Category: Office365

Last updated by at .

encrypted messages in Outlook.com

Encrypt Mails in Outlook.com (or Hotmail)

This is pretty cool! If you are an Office 365 Home or Office 365 Personal subscriber, Outlook.com (formerly known as hotmail.com or live.com) now includes encryption features that let you share your confidential and personal information while ensuring that your email message stays encrypted and doesn’t leave Office 365. This is useful when you don’t trust the recipient’s email provider to be secure.

So what does encrypt mean:

As an Outlook.com user with either an Office 365 Home or Office 365 Personal subscription, you’ll see the following:

  • Encrypt: Your message stays encrypted and doesn’t leave Office 365. Recipients with Outlook.com and Office 365 accounts can download attachments without encryption from Outlook.com, the Outlook mobile app, or the Mail app in Windows 10. If you’re using a different email client or other email accounts, you can use a temporary passcode to download the attachments from the Office 365 Message Encryption portal.
  • Encrypt and Prevent Forwarding: Your message stays encrypted within Office 365 and can’t be copied or forwarded. Microsoft Office attachments such as Word, Excel or PowerPoint files remain encrypted even after they’re downloaded. Other attachments, such as PDF files or image files can be downloaded without encryption.

If you want to know more about Encryption of Outlook.com E-Mails, check out the this support Page: Learn about encrypted messages in Outlook.com



Presenting ExpertsLive

Speaking about Azure Stack at Experts Live Switzerland 2018 in Bern

Today, I am proud to announce that I am speaking at the country event of Experts Live in Switzerland. Experts Live Switzerland 2018 will take place at the 3rd of May in the new Workspace Welle 7 in ​Bern Switzerland. Experts Live Switzerland is a one day event with 17 session in three parallel tracks focusing on Microsoft Cloud, Datacenter and Workplace Management topics, with Microsoft MVPs, speakers from Microsoft and other industry experts.

I was already speaking at Experts Live US 2018, Experts Live Australia 2017 and of course Experts Live Europe 2017. As always, I am really looking forward to this country event of the Experts Live conference series. It is always a lot of fun to listen to great sessions and meet friends.

Speaking at Experts Live Switzerland 2018

I am happy to give attendees an overview about Microsoft Azure Stack:

Azure Stack - Your Cloud Your Datacenter

Microsoft released Azure Stack as a Azure appliance for your datacenter. Learn what Azure Stack is, what challenges it solves, how you deploy, manage and operate a Azure Stack in your datacenter. Learn about the features and services you will get by offering Azure Stack to your customers and how you can build a true Hybrid Cloud experience. In this presentation Thomas Maurer (Microsoft MVP) will guide you through the highly anticipated innovations and experience during the Azure Stack Early Adaption Program and Azure Stack Technology Adoption Program (TAP).

The event is limited to only 180 attendees, so make sure you reserve you ticket right now! There will be a lot of other great sessions and a lot of experts from the Microsoft Cloud community.

Some more information about the conference:

  • 1 day event
  • In the heart of Switzerland (Bern)
  • 17 sessions
  • 3 parallel tracks
  • Top Community speakers
  • limited to 180 attendees
  • Partner booths in the expo hall
  • modern location
  • focusing on Microsoft Cloud Technology

 

 



Windows SpeculationControl PowerShell

Microsoft Guidance to protect against speculative execution side-channel vulnerabilities on Windows, Windows Server and Azure (Meltdown and Spectre)

Microsoft very quickly responded to the speculative execution side-channel vulnerabilities also called Meltdown and Spectre which affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM. Microsoft released some guidance how you should protect your devices against these vulnerabilities. The Microsoft Security Defense Team also published an article with guidance and more details on this: ADV180002 | Guidance to mitigate speculative execution side-channel vulnerabilities

In this blog post I tried to quickly summarize the information and link it to the right websites.

Summary

Microsoft is aware of detailed information that has been published about a new class of vulnerabilities referred to as speculative execution side-channel attacks. This industry-wide attack method takes advantage of out-of-order execution on many modern microprocessors and is not restricted to a single chip, hardware manufacturer, or software vendor. To be fully protected, updates are required at many layers of the computing stack and include software and hardware/firmware updates. Microsoft has collaborated closely with industry partners to develop and test mitigations to help provide protections for our customers. At the time of publication, Microsoft had not received any information to indicate that these vulnerabilities have been used to attack our customers.

Note This issue also affects other operating systems, such as Android, Chrome, iOS, and MacOS.

Warning

Microsoft addressed protect against speculative execution side-channel vulnerabilities in the latest Windows Updates. However, customers who only install the Windows January 2018 security updates will not receive the benefit of all known protections against the vulnerabilities. In addition to installing the January security updates, a processor microcode, or firmware, update is required. This should be available through your device manufacturer. Surface customers will receive a microcode update via Windows update.

Guidance for Windows Client

Customers should take the following actions to help protect against the vulnerabilities:

  1. Verify that you are running a supported antivirus application before you install OS or firmware updates. Contact the antivirus software vendor for compatibility information.
  2. Apply all available Windows operating system updates, including the January 2018 Windows security updates.
  3. Apply the applicable firmware update that is provided by the device manufacturer

Windows-based machines (physical or virtual) should install the Microsoft security updates that were released on January 3, 2018. See Microsoft Security Advisory ADV180002 for updates for the following versions of Windows.

Read full guidance for Windows Client here: Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities

Guidance for Windows Server

Customers should take the following actions to help protect against the vulnerabilities:

  1. Apply the Windows operating system update. For details on how to enable this update, see Microsoft Knowledge Base Article 4072699.
  2. Make necessary configuration changes to enable protection.
  3. Apply an applicable firmware update from the OEM device manufacturer.

Windows Servers-based machines (physical or virtual) should get the Windows security updates that were released on January 3, 2018, and are available from Windows Update.

  • Windows Server, version 1709 (Server Core Installation) KB4056892
  • Windows Server 2016 KB4056890
  • Windows Server 2012 R2 KB4056898
  • Windows Server 2012 Not available yet
  • Windows Server 2008 R2 KB4056897

Your server is at increased risk if it is in one of the following categories:

  • Hyper-V hosts
  • Remote Desktop Services Hosts (RDSH)
  • For physical hosts or virtual machines that are running untrusted code such as containers or untrusted extensions for database, untrusted web content or workloads that run code that is provided from external sources.

There for Microsoft posted some additional registry keys to mitigations on servers. Microsoft also added some extra registry keys if you are running older versions of Hyper-V.

Read the full guidance for Windows Server and the registry keys here: Windows Server guidance to protect against speculative execution side-channel vulnerabilities

Guidance for Virtual Machines running on Hyper-V

In addition to this guidance, the following steps are required to ensure that your virtual machines are protected from CVE-2017-5715 (branch target injection):

  1. Ensure guest virtual machines have access to the updated firmware. By default, virtual machines with a VM version below 8.0 will not have access to updated firmware capabilities required to mitigate CVE-2017-5715. Because VM version 8.0 is only available starting with Windows Server 2016, users of Windows Server 2012 R2 or earlier must modify a specific registry value on all machines in their cluster.
  2. Perform a cold boot of guest virtual machines.Virtual machines will not see the updated firmware capabilities until they go through a cold boot. This means the running VMs must completely power off before starting again. Rebooting from inside the guest operating system is not sufficient.
  3. Update the guest operating system as required. See guidance for Windows Server.

Read the full guidance for Guest Virtual Machines here: Protecting guest virtual machines from CVE-2017-5715 (branch target injection)

Guidance for Surface Devices

Microsoft will provide UEFI updates for the following devices:

  • Surface Pro 3
  • Surface Pro 4
  • Surface Book
  • Surface Studio
  • Surface Pro Model 1796
  • Surface Laptop
  • Surface Pro with LTE Advanced
  • Surface Book 2

The updates will be available for the above devices running Windows 10 Creators Update (OS version 15063) and Windows 10 Fall Creators Update (OS version 16299). You will be able to receive these updates through Windows Update or by visiting the Microsoft Download Center.

Read full guidance for Surface Devices here: Surface Guidance for Customers and Partners: Protect your devices against the recent chip-related security vulnerability

Guidance for Azure

Microsoft has already deployed mitigations across the majority of our cloud services and is accelerating efforts to complete the remainder.

However, I always recommend that you also patch your operating systems and applications to be protected against other vulnerabilities.

Impact to Enterprise Cloud Services

Microsoft is not aware of any attacks on the Microsoft Cloud customers which leverage these types of vulnerabilities. Microsoft employs a variety of detection capabilities to quickly respond to any malicious activity in our enterprise cloud services.

Most of the Azure infrastructure has already received mitigations against this class of vulnerability. An accelerated reboot is occurring for any remaining hosts. Customers can check the Azure Portal for additional details.

All other enterprise cloud services such as Office 365, Dynamics 365, and Enterprise Mobility + Security have mitigations against these types of vulnerabilities. Microsoft engineering is continuing to perform analysis across the environments to confirm further protection.

Read full guidance for Microsoft Azure here: Microsoft Cloud Protections Against Speculative Execution Side-Channel Vulnerabilities

Guidance for Azure Stack

Azure Stack customers should take the following actions to help protect the Azure Stack infrastructure against the vulnerabilities:

  1. Apply Azure Stack 1712 update. See the Azure Stack 1712 update release notes for instructions about how to apply this update to your Azure Stack integrated system.
  2. Install firmware updates from your Azure Stack OEM vendor after the Azure Stack 1712 update installation is completed. Refer to your OEM vendor website to download and apply the updates.
  3. Some variations of these vulnerabilities apply also to the virtual machines (VMs) that are running in the tenant space. Customers should continue to apply security best practices for their VM images, and apply all available operating system updates to the VM images that are running on Azure Stack. Contact the vendor of your operating systems for updates and instructions, as necessary. For Windows VM customers, guidance has now been published and is available in this Security Update Guide.

Read full guidance for Microsoft Azure Stack here: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities

Guidance for SQL Server

The following versions of Microsoft SQL Server are impacted by this issue when running on x86 and x64 processor systems:

  • SQL Server 2008
  • SQL Server 2008 R2
  • SQL Server 2012
  • SQL Server 2014
  • SQL Server 2016
  • SQL Server 2017

IA64-based versions of SQL Server 2008 are not believed to be affected.

Microsoft made a list of different SQL Server scenarios depending on the environment that SQL Server is running in and what functionality is being used. Microsoft recommends that you deploy fixes by using normal procedures to validate new binaries before deploying them to production environments.

You can finde the list for scenarios and recommendations here: SQL Server guidance to protect against speculative execution side-channel vulnerabilities

There is also a list of updates for SQL Server available:

 

  • 4057122 Description of the security update for SQL Server 2017 GDR: January 3, 2018
  • 4058562 Description of the security update for SQL Server 2017 CU3 RTM: January 3, 2018
  • 4058561 Description of the security update for SQL Server 2016 CU7 SP1: January 3, 2018
  • 4057118 Description of the security update for SQL Server 2016 GDR SP1: January 3, 2018
  • 4058559 Description of the security update for SQL Server 2016 CU: January 6, 2018
  • 4058560 Description of the security update for SQL Server 2016 GDR: January 6, 2018
  • 4057114 Description of the security update for SQL Server 2008 SP4 GDR: January 6, 2018
  • 4057113 Description of the security update for SQL Server 2008 SP3 R2 GDR: January 6, 2018

Read the full guidance for SQL Server here: SQL Server guidance to protect against speculative execution side-channel vulnerabilities

Verifying protections again speculative execution side-channel vulnerabilities

The Microsoft Security Response Center released a PowerShell Module on the PowerShell Gallery called SpeculationControl, which verifies if your system is protected or not.

You can find more here: Use PowerShell to verifying protections again peculative execution side-channel vulnerabilities CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre)

 

More information on how to mitigate speculative execution side-channel vulnerabilities can be found here: ADV180002 | Guidance to mitigate speculative execution side-channel vulnerabilities



Experts Live and Thomas Maurer

Win an Experts Live Europe 2017 Conference Pass

UPDATE: Thanks for all the people who joined the raffle, the raffle is closed now and the lucky winner will have a mail in the inbox

As mentioned, I am proud to speak at this year’s Experts Live Europe 2017 in Berlin, Germany. Today is your lucky day. If you want to join me at this amazing conference and you do not yet have a Conference Pass, you have the chance to win one today. The full 3-day conference pass is worth €761.60 and gives you access to all sessions, the expo hall, the attendee networking party and the closing party.

About Experts Live Europe 2017

ExpertsLive Europe

The Experts Live Europe 2017 conference takes place August 23-25 in the Berlin Congress Center

Experts Live Europe is one of Europe’s largest community conferences with a focus on Microsoft cloud, datacenter and workplace management. Top experts from around the world present discussion panels, ask-the-experts sessions and breakout sessions and cover the latest products, technologies and solutions. It’s the time of the year to learn, network, share and make valuable connections.

  • 3 conference days
  • 100 sessions
  • 6 parallel tracks
  • Private side meetings
  • Top experts from around the world
  • More than 20 MVPs on site
  • Exhibition area with 3rd party vendors
  • Networking party
  • Ask the experts area
  • Quality food & beverages
  • Conference closing party
  • Good connected city in Europe
  • Modern location with easy-to-reach rooms

How to win a free Conference Pass

If this is reason enough for you to join, you can win a conference pass here by doing the following steps:

  1. Share this post on Twitter or/and Facebook or/and Linkedin using the hashtag #ExpertsLive
  2. Leave a comment on this post with a great reason why you want to attend until August 9 23.59 (UTC +1).

Under all comments I will raffle one regular conference pass. The winner will be contacted by email.

 

Good Luck! And for those who didn’t win, you still have the chance to buy a ticket!

  • Only included is the regular conference pass (travel cost and hotel is not included)
  • No refund of existing tickets
  • The ticket cannot be paid out
  • The ticket is not for resale
  • and the usual 😉

 



Microsoft Certified Trainer MCT

MCT Microsoft Certified Trainer

I am proud to announce that I am now a Microsoft Certified Trainer. I got the official certification a couple of months ago, but I didn’t have time to share it yet. A Microsoft Certified Trainer (MCT) is a professional trainer, who has been certified by Microsoft as an expert in terms of professional knowledge and with the ability to properly impart this knowledge to others. MCTs are considered as the premier instructional and technical experts in all Microsoft technologies and they have the sole authority to deliver training for other Microsoft Certifications. It is great to be finally part of this community and I am looking forward to meet other MCTs.

 



Veeam Backup for Microsoft Office 365

Veeam Backup for Microsoft Office 365

Some weeks ago Veeam announced Veeam Backup for Microsoft Office 365 and now you can finally download the Beta of it. To be honest with you the installation is brutally boring and simple, so I will only show you how you quickly can create a new backup job.

First create a new job

Veeam Backup for Microsoft Office 365 New Backup Job

Select a which mailboxes you want to backup

Veeam Backup for Microsoft Office 365 New Backup Job Select Mailboxes

configure schedule and retention and you are ready to go

Veeam Backup for Microsoft Office 365 New Backup Job Schedule

And guest what, with the Veeam Explorer for Microsoft Exchange, you can also restore mails from your Office 365 mailboxes.

Veeam Explorer for Microsoft Exchange

Check out the Veeam Backup for Microsoft Office 365 here.



Microsoft MVP 2014

Microsoft MVP 2016 Cloud and Datacenter Management

I am proud to announce that I just received my 5th Microsoft MVP Award for my focus in Cloud & Datacenter Management.

Microsoft MVP Award 2016

Congratulations! We are pleased to present you with the 2016 Microsoft® MVP Award! This award is given to exceptional technical community leaders who actively share their high quality, real world expertise with others. We appreciate your outstanding contributions in Cloud and Datacenter Management technical communities during the past year. Also in this email:

  • About your MVP Award Gift
  • How to claim your award benefits
  • Your MVP Identification Number
  • MVP Award Program Code of Conduct

The Microsoft MVP Award provides us the unique opportunity to celebrate and honor your significant contributions and say “Thank you for your technical leadership.”

 

Patrick Malone
Director
Community & Advocacy Programs
Microsoft

 

This is the 5th Microsoft MVP award in a row since 2012, 2013, 2014 and 2015. The Microsoft MVP award and the included opportunities add a huge benefit like the Microsoft MVP summit where you have the chance to talk to the Microsoft Product Groups, learn and place feedback. But of course the Microsoft MVP award also adds some other great advantages. In the past years I had the chance to travel all over the world and speak in different countries and events, and I met a lot of great people, which also became great friends.

Of course there are a lot of people I have to thank, but I want to keep the list as short as possible. I would like to thank my employer itnetX which is supporting me in the best possible way year over year, my current and former colleagues, the Microsoft MVP community and of course Microsoft employees in Redmond and all over the world.

Get more information about the Microsoft MVP award: Microsoft MVP Award Website