Discover what’s new and what’s coming in Office 365 Message Encryption and Azure – THR2000

ArticlesBlog

Written by:


>>GOOD EVENING FOLKS. WELCOME TO MICROSOFT IGNITE. WELCOME TO ORLANDO. WE ARE PROGRAM MANAGERS WITH THE AZURE PRODUCTION TEAM. A HOSTED SERVICE THAT HAS OFFICE 365 AND WINDOWS AND AZURE. DATA CLASSIFIED AND ENCRYPTED DATA. WE ALSO PROVIDE SERVICES THAT WILL HELP CUSTOMERS LIKE YOU MONITOR PRODUCT CONTACT WHICH FLOWS THROUGH THE ECOSYSTEM. YOU ARE HERE AT THE END OF A LONG DAY BECAUSE YOU CARE ABOUT YOUR ORGANIZATION SECURITY. WHEN WE TALK TO IT LEADERS LIKE YOU, THE COMMON CONCERNS THAT SHOW UP IN ANY MODERN ENTERPRISE IS THE FACT THAT YOU ARE CONCERNED ABOUT SECURITY AND COMPLIANCE. IT GOES WITHOUT SAYING THAT EMAIL IS PROBABLY THE NUMBER ONE PRODUCTIVITY APP IN INTI — IN THE ENTERPRISE. MORE TIMES THAN NOT — YOUR USERS AND YOUR ORGANIZATION ARE NOT LEAKING — LEAKING DATA IT IS OR NOT INTENTIONALLY. YOU KNOW ABOUT IT OR YOU JUST DON’T HAVE THE RIGHT TOOLS TO KNOW YOU ARE LEAKING DATA. THE FOCUS OF TODAY’S SUBJECT IS A SERVICE CALLED OFFICE MESSAGE ENCRYPTION. WE RELEASED THIS CAPABILITY ROUGHLY A YEAR AGO BACK IN IGNITE. HOW MANY OF YOU WERE AT IGNITE LEICESTER. WE INTRODUCED IT LAST YEAR THIS YEAR — LESTER SAM TEMPTED SINCE THEN WE ENABLED THE SERVICE THE SERVICE TO 100 MILLION USERS WITHIN OFFICE 365 THIS SERVICE HAS GOTTEN A LOT OF FEEDBACK AND WE MAKE CONTINUED IMPROVEMENTS. THE FOCUS OF THE SESSION IS THE FOCUS ON THESE IMPROVEMENTS. OVER THE LAST YEAR MICROSOFT INVESTED HEAVILY IN INFORMATION PROTECTION SPACE. YOU WILL FIND VERSIONS OF THIS SLIDE IN MULTIPLE SESSIONS TODAY AND ALL THE WAY UNTIL THURSDAY. THE FOCUSED OF THE INVESTMENTS ARE BROADLY AROUND DISCOVERY WHERE DATA IS. AND BEING ABLE TO CLASSIFY THE DATA AND ONCE DATA IS CLASSIFIED WE WANT TO HELP YOU LABEL THE DATA. LABEL DATA IS THEN PROTECTED AS WELL. YOU KEEP HEARING THESE VERSIONS OF CLP. MULTIPLE TIMES DURING THE CONVERSATION. WE HAVE MULTIPLE WORKLOADS WITHIN OFFICE 365 WHICH ADHERE TO THIS COMMON SET OF PRINCIPLES. EMAIL PROTECTION IS ONE SUCH WORKLOAD. NOW THE CHALLENGE WITH EMAIL IS THAT THERE’S NO WAY TO CONTROL WHERE YOUR USERS ARE SENDING THE DATA. THEY COULD BE SENDING INFORMATION INSIDE OR OUTSIDE YOUR ORGANIZATION. THROUGH WINDOWS AND THROUGH CONTRACTS AND ANYONE WITH SOCIAL IDS. THIS IS WHERE OFFICE MESSAGE ENCRYPTION REALLY SHINES. WE GIVE CUSTOMERS LIKE YOU THE ABILITY TO SEND SENSITIVE INFORMATION TO ANYONE WITH ANY EMAIL ADDRESS. THERE IS NO STAR MARK OR ANYTHING THAT THEY INDICATE THAT HAVE TO BE WITHIN OFFICE 365 ARE THAT HAVE TO HAVE AN ACCOUNT. YOU CAN SEND SENSITIVE INFORMATION TO ANYONE. BUT SENDING — THE CHALLENGE OF WHAT WE OFTENTIMES HAVE SEEN IS EXISTING SOLUTIONS AS WELL AS — TYPICALLY HAVE BURDEN ON RECIPIENTS BUT YOU HAVE TO HAVE A SPECIFIC APP OR TAO LINE DOWNLOAD A FILE OR — THAT IS REALLY WHERE OFFICE MESSAGE ENCRYPTION PLAYS A KEY PART. WE PROMISED THAT RECIPIENTS WILL HAVE SOME WORKFLOW TO ALWAYS CONSUME THESE PRODUCTS. THEY CAN CAN BE CONSUMING IT ON ANY DEVICE, ANY PLATFORM COME IN AT. IT DOESN’T MATTER. THEY WILL HAVE SOME EXPERIENCE NEEDLESS TO SAY WE CONTROL THE OFFICE ECOSYSTEM AND CONTROL OUTLOOK AND WE TRY VERY HARD TO GIVE THE BEST IN-LINE EXPERIENCE. BUT FEAR NOT, EVEN IF YOU ARE NOT ON MICROSOFT, THEY WILL HAVE SOME WAY TO CONSUME THE PRODUCT. THE NEXT FEW MINUTES WE WILL GO THROUGH THESE NEW INVESTMENTS WE HAVE MADE AND ALSO REITERATE THE EXISTING FUNCTIONALITIES. THANK YOU. BASICALLY IN THE NEXT 15 MINUTES I’M GOING TO SHOWCASE THREE COMMON WORKPLACE ANNOUNCES THAT WILL HIGHLIGHT THE POWERFUL CAPABILITIES OF TO BEGIN, I WILL TALK ABOUT HOW EASY IT IS TO DETECT SENSITIVE INFORMATION IN EMAILS AND ENCRYPTED EMAILS. LET’S IMAGINE THAT YOU ARE A EMPLOYEE AND WORKING WITH CHRISTIE WHO IS A PARTNER. YOU WANT HER TO REVIEW SOME MARKETING DOCUMENTS SO YOU TYPE YOUR USUAL MAIL AND THEN IN THE END YOU WANT TO ATTACH THE DOCUMENT. SO HERE I’M GOING TO THE COMPUTER, CONVENIENTLY LABELED, I ADDED IT OUT HERE AND IN ESSENCE I DO THAT, YOU’LL NOTICE THAT THERE’S A STEP THAT SHOWS UP IN THIS EMAIL CONTAIN SENSITIVE INFORMATION AND IT WILL BE ENCRYPTED. IF YOU HAVE A CURIOUS MIND LIKE I DO, YOU WILL CLICK ON THE LEARN MORE AND YOU SEE THAT THERE IS SSN NUMBER. IF YOUR DOCUMENT SO I WILL LET YOU WORRY ABOUT WHY THERE IS SSN IN A MARKETING MATERIAL DOCUMENT BUT THAT’S BESIDES THE POINT. THE POINT IS THAT WHEN ADAM WANTS TO COLLABORATE SECURELY WITH CHRISTIE WHO IS NOT PART OF THE COMPANY, HE HAS TO DO NOTHING DIFFERENT. HE HAS TO STILL GO AHEAD AND CLICK THE SEND BUTTON. SO THAT IS WHAT I DID. NOW YOU MUST BE WONDERING HOW DID ALL OF THIS WORK. TO EXPLAIN THIS, LET ME INTRODUCE YOU TO BOB. THE SMART IT ADMIN AND HE’S THE ADMIN WHO ATTENDS IGNITE AND FIGURES OUT THAT OFFICE 365 MESSAGE ENCRYPTION NOW WORKS WITH DATA LOSS PREVENTION. YES, YOU HEARD IT RIGHT. IF YOU CREATE TODAY A DL B POLICY THEN IT CAN GO AHEAD AND DETECT SENSITIVE INFORMATION IN YOUR ORGANIZATION. THE SENSITIVE INFORMATION COULD BE OF THE NATURE OF PII, IT COULD BE MEDICAL INFORMATION, IT COULD BE FINANCIAL INFORMATION. YOU CAN NOW NOT JUST DICTATE THAT INFORMATION WHEN IT IS PRESENT IN THOSE EMAILS BUT NOW YOU CAN ENCRYPT IT. JUST LIKE THIS GUY BOB HAS DONE OVER HERE. SO THIS HAS HAPPENED OVER HERE. AS OF TODAY, THERE ARE 80 DIFFERENT SENSE OF THE TYPE THAT CAN BE DETECTED WHEN A DLP POLICY IS CREATED. AND WITH THE POWER OF OFFICE 365 MESSAGE ENCRYPTION, ALTHOUGH SENSITIVE EMAILS CAN NOW BE ENCRYPTED. WHAT YOU HAVE TO SAY ABOUT THAT? [APPLAUSE] MOVING ON TO THE SECOND SNARE. IN THE SECOND SCENARIO, I’M GOING TO SHOW YOU HOW EASY IT IS TO GO AHEAD AND CONSUME THE EMAIL. THIS IS CHRISTIE AND SHE IS A GMAIL USER PG COMES TO HER GMAIL INBOX AND NOTICES THAT ADAM HAS SENT HER AN EMAIL. SHE CLICKS ON THIS MAIL AND IT IS VERY OBVIOUS OVER HERE THAT THE MAIL HAS COME FROM THE COMPANY. SEE THE BRANDING OUT HERE. IT ALSO SHOWS YOU THAT THE MAIL IS PROTECTED. ALL CHRISTIE HAS TO DO IS CLICK ON THIS LINK WHICH SHE DOES. THEN SHE IS PROMPTED FOR AUTHENTICATION AND SHE CLICKS ON SIGN IN WITH GOOGLE. AND AT THAT POINT IN TIME, SHE WAS SUPPOSED TO SEE THE EMAIL MESSAGE. I WILL BLAME THE NETWORK FOR THIS NOT OUR PRODUCT. SO KEEP THAT MIGHT BE BUT THIS WAS SUPPOSED TO OPEN THE EMAIL. SO THE POINT I’M TRYING TO MAKE OVER HERE IS THAT IN THIS EXAMPLE, I PICKED CHRISSY WHO WAS A GMAIL USER. FOR THAT MATTER, SHE COULD HAVE BEEN A YAHOO USER, AND OUTLOOK USER — SHE COULD BE USING ANY EMAIL FROM IN ANY EMAIL PROVIDER AND COULD BE ON ANY PLATFORM. USING ANY APP OF HER CHOICE. AND YET SHE WILL HAVE THE ABILITY TO GO AHEAD AND READ THIS ENCRYPTED MESSAGE. ALSO, NOT ONLY DOES SHE HAVE THE ABILITY TO GO AHEAD — I’LL TRY ONE MORE TIME. I THINK I’M PUSHING MY LUCK, BUT I WILL. SO SHE COMES OVER HERE — LET ME TRY IT, IF IT DOESN’T WORK THEN I WILL GIVE UP. OH, HERE. IT WORKED. SO BASICALLY, CHRISTIE CAN GO AHEAD AND IF SHE WANTS, SHE CAN GO AHEAD AND READ THE DOCUMENT THAT WAS ATTACHED IN THE BROWSER. LET ME CLOSE THIS. AND IF SHE DEEMS, SHE CAN GO AHEAD AND REPLY TO THE EMAIL MESSAGE. CHRISTIE DOES NOT NEED ANY EXTRA LICENSE FOR THIS TO WORK. EVERYTHING THAT I HAVE SHOWN YOU RIGHT NOW WORKS OUT OF THE BOX. THERE WAS NO CONFLICT SET UP. IN FACT, FORGET CONFLICTS. NOTHING SPECIAL NEEDED FOR CHRISTIE TO REPLY TO THE EMAIL MESSAGE POINT LET ME SHOW YOU. I WILL REPLY TO THIS EMAIL MESSAGE. THIS LOOKS GREAT. AND HIT SEND. NOW ADAM, WHO IS THE EMPLOYEE AT THE COMPANY, HE USES OUTLOOK 365. AND HE USES THE OUTLOOK 365 OUTLOOK, SORRY. AND HE GETS THE EMAIL MESSAGE. AS SOON AS HE CLICKS ON IT, YOU WILL NOTICE THAT THE MESSAGE FROM KRISTI IS RENDERED IN LINE IN OUTLOOK. THAT IS THE SINGLE MOST POWER OF OFFICE 365 MESSAGE ENCRYPTION. MOVING ON TO THE THIRD SCENARIO. REMEMBER BOB, THE SMART ID ADMIN. IF YOU KNOW BOB THEN YOU KNOW THE COMPANY CAME AND ASKED IS MY SENSITIVE INFORMATION SECURED IN MY OVERS I SENT. BOTH YOU AND I KNOW IF YOU HAVE OFFICE 365 OUTLOOK EMPLOYED THEN THE ANSWER IS A RESOUNDING YES. HOW DO YOU PROVE THAT OME IS DOING ITS JOB. WE ARE VERY EXCITED TO ANNOUNCE THE PREVIEW CAPABILITIES OF OFFICE 365 MESSAGE ENCRYPTION REPORTING CAPABILITIES. SO NOW, ALL BOB HAS TO DO IS COME TO THE SECURITY AND COMPLIANCE CENTER AND CLICK ON THE MESSAGE ENCRYPTION REPORT AND NOW GET DETAILS ON THE VOLUME OF MALES THAT ARE GETTING ENCRYPTED. ARE THESE MESSAGES GETTING ENCRYPTED BECAUSE OF THE USER MANUAL CLICKING ON ENCRYPT MY EMAIL MESSAGE. VERSUS A DL B POLICY JUST LIKE ADAM HIT WHEN HE SENT HIS EMAIL. ALSO ADAM — BOB CAN GO AHEAD AND GET INFORMATION ABOUT THE NUMBER OF EMAILS THAT ARE GETTING SENT OUT TO EXTERNAL ORGANIZATIONS. AND THE VOLUME OF THOSE EMAILS. WHAT DO YOU HAVE TO SAY ABOUT THIS? [APPLAUSE] IF YOU ARE THINKING THAT OME IS JUST SOME PRETTY GRAPHS, IT’S BEYOND THAT. WHEN COMBINED WITH EFFECTIVE DLP POLICIES IN YOUR ORGANIZATION IT CAN HELP YOU IN DETECTING AND INVESTIGATING IF THERE ANY INFORMATION LEAK THAT IS HAPPENING IN YOUR ORGANIZATION. SO IMAGINE LIKE YOU ALL KNOW THAT IN YOUR ORGANIZATION, USERS ARE ACTUALLY GOING AHEAD AND INTENTIONALLY OR ACCIDENTALLY GOING AND SENDING INFORMATION TO BOND IN — UNINTENDED RECIPIENTS. WHAT YOU GUYS DO IN SUCH A CASE? HOW DO YOU FIGURE OUT THAT THE PERSON WHO IS THE CULPRIT AND WHO IS SENDING OUT THIS INFORMATION? ONCE YOU FIGURED OUT THAT THIS IS THE PERSON, WHAT HAPPENS NEXT? OF COURSE YOU WILL FIRE THE EMPLOYEE. BUT BEYOND THAT WHAT IS IT YOU WILL BE DOING? SO LET ME SHOW YOU HOW YOU CAN DO SOMETHING BEYOND INVESTIGATION USING OFFICE 365. LET ME GO TO THIS. I AM BOB AND I DO MY REGULAR CHECK OUT MY ENCRYPTION REPORT AND COME OUT TO THE DL B POLICY AND MATCH REPORT AND NOTICED THAT THERE IS A SPIKE IN THE NUMBER OF MALES THAT ARE GETTING HIT WITH DLP POLICY. SO I CLICK ON THE VIEW DETAILS TO DRILL DOWN INTO IT. I SORTED OUT BY THE DATE. AND NOTICE THAT EMILY IS THE PERSON WHO HAS BEEN SENDING A LOT OF SOCIAL SECURITY NUMBERS TO OUTSIDE. SOMETHING DOESN’T ADD UP. UNTIL NOW YOU DID NOT HAVE OR BOB DID NOT HAVE THE TOOLS IN PLACE TO DO ANYTHING BEYOND RAISING A RED FLAG AND SAYING HEY, EMILY SEEMS TO BE THE CULPRIT. AND DOING SOMETHING WRONG. BUT THAT STOPS NOW. IN A VERY SHORT AMOUNT OF TIME, YOU WILL HAVE THE ABILITY TO GO AHEAD AND DO A SIMPLE COMMAND TO REVOKE THESE EMAILS. NOT ONLY IS THE DATA X — SCENARIO BEING INVESTIGATED FIGURED OUT, YOU CAN REMEDY THE SITUATION ACTUALLY. LET ME SHOW YOU HOW EMILY, WHO HAS BEEN SENDING A DATA TO HERSELF, SHE CALLS IT EMILY PERSONAL EMAIL. BUT IF I CLICK ON THIS MAIL AND BOB HAS REVOKED THE EMAIL, ALL SHE — AND THEN SHE CLIPS — CLICKS ON THE SPIRIT YOU WILL NOTICE THAT THE MESSAGE HAS BEEN REVOKED BY THE SENDER. SO THESE ARE JUST SOME OF THE CAPABILITIES OF OFFICE 365 MESSAGE ENCRYPTION THAT YOU HAVE SEEN TODAY. THERE IS A LOT MORE TO IT AND THE BEAUTY OF IT IS THAT IT IS ENABLED FOR OFFICE 365 E- THREE USERS. SO 400 MILLION USERS. ALL YOU HAVE TO DO IS GET STARTED NOW. AND IF YOU’RE INTERESTED IN KNOWING MORE ABOUT THIS CAPABILITY THEN PLEASE CHECK OUT OUR BREAKOUT SESSION THAT’S HAPPENING ON THURSDAY. AND ALSO WE WILL BE HANGING OUT IN THE HALLWAY WHERE YOU CAN COME AND ASK US ANY QUESTIONS. BY THE WAY, ONE FINAL PIECE OF ADVICE. IF YOU’RE PLANNING ON RAISING ANY CONCERNS , GET HELP.>>LET’S DO A QUICK RECAP OF THE THINGS WHICH YOU SUPPER THE FIRST PART OF THE DEMO WAS AROUND THE AUTOMATIC CAPABILITY WHICH IS BUILT INTO DLP. OFFICE 365 DOB IS AROUND FOR A LONG TIME NOW. THEY HAVE 80+ CLASSIFICATION POLICIES WHICH ARE ALREADY IN THE PRODUCT. WHAT HAS BEEN MISSING SO FAR IS THE ABILITY TO ENCRYPT THE MALES AS AN ACTION. IN THE PREVIOUS SCREEN WHAT YOU SEE IS THE GREEN HIGHLIGHTED PART. WHEN YOU COME CLOSER, IT’S ESSENTIALLY TELLING IN CASE THE ORGANIZATION VIEW SOME CONTENT AS BEING SENSITIVE IT COULD BE PII OR SOCIAL SECURITY NUMBERS OR ANY REGULATED STUFF. YOU COULD TAKE AN ACTION THAT SAY YOU MAKE SURE YOU ENCRYPT THIS MAIL. AS PART OF TAKING THIS ACTION YOU COULD APPLY THE FRONT TEMPLATES. YOU COULD APPLY DIFFERENT POLICIES AND ADVENTURES THAT THE MALES COULD BE CONSUMED BY THE INTENDED AUDIENCE PER THE SECOND DEMO IS ABOUT THE ABILITY TO CONSUME CONTENT. WE ARE RUNNING A LOT OF THINGS IN A PRODUCTION ENVIRONMENT AND THINGS GET FLAKY. BUT NOW WE HAVE THIS ABILITY TO HAVE MULTIPLE BRANDING. ONE THINGS YOU HEARD COMMONLY IN THE LAST YEAR IS FOR THE SAME ORGANIZATION LIKE MICROSOFT IS IN EXAMPLE. THEY SEND SENSITIVE CONTACT AND HAVE ONE KIND OF LOGO WAS PROBABLY MICROSOFT LOGO. IT’S INTERACTING WITH HARDWARE WINDOWS AND THEIR CUSTOMERS WOULD LIKE TO SEE THE XBOX LOGO. THEY ARE ALL PART OF THE MARKS OF GOVERNMENT APPEARED SO SINGLE ORGANIZATION HAVING THE ABILITY TO PUT MULTIPLE LOGOS SOMETHING THAT HAS JUST COME UP REPEATEDLY. THAT’S ROLLING OUT INTO G A PREVIEW AS WELL. YOU SHOULD HAVE THAT IN YOUR ENVIRONMENT SHORTLY. WE CONTINUE TO HAVE THE ABILITY TO CONSUME PROTECTED DOCUMENTS AS WELL AS RAILS. IT CUSTOMERS WANT TO ENCRYPT THE MAIN BODY BUT NOT THE ATTACHMENT. THAT IS ALSO BEEN ROLLED OUT AND IS FULLY AVAILABLE WITH JUST A PARTIAL COMMAND. YOUR EMAIL BODY WILL BE PROTECTED BUT NOT THE DOCUMENT BUT NEEDLESS TO SAY, IT’S A SPECIFIC BUSINESS FOR THOSE ORGANIZATIONS AND THEY DID THIS PRETTY GOOD ACTION. THE LAST PART IS TRACKING AND REVOCATION. TRACKING HAS COME UP MULTIPLE TIMES. WE HAVE ALWAYS DONE A GOOD TIME WHERE WE SENT CON TENT AND THEY RECIPIENTS CAN CONSUME CONTENT BUT WHEN THEY TRACK THE CONTENT. WAS CONSUMING IT AND WHERE ARE THE CONSUMMATE. WE DID NOT HAVE A GOOD STORY. THAT’S GETTING ROLLED OUT IN THE FIELD AS WELL. HAVE RICH GRAPHS AS WELL AS DATA TO PRETTY MUCH AUDIT EVERY SINGLE CONTACT WHICH GOES OUT OF YOUR COMPANY. ALONG WITH THAT IT GAVE US THE ABILITY TO ALSO MONITOR AND REVOKE THE CONTENT. A KEY CAPABILITY DID A LOT OF COMPETING PRODUCTS DO NOT HAVE THAT THEY’LL BE PEERED BUT THAT HELPS US BUILD THE CAPABILITY IN A SEAMLESS FASHION. WHAT HAVE TODAY’S ADMIN FACING NETWORK. AND USER FACING THREE WORKFLOWS. BUT THAT’S ALL COMING. I THINK A LOT OF THINGS THAT WORK SMALL IMPROVEMENTS IN THE PRODUCT AS WELL AS BIG FEATURES. I HIGHLY RECOMMEND THAT YOU ATTEND THE THURSDAY SESSION. I BELIEVE IT IT AS AT 2 PM. A BREAKOUT SECTION FOR SECURE EMAIL. WE ALSO HAVE A BOOTH AT THE OFFICE AS WELL AS ON THE AZURE SITE. A BUNCH OF TEEN FOLKS OVER THERE. FEEL FREE TO STOP BY. WE WOULD LOVE TO HEAR FROM YOU. WE WANT TO UNDERSTAND YOUR BUSINESS BECAUSE AT THE END OF THE DAY WE BRING PRODUCTS FOR YOU. WE DON’T WANT TO STAND HERE AND SAY GO DO THIS THIS AND THIS. WE WANT TO KNOW THE BUSINESS PROMS WE ARE SOLVING. SO WITH THAT MY TIMECLOCK IS OUT. THANKS FOR ATTENDING THIS SESSION. 4 PM IS THE LAST DAY OF THE — THE LAST SESSION OF THE DAY. WE REALLY APPRECIATE EIGHT REALLY APPRECIATE IT.

Leave a Reply

Your email address will not be published. Required fields are marked *