<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Office-365 on Ru Campbell MVP</title>
    <link>https://campbell.scot/tags/office-365/</link>
    <description>Recent content in Office-365 on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Tue, 19 Dec 2023 08:26:45 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/tags/office-365/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Exchange Online Protection &amp; Defender for Office 365 - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Tue, 19 Dec 2023 08:26:45 +0000</pubDate>
      <guid>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Exchange Online Protection (EOP) and Microsoft Defender for Office 365 (MDO) are the email and collaboration security services native to Microsoft 365. EOP is included at all levels of licensing for Exchange Online, with MDO bringing additional security capabilities to license levels such as Business Premium, Microsoft 365 E3, and Microsoft 365 E5.&lt;/p&gt;
&lt;p&gt;In this blog, I&amp;rsquo;ll review five of the most common security mistakes I see in tenants regarding EOP and MDO. Realistically, this list could go to fifty mistakes, but I&amp;rsquo;ll focus on ones I think you can quickly convert into quick wins or just may have never crossed your mind.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploying Office 365 with Intune as a Win32 App (and Why You&#39;d Want To)</title>
      <link>https://campbell.scot/deploying-office-365-with-intune-as-a-win32-app/</link>
      <pubDate>Tue, 15 Jun 2021 15:26:14 +0000</pubDate>
      <guid>https://campbell.scot/deploying-office-365-with-intune-as-a-win32-app/</guid>
      <description>&lt;p&gt;Office 365, or Microsoft 365 Apps for Enterprise, or whatever it&amp;rsquo;s called this month, can be deployed by Intune to Windows 10 devices using a built-in wizard.  The advantage of this is you don&amp;rsquo;t need to package anything: you fill out some nice drop-downs and options in a GUI, assign it like any other app, and Microsoft takes care of the rest.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2021/06/Office-365-Intune-Deployment-Wizard.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the background, this is using the Office CSP to deploy the client, which makes it quite unique compared to the deployment of other apps, which are best done with Win32 packaging.  I wrote a general guide about that for &lt;a href=&#34;https://petri.com/how-to-package-and-deploy-windows-applications-with-intune&#34;&gt;Petri.com, available here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Revoke Access to Office Files with Sensitivity Labels and Azure Information Protection</title>
      <link>https://campbell.scot/revoke-access-to-office-files-with-sensitivity-labels-and-azure-information-protection/</link>
      <pubDate>Thu, 08 Apr 2021 06:16:40 +0000</pubDate>
      <guid>https://campbell.scot/revoke-access-to-office-files-with-sensitivity-labels-and-azure-information-protection/</guid>
      <description>&lt;p&gt;Most of us have had that &amp;ldquo;oh &amp;lt; &lt;em&gt;blank&lt;/em&gt; &amp;gt;&amp;rdquo; moment where we have given someone access to someone only to immediately or later need to undo that access.  Azure Information Protection has historically been able to help us there.  AIP allowed us to create protected (encrypted) documents and also let us remove access.  However, in the move from &amp;lsquo;classic&amp;rsquo; AIP to the new &lt;strong&gt;unified labelling&lt;/strong&gt; with &lt;strong&gt;sensitivity labels&lt;/strong&gt;, the ability to revoke was lost in the transition.  Now it&amp;rsquo;s back in preview, but unlike the classic version, it&amp;rsquo;s managed on the client and not a web portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Understanding Application Guard for Office, Now Generally Available</title>
      <link>https://campbell.scot/understanding-application-guard-for-office-now-generally-available/</link>
      <pubDate>Sat, 30 Jan 2021 22:13:50 +0000</pubDate>
      <guid>https://campbell.scot/understanding-application-guard-for-office-now-generally-available/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Application Guard&lt;/strong&gt; first appeared in Windows 10 1709 (&amp;ldquo;Fall Creators Update&amp;rdquo;) to isolate Edge browser activity within a Hyper V container.  Microsoft now extends that same idea to Word, Excel, and PowerPoint in Office 365 ProPlus Microsoft 365 Apps for Enterprise on Windows 10&amp;hellip;&lt;/p&gt;
&lt;p&gt;&amp;hellip; if you have Microsoft 365 E5 or E5 Security.  You knew that was coming!&lt;/p&gt;
&lt;p&gt;With &lt;strong&gt;Application Guard for Office&lt;/strong&gt;, your files can open in a sandbox without access local or network storage.  This provides an additional layer of protection against threats such as ransomware, for which Office apps are infamous as an attack surface.  There&amp;rsquo;s a significant catch: a standard configuration of Application Guard &lt;em&gt;will&lt;/em&gt; allow users to bypass it if they say they trust the file, therefore executing it in the normal way; resource access included.  You can change this default behaviour though, so keep reading.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Differences Between (and History of) the Microsoft 365 Security Centre, Compliance Centre, and Security &amp; Compliance</title>
      <link>https://campbell.scot/the-differences-between-and-history-of-the-microsoft-365-security-centre-compliance-centre-and-security-compliance/</link>
      <pubDate>Mon, 01 Jun 2020 07:11:37 +0000</pubDate>
      <guid>https://campbell.scot/the-differences-between-and-history-of-the-microsoft-365-security-centre-compliance-centre-and-security-compliance/</guid>
      <description>&lt;p&gt;There are currently &lt;strong&gt;three&lt;/strong&gt; separate admin consoles in Microsoft 365 for administrators to view or configure security and compliance policies, alerts, and reports.  Believe it or not, this is down from &lt;strong&gt;four&lt;/strong&gt; at the peak of just-tell-me-where-to-go-to-do-this.  This doesn&amp;rsquo;t even include consoles such as Microsoft Cloud App Security (MCAS).  The direction things are heading is good, as I&amp;rsquo;ll explain in this blog, but the situation does highlight Microsoft&amp;rsquo;s relatively new culture and position of continual small updates rather than delivering fully finished products.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Prerequisites and Planning for Centrally Deploying Office 365 Outlook Add-Ins</title>
      <link>https://campbell.scot/prerequisites-and-planning-for-centrally-deploying-office-365-outlook-add-ins/</link>
      <pubDate>Sun, 05 Jan 2020 21:00:38 +0000</pubDate>
      <guid>https://campbell.scot/prerequisites-and-planning-for-centrally-deploying-office-365-outlook-add-ins/</guid>
      <description>&lt;p&gt;Deploying Outlook add-ins (&amp;ldquo;apps&amp;rdquo;) for your O365 tenant is an intuitive experience via AppSource.  As a Global Administrator, click &lt;strong&gt;GET IT NOW&lt;/strong&gt; on the app&amp;rsquo;s page and you are immediately redirected to the &lt;strong&gt;Services &amp;amp; add-ins&lt;/strong&gt; page of the M365 Admin Center.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;1&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/1.png&#34;&gt;&lt;img alt=&#34;2&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/2.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;From there, you can configure add-ins for the whole tenant, just yourself, or by group.  All AAD group types, except non-email enabled ones, are supported.  If a group is nested, the top-level group gets it, but none of the nested ones.  You then choose to deploy as &lt;strong&gt;fixed&lt;/strong&gt;, which means enforced, &lt;strong&gt;available&lt;/strong&gt;, which means shown when users search for apps, or &lt;strong&gt;optional&lt;/strong&gt;, which means installed but can be removed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Manage MyAnalytics Weekly Insight Digest Emails and App Availability</title>
      <link>https://campbell.scot/manage-myanalytics-emails-and-app-availability/</link>
      <pubDate>Mon, 21 Oct 2019 14:25:45 +0000</pubDate>
      <guid>https://campbell.scot/manage-myanalytics-emails-and-app-availability/</guid>
      <description>&lt;p&gt;Made available to more than just E5 licencees &lt;a href=&#34;https://www.microsoft.com/en-us/microsoft-365/blog/2019/01/02/myanalytics-the-fitness-tracker-for-work-is-now-more-broadly-available/&#34;&gt;earlier this year&lt;/a&gt;, MyAnalytics will, by default, send users weekly emails regarding their work patterns.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;image-1&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/image-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Users can control this themselves in settings pane of the &lt;a href=&#34;https://myanalytics.microsoft.com/&#34;&gt;MyAnalytics web app&lt;/a&gt;.&lt;/p&gt;
&lt;figure&gt;
    &lt;img loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/image-2.png&#34;
         alt=&#34;image-2&#34;/&gt; &lt;figcaption&gt;
            &lt;p&gt;image-2&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;Administrators cannot, in bulk, keep MyAnalytics enabled for users but disable the email digest. The following PowerShell example instead disables MyAnalytics across all your Microsoft 365 Business licensed users, and therefore removing these emails.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
