Interlink Cloud Blog
Sarah Bunt

ON-DEMAND WEBINAR | How to Achieve Advanced Security, Compliance and Visibility with Office 365

ON-DEMAND WEBINAR | How to Achieve Advanced Security, Compliance and Visibility with Office 365

On-Demand Webinar & Slides

view webinar O365 Advanced Security and Compliance


Video Shot O365 Advanced Security and Compliance


While moving to the cloud has increased flexibility for employees and reduced IT cost, it has also raised new security concerns for many organizations. 

To realize the full benefit of cloud applications, IT teams must find the right balance of enabling access while maintaining control to protect critical data.

In this on-demand event, Microsoft and Microsoft Cloud Consumption Partner of the Year, Interlink Cloud Advisors show you how an organization can take full advantage of the cloud while maintaining control, security and improved visibility into activity with Advanced Security Management and Advanced eDiscovery.

Through demos and successful customer deployment scenarios, we’ll help you understand the new security and compliance functionality available in Office 365 and show you can achieve:

  • Improved Security and Compliance: Protect and control access to your data
  • Accelerated Response Times: Take corrective action quickly on security violations
  • Reduced Risk: Reduction in the time spent looking for litigation information
  • Improved Protection: Reduce ransomware and malware

After viewing, you'll also understand new Office 365 E5 licensing and all of your security options and bundles available.

Demos Include: 

Advanced eDiscovery and Advanced Security Management


Presented By:

Jason Wingert

Jason Wingert
Vice President & Principal Consultant, Interlink Cloud Advisors

 

Stephanie Donahue

Why the Dropbox Security Breach Should Have You Deploying OneDrive for Business

Why the Dropbox Security Breach Should Have You Deploying OneDrive for Business

I’ve said for a while that if you haven’t invested in a corporate-managed external file sharing software like Box, Dropbox or OneDrive, then I guarantee at least some of your users have gone rogue and done it themselves. For a long time, corporate users have been frustrated with email attachments that are blocked and aging and unreliable ftp servers. As a result, many have resorted to creating their own personal Dropbox accounts. These personal accounts may be connected to personal email addresses or even a corporate email address. These personal Dropbox accounts are being used to transfer the corporate documents you are responsible for protecting. This is commonly encouraged by vendors and so your end users see it as harmless. Everyone does it. It’s possible that even the IT department isn’t overly concerned about it – I haven’t seen many IT departments drop everything to fix the problem.  Before I explain my concern…let me start with a story.

As a member of IT leadership, you get a phone call from Dropbox. They inform you that 100 users in your organization have Dropbox accounts that they created on their own, using their corporate email. So – aren’t you interested in an Enterprise account so you can manage them? First, this may come as a shock – 100 users! You ask – can I find out who those users are?  No, they won’t provide that information, you don’t own it. You look into the cost and it’s more than you want to deal with, so you put it to the side to be addressed later.

In the meantime, Dropbox has a security breach.  Those 100 users from your own organization now have shared content that can be compromised. This time, it’s only old passwords and Dropbox forced password resets for those that needed it. However, we’ve seen a lot of security breaches lately across a number of platforms and many of them have been on relevant and active information. Sure, you could always just have them go change their passwords when these things happen. In this case though, you don’t even know who to contact to make sure they do. And…what if that compromised password is on an account that links to their corporate email and it was the same one they used to log into your network with? They didn’t just hack Dropbox, your network is at risk. So, you don’t know who has an account, who used the same password for their corporate account, who hasn’t changed their password since the breach, or what content is at risk. This isn’t a good situation!

Fortunately, the answer may be easier than you think. For many, OneDrive for Business is already part of your licensing agreement. It’s an easy roll-out and one of the easiest components of Office 365 to train users on. For those concerned about not being ready for the cloud, you can still support your on-premises SharePoint 2013 or 2016 servers and configure a redirect to OneDrive for Business instead of using My Sites. Easy! No more excuses.

Contact Interlink to learn more about OneDrive and how it keeps your documents secure.

Matt Scherocman

FindTime: Scheduling a Meeting Just Got a Whole Lot Easier

FindTime: Scheduling a Meeting Just Got a Whole Lot Easier

FindTime for Office 365 Makes Scheduling a Meeting Easy

Scheduling across multiple organizations can be a difficult process. A one-hour meeting with seven people from two different companies can take weeks to schedule. For the meeting organizer, planning a meeting between multiple third party representatives is a tiresome game of phone and email tag. For the attendees, it’s equally as frustrating. Just as soon as the business calendar is being updated, an email storms the inbox, stating that someone forgot to check a calendar and a new meeting time is needed.

Those who have gone through this process frequently find themselves saying, “There has to be a better way to schedule these meetings.”

Scheduling FOR the People

With the addition of Microsoft’s FindTime to the Office 365 suite, a better way to schedule meetings across organizations exists. FindTime is a free Outlook add-in that gives meeting organizers and attendees the flexibility to schedule a time that works for everyone. FindTime reduces the amount of phone calls and email clutter that piles up during the scheduling process.

How does FindTime work?

replay findtime meeting pollFindTime is a plugin for Outlook with Office 365.
You can either start a new message or reply with a meeting poll.
Next, it automatically looks at your calendar and the calendars of people in your organization, and show times when all invitees are available. 
The coolest part is...the application emails the “poll” to the other parties and lets them select the times they are available, along with the ones that they prefer the most.

findtime

FindTime is a welcomed tool for sales teams, product managers, business developers, and any other business units that require meetings with other organizations. 

To use FindTime, the organizing party must have an active Office 365 subscription and be using Outlook. However, attendees don’t need an Office 365 subscription and they don't have to be using Outlook. FindTime transforms multiple party scheduling by seamlessly working across different email service providers, devices, and organizational sizes and structures.

With FindTime, organizers and attendees can focus their time and resources on how to make meetings productive, not how to make them happen.

findtime install for free

 

Matt Scherocman

Difference Between Microsoft’s Cloud App Security and Office 365 Advanced Security Management

Difference Between Microsoft’s Cloud App Security and Office 365 Advanced Security Management

Cloud App Security and Office 365 Advanced Security Management are very comparable Microsoft products, and many of our clients are confused over the difference between them. Both were acquired by Microsoft through the acquisition of Adallom and give users the capability to create security policies and receive alerts when those policies are breeched. In addition, each of the products give users the ability to set manual or automation remediation. Focused on Office 365, Advanced Security Management (ASM) does that work automatically.

In contrast, Cloud App Security covers a wide range of SaaS-based applications - including competitor’s services like Box, Salesforce, and Amazon Web Services. Cloud App Security also adds more functionality including its own data loss prevention, ability to automatically add new applications, and integration with Security Information Event Management (SIEM) products. 

The below chart provides additional details on when each product includes:

Difference Between Microsoft Cloud App Security and Office 365 Advanced Security Management

Contact Interlink today to discuss your needs and which solutions would be a fit for your organization.  

Mark Rackley

Impactful Changes to Office 365 – SharePoint Sandbox Solutions [Time Sensitive]

Impactful Changes to Office 365 – SharePoint Sandbox Solutions [Time Sensitive]

Microsoft has recently made a significant change to the way they are handling SharePoint Sandbox Solutions in Office 365. This may have a major impact or your organization as these changes roll out across tenants.

If you have uploaded any Sandbox Solutions to your Office 365 tenant in the past week or so, you may have found that you are no longer able to activate these templates. That is because Microsoft is in the process of disabling the activation of any Sandbox Solutions that contain code. In addition, according to an article in Reddit - Microsoft has disabled activation of Sandboxed code solutions AND will disable all active solutions in 30 days on SharePoint Online.

Now, I’m skeptical of the statement that all Sandbox Solutions with code will be disabled in 30 days, as this will unlikely cause catastrophic consequences for some folks, but I don’t have any further information at this time.

What do disabled SharePoint Sandbox Solutions mean to me?

There are a few implications here. If you have any code-based Sandbox Solutions running in your environment in Office 365 you may start to see broken web-parts, pages, event receivers, or broken other functionality/errors in the next month or so. The implications could be as small as a missing web part on a page to a broken site collection. It really depends on what code has been deployed to your tenant.

In addition, if you’ve previously created any Site Templates that were created from sites that had activated code-based Sandbox Solutions, you will NOT be able to create sites from these templates after the solution has been disabled.

How can I tell if I have any SharePoint Sandbox Solutions?

You can go to your Solutions Gallery to see if you have any Sandbox Solutions deployed. You can get to the Solutions Gallery by going to the Site Settings of your Site Collection, then clicking on the “Solutions” link under the “Web Designer Galleries” section.

sandbox Solutions

Please note, this is also where things like Site Templates are stored, so don’t freak out of you see some solutions deployed and don’t know what they are. Hopefully they were named well as there are little details displayed from the Solutions Gallery itself.

Why weren’t we warned sooner?

Microsoft actually DID warn everyone back in January 2014 - one instance of this is on the SharePoint dev blog in an article titled Deprecation of Custom Code in Sandboxed Solutions. Plus we’ve been telling clients since then to stop doing code-based Sandbox Solutions.

Yet, it is a little surprising they would make sure a hard cut off of 30 days though. If I can get some confirmation I’ll be sure to update the post.

What do I do if this affects my company?

Excellent question. First of all, if you have any Site Templates that utilize code-based Sandbox Solutions, re-create those Site Templates with your code-based Sandbox Solutions disabled. I would do this immediately - if not sooner. Once a solution has been deactivated there is no way to create a site with a Site Template dependent on that feature.

Secondly, if you have any code-based Sandbox Solutions, evaluate their functionality and determine what will stop working. Some of the functionality (visual web parts) can be recreated with scripting, while other functionality (event receivers) may cause you a lot more heartburn to replicate without a Sandbox Solution.

You can also reach out to us at Interlink and we could help point you in the right direction for what to do in your particular scenario. It is important you do SOMETHING though. Interlink can assess your current environment, help point out possible pain points, and guide you through the re-creation of code-based Sandbox Solutions into a supported format.

Should I panic?

Hopefully, no, but honestly, if code-based Sandbox Solutions are forcibly disabled in 30 days you should be concerned if there is any chance you have them in your environment.

[Update as of 8/3/2016: Microsoft released a script that lets you check for sandbox solutions]

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.

Blog Categories

Interlink Cloud
Interlink Cloud
6 post(s)
Tips and Tricks
Tips and Tricks
2 post(s)
Outlook
Outlook
2 post(s)
Reporting
Reporting
1 post(s)
Cloud Storage
Cloud Storage
2 post(s)
Webinars
Webinars
15 post(s)
OneDrive
OneDrive
5 post(s)
Yammer
Yammer
3 post(s)
Azure
Azure
21 post(s)
SharePoint
SharePoint
10 post(s)
Microsoft
Microsoft
6 post(s)
SQL 2016
SQL 2016
1 post(s)
Lync
Lync
8 post(s)
Office 365
Office 365
59 post(s)