Posted by: kurtsh | April 18, 2016

RELEASE: Safety Tips feature of Office 365

A blog post the other day (Email Safety Tips in Office 365) details a new Safety Tips feature of O365 which provides an additional layer of protection via a warning to the user in an email that is marked suspicious, or a reassurance when a message is safe.

image

This feature is unique in that only Office 365 & Exchange Online Protection can integrate with the Outlook client to provide this level of transparency. 

Folks evaluating other solutions like mail gateways or 3rd party filtering solutions should understand how these capabilities can help uniquely protect their organization by simply involving the end user in the process of determining the threat at the time the email is viewed by the user. 

SOCIAL ENGINEERING THREATS
For example: Automated threat filtering is fine if threats are emailed as part of an attachment.  But what if the threat is written, i.e. the ‘threat’ is simple social engineering encouraging a user to send vulnerable data to the attacker – posing as someone in an authority position like IT?  These are the things that Safety Tips can help flag to the end user.

For the more technical, the blog below details the under-the-hood changes to EOP that make some of this possible.

imageJP Morgan recently release a 50-page note to their clients around the state of cloud computing in the Enterprise.

The note summarized the results of a survey of 207 CIOs of large Enterprise companies -specifically those CIOs with a budget of $600M or more.

J.P. MORGAN: INDISPENSIBLE ENTERPRISE VENDORS FOR CLOUD COMPUTING

One of the survey questions asked was:

“Which IT mega-vendor will be most critical and indispensable to your organization’s IT environment in the future, and why?”

The results are somewhat lopsided, with Microsoft coming out the most significant choice of CIOs for cloud computing, with almost 4x as many votes as the next vendor, Amazon:

image

The survey results of J.P. Morgan’s 207 CIOs of large Enterprises for “Critical and Indispensible IT Mega-Vendors”:

  1. 48.9% Microsoft
  2. 13,0% Amazon (AWS)
  3. 11.6% Cisco
  4. 11.1% Oracle
  5. 9.2% SAP
  6. 4.3% IBM
  7. 1.9% EMC
  8. 1.4% Apple
  9. 0.5% Hewlett Packard

J.P. MORGAN: VENDORS LOSING TO CLOUD COMPUTING
J.P. Morgan’s note also highlights “who’s going to lose share to cloud vendors” and the results of that question are similarly lopsided:

  1. 26.1% IBM
  2. 15.0% Hewlett-Packard Enterprise
  3. 14.5% Oracle
  4. 12.1% Dell
  5. 11.6% EMC

MORE ON THE SURVEY
For more on this story and JP Morgan’s survey of these CIOs, read the following articles:

Posted by: kurtsh | April 15, 2016

INFO: Windows 10 Roadmap

imageAt the beginning of the week, we published Microsoft’s Windows Roadmap, in the same way that we’ve published Microsoft’s Server & Cloud Roadmap & the Office Roadmap.

The Windows 10 roadmap provides a snapshot of what we’ve recently made generally available, released into public preview, are still developing and testing, or are no longer developing.

For example, here’s a few items that we’re working on today from the “in development” list:

  • Use Companion Device to Unlock your Windows PC
  • Use your phone to unlock your Windows PC
  • Enhancements to Microsoft Passport
  • Windows Defender Advanced Threat Protection
  • Cortana and Action Center integration
  • Remote Display Experience

For more, visit:

Our Cloud roadmap is located here:

Our Office roadmap is located here:”"

Posted by: kurtsh | April 15, 2016

RELEASE: Visual Studio Code 1.0

image

[taken from the Visual Studio Blog]

Today we’re very proud to release version 1.0 of Visual Studio Code. Since our initial launch one year ago, 2 million developers have installed VS Code. Today, we’re excited to report that more than 500,000 developers actively use VS Code each month.

What started as an experiment to build a production quality editor using modern web technologies has blossomed into a new kind of cross-platform development tool, one that focuses on core developer productivity by centering the product on rich code editing and debugging experiences. Visual Studio Code brings the industry-leading experiences of Visual Studio to a streamlined development workflow, that can be a core part of the tool set of every developer, building any kind of application.

Getting to "1.0" over the last few months has been about more than features. We have worked with the community to further improve stability, fixing hundreds of bugs. And we’ve pushed hard on getting the best performance we can out of the editing experience.

VS Code was initially built for developers creating web apps using JavaScript and TypeScript. But in less than 6 months since we made the product extensible, the community has built over 1000 extensions that now provide support for almost any language or runtime in VS Code. Today, a broad range of developers from individuals and startups to Fortune 500 companies, including audiences completely new to Microsoft’s tools, are all more productive with a tool that fits comfortably into their current tool chain and workflow, and supports the technologies they use, from Go and Python to React Native and C++. With this great ecosystem in place, we’re now confident in declaring our API as stable, and guaranteeing compatibility going forward.

And we have strived to make VS Code 1.0 a great editor for every developer. VS Code is now fully localizable, and ships in 9 different languages, including French, German, Japanese, and Chinese. And, we have worked to make VS Code the most accessible of modern editors, with full keyboard navigation and support for screen reading and accessible navigation for visually impaired developers.

Read more of the announcement here:

imageThis 19-page document provides an overview of the various encryption technologies that are currently available or recently announced for Office 365, including features deployed and managed by Microsoft, and features available to and managed by Office 365 customers.

This document also discusses some common customer concerns regarding their data, and how encryption protects customer data in those scenarios.

Here’s a summary of it’s contents:

  • Encryption of Customer Data at Rest
    • Volume-level Encryption
    • File-level Encryption
      • Skype for Business
      • SharePoint Online (including OneDrive for Business)
        • Files in SharePoint Online
        • List Items in SharePoint Online
    • Advanced Encryption
  • Encryption of Customer Data In-transit
    • Advanced Encryption with Customer-Managed Key
    • Key Management
    • Exiting the Office 365 Service
  • Customer-managed Encryption Technologies
    • Azure Rights Management
    • Office 365 Message Encryption
    • Transport Layer Security
  • Risks and Protection
    • Office 365 General
    • Office 365 Multi-tenant
    • Office 365 Government Community Cloud

Grab the document here.

Posted by: kurtsh | April 14, 2016

BETA: Azure Active Directory Identity Protection

imageAzure Active Directory Identity Protection is in public preview.  Identity Protection is a new feature of Azure AD that gives organizations around the world a previously unavailable level of security for their cloud identities.

Azure AD Identity Protection offers the following capabilities

  • Detection of identity-based security issues using our signals intelligence, experience, and algorithms.
  • Support investigation of risk events and users flagged for risk.
  • Support for in-line remediation and management of risk events.
  • Harnesses the power of Azure AD Conditional Access policies and real-time risk evaluation to auto-remediate leaked-credentials before they can cause harm.

Read more about the solution here:

Posted by: kurtsh | April 14, 2016

INFO: Sign up for the Surface IT Pro Bulletin

From our Devices Specialist, Toni Bollinger:

 “I highly encourage you to subscribe to this communication as it provides you with the latest information on updates being released.”

imageREGISTER FOR SURFACE IT PRO BULLETIN
Keep up with the latest announcements, guidance, resources, and events. Sign up for the Bulletin.

RESOURCES FOR SURFACE’S LIFECYCLE
Explore the technical aspects of Surface and learn how to plan for, deploy, manage, and support Surface devices in your organization.

We present the device lifecycle to help you find tools, step-by-step guides, and other resources to help you get started.

imageSURFACE FOR IT PROS BLOG
Your source for the latest news and tech tips for Microsoft Surface.

Posted by: kurtsh | April 13, 2016

INFO: Installing Office 365 Pro Plus

imageIf you’re an end user with Office 365 E3, E4, or E5, you get access to Office 365 Pro Plus.

And here’s the links for getting that software, assuming you have authenticated access into Office 365.

INSTALL OFFICE
https://portal.office.com/OLS/MySoftware.aspx

  • Install Office 365 ProPlus with the new 2016 apps (32 or 64bit)
  • Install Office 365 ProPlus with the 2013 apps
  • Install language accessory packs

MANAGE/DEACTIVATE INSTALLS
https://portal.office.com/Account#installs

  • Deactivate Office, Project, Visio

TOOLS & OTHER APPLICATIONS

image_thumb[1]Today, Microsoft released a critical patch to address the vulnerability identified as “Badlock”.  The patch is part of a larger critical cumulative update package. (3147458)

It is automatically getting pushed out via Windows Update to end users as part of today’s “Patch Tuesday”.  Corporations that manage their own patching are *encouraged* to evaluate & distribute this patch at their earliest convenience.

The individual patch (3148527) itself is documented here:

imageUPDATE 4/12/16: Today, Microsoft released a critical patch to address the vulnerability identified as “Badlock”.  The patch is part of a larger critical cumulative update package. (3147458)

The individual patch (3148527) itself is documented here:

———————-
ORIGINAL POST:

imageBadlock is a vulnerability to be released April 12 that attacks a weakness in the SMB/CIFS networking protocol.

While the vulnerability seems to be directed towards Microsoft and Samba, it also appears to impact major cloud file sharing providers and other operating systems distributions.

There’s a web site with very few details about the threat at http://badlock.org/.

Here’s a few articles about the topic:

(Thanks to coworker & Account Technology Strategist, Peter Renner, for bringing this to my attention)

« Newer Posts - Older Posts »

Categories