Showing posts with label control. Show all posts
Showing posts with label control. Show all posts

Saturday, November 2, 2013

The Garage Series: Explaining data security and your control in Office 365

AppId is over the quota
AppId is over the quota

In this week’s show, hosts Jeremy Chapman and Vijay Kumar tackle one of the most common questions asked about cloud services, “How safe is my data?” Security is an important element of trusting the service of any service provider. But even beyond security, they cover related concerns around data privacy, availability and show some of the controls your IT administrators have to configure access policies, lock down clients and build your own control set for data stored in or transferring though Office 365 services.

Jeremy: In last week’s show we rounded up all of Office apps and services to show cross-platform mobile devices coverage – from the core Office Mobile apps on iPhone and Android to new experiences like OWA for iPad. We also put Office VP, John Case, and skateboarding legend, Bucky Lasek, along with Office Mobile to the test as they navigated a rally course using roaming pace notes an Android phone, iPhone and Windows Phone all accessed from a single Office 365-stored document. 

This week, I’m joined by Office 365 security and compliance lead, Vijay Kumar, to address the topics of security, privacy, configurability, availability and overall trust of Office 365 services. We also hear from Office 365 General Manager of Engineering, Kevin Allison, and hear back from Mark Russinovich, then we return to Madrid to hear from European-based security experts and get their perspective about Cloud versus on-premises security and data access. 

Vijay: In fact today’s show we hope to give you the 101 on how we protect and manage access to your data with Office 365, as well as the behind the scenes view on Microsoft’s approach. We explore the topic in two halves. First, the measures that Microsoft has put in place to manage and monitor the Office 365 online service and second we look at what you can do to configure Office 365 for your specific organizational needs.

Jeremy:  So let’s explore the first side of the coin, if you are considering a shift to Office 365 Cloud services, the first thing that you may want to know is who has access to it and how it’s safeguarded by Microsoft?

Vijay: Well we do all the things that you would expect from a physical security perspective in terms of how we lock down our data centers including perimeter and personnel access and replicate your data across data centers to protect from data loss or natural disasters. What many people don’t know is that access to every file is gated based on access permissions with a lock box process. Also, your data has its own unique footprint and is isolated from the data of other organizations.

Jeremy: And speaking of access, a related fear is around overall privacy. Whether or not you sign up with Microsoft as the service provider, you don’t want your data being mined for other purposes such as advertising and you want your data to move with you if in future, you decide not to use the service. 

Vijay: Absolutely, and these measures are a given with Office 365. It’s your data and we simply process it while providing productivity services through email, Office applications, unified communications etc.

Jeremy: So even if a third-party requests access to my data it’s protected? 

Vijay: That’s a great question and very topical given the recent press reports around domestic and foreign government access to stored data and data in transit. Ultimately unless legally obligated, Microsoft cannot fulfill requests to access your data. We have to inform you of third-party requests and require your consent. We even provide reports of non-owner access to email inboxes from the Office 365 Administrator Console.

Jeremy: So let’s talk about vulnerability of the service and how Microsoft mitigates criminal attempts to hack its data centers and your data. What most people want to know is how secure is their data in the Cloud compared to on-premises? One of the points that resonated with me made by Marcus Murray, a European security expert that we spoke to on location in Madrid was that one key advantage of the Cloud is that it’s difficult to hack into a system if you don’t have machine level access as you would do on-premises. The way most malware works is to install software or replace system level services on host machines to access data and mask the existence of the malware, if the host layer is abstracted as with Office 365, it is much more difficult to infect a system.

Vijay: We also take extra measures to ensure that services are sufficiently hardened from external hacking threats. Mark Russinovich discussed are red and blue teaming approach where we have experts on staff tasked with the challenge to penetrate the service. They employ all standard means from automated and code execution to social engineering in order to access infrastructure and service layers. At the same time, the blue team works to detect any successful breaches and block any points of entry. They also review access logs and details from the red team to look for patterns and issues to inform ongoing security hardening work.

Jeremy: And of course, a related point on how Microsoft safeguards data access is what happens if the service goes down? How can I trust that I will always have access to my data when I need it?

 Vijay: We get asked that all the time, and we’ve had a lot of practice in maintaining ongoing application availability with our email and collaboration services that have been around for decades. The first thing to know is that we have a financially-backed SLA of 99.9% - which means the service cannot be down for more than 43 minutes in any given month or we need to compensate you as a customer. 

We want to be transparent and accountable too. In fact, we publish our historical uptimes quarterly on the Trust Center. More than that though we built the code and so we know how to fix it and as Kevin Allison explains, we have a Dev Op process, which means the developer who wrote the code is the assigned operator and is on point to fix – resulting in faster and more agile issue resolution compared to traditional approaches for on-premise software.  

Jeremy: Switching gears to explore the other half the coin has been a continuous topic on the Garage Series shows, that is how you define your own control set for managing Office 365 which is a key differentiator for Microsoft compared to other service providers. This is particularly important if you are concerned about meeting regulatory or company Compliance requirements around access to corporate data.

The good news is that, you have control over where your data resides – you can run Office 365 Services along-side your on-premises environment and keep your most sensitive data within your organization’s walls. Importantly too, can apply the same type of access rules that you would typically use to configure your on premises environment and in many respects they are easier to implement and faster.

Take for example Rights Management Services (RMS) – you can now set up file level access in 5 clicks in a large organization versus setting up and configuring a whole array of servers as you would do in the on-premises world. RMS protects the document and ensures that only those with access rights can view it. It is much stronger than simple password protection, because if the document does leak out of an organization, even employees of the organization where it was created would need to authenticate that A. they are still a member of the organization and B. have appropriate permissions to view or edit the file. For example, if a user were to load a USB drive with documents, then leave the company, then any document with RMS protection would not be viewable until that person authenticates against the Rights Management Service. In this case, since the former employee is no longer with the company, his log in and authentication attempts will fail and he won't be able to access the file.

In addition to RMS, we also have tools like Data Loss Prevention where an IT administrator set up rules for sensitive information like credit card or personal identification numbers. Then Outlook will mount an attached file or scan the email text and warn users or if the information leaves the inbox, transport rules in Exchange will block that information from sending. We saw this in a previous episode as Mr. #DealWithIt (played by Stephen Rose) attempted to send his boss's credit card details in a New Orleans bar. 

Vijay: So today’s show was just an overview, we are just scratching the surface in terms of what’s possible – which is why we have two security show specials coming soon in the New Year 

Jeremy: And, in fact we tackle mobile device control and security with Office 365 on next week’s show, when I’m joined again by all things data management and SharePoint expert, Mark Kashman. I’m also joined by Exchange engineering lead Greg Baribault to discuss the genesis and evolution of mobile device management in the advent of the ‘bring your own device’ trend where more and more people are using multiple devices of choice to get work done and to work from anywhere. 

See you next week.

Jeremy and Vijay

More Resources:

Office 365 Trust Center

Garage Series Video Channel

Garage Series Season 1 Blog Archive

Follow @OfficeGarage on Twitter

 


View the original article here

Friday, July 12, 2013

Review: Emcee tries to bring Mission Control to Windows 8

AppId is over the quota
AppId is over the quota

Years after its debut, Mission Control (formerly known as Exposé) remains one of Mac OS X's most distinctive features. It allows you to to lay out miniature copies of all of your windows on the screen at once, making it both useful and pretty. Microsoft briefly experimented with a fancy task switcher of its own for Windows, called Flip 3D, but the feature was retired in Windows 8, along with the Start button and other familiar fixtures. It also introduced the Modern interface with its own separate breed of apps that defy the notion of a window. This makes it difficult to create an effective Mission Control clone for Windows, but Emcee for Windows 8 is one utility that rises to the challenge.

As soon as you launch it, Emcee shows thumbnails of your windows.

Emcee ($7.49, 14-day free trial) doesn't waste time: As soon as you launch its executable, all of your windows instantly shrink into a Mission Control-like display. Any running Modern apps will also be included into the display, isolated into their own horizontal thumbnail strip at the bottom of the screen. Click any window or app to activate it, or hit Escape to abort the operation. Escape is one of the few keys that will get you anywhere with Emcee: It's a very mouse-centric utility.

You probably don't want to manually launch Emcee every time you want to switch windows, and so it offers a number of other triggers, the easiest of which are hot corners. Place your mouse at the top or bottom right corner of the screen, and Emcee pops open. You can use either the top corner or the bottom one, but not both. Leaving one of the two corners free makes sense, since Windows 8 uses those corners for its own needs.

Emcee plays nice with Modern-style apps, laying them out in their own strip along the bottom of the screen.

Hot corners may be too convenient at times: I've triggered Emcee on while playing a full-screen game, and it overrode the game's display with its own. I was later unable to Alt-Tab back to the game and had to forcibly terminate it, making thousands of Sims unhappy. Other ways to trigger Emcee include hotkeys (Ctrl+Tab by default, configurable), and the scrolling the mouse wheel with the mouse cursor close to the top of the screen.

Emcee's overview display is not just a bunch of window thumbnails: It employs intelligence to stack similar windows together. This can be as simple as putting all open Chrome one on top of the other, but you can also configure your own groups so that all open Office applications go together. To flip through a stack of windows you only need to hover your mouse over the edge of any window you wish to see.

Emcee doesn't display all windows: It was clever enough not to display miniature thumbnails of my Stickies, but also incorrectly excluded full-screen text editor WriteMonkey, and, inexplicably, Windows Live Writer, Microsoft's blogging product.

Emcee offers a number of activation triggers, some of which are easy to trigger accidentally.

Emcee is snappy, the thumbnails it displays are clear and easy to work with, and its stacks feature is simple to use. However, to become a truly useful everyday tool, it should include all relevant windows, as well as a way to quickly search through window titles using the keyboard. Until then, it remains a valiant effort to bring one of the Mac's most useful features into Windows.

Endlessly tweaking his workflow for comfort and efficiency, Erez is a freelance writer on a mission to discover the simplest, coolest, and most effective software and websites to make tomorrow happen today.
More by Erez Zukerman


View the original article here

Tuesday, June 18, 2013

Have garage series: Goes under the hood of the new offices-what control you really?

This week our hosts Jeremy Chapman and Yoni Kirsha frequently to address questions such as: "I get more control, when I the traditional Office installation with Office Professional plus 2013 or Office 365 ProPlus?" and "how to make Office 365 ProPlus set automatic updates?" Watch as she through, how to redirect automatic updates and catch up with the people behind the new Office as Skji Conklin, who explain the types of available controls foot, and Chris Yu, who shows the new telemetry features that run Office at the highest level to keep.

Be sure to mark your calendar for new episodes, and especially garage listen series live! on Wednesday, April 3rd 09 Pacific time learned for teaching in the real usage with Paul Thurrott of the Super site for Windows, together with "early adopters" and Office engineers, to discuss lessons learned and providing secrets for the new Office, including live-Q & A.

Read more on www.microsoft.com/garage and check out the complete archive of all previous garage series shows.


View the original article here

Thursday, November 29, 2012

Take control of your Outlook 2013 add-ins

AppId is over the quota
AppId is over the quota

Outlook add-ins provide lots of interesting features that customize Outlook for a particular scenario. Even if you don't purchase third-party add-ins, you might already be using the add-ins that are installed with Outlook such as the Outlook Social Connector 2013. While we make every attempt to ensure that add-ins integrate seamlessly with Outlook, some add-ins behave in a way that detracts from your Outlook experience.

We've listened to customer suggestions and added a new feature in Outlook 2013 to help you manage add-ins that cause performance or crashing problems. When an add-in takes too long to boot, Outlook will disable the add-in automatically*. When this happens, Outlook provides a warning in the notification bar as shown below and you can take appropriate action.

When you see the add-in problem alert, click the View Disabled Add-ins button on the notification bar to display the Disabled Add-ins dialog.

The Disabled Add-ins dialog lets you control add-ins that have caused a problem for Outlook. When you display this dialog, you'll notice that Outlook tells you how much time the add-in required. In the example below, the SaveMessageAsPDF add-in caused Outlook to start slowly and added over 16 seconds to Outlook startup time. If you click the Always enable this add-in button, Outlook will always allow the add-in to run no matter how much time it requires during Outlook startup.

What happens if you change your mind? Maybe you don't want to wait 16 seconds while Outlook starts up. Don't worry, you're still in control of your add-ins. To display the Disabled Add-ins dialog again, you click File | Manage Add-ins in the Backstage view:

Just click the Disable this add-in button to ensure that the add-in will be disabled and you'll get 16 seconds back every time you launch Outlook! If you know that you need your special add-in again, you can always go back to this dialog and re-enable the add-in.

We want to protect you from add-ins that slow down your Outlook experience and to ensure that you are always in control of your add-ins. In some cases, you will find it acceptable that an add-in slows down Outlook a bit but you are willing to make a tradeoff for a must-have feature provided by the add-in. On the other hand, you might not want to sacrifice Outlook performance for an add-in that was pre-installed on your computer. You have the final say, and enjoy having greater control of the add-ins that run in Outlook.

--Randy Byrne, Outlook Program Manager

* For those of you nitty-gritty technical types, here's how the add-in disabling feature works. Outlook monitors the time that an add-in contributes to Outlook startup or shutdown. Outlook also monitors the time that an add-in requires when a folder is switched or an item is opened. When the median time calculated over five instances of a performance measurement exceeds one second, Outlook will disable the add-in automatically.


View the original article here