Office 365 E3 and above includes Rights Management

There are many benefits of the more advanced Office 365 plans. One of the benefits you receive with E3 licenses and above is Rights Management:

image

If you visit the E3 product page at:

https://products.office.com/en-us/business/office-365-enterprise-e3-business-software

You will find the above focus on the included Information Protection features. One of the ways this is provided is via Rights Management.

image

https://technet.microsoft.com/en-us/network/dn858608.aspx

If you visit the above link you’ll find the table that compares the Rights Management features you receive in Office 365 E3 or better and with Azure Rights Management Premium.

image 

Although Office 365 Rights Management isn’t as full featured as the premium product it does most things a business needs. It will basically protect documents no matter where they are located. Rights Management basically will encrypt documents and embed permissions inside the document. Thus, the permissions go wherever the document goes, inside or outside the business.

This is unlike most documents today that are only protected by the location in which they are stored. If you have a sensitive document on your file server, it is generally locked down via server permissions. However, that doesn’t prevent someone with the appropriate permissions sending that document, as an email attachment say, another person who doesn’t normally have permissions. That is because once the file is removed from its secure container it effectively is no longer protected. That’s because only the container the file lives in has permissions, not the file itself. With Rights Management, the permissions are embedded into the file, ensuring it is protected where ever it goes.

So, if you have Office 365 E3 or better, what’s the easiest way to start using the included Rights Management abilities you get with Office 365?

image

image

The easiest way is to configure information to be directly protected from the file system and desktop applications.

If you look at the above screen shots of PowerPoint and Windows Explorer you see there is no option to apply Rights Management. To provide that we need to firstly install the Rights Management agent software on the desktop.

image

To download the agent software, navigate to the Microsoft Rights Management download portal at:

https://portal.aadrm.com/Home/Download

image

Simply select the icon that matches your device. In this case we’ll select the Windows computer icon.

image

When the software has downloaded, run it.

image

Select Next to continue.

image

You’ll see the software configure and install Microsoft RMS for you.

image

After the installation is complete you’ll now need to Restart your system.

image

image

Now when you look at your Office applications you’ll see a new button called Share Protected as shown.

image

You’ll also find that Rights Management has been embedded into the file manager. Just right mouse click on any file and you’ll see the Protect with RMS option in the menu as shown.

I’ll cover off how you actually use this inbuilt Rights Management functionality to protect your information in an upcoming article, so stay tuned. However, at least now you have the agent installed on your desktop to make protecting your information with Rights Management easy.

Remember, Rights Management with Office 365 is currently only available with E3 or better suites but is also available as a stand alone purchase if you want it.

Need to Know Podcast–Episode 101

Marc and I catch up on all the latest Azure and Office 365 news. We talk about the new Azure Resource Policy as well as the latest changes to the Office 365 interface. We also spend some time chatting about security and the best hardware device to get. THis one’s a little bit random, so enjoy the ride.

As always don’t forget to send us you questions and feedback as well as leaving review to help grow our audience. We appreciate you taking the time to listen.

or can listen to this episode at:

http://ciaops.podbean.com/e/episode-101-cloud-news/

or subscribe to this and all episodes in iTunes at:

https://itunes.apple.com/au/podcast/ciaops-need-to-know-podcasts/id406891445?mt=2

The podcast is also available on Stitcher at:

http://www.stitcher.com/podcast/ciaops/need-to-know-podcast?refid=stpr

Don’t forget to give the show a rating as well as send me anyfeedback or suggestions you may have for the show.

Resources

Marc Kean – @marckean

Robert Crane – @directorcia

Custom SSO through Azure AD

Azure Resource Policy

New Office 365 login screen

New Office 365 admin center look and feel

Office 365 B2B sharing

Lastpass

Office 365 customer lockbox

Project Madeira

Cloud App Discovery coming to Office 365

One of the handy features of Azure AD Premium was the ability to install a small program on each workstation and then have it report on cloud based applications used. All the data was collected by Azure and then reported in a handy dashboard.

That way you could see what cloud based applications were in use, how much data was flowing through them and whether they were being used outside the Azure AD Single Sign On Web Portal.

A good example I have seen is where cloud app discovery uncovered the fact that a number of employees were sharing large amounts of corporate information using Dropbox which had been banned from the workplace. Cloud Discovery allowed these users to be identified along the times sharing was taking place. The business could then take appropriate action.

According to this post from Microsoft:

https://blogs.office.com/2016/02/25/new-security-management-and-transparency-capabilities-coming-to-office-365/

Cloud App discovery is a new feature, amongst others, coming to Office 365. To quote:

Office 365 cloud app discovery gives you the ability to understand which other cloud services your users are connecting to. From the Office 365 admin portal, you can view a dashboard on network activity. For example, you can see where users are storing and collaborating on documents and how much data is being uploaded to apps or services outside of Office 365.

Not quite sure how exactly it works but I expect it will be a slightly cut down version of what is available in Azure AD Premium, like many other enhanced features of Office 365 are.

There are also some other great security enhancements announced in that blog post so check it and be ready for the new features arriving in an Office 365 near you soon!

Why technology will doom us all

As much as I like and make a living from technology, I have always maintained a healthy interest in all aspects of digital security. I have written plenty of previous articles about how technology is pretty devoid of good security in my opinion, such as:

Bad guy just keep winning

The world of security anonomalies

Security before convenience or else

Here’s another recent personal episode that once again proves my point that we are headed to a very bad place with technology due to a lack of focus and understanding of the real value of security.

While visiting a family member they informed me they feared their PC had been hacked. The reason sighted was they saw a message appear on the screen, while browsing the Internet, that told them their system had been hacked. They immediately panicked and turned the whole system off awaiting my arrival.

Time to investigate.

I powered the machine back up and ran a few scans and checked the logs and couldn’t see anything nasty. The family member told me that had been searching the Internet and viewing the resultant sites. The last one they remember visiting was:

Tasmanian Air Adventures

Rather the visting the site I ran my own search on the name of the business.

image

Above is the first result that was returned. If you look closely you’ll see that results returned are just ‘default text’ ( i.e. Donec ullamcorper…). This indicates to me that site still has some ‘defaults’ set somewhere. If that is the case then the site also probably has ‘default’ security, which really means no security!

After a little more digging I turned up the suspect HTML page and the above image from the browser cache which is what the user remembered seeing.

The suspect HTML also revealed that the exploit used was against an outdated Mailchimp WordPress plugin.

After some further checking I was confident that the exploit targeted the insecure server not client browsers. I re-assured the user that all was good and they didn’t have anything to worry about (for the reasons I’ll point out a bit later).

After some more digging it turns out that the company whose web site it was actually went into liquidation a while back.

Tasmanian Air Adventures in liquidation

That was about 10 months ago as of today.

So here are my comments/questions:

1. Why the hell is an insecure web site still allowed be to be running when that company was liquidated 10 months ago?

2. Who the hell is paying for that server to be still running?

3. If that web server was actually shared amongst others that insecure account now potentially makes all accounts on that server vulnerable.

I could go on but ….

My point here is that as we race towards making technology more and more part of our lives and our businesses, including connecting them all together all the time, we make ourselves more vulnerable to any single insecurity.

The Internet of Things sure sounds great but it will open a Pandora’s box of pain for everyone by connecting every device we see to the Internet. Why? Because all it requires is one insecurity in any of these connected system to give the bad guys a foot hold. In fact, I would contend that it is too late, they already well entrenched.

I’m scared. I really am. We are building a world that is going to fail, and fail potentially castastrophically. It is going to make us more vulnerable. It’s a world were the financial incentive is heavily stacked towards doing evil rather than good.

It is pretty much impossible these days to go totally unibomber and unplug. Thus, our only realistic option is to deal with the world we have created. That means taking total ownership of your own security.

Case in point, the family member who experience this issue was running a FULLY patched AUTOMATICALLY updating version of Windows 10 with other security measure in place thanks to your truly. Many people complain about the change Microsoft made to have Windows and Office automatically update. I, however, think that is GREAT! It is one thing EVERY piece of software MUST do in my opinion. Otherwise, we leave holes that the bad guys can crawl into and never be removed once they are in.

The reality, which I believe fails to be grasped, is that technology security is a losing equation. Every day more and more software and devices become vulnerable because they are not being updated YET they remain connected, just like the web server my relative was visiting.

I’m sorry, we are all doomed and technology is to blame. You have been warned.

Enabling Customer Lockbox

image

Microsoft already has a very secure process about when and how support staff may access your Office 365 tenant data. Here’s a great video that explains this:

The recent addition of Customer Lockbox provides additional control for the customer.

Basically, once Customer Lockbox has been enabled the user has the final say over when and for how long Microsoft may access the tenant data to provide support.

image

To enable Customer Lockbox you’ll need to have the appropriate license (i.e. the new E5 SKU includes Customer Lockbox for example), then you’ll need to login as an administrator to the Office 365 admin center.

image

If you then locate and expand the Service Settings option on the left hand side of the screen, you should see the list shown above. In the list is the option Customer Lockbox, which you should select.

 

image

Now on the right you should see the above screen. To eanble Customer Lockbox simply change the switch to ON (i.e. move to right).

image

You’ll then receive the above warning. Select Yes to enable.

image

You should now see that Customer Lockbox is enabled as shown above.

To find out more about Customer Lockbox visit:

Office 365 Customer Lockbox Requests

and note once Customer Lockbox has been enabled:

If a content access request is denied or isn’t approved within 12 hours, the request expires. If this happens, you might continue to experience a specific service issue that could be resolved by allowing an engineer to access the content. We’ll (Microsoft) let you know if this happens.

So in summary, Customer Lockbox is a feature you can add on to Office 365 to prevent Microsoft accessing your data with out your specific permission once enabled.

Here is also an overview video from Microsoft:

How to present Office 365

I’m working on a new course for my online training academy that will give people a framework for successfully presenting Office 365 to prospects, clients and colleagues.

Having presented this material in face to face classroom sessions I was really looking to incorporate the “whiteboard” experience on screen. What I therefore decided to try was using the Windows 10 OneNote app on my Surface 3 along with the Surface pen to see how well it would work while obviusly recording the whole thing.

My trial attempt is shown above and I think it worked pretty well. Obviously, there will need to be some polishing done before I release the final version of the course material, which will also contain more tutorials on how to present each individual service such as Delve.

Have a look and let me know what you think at the rough draft of on screen “whiteboarding”. Also, if you have played with OneNote and a pen then I suggest you do as OneNote is a great hand notetaking tool as hopefully the video illustrates. Of course if you want to find out when the course on Presenting Office 365 becomes available then stay tuned here or sign up for free at my online academy:

www.ciaopsacademy.com

Need to Know podcast–Episode 94

I’m joined by a returning guest, Microsoft MVP Troy Hunt to discuss the Ashley Madison hack and the impact that it had on Troy’s site Have I been Pwned? You’ll not only get a fascinating look inside a high profile hack but you’ll also learn a lot about Azure and how Troy utilises it effectively to handle the scale required for just such an event.

As always, a big thank you to Marc Kean for producing this episode and doing the intro and outros.

You can listen to this episode at:

http://ciaops.podbean.com/e/episode-94-troy-hunt/

or subscribe to this and all episodes in iTunes at:

https://itunes.apple.com/au/podcast/ciaops-need-to-know-podcasts/id406891445?mt=2

The podcast is also available on Stitcher at:

http://www.stitcher.com/podcast/ciaops/need-to-know-podcast?refid=stpr

Don’t forget to give the show a rating as well as send me any feedback or suggestions you may have for the show. I’m also on the hunt for some co-presenters so if you are interested on being a regular part of the show please contact me.

Resources

Troy Hunt

Have I Been Pwned

Office 365 E5 SKU

Power BI adds Bing content pack

OneDrive for Business shared link expiry now available

Azure Backup now does servers

Microsoft Findtime

Enterprise Mobility Suite

Azure Backup now does servers

Azure backup has allowed to backup up files and folders from servers and workstations to Azure very quickly, easily and cheaply. I have detailed this previously at;

Azure desktop backup

As announced here:

Announcing Microsoft Azure Backup Server

Azure backup now has the ability to backup server workloads like Exchange, SharePoint and SQL to both a local storage location as well as to Azure storage.This means that it can not only protect files and folders but all of the data on premises just as quickly and easily as it could for files and folder, however now there is also the added ability to have a local copy of the backup as well.

This now makes Azure backup a really compelling option for any business and provides the flexibility many demand.

image

To get started have a look at the above links or login to your Azure backup vault and download the Application Workload client to get started.