Compliance Manager dashboard and Azure Information Protection Scanner help to protect your employees in the cloud and while on-premises.

To further strengthen Office 365 as a go-to SaaS productivity tool for growing companies, Microsoft recently announced that new compliance and protection tools have been released for Office 365 users.

man standing in server room

The two new products that have been released include the Compliance Manager dashboard as well as the Azure Information Protection Scanner tool. Both of these tools have been released as Microsoft, and all the other major SaaS players in the industry prepared for the recent deadline for organizations to meet the European Union’s General Data Protection Regulation (GDPR).

Azure Information Protection Scanner

The Azure Information Protection Scanner has been around since 2016 but has only recently been released to all Azure users. This tool helps scan for sensitive information in emails and attached documents.

The Information Protection Scanner not only scans an organization’s emails but also detects sensitive data that is stored on your on-premises hard disks, NAS drives, and SharePoint data stores. This tool is primarily used for on-premises applications, but Microsoft does also offer a comparable service that’s available to Office 365 Data Loss Prevention subscribers.

Compliance Manager dashboard

Compliance Manager helps to track an organization’s status related to various regulations and standards, including GDPR compliance. Microsoft offers a GDPR template that can be used to identify personal data that falls under GDPR. It’s critical that organizations understand that failing to protect relevant customer data in accordance with GDPR law can result in large fines.

Compliance Manager users will have access to a Compliance Score within the dashboard. Also, Compliance Manager will propose recommendations to meet various compliance requirements.

Additional Office 365 security improvements

Aside from the security enhancements mentioned above, Microsoft has also released an “encrypt-only” feature for certain Office 365 account holders. This feature is available as part of Office 365 E3 and E5 subscriptions and as an added option for other Office 365 user accounts.

This feature allows end users to send fully encrypted emails to internal as well as external users. Recipients of these emails can print and redistribute these emails, but the messages themselves will always stay encrypted. This feature is currently only available for Office 365 subscribers with Outlook Mobile clients and the web version of Outlook, but Microsoft has indicated they’re working on support for desktop versions of Outlook for Windows and Mac users.

An additional tool for Office 365 subscribers is a tool dubbed Attack Simulator, which is currently available for Office 365 Threat Intelligence service subscribers. This tool offers a way for IT admins to test end users to see how susceptible they may be to the latest cyber attacks. Some attack scenarios include simulated phishing attacks, brute-force password attacks, and password spray attacks. The Attack Simulator uses Microsoft’s Intelligent Security Graph to create these simulated attacks.

Interested in learning more about recent Office 365 and Azure security improvements?

The engineers at Microsoft are hard at work helping to ensure their Office 365 and Azure services are as secure as ever.

If you have any questions about the new features that were covered in this blog, feel free to reach out to the MessageOps team for more clarification. We look forward to helping you make sense of the many ways that Microsoft is committed to cybersecurity both in the cloud and on-premises.

Was this article helpful?