Skip to main content

Message Encryption for Office 365

Much anticipated Message Encryption for Office 365 is now generally available and is being rolled out, read the following article for more information.   

Message Encryption is replacing what was previously known as Exchange Hosted Encryption (EHE), and while the basic idea of using mail-flow rules for transparently enforcing encryption policies remains the same, there's one major change on the back-end. Specifically, there has been a move away from the Voltage Identity Based Encryption (IBE) to Microsoft's own Rights Management Services (RMS).

Why was this feature much anticipated? Because it enhances overall security and privacy controls within Office 365's Exchange Online component; it also does so in a customer friendly fashion by incorporating this useful functionality into higher-level O365 subscriptions (starting with E3/G3) at no additional charge (add-on for the lower-level subscriptions):   
“Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can easily view their encrypted messages and return encrypted replies. Regardless of the destination email service - whether it’s Outlook.com, Yahoo, Gmail, or another service - email users can send confidential business communications with an added level of protection against unauthorized access.”
For more information, check out the following:
  • Blog post on the Message Encryption announcement - here
  • TechNet article that covers Message Encryption details - here
Also, since Rights Management Services (RMS) are essential to the Message Encryption functionality and are also a necessary component of the Information Rights Management (IRM) within different Office 365 components (e.g. SharePoint Online, Exchange Online, MS Office), it would be advisable to gain some familiarity with RMS/IRM. Here are a few helpful links:

Comments

  1. Wynn Casino in Las Vegas: Now Open | JTM Hub
    JTM has partnered 안동 출장안마 with Wynn Las Vegas to bring Las Vegas casino gaming to life. 서귀포 출장마사지 The 부천 출장안마 gaming floor features more than 120 table 보령 출장마사지 games, 에볼루션 바카라 including the latest

    ReplyDelete

Post a Comment

Popular posts from this blog

Updating computer's AD Security Group membership without rebooting

I found the following to be very useful - From the elevated command prompt execute “ klist –li 0x3e7 ” to view the logon session of the computer account . To purge them, simply execute “ klist –li 0x3e7 purge ”. A typical use case might involve targeting GPOs based on computer's group membership. When you add computer to the group in order to test the application of policies you can reboot it or, alternatively, run the above mentioned to clear logon sessions, then do “ gpupdate /force ” and check. In a spirit of giving credit where credit is due, I found a few references to this, but the one I learned it from was  http://setspn.blogspot.com/2010/10/updating-servers-security-group.html
  AI Agents as Trusted IoT/Software Defined Devices 🤖 Your Newest Endpoint Isn’t a Laptop; It’s an AI Agent. Are You Ready to Secure It? Dive into the next frontier of cybersecurity. Autonomous AI agents are no longer just code; they are powerful actors in our digital ecosystems. Treating them as simple software leaves a massive security gap. Our latest report introduces a new paradigm: The AI Agent as a Software-Defined Device. Discover the essential framework for securing the agentic future: ➡️ The Agent-as-Device Model: Learn why abstracting agents as software-defined devices, similar to IoT endpoints, is the key to managing their complexity and risk. Secure the “hardware” (host), “software” (agent logic), and “network” (communications). ➡️ A Digital Passport for AI: Move beyond static API keys. Explore how Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) create a cryptographic root of trust, giving every agent a verifiable identity and provable permissions. ➡️...

WordPress displays weird characters

Sometimes after a database conversion (e.g. from MySQL to MariaDB) or due to encoding issues a situation might arise when WordPress is showing weird characters. A quick way of remedying the situation would involve examining the pages to discover a pattern (what characters are being substituted, in the example below the apostrophe was replaced by  ’ ) then running an queries against the database to reverse the effect. Here's a quick example (common tables that store content): UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  'Â' ,  '' )      UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  '’' ,  "'" )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (meta_value,  'Â' ,  '' )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (me...