• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Public preview of Microsoft Defender ATP web content filtering is now free for enterprise users

Data protection in Microsoft Office 365 incomplete

April 7, 2021
Juniper Networks extends connected security with two new updates

5 channel partner program and MSP News update 21 April . 2021

April 22, 2021
Automate Evidence Collection With Hypersync

CyberSheath Enhances Its CMMC Managed Services with CMMCEnclave, the Most Comprehensive CMMC Compliance Platform

April 22, 2021
Microsoft To Build New Azure Cloud Data Centers In Greece

Device Connectivity and Edge Intelligence in Resource-Constrained Situations

April 22, 2021
8×8 makes raft of updates to platform

Sysinno Introduces First Available Air Quality Monitor Running on Microsoft Azure Sphere

April 22, 2021
Microsoft renames and unifies more products under Microsoft Defender brand

UK government signs new three-year Memorandum of Understanding with Microsoft

April 22, 2021
Azure Stack, AWS Outposts Poised to Impact Colocation

Aruba accelerates digital transformation from edge to cloud on Microsoft Azure.

April 22, 2021
How to set up Microsoft Cloud App Security

Eurotech Collaborates with Infineon Technologies, Microsoft, and Globalsign for ’Chain of Trust’ Security Solution for the IoT Device Identities

April 22, 2021
GHD accelerates digital transformation to ensure business continuity

ONUG to Address Enterprise Cloud, Cloud Native DevOps, Security & Automation at Biannual Spring 2021 Event

April 22, 2021
Microsoft To Build New Azure Cloud Data Centers In Greece

Infosec Teams Expand Use of Security Tools to Address Cloud Complexity, Survey Finds

April 22, 2021
Microsoft continues to extend security for all with mobile protection for Android

HVR Launches Agent as a Service for Microsoft Azure, Establishes Highly Available, Secure and Performant Real-Time Replication Environment for Enterprise Modernization

April 22, 2021
Hackers Cryptojack Microsoft Azure ML Clusters

6clicks partners with Microsoft to bring greater security to Aus Government

April 22, 2021
Seattle Seahawks Shift From Microsoft Azure to Amazon Web Services

Security should start in software engineering

April 21, 2021
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Thursday, April 22, 2021
  • Login
Azure Security News
  • Home
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    Juniper Networks extends connected security with two new updates

    5 channel partner program and MSP News update 21 April . 2021

    Automate Evidence Collection With Hypersync

    CyberSheath Enhances Its CMMC Managed Services with CMMCEnclave, the Most Comprehensive CMMC Compliance Platform

    Microsoft To Build New Azure Cloud Data Centers In Greece

    Device Connectivity and Edge Intelligence in Resource-Constrained Situations

    8×8 makes raft of updates to platform

    Sysinno Introduces First Available Air Quality Monitor Running on Microsoft Azure Sphere

    Microsoft renames and unifies more products under Microsoft Defender brand

    UK government signs new three-year Memorandum of Understanding with Microsoft

    Azure Stack, AWS Outposts Poised to Impact Colocation

    Aruba accelerates digital transformation from edge to cloud on Microsoft Azure.

    How to set up Microsoft Cloud App Security

    Eurotech Collaborates with Infineon Technologies, Microsoft, and Globalsign for ’Chain of Trust’ Security Solution for the IoT Device Identities

    GHD accelerates digital transformation to ensure business continuity

    ONUG to Address Enterprise Cloud, Cloud Native DevOps, Security & Automation at Biannual Spring 2021 Event

    Microsoft To Build New Azure Cloud Data Centers In Greece

    Infosec Teams Expand Use of Security Tools to Address Cloud Complexity, Survey Finds

    Microsoft continues to extend security for all with mobile protection for Android

    HVR Launches Agent as a Service for Microsoft Azure, Establishes Highly Available, Secure and Performant Real-Time Replication Environment for Enterprise Modernization

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech
    • All
    • Apps
    • Gear
    • Mobile
    • Startup
    Cisco, Google, Microsoft Lead Chorus of New Security Initiatives

    Windows 10 21H1: A small but significant update, with bigger changes to come in 21H2

    Microsoft Touts Secured-Core PCs To Block Driver Exploits

    KDDI Taps Cato SASE for Secure Remote Access

    Juniper Networks inspires overarching approach to connected security

    Going serverless? Rethink your data security approach

    Juniper Networks inspires overarching approach to connected security

    Introducing the Azure Network Security Tech Community and Github Repo

    Cisco, Google, Microsoft Lead Chorus of New Security Initiatives

    Azure WAF Custom Rule Samples and Use Cases

    Aruba ClearPass Policy Manager Integrates with Microsoft

    How Microsoft Is Powering Digital Transformation From the Cloud

    Part 4 – Data Disclosure and Exfiltration Playbook: Azure WAF Security Protection and Detection Lab

    The Mountain Of A Manager

    Microsoft offers startups free cloud tech

    Microsoft Launches Host of Security Products in Time for RSA

    The 14 Best Cloud Security Courses on Pluralsight

    Microsoft Adds Anti-Phishing ‘Campaign Views’ to Office 365 ATP

    How 4 cities are modernizing their IT infrastructure through the cloud

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
    • All
    • Gaming
    • Movie
    • Music
    • Sports
    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Twitter tweaks video again, adding view counts for some users

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    People are handing out badges at Tube stations to tackle loneliness

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    This Filipino guy channels his inner Miss Universe by strutting in six-inch heels and speedos

    Oil spill off India’s southern coast leaves fisherman stranded, marine life impacted

  • Lifestyle
    • All
    • Fashion
    • Food
    • Health
    • Travel
    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Offers More ‘Solorigate’ Advice Using Microsoft 365 Defender Tools

    A moment of reckoning: the need for a strong and global cybersecurity response

    Solar Winds, Office 365 & Shipbuilding…

    Aruba ClearPass Policy Manager Integrates with Microsoft

    Imprivata Expands Collaboration with Microsoft on New Digital Identity Innovations

    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Canada’s 10 biggest stories of 2020

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    AMD breaks revenue records for 2019 and 4Q

    AMD breaks revenue records for 2019 and 4Q

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft is killing off insecure Cloud App Security cipher suites

    Microsoft is killing off insecure Cloud App Security cipher suites

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Azure Security News
No Result
View All Result
Home News Business

Data protection in Microsoft Office 365 incomplete

by AZURE SECURITY NEWS EDITOR
April 7, 2021
in Business
0
Public preview of Microsoft Defender ATP web content filtering is now free for enterprise users
492
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

By Elmar Eperiesi-Beck  (expert) and Azure Security News

Microsoft Office 365 is the prime example of the cloud-based SaaS model. It has become one of the most popular cloud services over the past few years. Between 2015 and 2017, the number of subscribers increased by 320 percent. And Office 365 will continue to expand its reputation as the preferred cloud application for companies in the coming years: by 2021, more and more companies will switch to the cloud and cloud data is expected to take over up to 95 percent of all data traffic in data centers.

But what does Microsoft Office 365 offer companies? In addition to being able to access Office applications across a variety of platforms such as Android , macOS, and Windows , users are given storage space on the file hosting serviceOneDrive, Access to the e-mail, task management and calendar applications Outlook, the applications Excel , Word and PowerPoint as well as the collaboration tools Office Online, Skype for Business, SharePoint Online and Microsoft Teams.

However, not all Office 365 subscriptions are created equal. Depending on the plan you choose, there is a different selection of apps and tools. The Office 365 Enterprise E3 plan, for example, contains everything Office 365 has to offer – including all available additions to compliance and security tools. In contrast, the E1 plan offers almost no advanced security tools and the Office applications are only available as browser versions.

Businesses should become familiar with the different subscription models and see which plan is right for their purposes. It is imperative that they also deal with the topic of cloud data protection. After all, data breaches have reached an unprecedented high: LoudDataRisk Based Security’s Breach Quick View Report 2017 , there were around 7.8 billion exposed records in 2017. That was 6.3 billion more than in 2016 and corresponds to an increase of 420 percent.

The consequences of such data thefts are devastating: In addition to the problems for people who deal with the consequences of the theft of their private Datahave to contend with – including the complications and frustrations of dealing with identity theft – a data breach means major financial and, above all, reputational damage to the company. According to a report, the Ponemon Institute estimates that a data breach costs a company an average of $ 3.5 million. The need for data protection for cloud applications is obviously great.

Office 365 security features

In addition to tools for rights or identity management such as Azure Active Directory P1 and P2, there are also basics such as archiving,

DataLoss Prevention, Exchange Online Protection and eDiscovery / Advanced eDiscovery. In addition, Office 365 offers a few other useful security features:

Office 365 Threat Intelligence: As the name suggests, Threat Intelligence is an integrated tool for E5 that identifies potential attack targets and suspicious behavior from Office 365 users over an extended period of time. It suggests simplified workflows for dealing with potential injuries and threats and is useful for companies that work with private and sensitive data.

Advanced Threat Protection: This feature provides a message sandbox or filtering that checks email attachments for security. Advanced Threat Protection also checks and reports malicious links and URLs in real time and detects and protects against tracing and phishing in Exchange Online. Real-time URL checking either blocks access to malicious links or warns the user.

Cloud App Security: This integrated E5 tool provides a dashboard that alerts administrators to suspicious user behavior. Cloud App Security can also detect anomalies in Office 365 and when using third-party SaaS solutions and provide a detailed description of suspicious events as well as the detection and protection of sensitive data.

Customer Lockbox: This tool controls how a Microsoft support representative accesses a user’s data during a help session. Users can either approve or deny access to their sensitive data. If the users refuse access, however, this has a decisive disadvantage: In this case, Microsoft cannot access the mailboxes and thus cannot solve the problem. If the users approve the access, then support staff can see personal data.

Customer Key for Office 365: Customer Key allows administrators to introduce their own cryptographic key for server-side encryption (in Microsoft’s data centers) of services such as Exchange Online, OneDrive, SharePoint Online and Skype for Business. This includes the configuration of the required Azure resources and the management of a mandatory Microsoft recovery key. However, Microsoft administrators have access to the cryptographic key and thus also potentially access to the personal data that was encrypted with it.

Azure Information Protection P1 and P2: This cloud-based rights management service enables the encryption of documents and files, the tracking of documents and files and the classification of sensitive data. Users have to manually add this protection setting even though custom templates are included.

Azure Information Protection P2 can automatically add classifications to files and documents without user input. The disadvantage: Here too, administrators determine how the documents should be protected. You could therefore gain access to the data and the cryptographic keys at any time.

Advanced Threat Analytics: Advanced Threat Analytics (ATA) is an on-premises platform that uses machine learning to collect and track access requests, documents, locations, devices and users in order to create behavioral profiles based on user behavior. ATA also detects suspicious activity, malicious attacks, and known risks.

Intune: This cloud-based mobile device management service gives companies more control over mobile devices and applications forEmployeeto protect business applications and data on any device. It gives administrators control over how employees access and share company information and ensures that devices and applications are compatible.

Microsoft Cloud App Security (MCAS): This function enables company-wide control and monitoring of all apps on an employee device. For example, it shows what kind of unauthorized third-party service is oneEmployeeuses. In addition, it offers improved protection against threats and data loss through cross- SaaS . Additionally, in most cases , Office 365 includes auditing and logging, which reports certain searchable user and administrative actions (and the times of such actions) such as login requests, deletions, and more to investigate suspicious activity.

Authentication encompasses the way in which a user securely logs into a service. This can include entering the same password on-site as in the cloud, or some type of multi-factor authentication where a service user refers to a code on a mobile device or website to verify the identity of that user.

Another useful, integrated Office 365 function is Secure Score, which evaluates a company’s Office 365 deployment for possible risks and weaknesses and contains suggestions for improved cloud security controls. It scans the services used, such as Exchange, OneDrive or SharePoint, compares their numerical scores with the baseline of Microsoft and other Office 365 subscribers, and informs the company about best practices and security practices.

Encryption: Office 365 enables the encryption of email messages and Office documents stored on a computer, mobile device or in the cloud: files are encrypted using encryption algorithms such as Transport Layer Security / Secure Sockets Layer (TLS / SSL) and Advanced Encryption Standard (AES).

Encryption turns data into indecipherable text that can only be read by authorized users who have the cryptographic key. Transport encryption only protects the data on the way between the user and the cloud. There the data is then completely decrypted again. External encryption ensures that data is not only encrypted “in transit”, but also “at use” and “at rest” at all times. Buy article as PDF

Source : https://www.computerwoche.de/a/datenschutz-in-microsoft-office-365-ist-lueckenhaft,3546637

Share197Tweet123Share49
AZURE SECURITY NEWS EDITOR

AZURE SECURITY NEWS EDITOR

Related Posts

Azure Stack, AWS Outposts Poised to Impact Colocation

Aruba accelerates digital transformation from edge to cloud on Microsoft Azure.

by AZURE SECURITY NEWS EDITOR
April 22, 2021
0

By Seth Grace  and Azure Security News This brand new solution simplifies connecting to IoT devices. And bring the capabilities...

Microsoft continues to extend security for all with mobile protection for Android

HVR Launches Agent as a Service for Microsoft Azure, Establishes Highly Available, Secure and Performant Real-Time Replication Environment for Enterprise Modernization

by AZURE SECURITY NEWS EDITOR
April 22, 2021
0

SAN FRANCISCO, April 21, 2021 (GLOBE NEWSWIRE) -- HVR, the leading independent provider of real-time cloud data replication technology, today announced HVR...

Protiviti Delivers Innovative Cybersecurity Offerings on Microsoft Security Solutions

Datawiza Automates Application Integration for Microsoft Azure Active Directory

by AZURE SECURITY NEWS EDITOR
April 21, 2021
0

- Datawiza, one of the first companies to offer cloud-delivered Access Management as a Service (AMaaS), today announced Datawiza One-Click for...

Juniper Networks extends connected security with two new updates

UnitedLex Vantage Now Available in the Microsoft Azure Marketplace

by AZURE SECURITY NEWS EDITOR
April 20, 2021
0

NEW YORK--(BUSINESS WIRE)--UnitedLex, a leading technology and legal services company, today announced the availability of its Vantage solution in the...

  • Trending
  • Comments
  • Latest
Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

AZURE DEFAULT RESOURCE GROUP AND DEFAULT WORKSPACE: WHAT ARE THEY?

December 14, 2020
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Analyzing Azure Active Directory Sign-In Data with PowerShell

December 18, 2020
Microsoft Seriously Beefs Up Security in Windows Server 2019

TCS Launches Cloud Exponence on Microsoft Azure

January 21, 2021

Lady Gaga Pulled Off One of the Best Halftime Shows Ever

0

Barack Obama’s Now Mainly Focusing on Wearing This Casual Backwards Hat

0

Watch Justin Timberlake’s ‘Cry Me a River’ Come to Life in Mesmerizing Dance

0
Juniper Networks extends connected security with two new updates

5 channel partner program and MSP News update 21 April . 2021

April 22, 2021
Automate Evidence Collection With Hypersync

CyberSheath Enhances Its CMMC Managed Services with CMMCEnclave, the Most Comprehensive CMMC Compliance Platform

April 22, 2021
Microsoft To Build New Azure Cloud Data Centers In Greece

Device Connectivity and Edge Intelligence in Resource-Constrained Situations

April 22, 2021
Azure Security News

Copyright © 2020 - Azure Security

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2020 - Azure Security

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In