Eastern Cloud Blog

This blog is aimed at our East Region State & Local Government customers. Opinions are our own - be gentle with us.

Microsoft Services CyberSecurity Workshop

Security and Identity Strategies

In our fast-changing world where your enterprise’s services and data have to be accessible from nearly everywhere on any device while facing increasing security threats, the IT paradigm has changed. Comprehensive identity and security strategies across users, devices, and data are foundational to adapting and transforming your business through this change.
 
Microsoft Services can help guide you through this critical transformation—from helping you understand your current security posture to developing security and identity strategies that support your business goals, and then implementing comprehensive solutions across security, identity and cybersecurity

Register here for an event near you!


Microsoft Mechanics: Leading the way in the fight against dangerous email threats

Check out this Microsoft Mechanics blog entry and video which reviews upcoming enhancements to our Exchange Online Protection (EOP) service.  We process 200 billion emails each month and block 10 million spam messages every minute. 


We're adding the following features:

  • Built-in protection against malicious attack vectors, with spoof and common attachment-type detection.
  • Visible protection to end-users via Safety Tips to prevent users from interacting with detected malicious emails.
  • Rich learning mechanisms for users, such as Phish Reporting and Advanced Threat Protection.


Watch the video to learn more about how we are helping protect our customers from this threat vector.


Skype call scheduling and more updates for Outlook for iOS and Android and much more

Skype and Outlook—the best way to schedule and join a call

It can be challenging keeping up with friends, family and colleagues. Finding a time that works for everyone and remembering to show up is difficult enough. And then sometimes technology gets in the way: “How do I find you? How do I invite you? Do you have this app installed?”

Outlook and Skype have solved this problem. When creating a new event on your calendar, Outlook now includes the ability to add a Skype Call. When you tap the Skype Call toggle, Outlook includes a Skype link in the description of the event. When your scheduled meeting time arrives, recipients simply click the link in their calendar to launch Skype and join the conversation.

Skype and Outlook top features 1

as well ass

  • Contact Push
  • Save files to your Android device
  • Set Automatic Replies
  • iOS calendar widget
  • iOS print
  • iOS–3-D Touch

Read more here...


Announcing enhanced migration and disaster recovery for VMware using ASR

he enhanced VMware to Azure release builds on top of ASR’s workload-aware disaster recovery and protection solutions for heterogeneous and hybrid IT environments:
  • With no running IaaS components/appliance, you pay for Azure compute resources only when a failover or migration to Azure is initiated. Application data is replicated to customer’s Azure Storage account to ensure security and isolation, and virtual machines are provisioned in Azure only after a failover or migration is initiated.
  • With MSI-based unified setup of on-premises components, you can configure replication to Azure in a few simple steps without incurring the cost and complexity that traditional replication solutions entail. Our scale-out mode ensures that you can protect multiple high-churn workloads without losing the assurance of ASR’s on-going replication and protection.
  • With non-disruptive recovery testing, you can easily test the failover of your VMware virtual machines to Azure within minutes, and validate your workload’s performance in Azure, without impacting on-going replication or the production workload.
  • With ASR-integrated failback, start replicating your Azure virtual machines back to your on-premises ESXi environment, and failback to the original or an alternate location when your on-premises site is once again available for use.

The table below lists the significant feature enhancements being released as part of the enhanced VMware to Azure release:

enhanced VMware to Azure

Read more here...

New end-user experience: Mobile Application Management for iOS

We are excited to announce an updated user experience for Mobile Application Management (MAM) on iOS devices that users will soon start to see rolling out across their apps. Currently, each time a user launches an iOS app that is managed by an Intune MAM policy, they see a screen notifying them that the app is “Managed by your company.” We have heard feedback that this screen was confusing for end users, and that displaying this screen at every app launch was slowing down users as they were trying to get into their apps. Based on this feedback, we are replacing this existing message with the following alert.




Read more here.

 

Webinar: Start asking the right questions about cloud security


January 12, 2016 - 10:00-11:00AM PST (GMT -8)

Scalability, agility, and cost savings are certainly part of any cloud strategy, but how certain are you of the security benefits? You’re not alone if you still have concerns. Cyber attacks, privacy violations, and government surveillance are all part of the growing volume and sophistication of modern security threats and concerns. This is why it’s important to question the integrity of your current cloud solution to ensure you have the best security strategy in place.

 Join Tim Rains, Chief Security Advisor for Microsoft’s Worldwide Cybersecurity & Data Protection group, for a discussion and live Q&A about the questions you should be asking your current cloud service provider to guarantee you have a sound strategy in place. Learn how to critically assess your current cloud infrastructure and learn more about Microsoft’s efforts to deliver a cloud you can trust that addresses your needs across:

  • Security
  • Privacy and control
  • Compliance
  • Transparency


Register here

 

Microsoft Mechanics: How to enable consumer logins and access management for your B2C apps



If you struggle with identity management and the user sign-in experience for your consumer applications and websites Azure AD B2C is a new service to help you to reliably and securely maintain user accounts for your B2C apps. Watch the show as lead engineer Alex Simons walks through the tech behind the scenes that makes it all possible and how you can quickly: Connect your existing Web and mobile apps; allow your users to sign-in with social network accounts; configure the service and scale your app to reach millions of consumers globally.

Watch this 10-minute video to learn more about leveraging this highly-available, global, cloud-based identity store to provide a great experience for your customers and constituents.

Introducing a simplified configuration experience for SQL Server in Azure Virtual Machines

Configuring SQL Server Virtual Machines with the new experience

To try out the new configuration experience for SQL Server Virtual Machines, go to the Azure Portal. In the Azure Marketplace, you will find any version of SQL Server you want. Select the new Resource Manager deployment model and click Create. In the Create Virtual Machine blade you will find the new SQL Server Configuration section will all the SQL Server specific features.

Introducing a simplified configuration experience for SQL Server in Azure Virtual Machines

Configuration of SQL Server connectivity

Introducing a simplified configuration experience for SQL Server in Azure Virtual MachinesIn the past, configuring SQL Server connectivity was not trivial. For example, to connect from on-premises using SQL Server Management Studio (SSMS) you had to Remote Desktop to the VM, open the SQL Server port in the VM firewall, open SSMS and enable SQL Server Authentication, and create a Public Azure endpoint for the VM.

Now, you can simply choose SQL connectivity over the Internet and enable SQL Server authentication from the Portal. In addition, you can choose SQL connectivity within an Azure Virtual Network, or still allow it only within the VM.


Read more here...

Managing your security and compliance needs with the new Office 365 Protection Center (Preview)

With the recent launch of new security features in Office 365, such as Advanced Threat Protection (ATP), Data Loss Prevention (DLP) and Mobile Device Management (MDM), we are expanding the mission of the Office 365 Compliance Center and, in turn, are renaming it the Office 365 Protection Center. We’ve also redesigned the Office 365 Protection Center with a new user experience that is more intuitive, informative, scalable and insightful.



The new Protection Center includes all the same great features you’re accustomed to in the Compliance Center but surfaces them for a much more intuitive user experience. You’ll also start seeing the Office 365 security features, such as ATP, DLP and MDM, in the Protection Center during the first half of 2016

Read more here...

Announcing Office 365 customer security considerations preview

The CSC workbook contains two security-based pivots on the same set of features and information. One pivot is the Office 365 Customer Control Considerations section. Information in this section is organized into five scenarios listing the features that can be used to manage information security risks:

  • Data Resiliency—Considerations for protecting and recovering information from potential data corruption.
  • Access Control—Things to consider around managing identity and access control using Office 365 and Azure features.
  • Data Leakage—Considerations around using encryption and controlling forwarding.
  • Security and Compliance Investigations—Considerations for conducting compliance searches and forensics investigations, as well as logging and hold actions in Office 365.
  • Incident Response and Recovery—Things to consider around security incident response and recovery.

Office 365 customer security considerations 1

In addition to these five scenarios, an all-up list of considerations is provided.

The second pivot is the Office 365 Risk Assessment Scenarios section. Information in this section is organized by risks/threats and how you will implement various controls to manage these risks:

  • Malicious Customer Administrator
  • Former Employee
  • Credential Theft
  • Malware
  • Trusted Device Compromised
  • Attacker Foothold
  • Microsoft Operator

Read more here...