%3CLINGO-SUB%20id%3D%22lingo-sub-1298623%22%20slang%3D%22en-US%22%3EUsing%20Microsoft%20365%20Business%20Premium%20to%20secure%20your%20remote%20workforce%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1298623%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20living%20through%20extraordinary%20circumstances%20and%20one%20of%20the%20questions%20topmost%20in%20the%20minds%20of%20our%20SMB%20customers%20and%20partners%20is%20how%20they%20can%20enable%20business%20continuity%20even%20when%20employees%20are%20working%20from%20home.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EYou%20don%E2%80%99t%20have%20to%20sacrifice%20security%20to%20enable%20productive%20collaboration%20%26amp%3B%20work%20when%20employees%20are%20working%20from%20home.%20In%20this%20blogpost%2C%20we%E2%80%99ll%20focus%20on%20the%20best%20approach%20for%20securing%20productivity%20when%20employees%20are%20working%20remotely%2C%20and%20how%20you%20can%20enable%20it%20quickly%20with%20Microsoft%20365%20Business%20Premium.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EMicrosoft%20365%20Business%20Premium%20is%20a%20comprehensive%20suite%20of%20collaboration%20products%20and%20enterprise%20grade%20security%20tools%20curated%20specifically%20for%20SMBs%20with%20less%20than%20300%20employees.%20It%20includes%20your%20favorite%20Office%20productivity%20apps%20plus%20advanced%20security%20capabilities%20to%20help%20defend%20your%20business%20against%20cyberthreats%2C%20protect%20your%20data%2C%20and%20secure%20your%20devices.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3ESecure%20Access%2C%20Device%20%26amp%3B%20Data%20with%20Microsoft%20365%20Business%20Premium%3C%2FSTRONG%3E%3CBR%20%2F%3ETo%20enable%20a%20seamless%20productivity%20experience%20for%20your%20employees%20who%20are%20trying%20to%20access%20business%20resources%20from%20their%20homes%2C%20we%20recommend%20that%20you%20approach%20security%20in%20terms%20of%20Securing%20Access%2C%20Securing%20Devices%20(PCs%2C%20Macs%20%26amp%3B%20Mobile%20Devices)%20and%20Securing%20Data.%20Microsoft%20365%20Business%20Premium%20provides%20a%20solid%20foundation%20of%20security%20features%20across%20these%20three%20categories.%20Here%E2%80%99s%20how%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Secure_remote_work.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F183652iB580D5C16BAD9564%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Secure_remote_work.jpg%22%20alt%3D%22Secure_remote_work.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3E1.%20Securing%20Access%3A%3C%2FSTRONG%3E%20One%20of%20the%20most%20important%20aspects%20of%20enabling%20work%20from%20home%20scenarios%20is%20making%20sure%20users%20can%20access%20systems%20remotely%20in%20a%20secure%20manner%E2%80%94from%20anywhere%20and%20any%20device.%20The%20following%20features%20in%20Microsoft%20365%20Business%20Premium%20help%20you%20do%20exactly%20that.%20You%20can%20enable%20some%20of%20them%20or%20all%20of%20them%20based%20on%20the%20needs%20of%20your%20organization%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EMulti-Factor%20Authentication%20(MFA)%3A%3C%2FSTRONG%3E%20This%20enhances%20security%20by%20requiring%20more%20than%20one%20method%20of%20authentication%20to%20verify%20the%20user's%20identity%20when%20they%20log%20in%20to%20your%20company%E2%80%99s%20systems%20or%20data.%20For%20example%2C%20the%20user%20must%20put%20in%20a%20code%20or%20answer%20a%20phone%20call%2C%20apart%20from%20logging%20in%20with%20their%20username%20and%20password.%20This%20additional%20level%20of%20verification%20ensures%20that%20non-employees%20cannot%20gain%20access%20to%20your%20environment%20even%20if%20the%20user%E2%80%99s%20username%20and%20password%20are%20compromised%E2%80%94for%20example%2C%20in%20a%20phishing%20attack.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fadmin%2Fsecurity-and-compliance%2Fset-up-multi-factor-authentication%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20setting%20up%20MFA%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%20data-unlink%3D%22true%22%3E%3CSTRONG%3Eo%20Conditional%20Access%3A%3C%2FSTRONG%3E%20This%20feature%20helps%20you%20control%20access%20to%20your%20environment%20based%20on%20location%2C%20app%2C%20device%20state%20and%20user%20state.%20For%20example%2C%20you%20could%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fhowto-conditional-access-policy-location%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ecreate%20a%20policy%20that%20blocks%20access%26nbsp%3B%3C%2FA%3Ewhen%20someone%20attempts%20to%20log%20in%20from%20a%20country%20in%20which%20you%20don%E2%80%99t%20do%20business%20Or%2C%20you%20could%20use%20conditional%20access%20to%20restrict%20access%20if%20a%20user%20is%20logging%20in%20from%20an%20unrecognized%20and%20potentially%20compromised%20device.%20Conditional%20Access%20gives%20you%20the%20ability%20to%20safeguard%20access%20based%20on%20multiple%20criteria%20rather%20than%20simply%20relying%20on%20a%20username%20and%20password.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EAzure%20AD%20Application%20Proxy%3A%3C%2FSTRONG%3E%20Many%20companies%20have%20business-critical%20apps%20running%20on-premises%2C%20which%20aren%E2%80%99t%20accessible%20from%20outside%20the%20corporate%20network.%20Azure%20AD%20App%20Proxy%20allows%20you%20to%20publish%20these%20applications%20externally.%20It%20is%20a%20lightweight%20agent%20that%20enables%20internet%20access%20to%20your%20on-premises%20apps%2C%20without%20opening%20broad%20access%20to%20your%20network.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fmanage-apps%2Fwhat-is-application-proxy%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20enabling%20Azure%20AD%20App%20Proxy%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EWindows%20Virtual%20Desktop%20(WVD)%3A%20%3C%2FSTRONG%3EIf%20you%20have%20apps%20with%20sensitive%20information%20such%20as%20medical%20or%20financial%20information%20and%20you%20want%20to%20make%20sure%20that%20data%20is%20securely%20accessed%20by%20users%20working%20from%20home%2C%20you%20can%20easily%20enable%20this%20scenario%20by%20utilizing%20WVD.%20WVD%20creates%20a%20virtual%20desktop%20for%20users%20to%20access%20remotely.%20Employees%20can%20only%20access%20that%20information%20in%20that%20remote%20virtualized%20session%20and%20are%20unable%20to%20save%20any%20data%20on%20their%20local%20workstations.%20Learn%20more%20about%20WVD%20in%20this%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DNQFtI3JLtaU%26amp%3Blist%3DPLXtHYVsvn_b8KAKw44YUpghpD6lg-EHev%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Mechanics%20Video%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3E2.%20Securing%20Devices%3A%3C%2FSTRONG%3E%20Employees%20are%20using%20a%20wide%20array%20of%20laptops%2C%20desktops%20%26amp%3B%20mobile%20devices%20to%20access%20company%20data%20and%20get%20work%20done%20during%20this%20time.%20The%20challenge%20is%20keeping%20all%20these%20devices%20secure%20as%20people%20use%20them%20to%20work%20with%20sensitive%20business%20information.%20Microsoft%20Intune%20is%20included%20in%20Microsoft%20365%20Business%20Premium%20and%20can%20help%20you%20manage%20your%20PCs%20and%20mobile%20devices.%20Here%E2%80%99s%20how%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EManaging%20PCs%20with%20Intune%3A%20%3C%2FSTRONG%3E%20To%20maintain%20security%2C%20employees%20need%20to%20keep%20their%20work%20devices%20up%20to%20date%20with%20latest%20security%20updates%20while%20they%20are%20outside%20your%20corporate%20network.%20Intune%20can%20not%20only%20help%20keep%20those%20devices%20up%20to%20date%2C%20but%20also%20help%20you%20fully%20manage%20your%20PCs%20with%20features%20such%20as%20enforcing%20security%20policies%20or%20wiping%20data%20from%20devices%20remotely.%20In%20Microsoft%20365%20Business%20Premium%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness%2Fprotection-settings-for-windows-10-pcs%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eyou%20can%20apply%20pre-configured%20device%20policies%20for%20Windows%2010%20PCs%3C%2FA%3E%20accessing%20your%20environment%2C%20such%20as%20enabling%20Microsoft%20Defender%20AV%20and%20enabling%20ransomware%20protection%20for%20critical%20folders.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EManaging%20Mobile%20Devices%20with%20Intune%3A%3C%2FSTRONG%3E%20Intune%20also%20helps%20you%20manage%20mobile%20devices%20and%20gives%20you%20flexibility%20on%20how%20much%20control%20you%20want%20to%20exert%20on%20mobile%20devices%20accessing%20your%20company%20environment.%20In%20a%20Bring-You-Own-Devices%20(BYOD)%20situation%20where%20employees%20are%20using%20personal%20mobile%20devices%2C%20you%20may%20not%20want%20full%20control%20of%20a%20user%E2%80%99%20personal%20device%20but%20may%20still%20want%20to%20secure%20the%20company%20data%20that%20the%20user%20is%20accessing.%20In%20this%20case%20you%20can%20use%20Intune%20app%20protection%20policies%20to%20secure%20company%20data%20(Email%2C%20Teams%2C%20and%20OneDrive)%20on%20the%20device.%20However%2C%20if%20you%20want%20full%20control%20of%20a%20user%E2%80%99s%20mobile%20device%2C%20you%20can%20%E2%80%9Cenroll%E2%80%9D%20a%20device%20into%20Intune%20Mobile%20Device%20Management%20and%20fully%20control%20the%20device%20settings%20and%20set%20the%20security%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3E%3CSTRONG%3E%E2%80%A2%20Intune%20App%20protection%20Policies%3A%20%3C%2FSTRONG%3E%20These%20policies%20allow%20you%20to%20restrict%20users%20from%20copying%2C%20pasting%2C%20or%20saving%20corporate%20data%20and%20documents%20from%20Office%20mobile%20apps%20to%20personal%20apps%20or%20storage%20locations%E2%80%94without%20requiring%20any%20kind%20of%20device%20enrollment.%20For%20example%2C%20with%20these%20policies%20in%20place%2C%20a%20user%20cannot%20save%20a%20spreadsheet%20of%20customer%20data%20to%20their%20personal%20files.%20Because%20corporate%20data%20is%20kept%20within%20approved%20apps%20and%20locations%2C%20if%20a%20personal%20device%20is%20lost%20or%20stolen%2C%20you%20can%20selectively%20wipe%20this%20information%20without%20affecting%20personal%20photos%2C%20apps%2C%20and%20data.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness%2Fapp-protection-settings-for-android-and-ios%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThese%20policies%20are%20easily%20activated%20through%20the%20Microsoft%20365%20Business%20Premium%20administration%20console.%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3E%3CSTRONG%3E%E2%80%A2%20Intune%20Mobile%20Device%20Management%3A%20%3C%2FSTRONG%3E%20If%20you%20want%20to%20enforce%20stronger%20mobile%20device%20policies%20that%20go%20beyond%20App%20Protection%20Policies%2C%20you%20can%20enable%20full%20mobile%20device%20management%20capabilities%20in%20Intune.%20Then%20you%20can%20enforce%20deep%2C%20device-centric%20security%20policies%20such%20as%20blocking%20screen%20capture.%20This%20approach%20requires%20a%20device%20enrollment%20process%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fenrollment%2Fios-enroll%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EiOS%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fenrollment%2Fandroid-dedicated-devices-fully-managed-enroll%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAndroid%3C%2FA%3E%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E3.%20Securing%20Data%3A%3C%2FSTRONG%3E%20Another%20important%20step%20in%20enabling%20remote%20work%20scenarios%20is%20ensuring%20that%20company%20data%20is%20protected.%20As%20cybercriminals%20adjust%20their%20tactics%20to%20take%20advantage%20of%20the%20current%20situation%2C%20it%20is%20prudent%20to%20enable%20policies%20to%20defend%20against%20cyber%20threats%20and%20prevent%20phishing.%20It%20is%20also%20imperative%20to%20ensure%20sensitive%20data%20like%20social%20security%20numbers%2C%20customer%20credit%20card%20information%2C%20and%20personal%20identifiable%20information%20(PII)%20are%20protected%20and%20that%20policies%20are%20in%20place%20to%20control%20access%20as%20well%20as%20sharing.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EOffice%20365%20Advanced%20Threat%20Protection%3A%20%3C%2FSTRONG%3E%20A%20recent%20report%20by%20Microsoft%20Security%20Research%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F08%2Fmicrosoft-shares-new-threat-intelligence-security-guidance-during-global-crisis%2F%3FranMID%3D24542%26amp%3BranEAID%3DJ84DHJLQkR4%26amp%3BranSiteID%3DJ84DHJLQkR4-jbhIKdDcXGPuSQu2hjm5pA%26amp%3Bepi%3DJ84DHJLQkR4-jbhIKdDcXGPuSQu2hjm5pA%26amp%3Birgwc%3D1%26amp%3BOCID%3DAID2000142_aff_7593_1243925%26amp%3Btduid%3D%2528ir__69cloy2rk9kftjdjkk0sohznxv2xn1jtgdwofpn300%2529%25287593%2529%25281243925%2529%2528J84DHJLQkR4-jbhIKdDcXGPuSQu2hjm5pA%2529%2528%2529%26amp%3Birclickid%3D_69cloy2rk9kftjdjkk0sohznxv2xn1jtgdwofpn300%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eshows%20a%20surge%20in%20daily%20malware%20and%20spam%20using%20COVID-19%20lures.%3C%2FA%3E%20Office%20365%20ATP%20helps%20guard%20your%20business%20against%20sophisticated%20phishing%20and%20ransomware%20attacks%20across%20email%2C%20OneDrive%20%26amp%3B%20Teams%20that%20are%20intended%20to%20compromise%20employee%20or%20customer%20information.%20Office%20365%20ATP%20protects%20you%20in%20the%20following%20ways%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-120px%22%3E%3CBR%20%2F%3E%E2%80%A2%20%26nbsp%3BSophisticated%20attachment%20scanning%20in%20email%2C%20OneDrive%20%26amp%3B%20Teams%20that%20uses%20AI-powered%20analysis%20to%20detect%20and%20discard%20dangerous%20messages%20%3CBR%20%2F%3E%3CBR%20%2F%3E%E2%80%A2%26nbsp%3B%20Automatic%20checks%20of%20links%20in%20email%2C%20documents%20%26amp%3B%20Teams%20to%20assess%20if%20they%20are%20part%20of%20a%20phishing%20scheme%20and%20prevent%20users%20from%20accessing%20unsafe%20websites%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-120px%22%3E%3CBR%20%2F%3E%E2%80%A2%20%26nbsp%3BAnti-spoofing%20intelligence%20to%20warn%20you%20against%20domain%20impersonation%20intended%20to%20trick%20users%20in%20to%20thinking%20that%20the%20email%20is%20coming%20from%20an%20entity%20inside%20the%20organization%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-120px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-120px%22%3EYou%20can%20learn%20more%20about%20enabling%20Office%20365%20ATP%20features%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Foffice-365-atp%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EData%20Loss%20Prevention%20(DLP)%3A%20%3C%2FSTRONG%3E%20If%20you%20are%20worried%20about%20an%20increased%20risk%20of%20employees%20sharing%20sensitive%20information%20by%20mistake%20when%20working%20from%20home%2C%20this%20feature%20helps%20you%20identify%2C%20monitor%2C%20and%20protect%20sensitive%20information%20from%20being%20unintentionally%20shared%20either%20through%20email%20or%20in%20documents.%20DLP%20detects%20specific%20types%20of%20sensitive%20information%20being%20communicated%20to%20people%20outside%20your%20organization%2C%20such%20as%20credit%20card%20numbers%2C%20government-issued%20identifiers%2C%20dates%20of%20birth%20and%20even%20locale-specific%20personally%20identifiable%20information%20(PII).%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fcreate-a-dlp-policy-from-a-template%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20setting%20up%20a%20DLP%20policy%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-left%3A%2010%25%3B%20margin-right%3A%2010%25%3B%22%3Eo%20%3CSTRONG%3EExchange%20Online%20Archiving%3A%20%3C%2FSTRONG%3E%20This%20helps%20keep%20all%20company%20data%20safe%2C%20preserved%20in%20the%20event%20of%20lost%2F%20stolen%20devices%2C%20infrastructure%20failure%20or%20to%20meet%20litigation%20and%20compliance%20obligations.%20Exchange%20Online%20Archiving%20safeguards%20data%20by%20allowing%20messages%20and%20documents%20to%20be%20easily%20archived%20and%20then%20accessed%20anytime%2Fanywhere.%20It%20preserves%20user%20information%20including%20deleted%20items%20for%20electronic%20discovery%20or%20restoration%20at%20a%20later%20date.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness%2Fset-up-compliance%3Fview%3Do365-worldwide%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20setting%20up%20data%20retention%20policies.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EWhether%20you%20are%20continuing%20your%20journey%20to%20secure%20a%20remote%20workforce%20or%20are%20just%20getting%20started%2C%20Microsoft%20365%20Business%20Premium%20can%20simplify%20the%20process%20of%20delivering%20security%20and%20management%20when%20employees%20work%20from%20home.%20For%20more%20details%20on%20Microsoft%20365%20Business%20Premium%2C%20please%20visit%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fm365b%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eaka.ms%2Fm365b%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1298623%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20don%E2%80%99t%20have%20to%20sacrifice%20security%20to%20enable%20productive%20collaboration%20when%20employees%20are%20working%20from%20home.%20In%20this%20blogpost%2C%20we%E2%80%99ll%20focus%20on%20the%20best%20approach%20for%20securing%20productivity%20when%20employees%20are%20working%20remotely%20with%20Microsoft%20365%20Business%20Premium.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1298623%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1337980%22%20slang%3D%22en-US%22%3ERE%3A%20Using%20Microsoft%20365%20Business%20Premium%20to%20secure%20your%20remote%20workforce%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1337980%22%20slang%3D%22en-US%22%3ESolution%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1556999%22%20slang%3D%22pt-BR%22%3ERe%3A%20Using%20Microsoft%20365%20Business%20Premium%20to%20secure%20your%20remote%20workforce%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1556999%22%20slang%3D%22pt-BR%22%3E%3CP%3EInteresting%20option%20for%20remote%20access.%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fsmile_40x40.gif%22%20alt%3D%22Smile%22%20title%3D%22Smile%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

We are living through extraordinary circumstances and one of the questions topmost in the minds of our SMB customers and partners is how they can enable business continuity even when employees are working from home.


You don’t have to sacrifice security to enable productive collaboration & work when employees are working from home. In this blogpost, we’ll focus on the best approach for securing productivity when employees are working remotely, and how you can enable it quickly with Microsoft 365 Business Premium.


Microsoft 365 Business Premium is a comprehensive suite of collaboration products and enterprise grade security tools curated specifically for SMBs with less than 300 employees. It includes your favorite Office productivity apps plus advanced security capabilities to help defend your business against cyberthreats, protect your data, and secure your devices.


Secure Access, Device & Data with Microsoft 365 Business Premium
To enable a seamless productivity experience for your employees who are trying to access business resources from their homes, we recommend that you approach security in terms of Securing Access, Securing Devices (PCs, Macs & Mobile Devices) and Securing Data. Microsoft 365 Business Premium provides a solid foundation of security features across these three categories. Here’s how:

 

Secure_remote_work.jpg

 


1. Securing Access: One of the most important aspects of enabling work from home scenarios is making sure users can access systems remotely in a secure manner—from anywhere and any device. The following features in Microsoft 365 Business Premium help you do exactly that. You can enable some of them or all of them based on the needs of your organization:

 

o Multi-Factor Authentication (MFA): This enhances security by requiring more than one method of authentication to verify the user's identity when they log in to your company’s systems or data. For example, the user must put in a code or answer a phone call, apart from logging in with their username and password. This additional level of verification ensures that non-employees cannot gain access to your environment even if the user’s username and password are compromised—for example, in a phishing attack. Learn more about setting up MFA

 

o Conditional Access: This feature helps you control access to your environment based on location, app, device state and user state. For example, you could create a policy that blocks access when someone attempts to log in from a country in which you don’t do business Or, you could use conditional access to restrict access if a user is logging in from an unrecognized and potentially compromised device. Conditional Access gives you the ability to safeguard access based on multiple criteria rather than simply relying on a username and password.

 

o Azure AD Application Proxy: Many companies have business-critical apps running on-premises, which aren’t accessible from outside the corporate network. Azure AD App Proxy allows you to publish these applications externally. It is a lightweight agent that enables internet access to your on-premises apps, without opening broad access to your network. Learn more about enabling Azure AD App Proxy

 

o Windows Virtual Desktop (WVD): If you have apps with sensitive information such as medical or financial information and you want to make sure that data is securely accessed by users working from home, you can easily enable this scenario by utilizing WVD. WVD creates a virtual desktop for users to access remotely. Employees can only access that information in that remote virtualized session and are unable to save any data on their local workstations. Learn more about WVD in this Microsoft Mechanics Video


2. Securing Devices: Employees are using a wide array of laptops, desktops & mobile devices to access company data and get work done during this time. The challenge is keeping all these devices secure as people use them to work with sensitive business information. Microsoft Intune is included in Microsoft 365 Business Premium and can help you manage your PCs and mobile devices. Here’s how:

 

o Managing PCs with Intune: To maintain security, employees need to keep their work devices up to date with latest security updates while they are outside your corporate network. Intune can not only help keep those devices up to date, but also help you fully manage your PCs with features such as enforcing security policies or wiping data from devices remotely. In Microsoft 365 Business Premium, you can apply pre-configured device policies for Windows 10 PCs accessing your environment, such as enabling Microsoft Defender AV and enabling ransomware protection for critical folders.

 

o Managing Mobile Devices with Intune: Intune also helps you manage mobile devices and gives you flexibility on how much control you want to exert on mobile devices accessing your company environment. In a Bring-You-Own-Devices (BYOD) situation where employees are using personal mobile devices, you may not want full control of a user’ personal device but may still want to secure the company data that the user is accessing. In this case you can use Intune app protection policies to secure company data (Email, Teams, and OneDrive) on the device. However, if you want full control of a user’s mobile device, you can “enroll” a device into Intune Mobile Device Management and fully control the device settings and set the security policies.

 

• Intune App protection Policies: These policies allow you to restrict users from copying, pasting, or saving corporate data and documents from Office mobile apps to personal apps or storage locations—without requiring any kind of device enrollment. For example, with these policies in place, a user cannot save a spreadsheet of customer data to their personal files. Because corporate data is kept within approved apps and locations, if a personal device is lost or stolen, you can selectively wipe this information without affecting personal photos, apps, and data. These policies are easily activated through the Microsoft 365 Business Premium administration consol...

 

• Intune Mobile Device Management: If you want to enforce stronger mobile device policies that go beyond App Protection Policies, you can enable full mobile device management capabilities in Intune. Then you can enforce deep, device-centric security policies such as blocking screen capture. This approach requires a device enrollment process for iOS or Android devices.

 

3. Securing Data: Another important step in enabling remote work scenarios is ensuring that company data is protected. As cybercriminals adjust their tactics to take advantage of the current situation, it is prudent to enable policies to defend against cyber threats and prevent phishing. It is also imperative to ensure sensitive data like social security numbers, customer credit card information, and personal identifiable information (PII) are protected and that policies are in place to control access as well as sharing.

 

o Office 365 Advanced Threat Protection: A recent report by Microsoft Security Research shows a surge in daily malware and spam using COVID-19 lures. Office 365 ATP helps guard your business against sophisticated phishing and ransomware attacks across email, OneDrive & Teams that are intended to compromise employee or customer information. Office 365 ATP protects you in the following ways:


•  Sophisticated attachment scanning in email, OneDrive & Teams that uses AI-powered analysis to detect and discard dangerous messages

•  Automatic checks of links in email, documents & Teams to assess if they are part of a phishing scheme and prevent users from accessing unsafe websites


•  Anti-spoofing intelligence to warn you against domain impersonation intended to trick users in to thinking that the email is coming from an entity inside the organization

 

You can learn more about enabling Office 365 ATP features here.

 

o Data Loss Prevention (DLP): If you are worried about an increased risk of employees sharing sensitive information by mistake when working from home, this feature helps you identify, monitor, and protect sensitive information from being unintentionally shared either through email or in documents. DLP detects specific types of sensitive information being communicated to people outside your organization, such as credit card numbers, government-issued identifiers, dates of birth and even locale-specific personally identifiable information (PII). Learn more about setting up a DLP policy.

 

o Exchange Online Archiving: This helps keep all company data safe, preserved in the event of lost/ stolen devices, infrastructure failure or to meet litigation and compliance obligations. Exchange Online Archiving safeguards data by allowing messages and documents to be easily archived and then accessed anytime/anywhere. It preserves user information including deleted items for electronic discovery or restoration at a later date. Learn more about setting up data retention policies.


Whether you are continuing your journey to secure a remote workforce or are just getting started, Microsoft 365 Business Premium can simplify the process of delivering security and management when employees work from home. For more details on Microsoft 365 Business Premium, please visit aka.ms/m365b

2 Comments
Occasional Visitor
Solution
Occasional Visitor

Opção interessante para acesso remoto.:smile: