A container in which all your online services from Microsoft are stored. Does your company use a cloud service from Microsoft, such as Office 365? Then space is made available in the Windows Azure data centre for all online services. With Windows Azure Active Directory (WAAD) you can manage your users. Create a link to the Active Directory at your own location via Active Directory Federation Services (ADFS). When activating these online services, customers often think that the tenant is only the domain of the Office 365 users, but this is actually only the case if you do not specify your own domain.
A score for how secure the tenant is set up for you, judged by Microsoft. They also compare the security interface with other companies to see how high you score. You want to score as high as possible on this. The scale runs from 0 to somewhere in the 300s. The average international score is below 25, but we always try to get our clients to score 100+.
A remote monitoring and management tool for IT endpoints (pcs, laptops, servers). We use it to configure, secure, patch, update, troubleshoot, inform, monitor and organise services. There is a possibility for extensive automation through scripting. We use this service for all endpoints under our management.
Retaining email deleted from corporate accounts for purposes such as litigation. Suppose an employee intentionally deletes all emails from one customer, then with litigation hold you can retrieve it and see when it was deleted. Used mainly for litigation and court cases.
Ensures that you receive a warning or block if you send a message with privacy-sensitive information such as your social security or credit card number. You are then asked if you are sure you want to send that information, so that your data is not lost. This works for e-mails but also in Word files.
Possibility to retrieve e-mails, files and calendar appointments from a backup. So not the whole mailbox but really specific search on keywords, sender, date, etc. What you can also see: the time of deletion and reason for deletion (e.g. if a process is running, such as the automatic archiving of files that are 10 years old).
Extract e-mails or files from normal location and place them in an archive. Set, for example, that files older than 3 years are automatically moved to the archive. In this way you can optimise e-mails and files, for example if you are looking for a file from a certain year.
One large file stored at Microsoft for 90 days, in which every action is logged. This can be read online by administrators. For example, you can see who called who, when and what actions were taken. The function: transparency and honesty; we cannot do anything without the customer knowing it.
Retention; storing, managing and editing files within a certain policy. For example, a rule such as 'all files belonging to Lime Networks are deleted every year'. Or 'all tax data cannot be deleted for 7 years' or 'we can retrieve files for up to 10 years' or 'we are going to allow edits for 30 days and after that 30 day creation no one is allowed to edit any more'. The sky is the limit! So it is all about setting.
The umbrella term for everything that can be encountered by malicious persons via e-mail and the Internet, such as viruses and phishing. Actually, it is a spam filter, antivirus solution and antimalware. Office 365 has a low default rating that we always increase to ensure and guarantee your security.
We distinguish between two Active Directories (AD), namely a regular AD and an Asher AD. The normal Active Directory is a server in your office where all the users are stored. Think of it as a huge spreadsheet/database where all the usernames and passwords are stored. Of course, this is handled with the utmost security and everything is extremely well protected. The Asher AD is about the same as the regular AD, but then in the environment of Office 365. Microsoft sometimes uses the term 'Identity Management'.
Manage your company's security policies on mobile devices such as smartphones and tablets. These include mandatory MFA, a PIN number for unlocking, your fingerprint or a camera scan of your face (FaceID).