<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="https://skynorthsoftware-com.azurewebsites.net/blog/rss/xslt"?>
<rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <title>SkyNorth</title>
    <link>https://skynorthsoftware-com.azurewebsites.net/blog/</link>
    <description>Blog</description>
    <generator>Articulate, blogging built on Umbraco</generator>
    <item>
      <guid isPermaLink="false">1238</guid>
      <link>https://skynorthsoftware-com.azurewebsites.net/blog/posts/improving-your-microsoft-cloud-security-for-free/</link>
      <title>Improving your Microsoft Cloud Security for FREE!</title>
      <description>&lt;p&gt;So your organization has made the jump, at least on some level, to the Microsoft cloud.  That’s a great forward thinking strategy.  
&lt;/p&gt;
&lt;p&gt;I’m sure somewhere along this journey you were questioned about security.  You assured them that it would be covered and the organization would be safe.  Now that you're there, how are you living up to that promise?  Wouldn’t it be great if there was a place you could look that would tell you?  
&lt;/p&gt;
&lt;h4&gt;Say hello to Microsoft’s free tool, Secure Score&lt;/h4&gt;
&lt;p&gt;Secure Score looks at your settings and activities for the Office 365 (and recently added Modern Workplace) services your organization is using (SharePoint, Exchange, One Drive, etc.), and compares them to a baseline established by Microsoft to give you a score on how well you are doing security wise.  Examples of things you are scored on are multi-factor authentication status, policy progress, mailbox auditing, etc.  You can then use this information to take action to improve your score based upon recommendations presented by the tool.  
&lt;/p&gt;
&lt;p&gt;Did I mention it’s all FREE! That’s pretty cool. &lt;/p&gt;
&lt;h4&gt;Show value and justify actions&lt;/h4&gt;
&lt;img src="https://skynorthsoftware-com.azurewebsites.net/media/1035/23757303-274c-46c7-a7ee-b4e6f2f9eca0.png" alt="Actions in queue" title="Actions in Queue" width="450" align='right'/&gt;&lt;p&gt;IT typically understands the big picture of what needs to be done, but often has a hard time quantifying the need.  Because of this securing resources is a challenge especially when an initiative around security looks like a giant black hole to those on the outside.  How do you combat this?&lt;/p&gt;
&lt;p&gt;Metrics. Leadership loves metrics, as they should. They give you an accurate representation of a position.  
&lt;/p&gt;
&lt;p&gt;Secure Score to the rescue by allowing you to identify and communicate your efforts in addition to the benefit received.  Even better you can see how your security has changed historically, so once you complete a control you can see the before and after.  
&lt;/p&gt;
&lt;p&gt;But wait there's more, Secure Score also holds the documentation around these areas and controls in place!  
&lt;/p&gt;
&lt;h4&gt;I’m in. (It’s FREE after all) How can I see my organizations Secure Score?&lt;/h4&gt;
&lt;p&gt;You can view your organizations Secure Score by logging in at https://securescore.office.com with an ID tied to your organization.  Note: You must have Global Admin or a custom Admin role with permissions on an Office 365 Enterprise, M365 Business, or Office 365 Business Premium subscription In order to view the results.  While non admins won't be able to access Secure Score directly, admins can share the results with others in their organization. &lt;/p&gt;
&lt;p&gt;Caveat.  You may see actions that are labeled “Not Scored”.   Unfortunately these are not scored in the tool yet, but completing them will still benefit the security of your environment. &lt;/p&gt;
&lt;h4&gt;So will utilizing Secure Score mean my organization is safe?&lt;/h4&gt;
&lt;p&gt;There is no way of predicting if your organization will be subject to a breach.  There are just too many variables.  Secure Score simply gives you a view in to the measures taken to minimize that risk, and that is huge. Considering the price there is no reason you aren’t utilizing the tool. &lt;/p&gt;
&lt;h4&gt;I don’t understand everything being reported by Secure Score.&lt;/h4&gt;
&lt;p&gt;Unfortunately the bad guys do.  The good news is that you now know what you don’t know.  
&lt;/p&gt;
&lt;p&gt;If your organization doesn’t have the expertise to interpret and implement these controls there are third parties like us at SkyNorth Software that can help.  Pick your favorite or feel free to &lt;a href="&amp;#x6d;&amp;#x61;&amp;#x69;&amp;#x6c;&amp;#x74;&amp;#111;&amp;#x3a;&amp;#116;&amp;#109;&amp;#x61;&amp;#x72;&amp;#116;&amp;#105;&amp;#x6e;&amp;#64;&amp;#x73;&amp;#107;&amp;#121;&amp;#x6e;&amp;#111;&amp;#x72;&amp;#116;&amp;#x68;&amp;#115;&amp;#x6f;&amp;#102;&amp;#116;w&amp;#x61;&amp;#114;&amp;#x65;&amp;#x2e;&amp;#99;&amp;#111;&amp;#x6d;"&gt;d&amp;#x72;&amp;#x6f;&amp;#112;&amp;#32;&amp;#x75;&amp;#115;&amp;#x20;&amp;#x61;&amp;#x20;&amp;#x6c;&amp;#x69;&amp;#110;&amp;#101;&lt;/a&gt; and if you have questions.&lt;/p&gt;
</description>
      <pubDate>Thu, 24 Jan 2019 17:55:08 Z</pubDate>
      <a10:updated>2019-01-24T17:55:08Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1234</guid>
      <link>https://skynorthsoftware-com.azurewebsites.net/blog/posts/admin-guide-to-securing-your-office-365-data/</link>
      <category>Azure</category>
      <category>SharePoint</category>
      <category>Security</category>
      <title>The Admins guide to securing your Office 365 data</title>
      <description>&lt;p&gt; &lt;/p&gt;
&lt;p&gt;During my time at Microsoft and SkyNorth, one of the hottest cloud migration topics we have with clients, is around &lt;strong&gt;access and data security&lt;/strong&gt;. &lt;/p&gt;
&lt;p&gt;While most companies believe their on-premises data is secure, we’ve found it is usually at higher risk then data stored in a correctly configured Office 365 tenant.  If you can properly &lt;span style="display: inline !important; float: none; background-color: transparent; color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;answer the four primary concerns of the public cloud, &lt;/span&gt;O365 solutions will increase your security and flexibility.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;How do we limit and control access?&lt;/li&gt;
&lt;li&gt;How to ensure it’s the correct person?&lt;/li&gt;
&lt;li&gt;How do we secure our data?&lt;/li&gt;
&lt;li&gt;How do we secure our devices?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Out of the box, O365 cloud identities are accessible everywhere via internet, and secured with only username and password.   This appears sketchy at best, until you start looking at all the built-in features that O365 &amp;amp; Azure Active Directory offer.  When developing your O365 access policies you need to put together a plan that focuses on the 3 core areas.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="#a1"&gt;The Who and Where&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#a2"&gt;The What&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#a3"&gt;The How&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Please keep in mind, some of these technologies cross boundaries and can be used in conjunction with other features to maximize your cloud security strategy.   If you haven't seen the &lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-policies-configurations" target="_blank"&gt;Microsoft Identity and Device Access&lt;/a&gt; article. it is a must read (after you finish reading my blog post).&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;The Who and Where&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Do you know who is accessing your cloud services, and where they are logging in from?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Option 1 - &lt;strong&gt;ADFS Server&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Many people already have this infrastructure in place from past SSO requirements&lt;/li&gt;
&lt;li&gt;Uses Microsoft technologies&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Requires a lot of extra infrastructure and setup (ADFS, Proxy, x2 for HA)&lt;/li&gt;
&lt;li&gt;Limited Options&lt;/li&gt;
&lt;li&gt;This has became the 'outdated' way of providing a secured Single Sign-On solution&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx" target="_blank"&gt;Limiting Access to Office 365 Services Based on the Location of the Client&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 2 - &lt;strong&gt;Conditional Access&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Extremely configurable and stackable rules&lt;/li&gt;
&lt;li&gt;Tied to your cloud login&lt;/li&gt;
&lt;li&gt;Available to all Azure Applications and internal apps that are published via Azure Application Proxy&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Requires &lt;span&gt;&lt;a rel="noopener noreferrer" href="https://azure.microsoft.com/en-us/pricing/details/active-directory/" target="_blank"&gt;Azure AD Premium Plan 1&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-azure-portal" target="_blank"&gt;Limit logins based on the following policies&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Allows you to limited login based on the following
&lt;ul&gt;
&lt;li&gt;Select Users&lt;/li&gt;
&lt;li&gt;Trusted IP Range&lt;/li&gt;
&lt;li&gt;Trusted Applications&lt;/li&gt;
&lt;li&gt;Browser or Client Application&lt;/li&gt;
&lt;li&gt;Device Platforms&lt;/li&gt;
&lt;li&gt;Device Compliance (Requires Intune)&lt;/li&gt;
&lt;li&gt;Login Risk (Requires Azure Active Directory Premium Plan 2)&lt;/li&gt;
&lt;li&gt;Allows SharePointusers to only have READ access via Browser session, and others WRITE/EDIT via controlled Application&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;How do we ensure it’s the correct person?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Option 1 - &lt;strong&gt;Multi-Factor Authentication (MFA)&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Helps ensure the person is who they say they are&lt;/li&gt;
&lt;li&gt;Easy to use and configure&lt;/li&gt;
&lt;li&gt;Available for on-prem applications, rdp, and VPN via &lt;span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server" target="_blank"&gt;MFA Server&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Limited to call/text or mobile application&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="/umbraco/%09https:/docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication" target="_blank"&gt;A second form of user identification such as a phone call, email, or mobile app&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Option 2 - &lt;strong&gt;ADFS Server 2016 – MFA First&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Skews attempts to brute-force login attempts&lt;/li&gt;
&lt;li&gt;Validates the users device before the username/password&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Requires a lot of extra infrastructure and setup (ADFS, Proxy, x2 for HA)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="/umbraco/%09https:/blogs.technet.microsoft.com/ausoemteam/2016/08/19/whats-new-in-windows-server-2016-standard-edition-part-2-identity/" target="_blank"&gt;ADFS 2016 allows you to prompt for device MFA first, ensuring no password is passed to the session until the first factor has been passed&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 3 - &lt;strong&gt;&lt;span style="text-align: left; color: #000000; text-transform: none; line-height: 21px; text-indent: 0px; letter-spacing: normal; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;"&gt;Password-free Login&lt;/span&gt;&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Very secure&lt;/li&gt;
&lt;li&gt;Easy to use&lt;/li&gt;
&lt;li&gt;No passwords to remember&lt;/li&gt;
&lt;li&gt;&lt;span style="display: inline !important; float: none; background-color: transparent; color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;Corporate Credentials are not passed through the session&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="display: inline !important; float: none; background-color: transparent; color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;Only devices with an approved certificate/key will be allowed access&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;&lt;span style="display: inline !important; float: none; background-color: transparent; color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;Certificate Based requires infrastructure and setup (ADFS, Proxy, x2 for HA)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Authenticator/Hardware Key have limited support at this time&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://blogs.msdn.microsoft.com/samueld/2016/07/19/adfs-certauth-aad-o365/" target="_blank"&gt;ADFS: Certificate Authentication with Azure AD &amp;amp; Office 365&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type: none;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview" target="_blank"&gt;Windows Hello for Business&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password" target="_blank"&gt;Why a PIN is better than a password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise" target="_blank"&gt;&lt;span&gt;Can Use Biometrics as a form of PC Authentication&lt;/span&gt;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Fingerprint&lt;/li&gt;
&lt;li&gt;Facial recognition&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Microsoft Authenticator App
&lt;ul&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-phone-sign-in" target="_blank"&gt;Password-less phone sign-in with the Microsoft Authenticator app (public preview)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type: none;"&gt;
&lt;ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://myignite.techcommunity.microsoft.com/sessions/64557" target="_blank"&gt;Hardware Key w/ FIDO2 Support&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;The What?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;What data are people accessing and how do we secure it?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Option 1 - &lt;strong&gt;SharePoint Site Permissions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Highly customizable at different SharePoint levels (Site/Web/Library/Item)&lt;/li&gt;
&lt;li&gt;Have remained the same with all versions of SharePoint&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Can get complicated with breaking inheritance&lt;/li&gt;
&lt;li&gt;Auditing/Ensuring users are correctly setting permissions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Understanding-permission-levels-in-SharePoint-87ecbb0e-6550-491a-8826-c075e4859848" target="_blank"&gt;Understanding permission levels in SharePoint&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 2 - &lt;strong&gt;External Sharing Settings&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Allow or prevent external users from accessing your SPO data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;A misconfigured policy could mean bad news for your company&lt;/li&gt;
&lt;li&gt;It's not meant for every type of business or scenario&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Manage-external-sharing-for-your-SharePoint-Online-environment-C8A462EB-0723-4B0B-8D0A-70FEAFE4BE85" target="_blank"&gt;Manage external sharing for your SharePoint Online environment.&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 3 - &lt;strong&gt;Tenant Restrictions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Increased security&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Makes external collaboration difficult&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-tenant-restrictions" target="_blank"&gt;Use Tenant Restrictions to manage access to SaaS cloud applications&lt;/a&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span style="display: inline !important; float: none; background-color: transparent; color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;Prevent your users from accessing other data&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;This is handled via proxy server and HTTP Headers that identify and prevent external access&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 4 - &lt;strong&gt;Azure Rights Management / Azure Information Protection&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Increased data security&lt;/li&gt;
&lt;li&gt;Available to many data formats&lt;/li&gt;
&lt;li&gt;Set up on the SPO library or global rules via Azure&lt;/li&gt;
&lt;li&gt;Labeling Support for O365 Data Classification&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Multiple setup/config areas that do not span a broad spectrum of services&lt;/li&gt;
&lt;li&gt;Typically requires an internet connection to pass ACL validation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-irm-in-sp-admin-center" target="_blank"&gt;Protect SharePoint libraries to prevent read/write/edit/print/etc.&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Enabled on the document library or list level.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;"&gt;&lt;span style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;"&gt;&lt;a style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;" rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/protect-files-with-aip" target="_blank"&gt;Protect files with Azure Information Protection&lt;/a&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;"&gt;Gives you the option to classify, encrypt, and secure your data at a local level
&lt;ul&gt;
&lt;li style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;"&gt;For use with O365 documents, as well as on-prem file storage&lt;/li&gt;
&lt;li style="background-color: transparent; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 14px; line-height: 21px; min-height: 0px;"&gt;Uses Azure RMS to encrypt and secure access&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 5 - &lt;strong&gt;Data Loss Prevention&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Easy to configure rules&lt;/li&gt;
&lt;li&gt;Used for SharePoint/OneDrive/Exchange&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Other similar methods make it confusing to determine the best use
&lt;ul&gt;
&lt;li&gt;AIP / Transport Rules / Classification &amp;amp; Labels&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Overview-of-data-loss-prevention-policies-1966b2a7-d1e2-4d92-ab61-42efbb137f5e" target="_blank"&gt;&lt;/a&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Overview-of-data-loss-prevention-policies-1966b2a7-d1e2-4d92-ab61-42efbb137f5e" target="_blank"&gt;Overview of data loss prevention policies&lt;/a&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;Searches through your existing data to find matches that may need protection&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type: none;"&gt;
&lt;ul&gt;
&lt;li style="list-style-type: none;"&gt;
&lt;ul&gt;
&lt;li&gt;Create a DLP query to identify what sensitive information now exists in your site collections.&lt;/li&gt;
&lt;li&gt;Create a DLP policy to monitor and automatically protect sensitive information in your site collections.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;The How?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;How are people accessing cloud services, and how do we secure it?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Option 1 - &lt;strong&gt;Azure AD Device Registration / Workplace Join&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Identifies what users and devices are using cloud services&lt;/li&gt;
&lt;li&gt;Configure MFA for first-time registration&lt;/li&gt;
&lt;li&gt;Allows easy SSO access to all of your apps&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;There isn't much security you can place around the device without extras&lt;/li&gt;
&lt;li&gt;MFA Conditional Access rules are met with registered devices so you will not receive a call/text&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span style="color: #000120;"&gt;&lt;/span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-device-registration-on-premises-setup" target="_blank"&gt;Azure AD Device Registration&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 2 - &lt;strong&gt;Azure AD Joined Device&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Same as Option 1&lt;/li&gt;
&lt;li&gt;Azure AD Bitlocker Recovery&lt;/li&gt;
&lt;li&gt;PIN Sign-In&lt;/li&gt;
&lt;li&gt;Enterprise State Roaming Features&lt;/li&gt;
&lt;li&gt;Automatic MDM Enrollment (With AAD Premium P1)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;On-premises domain access would typically require VPN client&lt;/li&gt;
&lt;li&gt;There isn't much security you can place around the device without extras&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 3 - &lt;strong&gt;O365 Mobile Device Management (MDM)&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Comes with O365 E3&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Limited control&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Capabilities-of-built-in-Mobile-Device-Management-for-Office-365-a1da44e5-7475-4992-be91-9ccec25905b0" target="_blank"&gt;Provides Selective Wipe and removal of certain data&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://support.office.com/en-us/article/Set-up-Mobile-Device-Management-MDM-in-Office-365-dd892318-bc44-4eb1-af00-9db5430be3cd" target="_blank"&gt;Set up O365 MDM&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Option 4 - &lt;strong&gt;Microsoft Intune&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Pros
&lt;ul&gt;
&lt;li&gt;Highly configurable&lt;/li&gt;
&lt;li&gt;Tied with your cloud identity and your device&lt;/li&gt;
&lt;li&gt;Can manage Windows/iOS/Android Devices (limited MAC OSx Support)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cons
&lt;ul&gt;
&lt;li&gt;Requires &lt;span&gt;&lt;a rel="noopener noreferrer" href="https://www.microsoft.com/en-us/cloud-platform/microsoft-intune-pricing" target="_blank"&gt;Intune or EM+S subscription&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extras
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/intune/introduction-intune" target="_blank"&gt;What is Intune?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Contains Mobile Application Management policies (MAM)
&lt;ul&gt;
&lt;li&gt;Prevent Cut/Copy/Paste&lt;/li&gt;
&lt;li&gt;Prevent SaveAs&lt;/li&gt;
&lt;li&gt;Require a PIN for specific Mobile Apps&lt;/li&gt;
&lt;li&gt;*With or without device enrollment*&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Selective or Full Wipes of the device&lt;/li&gt;
&lt;li&gt;Manages device compliance settings
&lt;ul&gt;
&lt;li&gt;Encryption/Password Rules/Etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Manages device configuration settings
&lt;ul&gt;
&lt;li&gt;Blocks to cameras, screen shots, USB ports, and tons more&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/intune/conditional-access-intune-common-ways-use" target="_blank"&gt;Conditional Access&lt;/a&gt;&lt;/span&gt; via Compliance Policy and Device Registration
&lt;ul&gt;
&lt;li&gt;Allow only ‘domain joined’ devices to access cloud data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;I hope I've made an extremely complex topic a little easier for everyone to understand.   Like I mentioned above, there isn't a single solution that you should decide on for all business &amp;amp; security scenarios.  You may need to mix-and-match and you may also need to use features I didn't even mention here.   If you find yourself in a confusing situation and need help finding the best approach please feel free to reach out to &lt;a href="mailto:info@skynorthsoftware.com"&gt;SkyNorth&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Need Help?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Be sure to contact SkyNorth Software today for an &lt;span&gt;&lt;a rel="noopener noreferrer" href="/Offerings/O365-Data-Security" target="_blank"&gt;O365 Data Security Assessment&lt;/a&gt;&lt;/span&gt; or any of your data security needs! &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is our Data Security Assessment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It’s a comprehensive technology and process review for how you handle data security within your organization. &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How much does it cost?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;It’s FREE!&lt;/strong&gt;    Out introductory package is completely free and includes a 1-hour finding call with self-help documentation.  If you’d like to have a more comprehensive review or added support, you can look at our &lt;strong&gt;&lt;em&gt;PREMIUM&lt;/em&gt;&lt;/strong&gt; or &lt;strong&gt;&lt;em&gt;PREMIUM – WITH SUPPORT&lt;/em&gt;&lt;/strong&gt; options on &lt;a rel="noopener noreferrer" href="/Offerings/O365-Data-Security" target="_blank"&gt;our website.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;</description>
      <pubDate>Wed, 17 Oct 2018 02:05:06 Z</pubDate>
      <a10:updated>2018-10-17T02:05:06Z</a10:updated>
    </item>
  </channel>
</rss>