Endpoint DLP

In July 2020, a public preview for Windows Endpoint DLP has started. Endpoint DLP works with the DLP Policies you create in the Compliance Portal. This gives you the ability to use the same labels and sensitivity types in your DLP policies for all locations – Exchange Online, Teams, SharePoint, OneDrive for Business and Windows Endpoints.

In this video I show how to onboard your devices for Endpoint DLP and how to configure your policy. Of course we then take a look at the end user experience and finally I go through the reporting and alerting capabilities.

Restrict Guest Permissions in Azure Active Directory

Azure Active Directory (Azure AD) allows you to restrict what external guest users can see in their organization in Azure AD. Guest users are set to a limited permission level by default in Azure AD, while the default for member users is the full set of default user permissions.

This video shows a preview of a new guest user permission level in your Azure AD organization’s external collaboration settings for even more restricted access, so your guest access choices now are:

Permission levelAccess level
Same as member usersGuests have the same access to Azure AD resources as member users
Limited access (default)Guests can see membership of all non-hidden groups
Restricted access (new)Guests can’t see membership of any groups

More information in Docs: https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/users-restrict-guest-permissions

Office Message Encryption

Secure mail providers like Zivver or Zorgmail actually offer point solutions that increase cost considerably and store messages outside your Office 365 environment. This makes compliance, security and discovery more complex – if at all possible.

With Office 365 Message Encryption, your organization can send and receive encrypted email messages between people inside and outside your organization. Office 365 Message Encryption works with Outlook.com, Yahoo!, Gmail, and other email services. Email message encryption helps ensure that only intended recipients can view message content.

In this video I show you how it works!

My Profile Portal

The new My Profile (preview) portal helps you to manage your work or school account by setting up and managing your security info, managing your connected organizations and devices, and viewing how your organization uses your data.

In this video I show you around in the new portal, and also show you the My Sign-Ins functionality and the new My Applications portal.

Conditional Access for MFA and SSPR Registration

A couple of weeks ago, the combined registration experience for Multi Factor Authentication and Self Service Password Reset was launched in public preview. This new registration experience enables users to register for MFA and SSPR in a single, step-by-step process.

A lot of organizations asked for control over the conditions in which security sensitive MFA or SSPR information can be registered, to ensure it’s the right user — not an attacker — registering this security sensitive info.

This is why Azure AD conditional access for our combined registration experience for MFA and SSPR is now available in Public Preview. This new Conditional Access functionality is part of the Azure AD Premium Plan 1 subscription.

In this video I show you how to configure this and what the user experience is like.

AIP and Exchange Online: Better Together

Azure Information Protection helps your users make the right choices when it comes to data classification and protection. Exchange Online adds the power of Mail Flow Rules. Imagine you’d be able to combine those two tools… Indeed: you can!

Exchange Online can read classification labels created by Azure Information Protection. In Mail Flow Rules, you can define which actions should follow when a certain classification is detected.

See for yourself how to set this up in a few easy steps. And of course you will also see what the user experience will be like.

Learn more here: https://docs.microsoft.com/en-us/azure/information-protection/configure-exo-rules

Limited Access using Azure AD Conditional Access

In some situations you may want to give access to your data, but not give up on control. Enabling your employees while at the same time making sure no data is leaked from the cloud app to the device used.

With Limited Access in Azure AD Conditional Access, it is possible to limit access within cloud applications. For example: allow access to SharePoint Online, but prevent downloading or printing of any documents.

In this video, we explore the possibilities of this Conditional Access capability for Outlook on the Web (aka Outlook Web Access or OWA). Find out how to configure limited access in a few simple steps and see for yourself what the end user will experience.

Azure AD Identity Protection

Azure Active Directory Identity Protection is part of Azure AD Premium P2 and enables you to:

  • Detect potential vulnerabilities affecting your organization’s identities
  • Configure automated responses to detected suspicious actions that are related to your organization’s identities
  • Investigate suspicious incidents and take appropriate action to resolve them

In today’s video I am going to show you how to configure a risk policy and what it looks like when suspicious activity is detected and remediated.

Learn more about Azure AD Identity Protection here.

Azure AD B2B Support for Google Identities

A long awaited feature in Azure AD B2B has become available in Public Preview: it is now possible to add Google as an identity provider for B2B guest users! This means, you can invite guest users from outside your company using their GMail-account.

Enabling Google federation makes your invited Gmail user’s experience more seamless. After you have set up B2B Google federation for your organization, invited Gmail users can use their Google identity to sign in and collaborate. They no longer need to create an Azure AD account or Microsoft Account to access the apps and resources you’re sharing with them!

To get this to work, there’s a number of steps that you need to take, which are thoroughly documented on Docs. Let’s see what it looks like:

Important note: at this moment there’s support only for Google ID’s with the @gmail.com extension.

Read all about this new feature in Alex Simons’ blog. Full documentation can be found on Microsoft Docs.



Conditional Access Info in Azure AD Sign Ins Report

Conditional Access it the most popular feature in Azure AD premium. To manage conditional access at scale,  you need detailed visibility into how it’s actually working in your organization.

The addition of conditional access information in the Azure AD Sign-ins report is now in public preview. This new information will help you troubleshoot conditional access policies and understand the usage of conditional access in your organization.

There are four key scenarios for this new capability:

  • Quickly troubleshoot conditional access policies
  • Understand usage of conditional access policies
  • Understand legacy authentication usage in your organization
  • Identify gaps in your conditional access policies

In this video I show this new capability in combination with a Conditional Access policy assigned to the Global Admins-role in Azure AD:



Find out even more at https://cloudblogs.microsoft.com/enterprisemobility/2018/07/25/public-preview-for-conditional-access-information-in-azure-ad-sign-ins-report/