SlideShare a Scribd company logo
Microsoft 365 |
Modernisez, optimisez et sécurisez
votre entreprise
Siddick ELAHEEBOCUS
Directeur
SPILOG PARTNER
CONSULTING SERVICES
Siddick ELAHEEBOCUS @ SPILOG Partner Consulting Services (SPCS)
▪ Directeur & Stratégiste informatique.
▪ Originaire de l’Ile Maurice.
▪ Conférencier, formateur et expert des technologies Microsoft (cloud, datacenter, productivité, mobilité, sécurité), VEEAM,
Citrix, Dell, entre autres.
▪ 18 années d’expériences à l’international :
o L’intégration des systèmes, stratégie, consulting, la formation informatique.
▪ Territoire : Polynésie Française, Nouvelle Calédonie, Vanuatu, Fiji, Nouvelle Zélande, Ile Maurice, Afrique.
▪ Microsoft : Ex-P-SSP / Ex-TSP, Ex-MCT Lead, MCT et autres à venir 😊 !
▪ Membre actif :
Organisation Pays
Communauté aOS Mondial
Organisation des Professionnels de l'Économie Numérique (OPEN)
(Référent Infras & liaisons (PR/privé) du projet SMART Polynesia) Polynésie
FrançaiseClub de la Sécurité de l'Information Région Tahiti (CLUSIR)
Incubateur de projets polynésiens (PRISM) (Mentor)
Organisation des Professionnels de l'Économie Numérique (OPEN)
Nouvelle
Calédonie
Fédération des enterprises (MEDEF)
Syndicat du Numérique Nouvelle-Calédonie (SNNC)
IT Professionals New Zealand Nouvelle Zélande
Références
• Profile LinkedIn| https://tinyurl.com/ydxuws6a
• Etude de cas Microsoft (Tahiti Nui Fortress) | https://tinyurl.com/y9cv4lsz
• Etude de cas Microsoft (VITI) | https://tinyurl.com/y8tkfjvt
• Article de presse | https://tinyurl.com/y9tbztr6
• Speaker au Pacific Business Forum | https://tinyurl.com/y7abdwlp
• Speaker au conférence Microsoft Docker | https://tinyurl.com/ycqdpp99
• Speaker au Microsoft Techdays | https://tinyurl.com/yazq8ezp
• Canal YouTube | https://tinyurl.com/y8ob4c7v
Les grands défis technologiques auxquels
sont confrontés les PME aujourd'hui
Maintenir une
technologie à jour
Favoriser la
mobilité
Protéger vos
données sensibles
Lutter contre les
Cyber-menaces
Local Logins
/MSA
New PCs
bought adhoc
PCs refreshed
when dead
Employees
using personal
mobile devices
IT purchasing
decisions
made “on the spot”
What does today look
like for the customers?
“Good
enough”
platforms
No
technology
strategy
Legacy
back office
Fragmented
end-point
solutions
Cybercriminals target businesses of all sizes
24% customer’s privacy violated
20% trade secrets leaked
(1) Source: Small Business Cyber Security Study, Microsoft & YouGov, April 2018
(2) Source: Better Business Bureau “2017 State of Cybersecurity Among Small Businesses in North America. https://www.bbb.org/globalassets/shared/media/state-of-
cybersecurity/updates/cybersecurity_final-lowres.pdf
33%
(1)
One in four SMBs targeted (1)
Average loss (2)
$79,841
A complete, intelligent solution
to empower employees to be
creative and work together, securely.
Microsoft 365
Windows 10 + Office 365 + Enterprise Mobility + Security
Productivity
Office Applications
Word, Excel, PowerPoint, Outlook,
and more
Online Services
Exchange, OneDrive (1TB), Teams, and
more
Advanced Services
Exchange Online Archiving
Advanced Security
External Threat Protection
Office 365 Advanced Threat
Protection
Multi-Factor Authentication
Enforce Windows Defender Exploit
Guard
Enforce BitLocker encryption
Internal data leak prevention
Data Loss Prevention
Azure Information Protection
Device management
Device management
Microsoft Intune
Single Sign On (SSO) > 10 apps
Deployment assistance
Windows Autopilot
Auto-installation of Office apps
AAD Auto-enroll
+ +
What is
Additional benefits
Consistent security configuration across
Windows 10, macOS, Android, and iOS
devices
Upgrade from Windows 7 Pro or Windows 8.1
Pro to Windows 10 Pro ad no additional cost
99.9% financially-backed uptime guarantee;
24x7 online and phone support
Microsoft 365 Business
Microsoft 365 Business | Simplifying SMB technology investment
3rd party solutions
Productivity Software
File Storage
Online Meetings
Device Anti Virus
Email Filtering
Chat-based teamwork
Cloud identity management
Device Management
Archiving
>$100 Microsoft offerings $20
Microsoft 365 Business
A single, integrated solution
with support for hybrid identity
Windows 10 Business
Intune
Office 365 Advanced Threat Protection
Data Loss Prevention
Azure Information Protection P1
AAD Features
Exchange Online Archiving
Office 365 Business Premium
Microsoft 365
Microsoft 365
Enterprise
Microsoft 365
Education
Microsoft 365 E5
Microsoft 365 E3
Microsoft 365 F1
Microsoft 365
Business
Single entry point with a rationalized
set of specialist workspaces
Microsoft 365
Admin Center
Demo
Gagnez en éfficacité avec des outils
intelligents simples et familiers
Travaillez efficacement avec l’intégration
de toutes vos applications et solutions
Accédez à tous vos fichiers où que
vous soyez, et sécurisez votre
travail avec le stockage de fichiers en
ligne
Travaillez en mobilité avec des fonctions
de messagerie et de calendrier pour
organiser vos réunions facilement
Plus efficace
Mieux collaborer
ensemble
Des outils qui permettent
à votre équipe de mieux
travailler ensemble
Microsoft 365 | Modern workplace
Familiar Workflow Easy to Use Financial Peace of Mind
Easy to Schedule:
No Changes. Same Workflow
No 3rd party plug-ins
Simply schedule a Teams
meeting
“VTC Dial-in” info is
automatically included
Easy to Join:
One Click. You’re IN!
One touch dialing on video endpointsClick to join from native client
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Demo
Windows 10
Enables creativity
& teamwork
Intelligent
security
Integrated for
simplicity
Threat protection
Help avoid OS
tampering with
System Guard
Safely browse the
internet with
Application Guard
Protect against
malware with
Anti-Virus
Block malware and
untrusted apps with
Application Control
Block connections
to malicious sites
with Exploit Guard
Prevent attacks, isolate threats and control malicious code execution with Windows Defender
Plan upgrades by identifying devices
that are ready, identify and resolve
app and driver compatibility blockers
Ensure update and antimalware
compliance with timely reports for
all your devices (even those on the
road)
Upgrade Readiness Update Compliance Device Health*
Reduce support costs by pro-
actively identifying and
remediating top end-user
impacting issues
Windows Analytics is a free solution that provides data-driven insights to reduce the cost of
deploying, servicing, and supporting Windows 10
Demo
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Demo
Microsoft 365 | Modern workplace
Traditional Windows deployment // The old way
Build a custom image,
gathering everything else
that’s necessary to deploy
Time means money, making
this an expensive proposition
Deploy image to a new
computer, overwriting what
was originally on it
DRIVERS POLICIES
OFFICE & APPS
SETTINGS
Modern Windows deployment // The new way
Un-box and turn on
off-the-shelf Windows PC
Device is ready
for productive use
Transform with minimal
user interaction
Hardware vendor
Register devices
you purchased
Set OOBE
policy
Employee unboxes
device, powers on
Ship device directly to employee
Sync
IT Admin
Windows Autopilot Service
Intune
Configure
OOBE
Known
device?
Microsoft 365 | Modern workplace
Demo
What is it?
ATP Safe Attachments
ATP Safe Links
ATP for SharePoint, OneDrive, and Microsoft Teams
spoof intelligence
ATP anti-
phishing capabilities in Office 365
View reports to see how ATP is working
ATP reports include:
Threat protection status report
ATP Message Disposition report
ATP File Types report
If there is no data in the report, double check
that policies are set up correctly. Organizations
must have ATP Safe Links policies and ATP Safe
Attachments policies defined in order for ATP
protection to be in place.
GDPR (RGPD)
Lengthy and complex requirements
Enhanced personal privacy rights
Increased duty to protect data
Mandatory breach reporting
Significant penalties for non-compliance Improved data policies and processes
Tighter controls
Better data governance tools
What is it?
What is it?
What you need to know:
A DLP policy contains a few basic things:
Where to protect the content – locations such as Exchange Online,
SharePoint Online, and OneDrive for Business sites.
When and how to protect the content by enforcing rules comprised of:
▪ Conditions the content must match before the rule is enforced – for
example, look only for content containing Social Security numbers
that's been shared with people outside your organization.
▪ Actions that you want the rule to take automatically when content
matching the conditions is found – for example, block access to
the document and send both the user and compliance officer an
email notification.
Demo
Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
Compliance Manager
View your compliance posture against
evolving regulations.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
Demo
What is it?
What you need to know:
AIP works by classifying data based on sensitivity. You
configure policies to classify, label, and protect data
based on its sensitivity. Classification with Azure
Information Protection is fully automatic, driven by users,
or based on recommendation.
Classification and protection information follows the
data—ensuring it remains protected regardless of where
it’s stored or who it’s shared with. You can define who
can access data and what they can do with it—such as
allowing to view and edit files, but not print or forward.
WIP – Copying Highly Confidential file to Personal One
Drive
WIP – Copying Highly Confidential file to Gmail
WIP – Copying Highly Confidential file to USB Drive
Demo
Helps you manage sensitive data prior to migrating to
Office 365 or other cloud services
Use discover mode to identify and report on files
containing sensitive data
Use enforce mode to automatically classify, label and
protect files with sensitive data
Can be configured to scan:
• CIFS file shares
• SharePoint Server 2016
• SharePoint Server 2013
• SharePoint Server 2010
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace

More Related Content

PDF
Microsoft 365 Compliance
David J Rosenthal
 
PDF
Communication Compliance in Microsoft 365
Joanne Klein
 
PDF
Information protection & classification
David De Vos
 
PDF
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
PDF
Symantec Data Loss Prevention 11
Symantec
 
PDF
Introducing Data Loss Prevention 14
Symantec
 
PPTX
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
PDF
DLP Data leak prevention
Ariel Evans
 
Microsoft 365 Compliance
David J Rosenthal
 
Communication Compliance in Microsoft 365
Joanne Klein
 
Information protection & classification
David De Vos
 
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Symantec Data Loss Prevention 11
Symantec
 
Introducing Data Loss Prevention 14
Symantec
 
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
DLP Data leak prevention
Ariel Evans
 

What's hot (20)

PPT
Summer Tour CCH Event L2TC
Bill Watters
 
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
PPTX
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
PDF
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
PPT
Universal Search for Legal Enterprises
AdhereSolutions
 
PDF
Microsoft 365 Business - Presented by Razor Technology
David J Rosenthal
 
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
PPTX
Where in the world is your Corporate data?
Ashish Patel
 
PPTX
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor
 
PDF
Michael Jay Freer - Information Obfuscation
iasaglobal
 
PDF
DLP Executive Overview
Kim Jensen
 
PPT
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
PDF
Where data security and value of data meet in the cloud ulf mattsson
Ulf Mattsson
 
PPTX
Big data and analytics
Freeform Dynamics
 
PPTX
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
PPT
DLP
saurabh.sood
 
PPTX
Data Loss Prevention from Symantec
Arrow ECS UK
 
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
PPTX
A Smarter, More Secure Internet of Things
NetIQ
 
Summer Tour CCH Event L2TC
Bill Watters
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Universal Search for Legal Enterprises
AdhereSolutions
 
Microsoft 365 Business - Presented by Razor Technology
David J Rosenthal
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Where in the world is your Corporate data?
Ashish Patel
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor
 
Michael Jay Freer - Information Obfuscation
iasaglobal
 
DLP Executive Overview
Kim Jensen
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Where data security and value of data meet in the cloud ulf mattsson
Ulf Mattsson
 
Big data and analytics
Freeform Dynamics
 
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
Data Loss Prevention from Symantec
Arrow ECS UK
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
A Smarter, More Secure Internet of Things
NetIQ
 
Ad

Similar to Microsoft 365 | Modern workplace (20)

PDF
May 2020 Microsoft 365 Need to Know Webinar
Robert Crane
 
PDF
Being more secure using Microsoft 365 Business
Robert Crane
 
PPTX
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
jeffgellman
 
PDF
Focusing on security with Microsoft 365 Business
Robert Crane
 
PPTX
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
 
PDF
What is Microsoft 365 Business?
Robert Crane
 
PDF
Introducing Microsoft 365 for Business
David J Rosenthal
 
PDF
Pitching Microsoft 365
Robert Crane
 
PPTX
Office 365 Saturday - Office 365 Security Best Practices
Benoit HAMET
 
PDF
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
PPTX
M365 reinventing digital environment for modern workplace
Ahmad Almarzouk
 
PPTX
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
PPTX
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
PPTX
In t trustm365ems_v3
InTTrust S.A.
 
PDF
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
PDF
Productivity and Security with Microsoft 365 and the Modern Desktop
David J Rosenthal
 
PPTX
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
 
PPTX
Intelligent Security, Compliance and Privacy in Office 365
Miguel Isidoro
 
PDF
Microsoft Office 365 Security and Compliance Updates
David J Rosenthal
 
PPTX
Microsoft 365 Business Overview
Carolyn Roberts
 
May 2020 Microsoft 365 Need to Know Webinar
Robert Crane
 
Being more secure using Microsoft 365 Business
Robert Crane
 
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
jeffgellman
 
Focusing on security with Microsoft 365 Business
Robert Crane
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
 
What is Microsoft 365 Business?
Robert Crane
 
Introducing Microsoft 365 for Business
David J Rosenthal
 
Pitching Microsoft 365
Robert Crane
 
Office 365 Saturday - Office 365 Security Best Practices
Benoit HAMET
 
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
M365 reinventing digital environment for modern workplace
Ahmad Almarzouk
 
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
In t trustm365ems_v3
InTTrust S.A.
 
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Productivity and Security with Microsoft 365 and the Modern Desktop
David J Rosenthal
 
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
 
Intelligent Security, Compliance and Privacy in Office 365
Miguel Isidoro
 
Microsoft Office 365 Security and Compliance Updates
David J Rosenthal
 
Microsoft 365 Business Overview
Carolyn Roberts
 
Ad

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
The Future of Artificial Intelligence (AI)
Mukul
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Doc9.....................................
SofiaCollazos
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Software Development Methodologies in 2025
KodekX
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Microsoft 365 | Modern workplace

  • 1. Microsoft 365 | Modernisez, optimisez et sécurisez votre entreprise Siddick ELAHEEBOCUS Directeur SPILOG PARTNER CONSULTING SERVICES
  • 2. Siddick ELAHEEBOCUS @ SPILOG Partner Consulting Services (SPCS) ▪ Directeur & Stratégiste informatique. ▪ Originaire de l’Ile Maurice. ▪ Conférencier, formateur et expert des technologies Microsoft (cloud, datacenter, productivité, mobilité, sécurité), VEEAM, Citrix, Dell, entre autres. ▪ 18 années d’expériences à l’international : o L’intégration des systèmes, stratégie, consulting, la formation informatique. ▪ Territoire : Polynésie Française, Nouvelle Calédonie, Vanuatu, Fiji, Nouvelle Zélande, Ile Maurice, Afrique. ▪ Microsoft : Ex-P-SSP / Ex-TSP, Ex-MCT Lead, MCT et autres à venir 😊 ! ▪ Membre actif : Organisation Pays Communauté aOS Mondial Organisation des Professionnels de l'Économie Numérique (OPEN) (Référent Infras & liaisons (PR/privé) du projet SMART Polynesia) Polynésie FrançaiseClub de la Sécurité de l'Information Région Tahiti (CLUSIR) Incubateur de projets polynésiens (PRISM) (Mentor) Organisation des Professionnels de l'Économie Numérique (OPEN) Nouvelle Calédonie Fédération des enterprises (MEDEF) Syndicat du Numérique Nouvelle-Calédonie (SNNC) IT Professionals New Zealand Nouvelle Zélande
  • 3. Références • Profile LinkedIn| https://tinyurl.com/ydxuws6a • Etude de cas Microsoft (Tahiti Nui Fortress) | https://tinyurl.com/y9cv4lsz • Etude de cas Microsoft (VITI) | https://tinyurl.com/y8tkfjvt • Article de presse | https://tinyurl.com/y9tbztr6 • Speaker au Pacific Business Forum | https://tinyurl.com/y7abdwlp • Speaker au conférence Microsoft Docker | https://tinyurl.com/ycqdpp99 • Speaker au Microsoft Techdays | https://tinyurl.com/yazq8ezp • Canal YouTube | https://tinyurl.com/y8ob4c7v
  • 4. Les grands défis technologiques auxquels sont confrontés les PME aujourd'hui Maintenir une technologie à jour Favoriser la mobilité Protéger vos données sensibles Lutter contre les Cyber-menaces
  • 5. Local Logins /MSA New PCs bought adhoc PCs refreshed when dead Employees using personal mobile devices IT purchasing decisions made “on the spot” What does today look like for the customers? “Good enough” platforms No technology strategy Legacy back office Fragmented end-point solutions
  • 6. Cybercriminals target businesses of all sizes 24% customer’s privacy violated 20% trade secrets leaked (1) Source: Small Business Cyber Security Study, Microsoft & YouGov, April 2018 (2) Source: Better Business Bureau “2017 State of Cybersecurity Among Small Businesses in North America. https://www.bbb.org/globalassets/shared/media/state-of- cybersecurity/updates/cybersecurity_final-lowres.pdf 33% (1) One in four SMBs targeted (1) Average loss (2) $79,841
  • 7. A complete, intelligent solution to empower employees to be creative and work together, securely. Microsoft 365 Windows 10 + Office 365 + Enterprise Mobility + Security
  • 8. Productivity Office Applications Word, Excel, PowerPoint, Outlook, and more Online Services Exchange, OneDrive (1TB), Teams, and more Advanced Services Exchange Online Archiving Advanced Security External Threat Protection Office 365 Advanced Threat Protection Multi-Factor Authentication Enforce Windows Defender Exploit Guard Enforce BitLocker encryption Internal data leak prevention Data Loss Prevention Azure Information Protection Device management Device management Microsoft Intune Single Sign On (SSO) > 10 apps Deployment assistance Windows Autopilot Auto-installation of Office apps AAD Auto-enroll + + What is Additional benefits Consistent security configuration across Windows 10, macOS, Android, and iOS devices Upgrade from Windows 7 Pro or Windows 8.1 Pro to Windows 10 Pro ad no additional cost 99.9% financially-backed uptime guarantee; 24x7 online and phone support Microsoft 365 Business
  • 9. Microsoft 365 Business | Simplifying SMB technology investment 3rd party solutions Productivity Software File Storage Online Meetings Device Anti Virus Email Filtering Chat-based teamwork Cloud identity management Device Management Archiving >$100 Microsoft offerings $20 Microsoft 365 Business A single, integrated solution with support for hybrid identity Windows 10 Business Intune Office 365 Advanced Threat Protection Data Loss Prevention Azure Information Protection P1 AAD Features Exchange Online Archiving Office 365 Business Premium
  • 10. Microsoft 365 Microsoft 365 Enterprise Microsoft 365 Education Microsoft 365 E5 Microsoft 365 E3 Microsoft 365 F1 Microsoft 365 Business
  • 11. Single entry point with a rationalized set of specialist workspaces Microsoft 365 Admin Center
  • 12. Demo
  • 13. Gagnez en éfficacité avec des outils intelligents simples et familiers Travaillez efficacement avec l’intégration de toutes vos applications et solutions Accédez à tous vos fichiers où que vous soyez, et sécurisez votre travail avec le stockage de fichiers en ligne Travaillez en mobilité avec des fonctions de messagerie et de calendrier pour organiser vos réunions facilement Plus efficace
  • 14. Mieux collaborer ensemble Des outils qui permettent à votre équipe de mieux travailler ensemble
  • 16. Familiar Workflow Easy to Use Financial Peace of Mind
  • 17. Easy to Schedule: No Changes. Same Workflow No 3rd party plug-ins Simply schedule a Teams meeting “VTC Dial-in” info is automatically included
  • 18. Easy to Join: One Click. You’re IN! One touch dialing on video endpointsClick to join from native client
  • 21. Demo
  • 22. Windows 10 Enables creativity & teamwork Intelligent security Integrated for simplicity
  • 23. Threat protection Help avoid OS tampering with System Guard Safely browse the internet with Application Guard Protect against malware with Anti-Virus Block malware and untrusted apps with Application Control Block connections to malicious sites with Exploit Guard Prevent attacks, isolate threats and control malicious code execution with Windows Defender
  • 24. Plan upgrades by identifying devices that are ready, identify and resolve app and driver compatibility blockers Ensure update and antimalware compliance with timely reports for all your devices (even those on the road) Upgrade Readiness Update Compliance Device Health* Reduce support costs by pro- actively identifying and remediating top end-user impacting issues Windows Analytics is a free solution that provides data-driven insights to reduce the cost of deploying, servicing, and supporting Windows 10
  • 25. Demo
  • 28. Demo
  • 30. Traditional Windows deployment // The old way Build a custom image, gathering everything else that’s necessary to deploy Time means money, making this an expensive proposition Deploy image to a new computer, overwriting what was originally on it DRIVERS POLICIES OFFICE & APPS SETTINGS
  • 31. Modern Windows deployment // The new way Un-box and turn on off-the-shelf Windows PC Device is ready for productive use Transform with minimal user interaction
  • 32. Hardware vendor Register devices you purchased Set OOBE policy Employee unboxes device, powers on Ship device directly to employee Sync IT Admin Windows Autopilot Service Intune Configure OOBE Known device?
  • 34. Demo
  • 35. What is it? ATP Safe Attachments ATP Safe Links ATP for SharePoint, OneDrive, and Microsoft Teams spoof intelligence ATP anti- phishing capabilities in Office 365
  • 36. View reports to see how ATP is working ATP reports include: Threat protection status report ATP Message Disposition report ATP File Types report If there is no data in the report, double check that policies are set up correctly. Organizations must have ATP Safe Links policies and ATP Safe Attachments policies defined in order for ATP protection to be in place.
  • 37. GDPR (RGPD) Lengthy and complex requirements Enhanced personal privacy rights Increased duty to protect data Mandatory breach reporting Significant penalties for non-compliance Improved data policies and processes Tighter controls Better data governance tools
  • 39. What is it? What you need to know: A DLP policy contains a few basic things: Where to protect the content – locations such as Exchange Online, SharePoint Online, and OneDrive for Business sites. When and how to protect the content by enforcing rules comprised of: ▪ Conditions the content must match before the rule is enforced – for example, look only for content containing Social Security numbers that's been shared with people outside your organization. ▪ Actions that you want the rule to take automatically when content matching the conditions is found – for example, block access to the document and send both the user and compliance officer an email notification.
  • 40. Demo
  • 41. Manage data subject requests Search across Exchange Online, SharePoint Online, OneDrive for business (including Teams and Groups) and public folders Search for 80+ supported sensitive data types or create custom types Download results for further review prior to providing reports to requestors Find data associated with an individual with Office 365 Content Search
  • 42. Compliance Manager View your compliance posture against evolving regulations. Take recommended actions to improve your data protection capabilities. Conduct pre-audits to prepare for external audits. Manage your compliance in one place
  • 43. Demo
  • 44. What is it? What you need to know: AIP works by classifying data based on sensitivity. You configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Classification and protection information follows the data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. You can define who can access data and what they can do with it—such as allowing to view and edit files, but not print or forward.
  • 45. WIP – Copying Highly Confidential file to Personal One Drive
  • 46. WIP – Copying Highly Confidential file to Gmail
  • 47. WIP – Copying Highly Confidential file to USB Drive
  • 48. Demo
  • 49. Helps you manage sensitive data prior to migrating to Office 365 or other cloud services Use discover mode to identify and report on files containing sensitive data Use enforce mode to automatically classify, label and protect files with sensitive data Can be configured to scan: • CIFS file shares • SharePoint Server 2016 • SharePoint Server 2013 • SharePoint Server 2010