Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Matt Scherocman

Exchange 2013 High Availbility revealed

Exchange 2013 has introduced some new features that bring great options for geographical disaster recovery and High availability.

1. You no longer need a layer 7 load balancing.  you can now use TCP based layer 4 transport load balancers.  These are typically cheaper, and is a clear reason the TMG is being eliminated

2. URL redirection is now built into Exchange 2013, as it is now a true HTTP proxy at the CAS.  It also serves as a stateless proxy for SMTP, which allows for pass through connections through to the mailbox server.

* Exchange will allow a client to cnnect to a CAS in one region, using a single namespace, then identify the URL of the CAS using URL redirection defined in Exchange 2013.  Once identified, it will redirect the client connecting to the CAS in the same AD site (assuming it's internet facing) as the mailbox server that users mailbox resides on.

3. Geographical load-balancing using DNS - Round Robin DNS is a way for you to allow external connections to cache multiple DNS entries, and if one is not available, the other will be pushed in 20 seconds.  What Microsoft also supports for single namespace HA is Geo Loadbalanced DNS, which will identify the DNS entry best suited for a client based on where they are connecting from (IP identification)

4. If you deploy a CAS with a DAG stetched across two sites - it will always route the SMTP connection to the DAG that your active mailbox sits on.  However, if the DAG member you are connecting to is not available, it will create multiple SMTP connections and write to both DAG members with a copy of the mailbox.  This feature is call Safety Net.

5. Managed Availability - All components of Exchange in terms of protocols on the mailbox servers has a recovery mechanism that is sequenced.  Many of the actions taken are automated, allowing for built in recovery mechanisms.

6. Maintenace Mode - you now have the ability to put a DAG member mailbox serveer into maintenace mode to allow for it to be temporarily be in service and not be active in the Exchange 2013 installation.

Continue reading
  4121 Hits
  0 Comments
Matt Scherocman

What is Versionless?

Versionless software is software that is always up to date with incremental improvements.  Microsoft has flipped the coin.  Clients used to have to wait for functionality to be available in the cloud.  Now the cloud gets the functionality first and on premise comes later.  This change is tremendous for clients.  The number one obstacle that clients have told me to utilizing new software is the deployment.  Now in the cloud, Microsoft takes care of that deployment and keeps the product up to date.  From the slides you can see their commitment to the cloud and how much functionality is being released on a regular basis. The 2013 graphic was produced in the late summer time frame so it doesn’t include new functionality like encryption included in the E3 plans that came out later in the year.
What we've delivered 1

What We've Delivered 2

 

This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  6618 Hits
  0 Comments
Matt Scherocman

What Data Security and Compliance is Built into Office 365?

Security is at the heart of Office 365.  Here are some great bullet points from a recent Microsoft blog listing.  Check out the full article here:  http://blogs.office.com/b/office365tech/archive/2013/10/23/cloud-services-you-can-trust-security-compliance-and-privacy-in-office-365.aspx
Built-in capabilities

    • Physical security - We monitor our data centers 24/7 and we have technologies and processes to protect our data centers from unauthorized access or natural disasters
    • Security best practices -We use best practices in design like Secure Development Lifecycle and operations like defense-in-depth to keep your data secure in our data centers
    • Data encryption - Every customers' email content is encrypted at rest using BitLocker Advanced Encryption Standard (AES) encryption
    • Secure network layer - Our networks are segmented, providing physical separation of critical back-end servers from the public-facing interfaces at the same time our Edge router security detects intrusions and signs of vulnerability
    • Automated operations like Lock Box processes - Access to the IT systems that store customer data is strictly controlled via lock box processes. This access control mechanism is similar to a system where two people have to turn the key for an action to be allowed.

Compliance

    • Independently Verified - Third party audits verify that Office 365 meets many key world-class industry standards and certifications
    • Control framework - We follow a strategic approach of implementing extensive standard controls that in turn satisfy various industry regulations. Office 365 supports over 600 controls that enable us to meet complex standards and offer contracts to customers in regulated industries or geographies, like ISO 27001, the EU Model Clauses, HIPAA Business Associate Agreements, FISMA/FedRAMP
    • Comprehensive Data Processing Agreement - Our Data Processing Agreement comprehensively addresses privacy and security of customer data, helping customers comply with local regulations

Privacy

    • No Advertising - We do not scan email, documents, build analytics or data mine to build advertising products. In fact, we do not use your information for anything other than providing you services you have subscribed for.
    • Data Portability - As an Office 365 customer, your data belongs to you, and you can export your data at any time with no restrictions. We act only as a data processor and provider of productivity services, not as a data owner
    • Notice and Consent - When we act upon your data, we let you know why and we ask for permission in advance or redirect any inquiries to our customers unless legally prevented to do so.
    • Breach Response - We have strong, tested and audited processes to inform you if there is a breach and re-mediate issues if they occur.
    • Data Minimization - We strive to minimize the actual amount of customer data that our internal teams have access to.


This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  5583 Hits
  0 Comments
Matt Scherocman

What Reports Does Microsoft Have Available For Monitoring Skype for Business Usage?

Microsoft has NEW Lync Reporting in Office 365.

These reports help you to visualize lync usage throughout your business.

Follow the link below for more information:

http://blogs.office.com/b/office365tech/archive/2013/10/03/visualize-lync-usage-for-your-business-with-new-reports.aspx

This posting is provided “AS IS” with no warranties, and confers no rights

Continue reading
  4851 Hits
  0 Comments
Matt Scherocman

What Are The Different Options for Microsoft Office?

 

The following chart highlights the differences/similarities between Microsoft Office Products, to help you better understand what product will best fit your needs.


 b2ap3_thumbnail_office-365-versions-2.PNG_20140414-190552_1.jpg
 
For more information on each, please see the links below:
Traditional Office Pro
Office 365 Pro Plus
Office Web Apps
Office Mobile


 This posting is provided “AS IS” with no warranties, and confers no rights.

 

Continue reading
  5796 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.