Eastern Cloud Blog

This blog is aimed at our East Region State & Local Government customers. Opinions are our own - be gentle with us.

Getting started with Operations Management Suite Security and Audit Solution


Microsoft Operations Management Suite (OMS) is Microsoft's cloud based IT management solution that helps you manage and protect your on-premises and cloud infrastructure. Explore the OMS Security and Audit dashboard, security domains, and common security queries then get step-by-step guidance on how to leverage OMS to proactively and automatically:


 

Want more information on OMS? See the Operations Management Suite overview.

Lookout and Microsoft: securing enterprise mobility together



Microsoft and Lookout announced a new partnership that will integrate Lookout Mobile Threat Protection with our Enterprise Mobility Suite (EMS).  The partnership will result in product integration that will improve how customers protect and manage the sensitive data that employees access through their mobile devices every day.  Lookout is a leading provider of mobile threat protection with a global sensor network of over 100 million mobile sensors.  Integrating the threat intelligence from Lookout into EMS will give security teams the ability to take action on threats to protect users, devices and data.

Read this Lookout blog post for information about this partnership and what we are building together.


Azure Security Information Site on Azure.com

We are very happy to announce today the release of the Azure Security Information site on Azure.com!

The Azure Security Information site is intended to be your one-stop shop for getting information about Azure security services, technologies, and features. In addition to this, we have information about security architecture, best practices and patterns, security in industry verticals, and an array of other security resources.

Prior to this site, you would have had to poke around in the Azure documentation to piece this information together for yourselves.

Since we're talking about security, here's a reminder of some of the other key sites related to Microsoft cloud security:


Ransomware: Understanding the Risk



If you are in IT, and you've paid even the slightest bit of attention to trending topics, you know the threat from ransomware is on the rise.  I was told that about $25 million was paid out in 2015 by people and organizations to get their data unlocked.  I can't imagine what the cost is in terms of time and effort, but that has to go way beyond $25M.

Microsoft's Director of Security, Tim Rains, has written a fairly technical post on evaluating and understanding the risks associated with ransomware.  The Office 365 Security team published a blog, How to Deal with Ransomware, aimed at Office 365 admins and customers.  Finally, the Microsoft Malware Protection Center has a blog entry providing more high-level information, as well as a ransomware page that has information for both home and enterprise customers and the Microsoft.

So, there are plenty of resources to help you better understand what you need to do in order to be better protected.

#AzureAD a leader in the 2016 Gartner IDaaS MQ



Gartner released their Magic Quadrant for Identity and Access Management as a Service (IDaaS) for 2016 and Azure Active Directory was placed in the “leaders” quadrant, and positioned very strongly for our completeness of vision.

Read more, and get access to the Gartner report here.

Webinar: Top 5 security threats facing your business – and how to respond

June 29, 2016 – 10:00 –11:00AM PST

Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect, and respond to security threats.

Join speakers Julia White, General Manager in the Cloud + Enterprise, and Ann Johnson, Vice President of the Enterprise Cybersecurity Group, for our webinar: Top 5 security threats facing your business—and how to respond. You’ll discover our unique approach to security and how to benefit from the insight into the threat landscape that Microsoft derives from trillions of signals from billions of sources.

During this webinar you'll learn about:

  • Protecting against identity compromise and identify breaches before they cause damage
  • Ensuring device security while enabling mobile work for your users
  • The unique perspective Microsoft brings to cybersecurity


REGISTER HERE

 

Microsoft helps secure accounts by blocking weak passwords



Recent news about the 167 million accounts and passwords for LinkedIn that have been put up for sale on the dark web has scared a lot of people - hopefully, you have reset your password by now.  Of course, this is just the latest in a long history of accounts being leaked and potentially used for nefarious purposes.  What was interesting about this latest breach is that one organization has managed to crack about 117 million of those passwords because users were using weak, easily guessable passwords. 

Microsoft is taking action on this problem of users electing to use weak passwords by dynamically blocking those types of passwords for Microsoft Accounts (aka Live IDs).  Microsoft has been securing these accounts for years and sees millions of attacks on these accounts every day.  Leveraging this experience, machine learning and the compute resources of Azure, we have the ability to solve some of these issues.

Please review this Active Directory Team Blog post to learn about some interesting statistics, some research we've done on the problem and the solutions we are implementing to protect consumers and customers.

Microsoft and Citrix Partner to Help Customers Move to the Cloud



At the Citrix Synergy event in Las Vegas today, there were several exciting announcements about how Microsoft and Citrix are partnering together to accelerate Windows 10 and Office 365 adoption. 

  • Citrix will leverage Azure to provide a Windows 10 VDI solution for customers with Windows licensed per user. 
  • Citrix is updating their mobile applications with the Microsoft Intune SDK so they can be managed by Intune and integrated with Office 365 mobile apps.
  • Citrix has announced an updated connector for SCCM, allowing organizations to manage Citrix XenApps applications with a single tool.
  • Microsoft and Citrix have partnered to optimize the Skype for Business application for use in XenApp and XenDesktop environments
  • Citrix and Microsoft are working together to leverage the Citrix NetScaler solution to provide secure, conditional access to on premises applications through the Intune solution
  • Citrix is building capabilities into its mobile apps like support for MFA and self-service password reset


Find out more about how the Microsoft and Citrix partnership continues to grow and provide valuable solutions for our customers.  All the details are in this Brad Anderson blog post.


Video: What’s new in Intune MAM without device enrollment



Did you know that Intune can be used to manage individual applications on a mobile device, even if that device is managed by a different MDM solution?  Intune can also manage apps on a device that is not managed or enrolled.  We call it Mobile Application Management (MAM), and you can find out how we do it by checking out this new Microsoft Mechanics video that shows the admin and end-user experience.

OMS Office 365 management solution now in public preview



Microsoft has announced the public preview of the Microsoft Operations Management Suite solution for Office 365.  With this solution, you can monitor user activities, monitor admin activities, detect/investigate unwanted user behavior, demonstrate compliance and perform troubleshooting.  Check out this TechNet Blog entry for more detail and the steps you'll need to follow to test it out.