{"id":13479,"date":"2018-10-01T09:00:36","date_gmt":"2018-10-01T17:00:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/01\/news-7246\/"},"modified":"2018-10-01T09:00:36","modified_gmt":"2018-10-01T17:00:36","slug":"news-7246","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/01\/news-7246\/","title":{"rendered":"Collaborate securely"},"content":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Mon, 01 Oct 2018 16:00:26 +0000<\/strong><\/p>\n<p><em>This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out <a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/09\/04\/protecting-user-identities\/\" rel=\"noopener\">Protecting user identities<\/a>, the fourth blog in our eight-blog series on deploying Intelligent Security Scenarios.<\/em><\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85723\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely.jpg\" alt=\"Image taken at the Microsoft Ignite Conference.\" width=\"480\" height=\"498\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely.jpg 480w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-289x300.jpg 289w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-241x250.jpg 241w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-330x342.jpg 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-400x415.jpg 400w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-32x32.jpg 32w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>&#10;<\/p>\n<p>Your users can create, edit, and share a single document securely, even when working with multiple stakeholders, both inside and outside of your company. With Microsoft security solutions, users can identify, classify, track, and protect documents to prevent leaks and block access by unauthorized readers. These security measures travel with the document, making it easy and much less risky for stakeholders to download files.<\/p>\n<p>&#10;<\/p>\n<h3>How can I make it easier for groups of people to securely work on the same document?<\/h3>\n<p>&#10;<\/p>\n<p>Provide a common, secure identity for your employees, by first importing their user identities into <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" rel=\"noopener\">Azure Active Directory<\/a> (Azure AD). Then integrate your on-premises directories with Azure AD using <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/connect\/active-directory-aadconnect\" rel=\"noopener\">Azure AD Connect<\/a>, which allows you to create a common, secure identity for your users for Microsoft Office 365, Azure, and thousands of other software as a service (SaaS) applications that are integrated with Azure AD.<\/p>\n<p>&#10;<\/p>\n<p>To make it easy for your employees to work securely with users from other organizations, enable <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/b2b\/what-is-b2b\" rel=\"noopener\">Azure AD B2B collaboration<\/a> capabilities. Now you can provide access to documents, resources, and applications to your partners while maintaining complete control over your own corporate data (see Figure 1). For your customers, <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory-b2c\/\" rel=\"noopener\">Azure AD B2C<\/a> lets you build identities on Windows, Android, and iOS devices, or for the web, and allow your customers&#8217; users to sign in with their existing social accounts or personal emails.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85726\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic.png\" alt=\"Infographic detailing Azure Active Directory security.\" width=\"820\" height=\"377\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic.png 820w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic-300x138.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic-768x353.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic-330x152.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic-800x368.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Collaborate-securely-infographic-400x184.png 400w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 1. Azure AD B2B collaboration enables organizations using Azure AD to work securely with users from other organizations while maintaining control over their own corporate data.<\/em><\/p>\n<p>&#10;<\/p>\n<h3>How can I protect organizational data when my users view, edit, and share documents?<\/h3>\n<p>&#10;<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/information-protection\/\" rel=\"noopener\">Azure Information Protection<\/a> enables you to configure policies and label a document to control who can see, edit, or share it. For example, a user could apply a Confidential label to a sensitive document that would then prevent it from being shared externally. You can also track who opened a document and where, and then determine what that person can do with the document after its opened.<\/p>\n<p>&#10;<\/p>\n<p>With <a target=\"_blank\" href=\"https:\/\/support.office.com\/en-us\/article\/Overview-of-data-loss-prevention-policies-1966b2a7-d1e2-4d92-ab61-42efbb137f5e\" rel=\"noopener\">Microsoft Data Loss Prevention (DLP) in Microsoft Exchange<\/a>, you can take your information protection one step further and create rules that automatically identify sensitive content and apply the appropriate policy. For example, you can identify any document containing a credit card number thats stored in any OneDrive for Business site, or you can monitor just the OneDrive sites of specific people.<\/p>\n<p>&#10;<\/p>\n<p>In addition to DLP, OneDrive for Business offers its own set of options for protecting and controlling the flow of organizational information. For example, you can <a target=\"_blank\" href=\"https:\/\/support.office.com\/en-us\/article\/block-syncing-of-specific-file-types-7d7168dd-9015-4245-a971-61b504f834d6\" rel=\"noopener\">block file syncing<\/a> on unmanaged devices, audit actions on OneDrive for Business files, and <a target=\"_blank\" href=\"https:\/\/blogs.office.com\/en-us\/2015\/03\/31\/built-in-mobile-device-management-now-available-for-office-365-commercial-plans\/\" rel=\"noopener\">use mobile device management policies<\/a> to manage any device that connects to your organizations OneDrive for Business account. You can control as much or as little of your employee permissions as you need to.<\/p>\n<p>&#10;<\/p>\n<h3>How can I protect email?<\/h3>\n<p>&#10;<\/p>\n<p>The same Microsoft DLP capabilities above can be applied to email on Exchange Online to better control data in email and prevent accidental data leaks. Use Office 365 Message Encryption for email sent via Outlook.com, Yahoo!, Gmail, and other email services. Email message encryption helps you make sure that only intended recipients can view message content. Office 365 administrators can <a target=\"_blank\" href=\"https:\/\/support.office.com\/en-us\/article\/define-rules-for-office-365-message-encryption-9b7daf19-d5f2-415b-bc43-a0f5f4a585e8\" rel=\"noopener\">define message flow rules<\/a> to determine the conditions for encryption. For example, a rule can require the encryption of all messages addressed to a specific recipient.<\/p>\n<p>&#10;<\/p>\n<h3>Deployment tips from our experts<\/h3>\n<p>&#10;<\/p>\n<p><strong>Start by provisioning employee identities in Azure AD.<\/strong> Identity is the foundation for secure collaboration. Your first step is to import employee identities into <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\">Azure AD<\/a> and then integrate your on-premises directories with Azure Active Directory using <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/connect\/active-directory-aadconnect\" rel=\"noopener\">Azure AD Connect<\/a>.<\/p>\n<p>&#10;<\/p>\n<p><strong>Collaborate securely with other organizations.<\/strong> With <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/b2b\/what-is-b2b\" rel=\"noopener\">Azure AD B2B <\/a>and <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory-b2c\/\" rel=\"noopener\">Azure AD B2C<\/a> capabilities, you can work securely with customers and partners.<\/p>\n<p>&#10;<\/p>\n<p><strong>Protect documents and emails.<\/strong> Help protect information through access control, classification, and labeling that extend to shared documents and external stakeholders with <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/information-protection\/\" rel=\"noopener\">Azure Information Protection<\/a>. Then <a target=\"_blank\" href=\"https:\/\/support.office.com\/en-us\/article\/define-rules-for-office-365-message-encryption-9b7daf19-d5f2-415b-bc43-a0f5f4a585e8\" rel=\"noopener\">define message flow rules<\/a> in <a href=\"https:\/\/products.office.com\/en-us\/exchange\/office-365-message-encryption\">Office 365 Message Encryption<\/a> to determine the conditions for email encryption.<\/p>\n<p>&#10;<\/p>\n<p><strong>Plan for success with Microsoft FastTrack.<\/strong> FastTrack comes with your subscription at no additional charge. Whether youre planning your initial rollout, needing to onboard your product, or driving user adoption, FastTrack is your benefit service that is ready to assist you. <a target=\"_blank\" href=\"https:\/\/fasttrack.microsoft.com\/microsoft365\/journey\" rel=\"noopener\">Get started at FastTrack for Microsoft 365<\/a>.<\/p>\n<p>&#10;<\/p>\n<h3>Want to learn more?<\/h3>\n<p>&#10;<\/p>\n<p>For more information and guidance on this topic, check out the white paper <a target=\"_blank\" href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE2x3jP\" rel=\"noopener\">Collaborate and share documents securely in real-time<\/a>. You can find additional <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/Resources\" rel=\"noopener\">security resources on Microsoft.com<\/a>.<\/p>\n<p>&#10;<\/p>\n<p><strong>Coming soon!<\/strong> Productive and Secure, the sixth installment of our Deploying Intelligent Scenarios series. In November, we will kick off a new series, Top 10 Security Deployment Actions with Microsoft 365 Security.<\/p>\n<p>&#10;<\/p>\n<h3>More blog posts from this series<\/h3>\n<p>&#10;<\/p>\n<ul>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/06\/tips-for-getting-started-on-your-security-deployment\/\" rel=\"noopener\">Tips for getting started on your security deployment<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/20\/accelerate-your-security-deployment-with-fasttrack-for-microsoft-365\/\" rel=\"noopener\">Accelerate your security deployment with FastTrack for Microsoft 365<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/01\/first-things-first-envisioning-your-security-deployment\/\" rel=\"noopener\">First things first: Envisioning your security deployment<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/17\/now-that-you-have-a-plan-its-time-to-start-deploying\/\" rel=\"noopener\">Now that you have a plan, its time to start deploying<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/06\/18\/new-fasttrack-benefit-deployment-support-for-co-management-on-windows-10-devices\/\" rel=\"noopener\">New FastTrack benefit: Deployment support for co-management on Windows 10 devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/07\/02\/assessing-microsoft-365-security-solutions-using-the-nist-cybersecurity-framework\/\" rel=\"noopener\">Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/07\/18\/enable-your-users-to-work-securely-from-anywhere-anytime-across-all-of-their-devices\/\" rel=\"noopener\">Enable your users to work securely from anywhere, anytime, across all of their devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/02\/protect-your-data-in-files-apps-and-devices\/\" rel=\"noopener\">Protect your data in files, apps, and devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/13\/cybersecurity-threats-how-to-discover-remediate-and-mitigate\/\" rel=\"noopener\">Cybersecurity threats: How to discover, remediate, and mitigate<\/a><\/li>\n<p>&#10;<\/p>\n<li><a target=\"_blank\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/09\/04\/protecting-user-identities\/\" rel=\"noopener\">Protecting user identities<\/a><\/li>\n<p>&#10;<\/ul>\n<p>&#10;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/01\/collaborate-securely\/\">Collaborate securely<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\">Microsoft Secure<\/a>.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/01\/collaborate-securely\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Mon, 01 Oct 2018 16:00:26 +0000<\/strong><\/p>\n<p>This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely, inside and outside of your organization.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/01\/collaborate-securely\/\">Collaborate securely<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\">Microsoft Secure<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-13479","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13479"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13479\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13479"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}