<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security and Compliance center Archives - Erjen Rijnders</title>
	<atom:link href="https://erjenrijnders.nl/tag/security-and-compliance-center/feed/" rel="self" type="application/rss+xml" />
	<link>https://erjenrijnders.nl/tag/security-and-compliance-center/</link>
	<description>Microsoft Azure/EMS blog</description>
	<lastBuildDate>Thu, 04 Apr 2019 09:44:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>Microsoft Ignite day 5</title>
		<link>https://erjenrijnders.nl/2018/09/28/microsoft-ignite-day-5/</link>
					<comments>https://erjenrijnders.nl/2018/09/28/microsoft-ignite-day-5/#respond</comments>
		
		<dc:creator><![CDATA[Erjen]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 18:13:13 +0000</pubDate>
				<category><![CDATA[Ignite 2018]]></category>
		<category><![CDATA[Azure-information-protection]]></category>
		<category><![CDATA[Security and Compliance center]]></category>
		<category><![CDATA[BYOK]]></category>
		<category><![CDATA[HYOK]]></category>
		<category><![CDATA[Windows 10 Virtual Desktop]]></category>
		<guid isPermaLink="false">http://erjenrijnders.nl/?p=75852</guid>

					<description><![CDATA[<p>As you know by now (by reading my previous blog posts), I focus mostly on Information Protection and compliance from [&#8230;]</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/28/microsoft-ignite-day-5/">Microsoft Ignite day 5</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As you know by now (by reading my previous blog posts), I focus mostly on Information Protection and compliance from a technical point of view and this blog post will cover a lot regarding that. Today, I wasn’t able to visit as many sessions as the last four days because I need a plane to catch in a few hours, but I still got a few interesting things to share.</p>
<h1>Index:</h1>
<ol>
<li><a href="#security-and-compliance-center">Security and Compliance center</a></li>
<li><a href="#service-encryption">Service Encryption</a></li>
<li><a href="#advanced-e-discovery">Advanced E-Discovery</a></li>
<li><a href="#windows-virtual-desktop">Windows Virtual Desktop, RDMI &amp; Windows 10 Multi-User</a></li>
</ol>
<h1><a id="security-and-compliance-center"></a>Security and Compliance center</h1>
<p>Microsoft covers a big part protecting us from malicious tools and attackers, but there is still a part that we must do. And I can tell you that it is the most important part, like activating MFA, encrypting sensitive data etc. This slides covers what Microsoft does and what you have to do.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-75853" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection.png" alt="" width="683" height="385" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection.png 1657w, https://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection-300x169.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection-768x432.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection-1024x577.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/1-Microsoft-us-responsibilities-data-protection-600x338.png 600w" sizes="(max-width: 683px) 100vw, 683px" /></p>
<p>So about the part that we are responsible of, Microsoft provides us multiple tools. How do AIP and OME help with compliance? Check this slide.</p>
<p><img decoding="async" class="alignnone wp-image-75854" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4.png" alt="" width="550" height="317" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4.png 1628w, https://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4-300x172.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4-768x442.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4-1024x589.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/Screenshot_4-600x345.png 600w" sizes="(max-width: 550px) 100vw, 550px" /></p>
<p>There are certain scenario’s that you don’t want that Microsoft manages your key. Some regulatory reasons might require you to manage your key so the security is end-to-end. BYOK might be sufficient since you can store your own key in Azure Key Vault. If that isn’t even good enough you have the HYOK where you store it on-premises. Keep in mind that this option is much less flexible. You only have access to your secured documents as long as you can reach the on-premises key for decryption. Here is an overview of licensing.</p>
<p><img decoding="async" class="alignnone wp-image-75858" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK.png" alt="" width="625" height="351" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK.png 1577w, https://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK-300x169.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK-768x431.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK-1024x575.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/SKUs-BYOK-HYOK-600x337.png 600w" sizes="(max-width: 625px) 100vw, 625px" /></p>
<p>Here is a great overview of BYOK. It makes clear that it is as flexible as the Microsoft-managed keys, but it does give you more overhead since you need to manage the key now.</p>
<p><img decoding="async" class="alignnone wp-image-75857" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology.png" alt="BYOK-technology" width="611" height="335" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology.png 1646w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology-300x165.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology-768x421.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology-1024x562.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-technology-600x329.png 600w" sizes="(max-width: 611px) 100vw, 611px" /></p>
<p>Some good insights when using BYOK.</p>
<p><img decoding="async" class="alignnone wp-image-75859" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points.png" alt="" width="595" height="319" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points.png 1563w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points-300x161.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points-768x412.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points-1024x549.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/BYOK-important-points-600x322.png 600w" sizes="(max-width: 595px) 100vw, 595px" /></p>
<h1><a id="service-encryption"></a>Service Encryption</h1>
<p>Some good news, if we use the Microsoft-managed keys or BYOK, we will have service encryption in Exchange Online, starting to rollout in January 2019 (already available in SharePoint). Once we create a Data Encryption Policy (DEP), It will encrypt our data at storage level. This is required if you want to meet compliance.</p>
<p><img decoding="async" class="alignnone wp-image-75860" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow.png" alt="" width="542" height="320" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow.png 1456w, https://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow-300x177.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow-768x453.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow-1024x604.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/EXchange-Online-Access-Flow-600x354.png 600w" sizes="(max-width: 542px) 100vw, 542px" /></p>
<p>&nbsp;</p>
<h1><a id="advanced-e-discovery"></a>Advanced E-Discovery</h1>
<p>With the advanced E-Discovery set in Office 365 by using the analytics, we can further minimize the data. It will deduplicate data for example and only present us with relevant data. We are also presented now with a much better E-Discovery dashboard. We see what kind of data the hold holds, but we are also able to communicate with the persons in a specific hold, make searches in it etc. Great improvement!</p>
<p><img decoding="async" class="alignnone wp-image-75861" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard.png" alt="legal-hold-dashboard" width="655" height="369" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard.png 1696w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard-300x169.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard-768x432.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard-1024x577.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-dashboard-600x338.png 600w" sizes="(max-width: 655px) 100vw, 655px" /></p>
<p>Now creating a Legal Hold is doable, but not that easy. But it will be! Here is a great overview of how it is now and how it will be very soon.</p>
<p><img decoding="async" class="alignnone wp-image-75862" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process.png" alt="" width="624" height="346" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process.png 1552w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process-300x166.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process-768x425.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process-1024x567.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/legal-hold-process-600x332.png 600w" sizes="(max-width: 624px) 100vw, 624px" /></p>
<p>So these are some great new features! For sure you will see a more in-depth bog when it’s available.</p>
<p>&nbsp;</p>
<h1><a id="windows-virtual-desktop"></a>Windows Virtual Desktop, RDMI &amp; Windows 10 Multi-User</h1>
<p>Now also a little bit of info about Windows Virtual Desktop, as I can imagine you want to see some updates about this as well. One of the bigger announcements is Windows 10 Multi-User within Windows Virtual Desktop, so you will connect to shared hardware. If you spin up a Windows Virtual Desktop, you can decide how many users you want to connect to that VM which makes it a lot cheaper. There will be a Windows Desktop Calculator soon which gives some recommendations of this, based on the chosen size.</p>
<p>Automatic scaling will be available as well. You can auto scale based on two methods: Breath Mode and Depth Mode. The Breath Mode needs reserved instances so turning off a Virtual Desktop doesn’t help you. However, this can still be cheaper, that’s something you need to calculate. The Depth Mode is based on activity. If no users are logged in anymore in a Virtual Desktop, it will automatically turn off the VM and it will save you money. On the other hand if it’s too busy, it will spin up some new VM’s.</p>
<p>Windows Virtual Desktop will be available through the Azure Marketplace.</p>
<p>&nbsp;</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/28/microsoft-ignite-day-5/">Microsoft Ignite day 5</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://erjenrijnders.nl/2018/09/28/microsoft-ignite-day-5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
