Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Office 365 Message Encryption

How Exchange Online Processes Journal Reports for Protected Email

by Tony Redmond

Office 365 tenants often want to journal email from Exchange Online mailboxes. Things become a little more complicated when protected email is involved, but Exchange can decrypt protected messages and create journal reports with attachments containing the original encrypted message and a decrypted copy. That should be enough for journaling systems to process the journal reports and import messages into their repositories.

Support for Office 365 Sensitivity Labels Now in Office ProPlus for Windows

by Tony Redmond

The September update of the Office ProPlus monthly channel delivers support for Office 365 sensitivity labels without the need to install the Azure Information Protection client. This is a step forward to make it easier for Office 365 users to be able to protect their most confidential information with encryption. More work remains to be done to upgrade the Office Online apps (including OWA), Outlook Mobile, and SharePoint and OneDrive. Will all this happen before Ignite?

Is Exchange Online Threatened by Ransomware?

with 4 Comments by Tony Redmond

Some people worry that Exchange Online mailboxes could be compromised by ransomeware and people will be forced to pay BitCoin to decrypt their messages. It's certainly a possibility, but out-of-the-box solutions exist if you're unlucky enough to be infected. That is, if you've done the necessary up-front planning to prepare for the worst to happen.,

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: