Interlink Cloud Blog

facebooktwitterlinkedin

Mike Wilson

Azure Site Recovery (ASR) | Easy and Cost-effective Disaster Recovery

Azure Site Recovery (ASR) | Easy and Cost-effective Disaster Recovery

Disaster recovery (DR) was once a privilege reserved for large enterprises with substantial budgets and sizeable IT staffs. In year’s past, small and mid-market companies could fall back to manual or paper based processes.  However, that simply isn’t the case today. For most businesses, the paper processes are a thing of the past. Losing access to their critical systems will mean loss of business, lost customers, and possibly even going out of business. This makes disaster recovery an absolute necessity. Fortunately, Azure Site Recovery (ASR) makes it cost-effective and easy. Azure Site Recovery list price is $25 per virtual machine per month – which is incredibly low. 

[...]
Sarah Bunt

ON-DEMAND WEBINAR | How to Manage Any Platform, On Any Cloud with the Microsoft Operations Management Suite (OMS)

ON-DEMAND WEBINAR | How to Manage Any Platform, On Any Cloud with the Microsoft Operations Management Suite (OMS)

On-Demand Webinar - View Replay & Slides


Are you looking for a single hybrid solution that manages your entire fleet of servers, from any location – regardless if your running in public, private or hybrid scenarios?

Join Microsoft and Microsoft Gold Certified Office 365 Partner - Interlink Cloud Advisors - in an on-demand event that covers how Microsoft’s Operations Management Suite (OMS) can help you leverage your cloud-scale resources to unlock new, faster ways to solve and prevent problems and protect your systems.

In this webinar, you’ll see just how OMS delivers capabilities and capacity beyond any on-premises management solution by combining a holistic view of all your managed resources across multiple cloud and platforms - with full-featured backup and disaster recovery solutions.

[...]
Matt Scherocman

The Business and Technical Benefits of Azure AD Domain Services

The Business and Technical Benefits of Azure AD Domain Services

Azure AD Domain Services provides managed domain services that relieve the high cost and administrative overhead required when deploying domain controllers using virtual machines in Azure. Other approaches often require admins to manage and monitor every small detail of these domain controllers, which can cause workloads to be vulnerable to transient network glitches or outages, resulting in lower uptime and reduced reliability due to network outages. With Azure AD Domain Services, you no longer have to worry about this.

[...]
Matt Scherocman

Microsoft Rights Management – Three Different Options to Best Fit Your Information Needs and Budget

Microsoft Rights Management – Three Different Options to Best Fit Your Information Needs and Budget

Microsoft has three different levels of functionality around controlling access to critical intellectual property with rights management. 

Here is a quick summary of Microsoft's Rights Management offerings:

1) Rights Management Service for Office 365

Included in the E3 Service

This option is for those who want base level security and the ability to keep documents that are stored in the cloud secure. It does not protect documents stored locally on a file share, but there is a connector available for Exchange and SharePoint.

[...]
Eric Inch

"Stay Out Unless I Say So!" - The Sweetness of Azure AD Conditional Access

"Stay Out Unless I Say So!" - The Sweetness of Azure AD Conditional Access

I talk to a lot of customers using Office 365 that would like to have granular control on who can access the hosted services and only allow access to these services from corporate owned and managed devices. Enter Azure AD Conditional Access. “Keep out.. Unless of course you meet certain conditions!”

For example, with Azure AD device access rules you can restrict access to Exchange Online to only domain joined machines.

“Wait?! What?! That sounds just like what I’m looking to do.

What does that look like?”

 

When a user attempts to access Outlook Web App from a personal computer, they go to the OWA URL and enter their username and password.


The conditional access policy will look to verify that the device being used to access OWA is domain joined and registered in Azure AD. Since the computer is a personal computer, the user is denied access.


After closer examination using the “More details” link, you can see the access rules set require the device to be domain joined for access. In the scenario of personal computers, this will show as Unregistered.

Your access to corporate resources was swatted away like Dikembe Mutumbo. “Not in my house!”

“Good Eric, that’s all great but how about the full Outlook client? I would really like to see what options we have to prevent our users from connecting their personal Outlook client to our corporate email.”


When a user attempts to connect the Outlook client on a non-domain machine, the Outlook client will open and prompt the user for authentication.


The user will enter their username and password and the authentication process will look for a registered device.


Once again the user will be gently reminded that they need to be on a corporate owned device.

“Wow Eric, I’m really impressed by Conditional Access and the device access restrictions available in the Microsoft security suite. Anything else we should know? What about users that want to access OWA from other browsers?”

 

First and foremost, under no circumstance should you ever use anything other than Microsoft technology. Ever!

But, in the event some of your users want to go against my recommendation, to access corporate resources protected with device access rules they would need to use a supported browser. Conditional access support for applications: https://azure.microsoft.com/en-us/documentation/articles/active-directory-conditional-access-supported-apps/


The behavior when attempting Outlook Web App using the Google Chrome browser would be as follows:

The user enters their username and password from a non-domain machine.

Since the user is trying to use a browser that doesn’t support conditional access, it gives the user a warning that the browser is not supported and to use Microsoft Edge or Internet Explorer.

The device based access rules are configured within Azure AD Premium and have the following options.

  • Enable Access Rules – On or Off. (self-explanatory)
  • Apply To – Specific groups that you want to scope the access rules to. You also have the ability to except specific users from the scope.
  • Device Rules – The access rules you want to enforce for access to the corporate resources.
  • Application Enforcement – “For browser and native applications” OR “For only native applications” Exchange ActiveSync – Require a compliant device to access email

For more information on Azure AD Conditional access, please read the official Microsoft blog article AzureAD Conditional Access Policies for iOS, Android and Windows are in Preview!

 

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.

Blog Categories

Interlink Cloud
Interlink Cloud
5 post(s)
Tips and Tricks
Tips and Tricks
2 post(s)
Outlook
Outlook
2 post(s)
Reporting
Reporting
1 post(s)
Cloud Storage
Cloud Storage
2 post(s)
Webinars
Webinars
14 post(s)
OneDrive
OneDrive
5 post(s)
Yammer
Yammer
3 post(s)
Azure
Azure
19 post(s)
SharePoint
SharePoint
9 post(s)
Microsoft
Microsoft
6 post(s)
Lync
Lync
8 post(s)
Office 365
Office 365
55 post(s)

Blog Archive