It was a busy month for Office 365, here’s a wrap-up of the highlights for the month.
Exchange Online transport (mail flow) rules are a powerful way to ensure that email from Office 365 tenants to specific recipients are encrypted in a consistent manner. Using rules relieves the need for users to become involved and makes sure that email is protected in a way that recipients can read messages. It’s a good way to use the protection features built into Office 365.
Microsoft plans to create an automatic policy to encrypt outbound email containing sensitive data for all Office 365 tenants. It sounds like a good idea until you begin looking at the operational consequences of such an action. For instance, how to insert a new transport rule into a complex set of existing rules. All in all, this is not a good plan.
Given the increased ways to apply rights management protection (encryption) to Exchange Online messages, the volume of encrypted traffic should rise. That’s good for users because their email is protected, but it’s not so good for ISVs who must deal with encrypted email. One such example is autosignature products, where server-based components can’t touch protected email to add their text.
Researchers from Radboud University in the Netherlands, Carlo Meijer and Bernard van Gastel, have published a paper claiming that encryption on SEDs can be bypassed using different attack vectors
Aidan Finn tells you about a service in Azure called Key Vault, which you can think of as secret storage/handling-as-a-service.
In a recent post on the AWS blog, Amazon announced the addition of several new encryption and security features that are now available to AWS S3 customers.
Office 365 has given its rights management capabilities a complete refresh. Clients deal with protected email better and it’s easy to send protected email to people inside and outside your organization, including coverage of consumer email systems like Gmail and Outlook.com. And protected email works on mobile devices too.
In this Ask the Admin, Russell Smith looks at how Protected Event Logging is implemented in Windows 10.
Learn how to enable Storage Service Encryption for storage accounts in Microsoft Azure.