Eastern Cloud Blog

This blog is aimed at our East Region State & Local Government customers. Opinions are our own - be gentle with us.

Getting started with Operations Management Suite Security and Audit Solution


Microsoft Operations Management Suite (OMS) is Microsoft's cloud based IT management solution that helps you manage and protect your on-premises and cloud infrastructure. Explore the OMS Security and Audit dashboard, security domains, and common security queries then get step-by-step guidance on how to leverage OMS to proactively and automatically:


 

Want more information on OMS? See the Operations Management Suite overview.

Lookout and Microsoft: securing enterprise mobility together



Microsoft and Lookout announced a new partnership that will integrate Lookout Mobile Threat Protection with our Enterprise Mobility Suite (EMS).  The partnership will result in product integration that will improve how customers protect and manage the sensitive data that employees access through their mobile devices every day.  Lookout is a leading provider of mobile threat protection with a global sensor network of over 100 million mobile sensors.  Integrating the threat intelligence from Lookout into EMS will give security teams the ability to take action on threats to protect users, devices and data.

Read this Lookout blog post for information about this partnership and what we are building together.


Azure Security Information Site on Azure.com

We are very happy to announce today the release of the Azure Security Information site on Azure.com!

The Azure Security Information site is intended to be your one-stop shop for getting information about Azure security services, technologies, and features. In addition to this, we have information about security architecture, best practices and patterns, security in industry verticals, and an array of other security resources.

Prior to this site, you would have had to poke around in the Azure documentation to piece this information together for yourselves.

Since we're talking about security, here's a reminder of some of the other key sites related to Microsoft cloud security:


Ransomware: Understanding the Risk



If you are in IT, and you've paid even the slightest bit of attention to trending topics, you know the threat from ransomware is on the rise.  I was told that about $25 million was paid out in 2015 by people and organizations to get their data unlocked.  I can't imagine what the cost is in terms of time and effort, but that has to go way beyond $25M.

Microsoft's Director of Security, Tim Rains, has written a fairly technical post on evaluating and understanding the risks associated with ransomware.  The Office 365 Security team published a blog, How to Deal with Ransomware, aimed at Office 365 admins and customers.  Finally, the Microsoft Malware Protection Center has a blog entry providing more high-level information, as well as a ransomware page that has information for both home and enterprise customers and the Microsoft.

So, there are plenty of resources to help you better understand what you need to do in order to be better protected.

#AzureAD a leader in the 2016 Gartner IDaaS MQ



Gartner released their Magic Quadrant for Identity and Access Management as a Service (IDaaS) for 2016 and Azure Active Directory was placed in the “leaders” quadrant, and positioned very strongly for our completeness of vision.

Read more, and get access to the Gartner report here.

Webinar: Top 5 security threats facing your business – and how to respond

June 29, 2016 – 10:00 –11:00AM PST

Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect, and respond to security threats.

Join speakers Julia White, General Manager in the Cloud + Enterprise, and Ann Johnson, Vice President of the Enterprise Cybersecurity Group, for our webinar: Top 5 security threats facing your business—and how to respond. You’ll discover our unique approach to security and how to benefit from the insight into the threat landscape that Microsoft derives from trillions of signals from billions of sources.

During this webinar you'll learn about:

  • Protecting against identity compromise and identify breaches before they cause damage
  • Ensuring device security while enabling mobile work for your users
  • The unique perspective Microsoft brings to cybersecurity


REGISTER HERE

 

Microsoft helps secure accounts by blocking weak passwords



Recent news about the 167 million accounts and passwords for LinkedIn that have been put up for sale on the dark web has scared a lot of people - hopefully, you have reset your password by now.  Of course, this is just the latest in a long history of accounts being leaked and potentially used for nefarious purposes.  What was interesting about this latest breach is that one organization has managed to crack about 117 million of those passwords because users were using weak, easily guessable passwords. 

Microsoft is taking action on this problem of users electing to use weak passwords by dynamically blocking those types of passwords for Microsoft Accounts (aka Live IDs).  Microsoft has been securing these accounts for years and sees millions of attacks on these accounts every day.  Leveraging this experience, machine learning and the compute resources of Azure, we have the ability to solve some of these issues.

Please review this Active Directory Team Blog post to learn about some interesting statistics, some research we've done on the problem and the solutions we are implementing to protect consumers and customers.

Video: What’s new in Intune MAM without device enrollment



Did you know that Intune can be used to manage individual applications on a mobile device, even if that device is managed by a different MDM solution?  Intune can also manage apps on a device that is not managed or enrolled.  We call it Mobile Application Management (MAM), and you can find out how we do it by checking out this new Microsoft Mechanics video that shows the admin and end-user experience.

OMS Office 365 management solution now in public preview



Microsoft has announced the public preview of the Microsoft Operations Management Suite solution for Office 365.  With this solution, you can monitor user activities, monitor admin activities, detect/investigate unwanted user behavior, demonstrate compliance and perform troubleshooting.  Check out this TechNet Blog entry for more detail and the steps you'll need to follow to test it out.

Enhancements to Office 365 eDiscovery



To save you time and make it easier to perform investigations and eDiscovery from one central location, we have released several eDiscovery enhancements to the Office 365 Security & Compliance Center, including case management, search, hold and export. These new eDiscovery enhancements further strengthen the rich set of eDiscovery capabilities already present in Office 365 to help you quickly investigate and meet legal and regulatory obligations from the Security & Compliance Center.

Read this Office Blog entry for more details, including links and screen shots.