Updated Microsoft Hybrid Cloud for Enterprise Architects poster includes HA federated identity for Office 365 in Azure

The Microsoft Hybrid Cloud for Enterprise Architects poster has been updated with a new section that describes high availability federated authentication for Office 365 in Azure. This configuration is another example of a multi-tier, highly-available line of business IT workload deployed in an Azure infrastructure services hybrid configuration. See topic 5, Hybrid cloud scenarios for Azure IaaS, of…

0

New Test Lab Guide for the One Microsoft Cloud

At Microsoft, we think we have the best overall cloud solution in the marketplace, which includes: Microsoft Office 365 for personal productivity and organization communication and collaboration. Microsoft Azure for cloud-based services and applications and hosting your server-based applications in the cloud. Microsoft Enterprise Mobility + Security (EMS) for identity and security management for your…

0

New solution for isolated SharePoint Online team sites

SharePoint Online team sites allow you to quickly and easily create new sites for public (organization-wide) or private (confined to group membership) collaboration. If you want to lock down a SharePoint Online team site whose membership and permissions are tightly controlled by designated SharePoint administrators, create an isolated SharePoint Online team site. To help you…

0

Updated Contoso in the Microsoft Cloud poster includes new Office 365 security best practices

The Contoso in the Microsoft Cloud poster has been updated with a new section that describes how the Contoso Corporation is using Office 365 security features and best practices to protect access, data, and email and to monitor for suspicious activity. See topic 6, Security, of the poster for this new section: Download this multi-page…

0

Protect your Office 365 global admin accounts right now with these three steps

Typical Office 365 subscription security breaches are based on compromising a global administrator user account. Once the credentials of a global administrator user account are known, an attacker can harvest the information stored in Office 365 and perform targeted phishing attacks. To protect your global admin accounts, even as a small or medium business, you…

0

Disable access to Office 365 services while assigning user licenses with PowerShell

Managing user accounts, licenses, and the selective access to specific services in Microsoft Office 365 is an important and ongoing administrative responsibility. Although many of these management tasks can be done in the Office Admin center, some of these can only be done with Microsoft PowerShell commands from the Windows Azure Active Directory Module. Disable…

0

Join us for the May 2017 CAAB Webinar

The May 2017 Cloud Adoption Advisory Board (CAAB) webinar was a Skype meeting that opened at 7:45 AM Pacific Daylight Time (PDT) on Wednesday, May 31. It began promptly at 8:00 AM and ran to 9:00 AM. There was time for discussion during the session, and the speakers were available for a few minutes after the session for additional questions….

0

New Test Lab Guide for an isolated SharePoint Online team site

SharePoint Online team sites in Office 365 allow you to quickly and easily create new sites for public (organization-wide) or private (confined to group membership) collaboration. To create one, you fill out two panes of information about the new site. The Let’s create a team site and group pane collects the team site name (which…

0

Updates for the new Azure Active Directory V2 PowerShell module

User and group account maintenance is an important part of Office 365 administration. For Office 365 PowerShell, the Windows Azure Active Directory Module for Windows PowerShell has been available for years. This module contains cmdlets to connect and to manage user accounts, groups, and licenses. More recently, the Azure Active Directory (AD) product team has…

0

Yes, you can put “toxic” data in Office 365

As a writer for our enterprise customers at Microsoft I understand how challenging it can be to sort out security capabilities, especially for the most sensitive data, often referred to as “toxic” data. This is trade secret, highly regulated, classified, or any type of data a customer wants to ensure remains encrypted and undecipherable to…