Office 365 Archives - Thrive https://thrivenextgen.com/category/office-365/ NextGen Managed Services Provider Tue, 01 Apr 2025 12:53:07 +0000 en-US hourly 1 7 Security Features in Office 365 You Need to Know About https://thrivenextgen.com/7-security-features-in-office-365-you-need-to-know-about/ Wed, 23 Aug 2023 04:39:15 +0000 https://thrivenextgen.com/?p=28146 Cybercrime is rising, and businesses must act fast—in just two years, reports of ransomware attacks have increased a whopping 3000%. Given how rapidly cyber threats evolve, your business must keep up. Luckily, Office 365 offers several advanced…

The post 7 Security Features in Office 365 You Need to Know About appeared first on Thrive.

]]>
Cybercrime is rising, and businesses must act fast—in just two years, reports of ransomware attacks have increased a whopping 3000%. Given how rapidly cyber threats evolve, your business must keep up.

Luckily, Office 365 offers several advanced threat protection features to help you monitor your data and stay ahead of cyber threats.

Overview of Office 365 Security

Office 365 is a cloud-based productivity suite. With over 345 million people using this suite, it’s a popular choice for businesses. Office 365 provides familiar tools like Word, Excel, and PowerPoint, as well as secure storage solutions like OneDrive and SharePoint. But with any online service comes the risk of security breaches, so how does Office 365 keep your data safe?

The answer is simple—Microsoft is committed to ensuring the safety of customer data, so they offer several built-in security features and a shared responsibility model between customers and Microsoft. With these tools combined, Office 365 offers a comprehensive security strategy that spans prevention, detection, and response

7 Key Security Features of Office 365

From Office 365 Advanced Threat Protection to Data Loss Prevention, here are seven key security features in Office 365 that help keep your business prepared for anything.

1. Multi-Factor Authentication (MFA)

MFA, or Multi-Factor Authentication, is a security measure that requires users to provide more than one form of authentication. For instance, alongside your username and password, you’ll be prompted to use the Authenticator app for an additional layer of protection.

Microsoft has taken this enhanced authentication process as a pivotal step to fortify security. MFA adds an extra layer of protection that significantly reduces the risk of unauthorized access.

2. Data Loss Prevention (DLP)

Data Loss Prevention (DLP) is a system that helps you monitor the way sensitive data is used and shared. It can detect when files are sent or shared with unauthorized recipients, as well as non-compliant file types like .exe files. You can customize DLP policies to protect specific data sets and user groups, so you always know who has access to sensitive data.

3. Threat Protection with Office 365 Advanced Threat Protection (ATP)

Office 365 Advanced Threat Protection (ATP) provides comprehensive protection against email and file-based threats, like malware, ransomware, and zero-day attacks. It also offers two additional features—Safe Attachments and Safe Links—which scan emails and links for malicious content before they reach your inbox.

4. Information Rights Management (IRM)

Information Rights Management (IRM) in Office 365 allows you to control and protect documents and emails by defining access permissions. This includes setting limitations on copying, printing, and forwarding your sensitive information. To implement IRM in Office 365, navigate to the Security & Compliance Center, then to the Information Protection section.

From here, you can create and manage IRM policies for your Office 365 environment. Remember to apply these policies to the right groups and users to secure your sensitive data effectively.

5. Security and Compliance Center

The Security and Compliance Center within Office 365 acts as a unified interface where you can manage and monitor your data. Its centralized structure ensures that security and compliance are not scattered across various modules, but are instead managed collectively from one place.

6. Data Encryption and Secure Collaboration

Data Encryption helps protect your files by encoding them with a secure key. This makes it much harder for hackers to access sensitive data and ensures that only authorized users can view the encrypted files.

Office 365 also offers secure collaboration features, like allowing employees to securely share documents across different teams and locations. These features help ensure that your company’s confidential data stays secure throughout its entire lifespan.

7. Mobile Device Management (MDM)

Mobile Device Management (MDM) in Office 365 provides the capability to manage both company-owned and personal devices. It includes access and security controls to protect your organization’s information from potential threats.

MDM also allows you to create device security policies, manage device access settings and remotely wipe a device if it’s lost or stolen. Plus, you’ll get conditional access control, which means that access to Office 365 can be blocked or limited based on conditions such as location, device compliance, or risk.

Leverage Office 365 Threat Protection with Thrive

Contact us today to learn more about how Thrive can help you manage Office 365 securely! Our experienced team of security experts will work with you to create a comprehensive security strategy tailored to your unique needs.

The post 7 Security Features in Office 365 You Need to Know About appeared first on Thrive.

]]>
Maximizing Microsoft 365 https://thrivenextgen.com/maximizing-microsoft-365-white-paper/ https://thrivenextgen.com/maximizing-microsoft-365-white-paper/#respond Wed, 08 Jun 2022 15:07:20 +0000 https://thrivenextgen.com/?p=22700 Download this guide to cybersecurity risk assessments to understand how best to calculate your risk exposure.

The post Maximizing Microsoft 365 appeared first on Thrive.

]]>
Microsoft 365 is a robust suite of collaboration tools oftentimes underutilized by its users. More than just a range of solutions for video chatting, text chatting, document building, and document sharing, Microsoft 365 offers an advanced level of customizability over administration, governance, front end appearance, implementation, security, and more. Paired with Power Platform, choosing Microsoft 365 could not only improve your business’ security posture and collaboration efficiency, it also has the potential to gather and analyze crucial data to unlock a new level of business forecasting, client behavior tracking, and user interaction analytics.

This white paper is to provides a summary of what each tool in Microsoft 365 offers and how they all come together seamlessly to offer users more than just a place to store their files and communicate. Download this guide to learn how to best maximize your Microsoft 365 investment.

DOWNLOAD our white paper today!

Thrive White Paper Maximizing the Features of Microsoft 365 and the Complete Collaboration Suite cover

The post Maximizing Microsoft 365 appeared first on Thrive.

]]>
https://thrivenextgen.com/maximizing-microsoft-365-white-paper/feed/ 0
Office 365 Backups – Do you need them? https://thrivenextgen.com/office-365-backups-do-you-need-them/ Tue, 09 Feb 2021 18:09:42 +0000 https://thrivenextgen.com/?p=17780 Over the last year, more and more organizations have opted to migrate their data to the Cloud to make working remote easier for their workers.  One of the most popular migrations has been to Microsoft’s…

The post Office 365 Backups – Do you need them? appeared first on Thrive.

]]>
Over the last year, more and more organizations have opted to migrate their data to the Cloud to make working remote easier for their workers.  One of the most popular migrations has been to Microsoft’s Office 365 stack.  This platform offers a one stop shop for organizations who are looking to collaborate and work smarter.  However, I continuously run into this idea that Cloud services, such as Office 365, include backups of customer data.  While some services provide a level of backup, the truth is most spell it out for you in their service agreements, that you should backup your data via a 3rd party mechanism.

Microsoft’s Office 365 is no different, and they spell this out in there their service agreement below:

Microsoft MSA

Like a traditional on-premise email or file server there are some built-in retention settings in the service.  For example, if you delete an email, OneDrive file, or SharePoint item you can use the Office 365 version of a recycle bin to retrieve it.  This location stores deleted items for set period of time.  In the scenario where you need to locate that item you deleted, chances are if you realized it is gone quickly enough, and you can locate it you are probably fine.  But let us talk about the more common scenario where you realize you need something that was deleted last month and the recycle bin has already been purged.  In this more real-world example, not even a call to Microsoft support will help.  Your data is now permanently deleted, and you have no way to retrieve it.  While Microsoft Office 365 may have started as an email service, it has grown into an entire ecosystem for personal files using OneDrive and company shared data in Teams / SharePoint sites.  Using a backup solution, you would be able to quickly locate and restore your lost data.  Another often overlooked item, is that many companies had a business requirement to have their data backed up before they moved to the Cloud.  This same business requirement should also apply once you have migrated that data into the Office 365 ecosystem.

In addition to the examples I described earlier, there is a much scarier situation. This past year several of my colleagues wrote about ransomware attacks that have crippled organizations of all sizes, from small businesses, entire hospital systems, and even municipalities.  Organizations that have adopted a backup solution that covers their Cloud data, are able to either roll back all their affected data, or in some cases selectively based on the damage caused by a ransomware attack.

Take it from someone who has had to help restore everything from email data, to complex SharePoint permissions for a company site.  Having a 3rd party backup solution for your Office 365 not only protects your organization but could also save money in the long run when compared to cost of dealing with situations where there is no back up of the data.

Interested in learning more? CONTACT US TODAY!

The post Office 365 Backups – Do you need them? appeared first on Thrive.

]]>
Microsoft’s Return to the Workplace Solution https://thrivenextgen.com/microsofts-return-to-the-workplace-solution/ Thu, 29 Oct 2020 14:00:45 +0000 https://www.timlinenterprises.com/?p=1912 Enable your workforce to confidently return to on-site work by deploying Microsoft’s Return To The Workplace app. The app allows managers to view location readiness, conduct employee health screenings, and ultimately ensure a safe environment…

The post Microsoft’s Return to the Workplace Solution appeared first on Thrive.

]]>
Enable your workforce to confidently return to on-site work by deploying Microsoft’s Return To The Workplace app. The app allows managers to view location readiness, conduct employee health screenings, and ultimately ensure a safe environment to return to. Return To The Workplace is available in the AppSource, and is deployed as a Dynamics 365 App within your environment.

The App includes four separate solutions, all of which are interconnected through Common Data Services (CDS) and are all essential to use together to make the solution effective. These four solutions include:

  1. Location Readiness dashboard (Power BI)
  2. Workplace Care Management dashboard (Power BI)
  3. Facility Safety Management app (PowerApp)
  4. Employee Return to the Workplace app (PowerApp)

Learn how to use the other sections of the solution in this Return to the Workplace Solution Overview.

Prerequisites

The Return To The Workplace app requires two prerequisites:

  1. Global Administrator: Required to install the app and deploy it within an environment.
  2. PowerApps Per-App Plan ($10/Month): Required to have at least 1 per app plan to run this app.
Using the App

The first screen gives users the options to get a day pass, look up the status of a facility, or register a guest for entering a facility. There is also an optional self-assessment to select how safe the employee feels to return to work (Yes, No, Neutral). The selection is saved inside a CDS entity and factored into the app’s pre-configured algorithms. Organizations can modify those algorithms with the PowerApp studio to customize how it behaves and/or handles the user’s inputs.

Day Passes

The Day Pass feature allows users to search for active facilities and select one they want to enter. Users can follow the below steps to book a day pass:

  • Select Get Day Pass.
  • Search for the facility they would like to enter.
  • Select Book A Space.
  • Select Accept to agree to take the Daily Health Check questionnaire which will be given upon arrival at the facility.
  • Select I Agree to confirm that the users’ current health meets the requirements to enter. NOTE: Selecting I Disagree will deny the user from being able to book a space.
  • The day pass is generated.
  • If a user needs to cancel, they can do so by selecting Cancel.

When it comes time to enter the facility, the user must first complete the Daily Health Check to ensure they are healthy enough to enter the facility.

Then, the user must choose which facility they’d like to enter.

They are given a pass for the facility of choice.

Register A Guest

This feature allows users to generate a day pass for guests to enter facilities. To do so, a user should:

  • Select Register A Guest.
  • Fill out the guest info and select Next.
  • Proceed with the same steps as Get Day Pass.

Look Up Status

This function allows users to view the current status of a facility. The status of facilities is pre-configured by ‘Phases’ inside the Facility Safety Management app.

To utilize the Look Up Status feature, follow these steps:

  • Select Look Up Status from the home screen of the app.
  • Search and select the facility in question.
  • View the current Phase.
    • NOTE: If the facility is open and active, the Book A Space button will be enabled.

Safely Get Back To The Workplace

Give your team the ability to control their return to workplace operations with custom safety parameters set through the Microsoft Return to the Workplace app. Employees will have increased confidence in management’s ability to control potential risks and management will feel confident in their ability to control the return to work process and give some responsibility to the employees.

The post Microsoft’s Return to the Workplace Solution appeared first on Thrive.

]]>
Power Automate – Avoiding “File Locked For Shared Use” Failing Your Workflow https://thrivenextgen.com/power-automate-file-lock-fail/ Mon, 18 May 2020 14:00:44 +0000 https://www.timlinenterprises.com/?p=1668 In our workflows, we often need to perform file metadata updates, check-ins, moves, etc. If a file is locked and we do not account for it, it can fail our workflow entirely and prevent it…

The post Power Automate – Avoiding “File Locked For Shared Use” Failing Your Workflow appeared first on Thrive.

]]>
In our workflows, we often need to perform file metadata updates, check-ins, moves, etc. If a file is locked and we do not account for it, it can fail our workflow entirely and prevent it from moving forward. 

Consider a common scenario of running an approval flow that updates a Status field or other fields based off of the stage of the workflow and end-user responses. Utilizing a “Do until” loop and configuring the “run after” settings of actions we can ensure metadata updates are performed before moving onto the next steps of the workflow.

How does it work?

The basic premise is to create a variable to store the state, then use a Do Until loop to keep trying to update the item. If the update fails, execute a Delay and try again. If it succeeds, update the variable to exit the loop. The Run After conditions need to be set on both the Delay and the Set Variable. The Delay will run when the Update fails or is timed out, while the Set variable will run if the delay is skipped.

1. Initialize a Boolean variable and set it to False.

Update Metadata

2. Create a Do Until loop to run until the variable ‘UpdateMetadata’ = True.

The Change limits configuration controls how long the Do Until loop runs, or how many times it tries before moving onto next workflow actions. I set timeout to PT720H, which is 30 days using the ISO-8601 duration notation, and leave count empty so it retries unlimited times. 

Place your “Update item” or other action susceptible blockage within the Do Until. After the Update item, add a Delay action to configure how long you wish to wait between retries. 

After the Delay, add a Set variable to flip the marker variable to True, indicating the update was successful and the loop can stop.

Creating a Do Until Loop

3. Configure run settings on ‘Delay’ and ‘Set Variable’.

If the Update is successful, the “has failed” and “has timed out” options will instruct the workflow to skip the Delay action and move onto the Set Variable. 

Setting “is skipped” on Set Variable means it will only run if Delay didn’t, which would indicate a successful update.

Delay Run Time

Set Variable Run Time

Conclusion

In a shared environment, there is a good chance you will try to update a file while it is in use by others. When it’s a human being performing the update, the consequences are usually minimal — we just wait a few minutes and try again. When a workflow is blocked, it can cause downstream issues and leave data and files in an unexpected state. By adding some protection and retry logic around the updates, we can help ensure they are completed successfully before moving on to other tasks.

The post Power Automate – Avoiding “File Locked For Shared Use” Failing Your Workflow appeared first on Thrive.

]]>
Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 2 https://thrivenextgen.com/balancing-security-and-productivity-in-microsoft-365-during-times-of-crisis-part-2/ Mon, 13 Apr 2020 19:31:21 +0000 https://www.timlinenterprises.com/?p=1611 In our first blog of this series, we discussed how entitlement management in Azure Active Directory (Azure AD) Identity Governance creates Access Packages to control the scope and duration of access to groups, applications, and…

The post Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 2 appeared first on Thrive.

]]>
In our first blog of this series, we discussed how entitlement management in Azure Active Directory (Azure AD) Identity Governance creates Access Packages to control the scope and duration of access to groups, applications, and SharePoint sites. The two additional primary tools designed to control and audit access to company resources include Access Reviews and Privileged Identity Management. These three functions work synergistically to help keep a watchful eye on the collaboration space without impeding productivity.

In Part 2, we’ll discuss Access Reviews in detail. These are about auditing access to ensure previously-granted permissions are still appropriate and necessary.

Access Reviews

Setting up an Access Review

An Access Review is a scheduled, guided review of a group of Microsoft 365 users to help determine if their continued access to tenant resources is required. The review can be performed by multiple users and can be set to report on dispositions and, in some cases, automatically take action based on the dispositions set.

The first step of creating an Access Review is naming and describing its purpose. You will also set a start date and frequency if the intention is to perform the review periodically. Frequencies include weekly, monthly, quarterly, semi-annually, and annually. Occurrences can run indefinitely or can end by a specified date or after a number of occurrences. The review will also have an end date, after which the review will close and the “upon completion settings” will be applied.

Create an Access Review

Next, you determine who will be reviewed and who will be performing the review. The users to review can be Members of a Group or users Assigned to an Application on the tenant. Additionally, you can scope the review to include Guest users only or include all users. For Reviewers, you can select the Group’s owners, specific tenant users, or allow for self-review by the users. You can also associate the review with a Program (similar in concept to a Catalog for Access Packages) or choose the Default Program.

Select Users And Reviewers

Next, we’ll set the “Upon completion settings,” which determine the action to take when the end date of the review is reached. The first choice is whether or not you’d like to auto-apply the results. With this setting enabled, any user whose disposition is to Deny access will automatically have their access removed upon the completion of the review. The second option is to determine what actions to take if reviewers don’t respond. These options include “No change,” “Remove access,” “Approve access,” or “Take recommendations.” The last option is based on Azure AD’s auto-set recommendations, which are primarily based on the last time the reviewed user utilized the system.

The final settings, under Advanced, include options to Show recommendations, Require a reason on approval, Mail notifications, and send Reminders to reviewers. All are currently enabled by default.

Settings

At this point, we are ready to start the review process. After pressing the Start button, the new Access Review will be added to the Access Reviews section within the Identity Governance module. The listing will include the name, the resource being reviewed, the status, and when it was created. 

Starting the Access Review

Clicking on the review will show an overview of the settings as well as a chart showing the status of the resources being reviewed. There are also pages to view the Results and the Reviewers. You can even send automated reminders for individual reviewers with the press of a button.

Performing a User Access Review

If the Mail Notifications option was set to Enabled, reviewers should receive an email with a link to begin their review. The email will have a hyperlinked button to take the user directly to the review page.

Review Request

The Review page will show all relevant information, including who requested the review, when it is due by, the names of any other reviewers, and the progress made so far. It will also list each Resource being reviewed with their name, email address, Access Info (statement about whether they have recently logged in), and a recommended Action.

Team Review

This list of users can be filtered based on Status (Reviewed, Not Yet Reviewed, All), Recommendation (Approve, Deny, All), or Action (Approved, Denied, Don’t Know, All). The reviewer can click on a single source to review or multi-select resources using the checkboxes, then press the “Review n user(s)” button. Reviewing resources opens a dialog with options for the disposition and comments. Actions can be Approve, Deny, or Don’t Know. The recommended action will be highlighted already. Don’t Know is useful if there are other reviewers who may have more insight or knowledge of the resource being reviewed. 

Approve or Deny

Although all Resources may have been reviewed, the Access Review will stay open until its end date has been reached to allow for changes or other reviewers to provide input. If desired, a review can be manually stopped so action can be taken. This can be done by the user who originally set up the review using the Access Review overview screen. At that time, the actions will be automatically applied if the “Upon completion” setting’s “auto apply results to resource” is enabled, or the Apply Results button can be pressed if not. 

The results of the review can be reviewed in the Results section of the Access Review.

Results Section

Summary

Access Reviews in Azure AD Identity Governance provide a simple, consistent, and governed method of reviewing and controlling access to company tenant resources. By combining Access Reviews with Access Packages, administrators can tightly control who has access to which resources and ensure they retain the appropriate access only as long as required, all while maintaining agility and simplicity for users.    

Next up: Privileged Identity Management. Configure just-in-time role escalation to implement a least-privileged security model for day-to-day operations while providing a rapid but governed path to escalated roles as required. Stay tuned!

The post Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 2 appeared first on Thrive.

]]>
Microsoft Teams vs. Zoom: Feature Comparison https://thrivenextgen.com/microsoft-teams-vs-zoom/ https://thrivenextgen.com/microsoft-teams-vs-zoom/#comments Tue, 07 Apr 2020 19:10:54 +0000 https://www.timlinenterprises.com/?p=1608 For those using Zoom, hopefully you are carefully reconsidering your use based on the recent security concerns exposed. In this blog, I’ll review the features of Zoom relative to Teams to make sure users are aware of…

The post Microsoft Teams vs. Zoom: Feature Comparison appeared first on Thrive.

]]>
For those using Zoom, hopefully you are carefully reconsidering your use based on the recent security concerns exposed. In this blog, I’ll review the features of Zoom relative to Teams to make sure users are aware of what they get and are giving up with each platform in the event they could take advantage of features that allow them to communicate and work better.   

Unlike a simple “review site,” I’ll address this from the view of a remote worker trying to get their job done and highlight the differences in functionality. This comparison is not intended to target the “social distancing cocktail party” crowd, though they may benefit from it as well. 

Security

Zoom should essentially be treated like an “open conversation” until they get their security issues fixed. The platform is easy to hack and Zoom has previously admitted to collecting and sharing users’ personal data. If security is a real concern, I would not recommend Zoom for anything that you wouldn’t feel comfortable with any random person hearing. 

Microsoft Teams does not use users’ data for anything other than to provide better services. The Microsoft 365 platform, in general, is designed around data loss prevention and information protection. However, it has more to protect as it is designed for persistent storage and collaboration on sensitive information, not just a simple video conferencing platform. 

Web Conferencing

Zoom is simple — which is part of what made it vulnerable. It’s really just an audio/video conferencing tool. Zoom makes it easy to set up a virtual meeting, meet, chat, discuss, and be done. It also doesn’t require any advanced authentication or account management besides your name. 

Teams has similar functionality, but may take a moment longer to set up a conference due to the intent of the platform. For example, Teams was built for integration with Microsoft 365, not as just a standalone product. Its scheduled meetings can be done from within its own calendar interface, which pulls directly from your Outlook/Microsoft calendar. You can also create meetings for Teams directly within Outlook and never open Teams. 

Video Calls & Chat

When it comes to one-on-one or multi-person calls and chatting, Zoom is heavily built around the ID of a meeting or user, which is senout for attendees to “join.” This system is designed to help users schedule meetings or start ad hoc video conferring meetings quickly, but it gets a lot less user-friendly when you want chat with someone, view their availability, jump on a video call, and add/remove people from that context.   

Teams is designed around the individual, not the meeting. Chatting with someone, adding another person to a chat stream, sharing documents and notes, and collaborating on files are Teams’ main goal. It’s called “Teams” for a reason — it’s meant to let smaller groups of people work together.  

It’s important to know that when sharing documents or data with people in ad hoc chats or video calls, that data is stored in OneDrive and available indefinitely if you want to continue working on it.   

Since Teams is part of the overall Microsoft 365 ecosystem, all the data is searchable and discussion/chats can be sent out via email. 

Telephone Integration

One of the biggest differences between Teams and Zoom is telephony. Zoom allows you to use a web link or a dial-in number for those joining from phones, but that’s pretty much where it leaves off. Teams has advanced integration with true calling capabilities because it was designed to replace telephone systems as well. 

For example, with the proper licensing, I can call a telephone or join someone else’s conference via a traditional dial-in number with Teams, treating it like it was a telephone. In a voice meeting or chat, when I want to add a user, I can choose to call their telephone to dial them in. If Teams knows the user, it allows you to choose to invite them via telephone or their traditional online user account.   

If you want the ability to add legitimate telephone capabilities (including receiving calls and voicemail), Teams is a much better choice. 

Complete Internal Communication

Teams was created to be complete internal communication hub — a context-based front-end to a lot of the work we perform on a daily basis. Its capabilities includeemailing, chatting, meeting, co-authoring documents, setting up calendar items, working on projects, and collaborating with both internal and external users on various secured topics and data.  

Teams allows users to work with documents in secure channels, synchronize data to desktopsand co-author documents, adding workflow and automation to them as well. It also allows users to notify others when certain changes are made or reduce notifications on items they don’t need to hear about.  

Teams provides for persistent notes integrated into meetings or work “locations and @ mentionand hashtags to message people and groups specifically or allow them to search for tagged data and conversations. 

One of the most important aspects of Teams is the ability to create multiple teams to work on specific content or projects and make sure those locations are private, secure, and audited, only accessible by the intended groups or users you define. 

Platforms

Both applications are available on all typical platforms: PC, Mac, iOS, and AndroidThere isn’t a big distinction here in terms of availability, and both tools can be browserbased. 

Price

Teams has a free version and the paid access starts with a $5 minimum licensing. However, most organizations already have Microsoft 365 Business Premium ($12.50) or E3 ($20) licensing, which includes a fullyfunctioning version of Teams at no additional cost. Prices increase if you want to use Teams as your office phone. 

Zoom has a free version with some meeting time limitations, and their standard pricing is approximately $15-20 per month. 

Bottom Line

The bottom line is that, in many ways, Teams and Zoom aren’t even comparable.  

Security aside, if all you want to do is create a video/audio conference calls from a computer, Zoom is certainly easier to set up and useBecause the functionality is very specific and limited, there isn’t much else to do with it. 

Teams, however, is designed to be an enterprise collaboration and productivity tool for business that do a lot more than calling and conferencing. The integration of documents, data, workstreams, permissions, and sharing all lend themselves to a deeper overall product. This product does come with some complexity and governance challenges that need to be addressed unless you simply want to use it for video conference calls. 

If you want to do more with the tools you have and prefer software you can manage internally via settings, provisioning, and auditing, Teams is the clear choice for you. 

The post Microsoft Teams vs. Zoom: Feature Comparison appeared first on Thrive.

]]>
https://thrivenextgen.com/microsoft-teams-vs-zoom/feed/ 1
Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 1 https://thrivenextgen.com/balancing-security-and-productivity-in-microsoft-365-during-times-of-crisis-part-1/ Thu, 02 Apr 2020 21:21:01 +0000 https://www.timlinenterprises.com/?p=1588 How Azure Active Directory (Azure AD) Identity Governance can assist your organization in responding quickly to new collaboration needs while maintaining security and governance.  The sudden onset of the COVID-19 pandemic sent much of the world into…

The post Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 1 appeared first on Thrive.

]]>
How Azure Active Directory (Azure AD) Identity Governance can assist your organization in responding quickly to new collaboration needs while maintaining security and governance. 

The sudden onset of the COVID-19 pandemic sent much of the world into a frenzy. With businesses concerned for the safety and wellbeing of their employees and customers, and many governments strongly advising social distancing, the need to ramp-up the remote workforce went from a distant goal to a top priority almost overnight. One of the many groups greatly impacted by this new priority is the group of people responsible for collaboration platforms such as Microsoft 365. The need to quickly enable remote workers has made it seem necessary for many groups to ignore or postpone best practices and security considerations in favor of business continuityAzure AD’s Identity Governance is one set of tools designed to help strike the balance between security and productivity, enabling quick turnaround on required resources while providing checks and balances to mitigate risk.

What is Azure AD Identity Governance? 

Simply put, Azure AD Identity Governance is about “ensuring the right people have the right access at the right time.” More specifically, it is a set of 3 primary tools designed to control and audit access to company resources.   

Entitlement Management is about creating Access Packages to control the scope and duration of access to groups, applications, and SharePoint sites.    

Access Reviews are about auditing access to ensure previously granted permissions are still appropriate and necessary. 

Privileged Identity Management covers the just-in-time elevation of tightly scoped roles to allow users to perform privileged operations when needed while maintaining lower permission levels during their day-to-day job functions.   

These three functions work synergistically to help keep a watchful eye on the collaboration space without impeding productivity. Part 1 of this series will cover Entitlement Management in detail.   

Entitlement Management 

Setting up an Access Package 

The key component of Entitlement Management is the creation of “Access Packages”.  An Access Package is a collection of resources that users can be granted or request access to. Unlike simply adding users directly to Groups, these packages can control the duration, approval process, and periodic reviews of those assignments.   

The first step of creating an Access Package is naming and describing its purpose.  You can also create “Catalogs” to group multiple packages and delegate the administration of them to the appropriate users.

First steps of setting up Access Package.

 

Next, you determine the Resource Roles that will be part of this package. It can be a combination of Groups/Teams, Applications, and SharePoint sites. In this case, we will grant access to the “COVID-19 Response Team” team in the Member role.

Determining Resource Roles

We’ll then move onto the Request process. Since this team may be made up of external collaborators who are unknown at this time, we’ll select “For users not in your directory”, and we’ll allow “All users (All connected organizations + any new external users)” to request access. 

Request Process

Since we are allowing as of yet unknown external users, we must require approval (other settings allow you to disable approval). We will set a specific user to provide approval, ensure a decision is made within 2 days, and force both the requestor and the approver to provide a justification for the access. We’ll enable this access request when we are ready to start requesting access.

Approval Process

Next, we will set the lifecycle of the access being provided. In this case, we will allow for 30 days of access, with the ability to request an extension (which also requires approval). If this was a longer duration or did not expire, we could also tie access to an Access Review, which we’ll cover later.

Expiration Settings

The last page will show a summary of all the choices to allow you to make any desired changes before creating the package.  

Once the package is created, the browser will display a list of all Access Packages the current user has access to. From here, you can use the ellipsis to copy the link used to request access. This link can be emailed, put on a public site, or shared in any other traditional way.

Final Review

Requesting Access

To request access via an Access Package, a user can use the link generated during the creation process. Once they sign in to the 365 tenant, they will be presented details of the access being requested. The user would then select the package and push the “request access” button. 

Requesting Access

From there, because we require justification, the user will be presented an area to provide the reason they are requesting access.

Justification Requirement

They will receive confirmation that their request was submitted.

Request Confirmation

Approving Access

After requesting access, the Approver will receive an Email with actions to Approve or Deny the request, and a summary of the information about the request. 

Approval Process

Pressing the Approve or deny request button takes you to an Approvals page where you can approve or deny and provide the required justification. 

Approve or Deny

Now that the request has been approved, the user should have access to the Team as a Member.  When the expiration date is reached in 30 days, that access will be revoked unless an extension is requested. 

Summary

Entitlement Management using Access Packages is a great way to govern access to resources such as Teams, SharePoint sites, and Applications, especially when external users are involved or the context of the access is limited to a specific timeframe. Users can request access as needed, owners can be empowered to grant access on demand, and removal of access can be automated to prevent lingering exposure of company information.  

Next up: Access Reviews

Configure periodic, guided reviews of access to resources with suggestions based on login activity and automated resolution based on dispositions. 

 

The post Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 1 appeared first on Thrive.

]]>
COVID-19 and Remote Work: Tips for Working and Collaborating Remotely https://thrivenextgen.com/covid-19-and-remote-work/ https://thrivenextgen.com/covid-19-and-remote-work/#respond Mon, 16 Mar 2020 23:16:12 +0000 https://www.timlinenterprises.com/?p=1548 With the current COVID-19 pandemic impacting almost everyone these days, many organizations, groups, and people in general are trying to find ways to maintain business continuity very quickly.  Almost everything is more difficult when you…

The post COVID-19 and Remote Work: Tips for Working and Collaborating Remotely appeared first on Thrive.

]]>
With the current COVID-19 pandemic impacting almost everyone these days, many organizations, groups, and people in general are trying to find ways to maintain business continuity very quickly.  Almost everything is more difficult when you have less time to make it happen. Since more than half of our team permanently works remotely and much of our business and customer efforts are completed remotely, we have been doing this for a while and thought the timing was right to share some of our tips and tricks with everyone out there.

Select a Technology / Tool

If you can standardize one tool for your company to use, it makes the effort a lot easier. Trying to use various different technologies to maintain continuity can be difficult. We are a Microsoft shop, so we use Microsoft Teams. Recently, Microsoft offered to give this tool away for free to help companies struggling with recent events.

In short, Microsoft Teams provides a platform for calling, video chatting, conferencing and recording, written and verbal discussion areas, file storage, document co-authoring, tagging, notifications, and more. Teams even allows for the compartmentalization of workstreams and security so you have context when collaborating in a certain location. Instead of one giant, open phone line, Teams helps streamline what you are working on and notifies when you people are working/discussing other topics.

Stop Emailing

This one is tough, but we recommend you think twice before emailing people within your organization. Email inboxes can be difficult to search properly, tedious to keep organized, and can make it hard for users to keep track of timelines and files.

In Microsoft Teams and other similar technologies, users can post documents, allow for collaboration on those documents, and determine who can and cannot edit those documents. If your team is working on a document without you, you can still hop in whenever you want to see the progress, add comments, or review updates. When you aren’t viewing the channel the document was added in, you won’t get bombarded or distracted as you might with email.

Reducing internal emails reduces clutter and distractions, and lets you choose the topics and virtual work locations that are important to you.

Talk to People

Schedule time to actively reach out and talk to your team throughout the day. We strongly suggest video chats (most laptops are equipped with a camera) so you can see their faces, look at their inflection, and remember there are human beings on the other side of these conversations. The biggest risk in remote work is the human isolation component. Now more than ever, with the recommendation to physically isolate, it is imperative for our mental health to stay connected, involved, and actively engaged in not just social activities, but also productive/work social activities.

Create Multi-Person Chats

A great way to encourage a positive online culture is to create and participate in chats between more than just two people. Go out of your way to respond, and others will follow suit. It’s inspiring to see people responding, helping, and moving the ball forward together in a way you can see (rather than just hoping it’s happening).

Consider an even wider audience chat instead of emails for major communication and news. Company-wide channels allow for responses and interaction from all the folks on the team — not just those in one department. Staying connected and cross-pollinating are the names of the game here.

Go one step further! Modern tools can securely invite people from outside your organization to participate with almost all the available activities for collaboration. Your contractors, vendors, support personnel, and partners will all be able to continue working with you — possibly better and more efficiently than they have up to until now.

Stay Notified

Since email, chat, and just about anything except a phone call or video chat are asynchronous, it’s important your technology notifies you of activities and changing information. In the old world, we called this “toast” because a small window in the lower right would pop up like a piece of toast, with just enough information on it so we knew what was going on, but not so much that had to interact or do anything about immediately unless we wanted to.

By using these notifications, you can continue working on your current efforts and glance quickly at notifications coming in. Emails and phone calls do not give you this level of anti-distraction capabilities.

Don’t Keep Documents Locally

Use the modern workplace tools to work on documents in a specific location where others can join in. When you get to the “can you take a look at this?” moment, you can easily ask and notify the group that you need some feedback. All work on the document(s) can be tracked, saved, and available for everyone at any time — without using ANY email.

Keep a History

One of our biggest issues with email is when we need to go back and look at a series of communications or activities and try to piece it back together. It feels like we must be a detective.  Choose a technology that keeps a running tab of contextual communications and documents so all you have to do is go look, maybe scroll a bit, and can view any version of the document at any time.  Then, when you add someone else to the workstream, you don’t have to try to find all the correct emails to forward to them in order to get them up to speed on the project  — they can simply go look in the channel for themselves.

Logically Segment the Work

Don’t use an advanced tool and treat it just like email. A singular Teams setup with one big channel where all your work, chats, meetings, and interaction occur is essentially the same single steam firehose that email gives you, and is not valuable.

Break up your work into logical areas, departments, projects, teams, and efforts. Don’t choose so many that you must jump around for absolutely everything, find the balance that best suits your company’s needs. If you need assistance making this determination, our specialized consultants are here to help. We are willing to help at no cost to you during this pandemic, so don’t suffer because you didn’t budget for an emergency. We are happy to have a quick call with your team to pass along best practices and get your remote work started off on the right foot.   

We hope this helps trigger some thoughts, ideas, and actions to make you and your organization more effective as you find you may have no choice but to work from home.

Stay safe,

Ryan Thomas
CEO, Timlin Enterprises

Get in touch with the Timlin Team

The post COVID-19 and Remote Work: Tips for Working and Collaborating Remotely appeared first on Thrive.

]]>
https://thrivenextgen.com/covid-19-and-remote-work/feed/ 0
10 Reasons Why Your Company Needs An Intelligent Intranet https://thrivenextgen.com/10-reasons-why-your-company-needs-an-intelligent-intranet/ https://thrivenextgen.com/10-reasons-why-your-company-needs-an-intelligent-intranet/#respond Wed, 26 Feb 2020 14:39:31 +0000 https://www.timlinenterprises.com/?p=1528 According to Techterms, an intranet is a “private network that can only be accessed by authorized users.” In reality, it’s a lot more interesting than that. An intranet is an intelligent resource of organizational bliss…

The post 10 Reasons Why Your Company Needs An Intelligent Intranet appeared first on Thrive.

]]>
According to Techterms, an intranet is a “private network that can only be accessed by authorized users.” In reality, it’s a lot more interesting than that. An intranet is an intelligent resource of organizational bliss that can improve internal communication, collaboration, knowledge sharing, and more.   

One way to imagine an intranet is as a password-protected VIP club. Within this private club are virtual file cabinets full of information and areas for private, secure communication that only the club members have access to. With all information and members in one password-protected space, users can send out important messages and updates more simply and securely.

How Does an Intranet Compare to an Intelligent Intranet?

 Intranets are designed to be the central location that an organization’s employees can access company updates, announcements, and resources — improving not only company culture but also internal communications and collaborations.   

For example, the LiveTile’s Wizdom Intelligent intranet takes all of the ease, privacy, and connection of an intranet, and includes a wide range of leading productivity tools that employees can use in a cohesive, digital workspace.  

Through our partnership with LiveTiles, your IT team can deliver a powerful digital workplace that surfaces the relevant tools, communications, and knowledge, wherever and whenever your employees are working. There are several benefits to implementing and using an intranet within your organization. Here are our top reasons:  

10 Reasons To Implement An Intelligent Intranet

1. Security 

Sensitive, private information can be saved in one specific location, with access given only to authorized personnel. In addition, groups, users, or teams are able to manage their workspaces with predefined security settings.  

 2. Reduced Meeting Times 

Access to employee directories within the intranet gives employees a chance to locate the correct person to answer questions and chat about business-related matters from their desks in real-time. This lessens the time spent in meetings and prevents sidetracked conversations from taking over.  

 3. Improved Individual Productivity with Bots 

LiveTiles Bots help to connect people to specific information, lists, or data that they need, allowing them to receive, create, and organize their work. The automation of otherwise mundane tasks helps to free up employee time to focus on more productive assignments. Bots can be customized based on each unique business and changed as a business evolves. 

4. Quick, Efficient Access to Information  

Access to information becomes more convenient, leading to enhanced productivity and less wasted time. Communication sites, like the Wizdom Noticeboard, provide a place to share anything from reports to news or anything else that may need to be communicated.   

5. Boosts Team Collaboration 

Individual teams can use tools and features in Office 365 to collaborate more efficiently on projects or tasks specific to their department or function. With more remote workers, it is imperative that you provide tools and capabilities that promote easy to use collaboration solutions making it simple to collaborate, hit deadlines, and increase productivity.  

6. Customizability 

The features of Modern SharePoint combined with the enhanced capabilities of LiveTiles allow you to deliver solutions using mostly out of the box tools.   However, in order to deliver highly engaging solutions, organizations need to customize their intranets to add corporate branding, extended features, or integrations. The customization allows businesses to develop actual solutions to cover any need necessary, something that would be impossible with the use of a ready-made site. In addition, site designs can be applied at any time — at or after site creation.  

7. Less Strain On Development Resources 

The usability of Office 365 and a LiveTiles Wizdom Intelligent intranet means that a developer is no longer necessary to create what content editors are now capable of. The tools in both platforms allow business owners to configure solutions that meet their requirements. For times that development resources are needed, LiveTiles’ built-in intuitive interface allows you to design as quickly and efficiently with over 70 preconfigured tiles and a drag-and-drop interface. 

 8. Cross-Department Collaboration 

More brainpower results in better ideas, especially when various departments are able to collaborate using an integrated approach. LiveTiles is easily integrated with CRM, ERP, BI, ITSM, and other software, making cross-department collaboration easier than ever. 

 9. Saves Time  

The primary goal of a corporate intranet is to improve internal communications, ensure you have a hub for information and collaboration, and bring efficiency to internal processes.   The implementation of a properly designed and governed intranet will drive time and cost efficiencies by improving how users find, act, and communicate internally.   LiveTiles’ intelligence provides real actionable insights that allow for content evolution based on direct user feedback, analytics, and insights. Users are no longer spending hours trying to find a specific policy, fill out a vacation request form, or simply find the right person in the organization to solve an issue.  

 10. Greater Cost Control 

The choice of different intranet deployment and payment models allows organizations to make financial decisions that are right for them. When site creation and design are being driven by organizations themselves, sites can be maintained with less effort. Additionally, there is no need to employ extra IT resources or experience developmental delays, saving both time and money.   

Based on these ten reasons, a LiveTiles Wizdom Intelligent intranet can propel your organization towards greater success. The time and money saved, and improved collaboration across departments and increased team communication are equally priceless.  

Interested in learning more about LiveTiles Wizdom Intelligent intranet? Reach out to our team to get your company on board.  

The post 10 Reasons Why Your Company Needs An Intelligent Intranet appeared first on Thrive.

]]>
https://thrivenextgen.com/10-reasons-why-your-company-needs-an-intelligent-intranet/feed/ 0