Microsoft 365 Apps Expand Double Key Encryption Support to Android Devices

Microsoft has added Double Key Encryption for Microsoft 365 apps on Android to enhance data security and compliance.

Published: Dec 23, 2024

Microsoft 365 Apps

SHARE ARTICLE

Key Takeaways:

  • Microsoft has introduced Double Key Encryption (DKE) to Microsoft 365 apps on Android.
  • The DKE feature allows users to apply sensitivity labels and view protected files.
  • DKE helps organizations meet strict regulatory requirements.

Microsoft has rolled out Double Key Encryption (DKE) support for its Microsoft 365 apps on Android devices. The company has announced on the Microsoft 365 admin center that this security feature is now available in public preview for commercial customers.

Double Key Encryption is a robust security feature that enhances data protection by using two separate keys for encryption. One key is managed by the user and the other is securely stored in Microsoft Azure. This dual-key approach ensures the data remains secure even if one key is compromised. The DKE feature helps organizations to meet various regulatory requirements such as HIPAA and GDPR.

dke encryption workflow protect dke
Request the DKE public key (Image Credit: Microsoft)

How does the Double Key Encryption feature work?

Previously, the Double Key Encryption (DKE) feature was only available in Microsoft 365 Apps on Windows, Mac, and iOS. With this latest update, Microsoft has expanded DKE functionality to Android. Users can now apply sensitivity labels to define document protection levels and view DKE-protected files directly on their devices.

Microsoft plans to roll out the DKE feature to all commercial customers worldwide by late January 2025. However, this feature will only be available for organizations that have implemented DKE within their environments.

Microsoft has extended Double Key Encryption support to Android devices to help businesses maintain strong security across multiple platforms. This feature enables administrators to protect sensitive information and meet regulatory requirements. It also helps to ensure that authorized users can securely access critical data across various devices.

SHARE ARTICLE