.j-solutions.be/blog
Password Policy
 Account Lockout
           After 10 unsuccessful logon attempts (wrong password), the user will
            need to solve a CAPTCHA dialog as part of logon.




@jseghers – http://www.j-solutions.be/blog
Is this
Independently
Verified?
MS Online Certification and Compliance Finder
   Certified for ISO 27001
   EU Safe Harbor
   HIPAA-Business Associate Agreement
   Data Processing Agreement
   FISMA




@jseghers – http://www.j-solutions.be/blog
Exchange Online
Exchange Online .
   Archiving
   Moderation Security/Distribution Groups
   Item Level Recovery
   Transport Rules
   Retention Policies – Managed Folder Assistent
   Deleted Mailbox Recovery




@jseghers – http://www.j-solutions.be/blog
Exchange Online ..
   Journaling
   F.O.P.E in Current Version, Built-In in EXO Wave 15
   Auditing
   Retention Hold
   Litigation Hold
   Mobile Device




@jseghers – http://www.j-solutions.be/blog
DEMO
Lync Online
Lync Online
 Privacy Settings
 External Communications
 User Defined Settings
           Sending files via IM
           Make audio and video calls
           Record Call and conferences
           Federation with Lync users in other organizations
           Federation with Users of public IM service providers
           Dial-in Conferencing



@jseghers – http://www.j-solutions.be/blog
DEMO
SharePoint Online
SharePoint Online .
   Information Management Policy – Records
   Use Of Term Store & Required Fields – Content Types
   Drop Off Library
   Audit
   Blocked File Types
   Security
   Versioning
   Recycle Bin
   Backup: 14 days
@jseghers – http://www.j-solutions.be/blog
DEMO
Sources Of Information
 Office 365 Trust Center : http://www.microsoft.com/en-
    us/office365/trust-center.aspx
   Service Description
   Office 365 Password Policy
   Security White Paper
   Data Boundaries




@jseghers – http://www.j-solutions.be/blog
Questions

More Related Content

What's hot

SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015Tiago Henriques
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionAlbert Hoitingh
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersCorey Roth
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointedynamic
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
PLNOG 6: Piotr Szołkowski - Identity Management
PLNOG 6: Piotr Szołkowski - Identity Management PLNOG 6: Piotr Szołkowski - Identity Management
PLNOG 6: Piotr Szołkowski - Identity Management PROIDEA
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates RapidSSLOnline.com
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breachCloudMask inc.
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Microsoft Norge AS
 
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
 
Cisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewCisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewIlyanna
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 

What's hot (20)

SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePoint
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
PLNOG 6: Piotr Szołkowski - Identity Management
PLNOG 6: Piotr Szołkowski - Identity Management PLNOG 6: Piotr Szołkowski - Identity Management
PLNOG 6: Piotr Szołkowski - Identity Management
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
 
Cisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewCisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overview
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 

Viewers also liked

Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtablemaxtable
 
Ամանորն իմ ընտանիքում
Ամանորն իմ ընտանիքումԱմանորն իմ ընտանիքում
Ամանորն իմ ընտանիքումtatevabrahamyan
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European UnionRene Summer
 
4 steps in Business Strategy for Start-ups
4 steps in Business Strategy for Start-ups4 steps in Business Strategy for Start-ups
4 steps in Business Strategy for Start-upsCostin Ciora
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...EMC
 
Week1_presentation
Week1_presentationWeek1_presentation
Week1_presentationsara_chou
 
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Faruk Emre Güngör
 
Day 4 legal matters
Day 4 legal mattersDay 4 legal matters
Day 4 legal mattersTravis Klein
 
Advance DNA sequencing
Advance DNA sequencing Advance DNA sequencing
Advance DNA sequencing Asheesh Pandey
 
บทที่ 4 (1)
บทที่ 4 (1)บทที่ 4 (1)
บทที่ 4 (1)einscream
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-EtructuralesCESEIC
 
El correu electrònic imad
El correu electrònic imadEl correu electrònic imad
El correu electrònic imadmgonellgomez
 

Viewers also liked (19)

Wed mexico
Wed mexicoWed mexico
Wed mexico
 
Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtable
 
Ամանորն իմ ընտանիքում
Ամանորն իմ ընտանիքումԱմանորն իմ ընտանիքում
Ամանորն իմ ընտանիքում
 
Chinese rev thur
Chinese rev thurChinese rev thur
Chinese rev thur
 
Verizon communication
Verizon communicationVerizon communication
Verizon communication
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European Union
 
4 steps in Business Strategy for Start-ups
4 steps in Business Strategy for Start-ups4 steps in Business Strategy for Start-ups
4 steps in Business Strategy for Start-ups
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
 
Week1_presentation
Week1_presentationWeek1_presentation
Week1_presentation
 
Thurs encomienda
Thurs encomiendaThurs encomienda
Thurs encomienda
 
Das
DasDas
Das
 
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
 
Day 4 legal matters
Day 4 legal mattersDay 4 legal matters
Day 4 legal matters
 
Advance DNA sequencing
Advance DNA sequencing Advance DNA sequencing
Advance DNA sequencing
 
บทที่ 4 (1)
บทที่ 4 (1)บทที่ 4 (1)
บทที่ 4 (1)
 
Siesmic
SiesmicSiesmic
Siesmic
 
Cybernetics of knowledge
Cybernetics of knowledgeCybernetics of knowledge
Cybernetics of knowledge
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-Etructurales
 
El correu electrònic imad
El correu electrònic imadEl correu electrònic imad
El correu electrònic imad
 

Similar to Data security and compliancy in Office 365

The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2Kallex
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarRobert Crane
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
Microsoft Cloud options
Microsoft Cloud optionsMicrosoft Cloud options
Microsoft Cloud optionsRobert Crane
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features TechSoup
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Deloitte Resume December 2016
Deloitte Resume December 2016Deloitte Resume December 2016
Deloitte Resume December 2016Modesta Key
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieNCCOMMS
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 

Similar to Data security and compliancy in Office 365 (20)

The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Microsoft Cloud options
Microsoft Cloud optionsMicrosoft Cloud options
Microsoft Cloud options
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Deloitte Resume December 2016
Deloitte Resume December 2016Deloitte Resume December 2016
Deloitte Resume December 2016
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 

More from Microsoft TechNet - Belgium and Luxembourg

More from Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 

Data security and compliancy in Office 365

  • 1.
  • 2. Jethro Seghers @jseghers – http://www.j-solutions.be/blog
  • 3. J-Solutions.be  Located in Belgium  Provides IT Business Consultancy - Evangelism  SharePoint 2010/2013 and Online  Cloud Services – Office 365, Windows Intune & Azure  IT as a service – MOF and ITIL v3 @jseghers – http://www.j-solutions.be/blog
  • 4. Agenda  Terminology  Infrastructure settings  Exchange Online  Lync Online  SharePoint Online  Sources of Information @jseghers – http://www.j-solutions.be/blog
  • 6. The protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure
  • 8. Compliance is either a state of being in accordance with established guidelines, specifications, or legislation or the process of becoming so
  • 9. BRINGING TOGETHER CLOUD VERSIONS OF OUR MOST TRUSTED COMMUNICATIONS AND COLLABORATION PRODUCTS WITH THE LATEST VERSION OF OUR DESKTOP SUITE FOR BUSINESSES OF ALL SIZES.
  • 11. Overview  Microsoft Datacenters & their locations  DataFlow  Privacy  Encryption  Identity Protection  Password Policies @jseghers – http://www.j-solutions.be/blog
  • 12. Microsoft Datacenters .  Physical Security  Secure physical access for authorized personnel only  State of the Art datacenters  Hosted Applications Security  Anti SPAM  Encryption Mail  Security Development Lifecycle  Potential threats while running a service  Exposed aspects of the service that are open to attack @jseghers – http://www.j-solutions.be/blog
  • 13. Microsoft Datacenters ..  Secured Office 365 Services Infrastructure  Server Monitoring via System Center  Secure Remote Access via RDS  Intrusion Detection  Network-level Security Measures  Customer Access via SSL  Uptime 99,9 %  Identity & Access Management  Access control follows the separation of duties principle and granting least privilege. @jseghers – http://www.j-solutions.be/blog
  • 14. Where is our data stored: Example: EMEA  A primary data center is where the application software and the customer data running on the application software are hosted.  A backup data center is used for failover purposes  Data center Dublin: Primary for F.O.P.E.  Data center The Netherlands: SharePoint Online  Dublin + The Netherlands: interchangeably Exchange Online + Lync Online @jseghers – http://www.j-solutions.be/blog
  • 15. What is stored in the US: EMEA  Customer Information  Microsoft Online Portal  Routing Lync Online Communications  Office 365 Authentication  Additionally, Microsoft abides by the Safe Harbor Framework for transfer of data between the European Union and the United States. @jseghers – http://www.j-solutions.be/blog
  • 16. Privacy . Microsoft Online Usage Data Account and Customer Data Core Services Customer Address Book (excluding Core Customer Data Data Data Customer Data) Operating and Yes Yes Yes Yes Troubleshooting the Service Security, Spam and Yes Yes Yes Yes Malware Prevention Improving the Yes Yes Yes No Purchased Service, Analytics Personalization, No Yes No No User Profile Promotions Communications No Yes No No (Tips, Advice, Surveys, Promotions) – http://www.j-solutions.be/blog @jseghers
  • 17. Privacy .. Microsoft Online Usage Data Account and Customer Data Core Services Customer Address Book (excluding Core Customer Data Data Data Customer Data) Voluntary No No No No Disclosure to Law Enforcement Advertising No No No No @jseghers – http://www.j-solutions.be/blog
  • 18. Encryption  HTTPS Communication with portal.microsoftonline.com  HTTPS Communication between clients and Exchange Online for all protocols  PGP: Transportation and storage of Exchange Online Messages  Lync Online: Instant Messaging, IM Federation  SharePoint Online: HTTPS Connection (only for Enterprise & Academic) @jseghers – http://www.j-solutions.be/blog
  • 19. Identity Protection  Identity stored in Microsoft Online  Identity federation via SSO  Granular Licenses  Different Administrator Roles @jseghers – http://www.j-solutions.be/blog
  • 20. Identity options comparison 1. MS Online IDs 2. Federated IDs + Dir Sync • Authentication is done by Microsoft • Authentication is done by Corporate Infrastructure • Larger enterprise organizations with AD on-premise Pros • Bound to the SLA of 99,9% of MSFT. Pros • Users and groups mastered on-premise • SSO with corporate cred • Users and groups mastered on-premise Cons • Password policy controlled on-premise • 2 sets of credentials that need to be • Enables co-existence scenarios maintained • Different Password policies Cons • High availability server deployments required
  • 21. Password Policy  Password Restriction: 8 characters minimum and 16 characters maximum  Values allowed:  A-Z  a-z  0-9  !@#$%^&*-_+=[]{}|:‘,.?/`~“<>();  No UNICODE  Cannot contain the username alias (part before @ symbol)  Password expiry duration:  This is set to 90 days and is not configurable @jseghers – http://www.j-solutions.be/blog
  • 22. Password Policy  Password expiry:  Can be enabled/disable via powershell at user level  Password strength  Strong passwords require 3 out of 4 of the following:  Lowercase characters  Uppercase characters  Numbers (0-9)  Symbols (see password restrictions above)  Password history  Last password cannot be used again @jseghers – http://www.j-solutions.be/blog
  • 23. Password Policy  Account Lockout  After 10 unsuccessful logon attempts (wrong password), the user will need to solve a CAPTCHA dialog as part of logon. @jseghers – http://www.j-solutions.be/blog
  • 25. MS Online Certification and Compliance Finder  Certified for ISO 27001  EU Safe Harbor  HIPAA-Business Associate Agreement  Data Processing Agreement  FISMA @jseghers – http://www.j-solutions.be/blog
  • 27. Exchange Online .  Archiving  Moderation Security/Distribution Groups  Item Level Recovery  Transport Rules  Retention Policies – Managed Folder Assistent  Deleted Mailbox Recovery @jseghers – http://www.j-solutions.be/blog
  • 28. Exchange Online ..  Journaling  F.O.P.E in Current Version, Built-In in EXO Wave 15  Auditing  Retention Hold  Litigation Hold  Mobile Device @jseghers – http://www.j-solutions.be/blog
  • 29. DEMO
  • 31. Lync Online  Privacy Settings  External Communications  User Defined Settings  Sending files via IM  Make audio and video calls  Record Call and conferences  Federation with Lync users in other organizations  Federation with Users of public IM service providers  Dial-in Conferencing @jseghers – http://www.j-solutions.be/blog
  • 32. DEMO
  • 34. SharePoint Online .  Information Management Policy – Records  Use Of Term Store & Required Fields – Content Types  Drop Off Library  Audit  Blocked File Types  Security  Versioning  Recycle Bin  Backup: 14 days @jseghers – http://www.j-solutions.be/blog
  • 35. DEMO
  • 36. Sources Of Information  Office 365 Trust Center : http://www.microsoft.com/en- us/office365/trust-center.aspx  Service Description  Office 365 Password Policy  Security White Paper  Data Boundaries @jseghers – http://www.j-solutions.be/blog