IN THIS TOPIC:
Monitoring for data leakage is a necessary management task for all organizations.
Last week we posted a tweet about data leakage, which is one of the top threats of cloud computing. Let’s investigate this a little bit deeper in this blog posting about methods of monitoring for data leakage in Office365.
If you look up Data Loss Prevention (DLP) online you’ll see plenty of websites that describe the need for Data Loss Prevention, but any IT Director or Security Manager will tell you that their biggest concern is Data Leakage Prevention, or the other DLP. There are plenty of ways that data can leak outside of your organization, but the most common are through e-mail and file-sharing methods.
Monitoring and managing access to e-mail accounts and shared folders that contain sensitive or confidential information is extremely difficult. And these days with more and more companies moving their messaging and file-shares to Microsoft’s O365 cloud offering there are definite concerns about how best to monitor and manage (aka control) this type of data leakage. A recent report from the Cloud Security Alliance even stated that data leakage is one of the top threats of cloud computing.
As you well know, whenever there’s a viable business opportunity there will be a smart Microsoft business partner step in with a solution to help customers with what they need. That is why we started the initial development of our 4ward365 solution with a focus on helping customers monitor, manage and control all aspects of their O365 implementation. Our information aggregation algorithms perform the hoovering of unique and valuable data items available that we can then catalog, alert and report on to help IT groups manage their deployments.
When it comes to monitoring your Office365 environment we really provide that big brother oversight.
Microsoft Office365 does offer both customizable and pre-defined Data Leakage Prevention policy templates, however, the tools provided are unable to easily report on key access risks for Exchange, SharePoint, and OneDrive which could result in a data leak. With our 4ward365 solution you have several built-in reports that will help you easily identify potential access issues to e-mail accounts and file-sharing folders, minimizing your data leakage risks.
Our reports include:
- User permissions to shared OneDrive files and folders;
- Delegation access to e-mail accounts;
- Notification of e-mail accounts with auto-forwarding enabled (especially when forwarding outside the company);
- Views of all inactive e-mail accounts;
- Reports for e-mail accounts placed on hold for litigation purposes;
- Views of all e-mail distribution lists.