exchange online protection overviewdocshare01.docshare.tips/files/21643/216439985.pdf · spf &...
TRANSCRIPT
http://ignite.office.com
Spam
Protect communications
Enforce policy
Streamlined management
Every Office 365 customer is an EOP customer
Easy transition from EOP stand-alone to Office 365
On-premises server - Inbound and Outbound email filtered through EOP
On Premise
Corporate Network
EOP
O365
Exchange Online
Email is routed to EOP DC’s based on MX record resolution
(mail.messaging.microsoft.com)
IP-based edge blocking
Reputation Blocking
Virus
Scanning
AV Engine 1
AV Engine 2
AV Engine 3
SPAM Protection
Safe Sender/Recipient
Policy Enforcement
Custom Rules
Content scanning and Heuristics
Bulk Mail filtering
SPF & Sender ID Filter
Quarantine
*International Spam*
Advanced SPAM management
Customer Feedback
False +ve / -ve
Spam Analysts
Corporate Network
Regular Expressions
URL Block lists
Envelope blocks
Forefront blocks
Allows/Rejects
Outbound Pool
Outbound Pool
High Risk Delivery Pool High Score
Outbound Pool
Low Score SPAM Protection
Content scanning and Heuristics
Advanced SPAM management
Virus
Scanning
AV Engine 1
AV Engine 2
AV Engine 3
Policy Enforcement
Custom Rules
Quarantine
Spam Analysts
Corporate Network
Bulk Delivery Pool
Bulk Mail
Internet
Email Encryption
On-premises Exchange Online
Protection
Office 365 Directory Sync
Secure mail flow
Existing email
environment
Bulk Mail control
Mark all bulk messages as spam
Block external threats quickly
Advanced fingerprinting technologies that identify and stop new spam and phishing vectors in real time.
Block unwanted email based on language or geographic origin
Block email based on language
Block email based on geography
Recommendation: Send suspected junk mail to the Outlook junk mail folder.
Spam quarantine managed by administrators.
Users can manage safe senders and block lists through Outlook.
Set Frequency from 1-15 days
Localized ESN
Outlook Junk Mail Reporting Tool for missed spam
http://www.microsoft.com/en-us/download/details.aspx?id=18275
Send spam email as an attachment to [email protected]
Send false positive messages to [email protected]
Delete messages
Delete attachments
Robust, customizable notifications
Sender notifications
Admin notifications
Delete messages
Delete attachments
Robust, customizable notifications
Sender notifications
Admin notifications
Built on Exchange transport rules engine
Conditions
Actions
Exceptions
Conditions
Actions
Exceptions
Encryption
EHE Encryption
Send Encrypted email to any recipient without prior setup
Encryption is performed via policy rules and enforced in the EOP cloud
Identity-Based Encryption (IBE) uses email address as ID for public key
EHE saves public keys so users should use strong passwords as their credentials
No cost for recipient non-licensed user
All replies and forwards remain encrypted for any mail recipient
Encrypted emails are not saved by EHE
Data protection at rest
Data protection at rest
Data protection at rest
Data Protection in motion Data Protection in motion
Information can
be protected
with RMS at rest
or in motion
Data protection at rest
Functionality RMS in
Office 365 S/MIME
ACLs
(Access Control
Lists)
BitLocker
Cloud
Encryption
Gateways (CEGs)
Data is encrypted in the cloud
Encryption persists with content
Protection tied to user identity
Protection tied to Policy (edit, print, do not forward, expire after 30 days)
Secure collaboration with teams and individuals
Native integration with my services (Content Indexing, eDiscovery, BI, Virus/Malware scanning)
Lost or stolen hard disk
RMS can be activated right inside Office 365 Admin console
Enable Rights Management in the tenant admin
RMS can be applied to Emails
Apply RMS to content
RMS can be applied to SharePoint libraries
Files are protected if they are viewed using Webapps or downloaded to a local machine
RMS can be applied to any Office documents
Office 365 Trust Center
Protect communications
Enforce policy
Streamlined management
All statements in this report attributable to Gartner represent Microsoft interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.