Safe remote working: i-Vertix Log Management for Office 365
The outbreak of the pandemic gave an incredible boost to the introduction of the so-called Smart Working into the everyday life of many companies. Nowadays, there are plenty of tools available for remote working and collaboration, video meetings and productivity. Finding the right tool for one’ needs doesn’t appear to be so complicated.
When talking about Smart Working, the real challenge seems to be making sure that everything runs smoothly, while also ensuring both the Company’s and the employees’ safety. Among those tools we have mentioned before, one of the most common is probably Office 365. But how can you ensure that your company, your employees and your data are safe when working with it?
Well, here comes the good news: i-Vertix Log Management offers connectors towards Office 365, thus allowing the system to receive and analyse data from the following sources:
- Audit logs
- Cloud App Security
Office 365 audit logs
Do you ever need to find out if a user has visualized or shared a specific document, or if he deleted an item? Or do you need to track potential activities from malicious IP addresses?
If so, you will be happy to know that i-Vertix Log Management helps you monitor all that and more, providing you with preconfigured Dashboards and IP geo-localisation that allow to easily and transparently analyse the activities generated. Depending on the different Office 365 subscriptions, it is possible to examine several types of data, such as:
- User activity in SharePoint Online and OneDrive for Business
- User activity in Exchange Online (Exchange mailbox audit logging)
- Admin activity in SharePoint Online
- Admin activity in Azure Active Directory (the directory service for Microsoft 365)
- Admin activity in Exchange Online (Exchange admin audit logging)
- eDiscovery activities in the security and compliance center
- User and admin activity in Power BI
- User and admin activity in Microsoft Teams
- User and admin activity in Dynamics 365
- and much more…
We do not want you to get bored with too deep information, but if you’d like, you can learn more about the different options by checking the documentation Microsoft offers.
All the authentication events (login, logoff, failed logon) are automatically normalised and forwarded to the fiscal and analytical archive of the “Garante della Privacy”, where i-Vertix Log Management ensures data integrity, as required by the law.
Office 365 Cloud App security
Office 365 Cloud App Security is a tool offered by Microsoft within the Office 365 suite, available after the purchase of dedicated licenses or included with specific subscriptions.
Microsoft Cloud App Security is a complete Cross-SaaS solution that offers deep visibility, advanced data control and an enhanced protection from threats to the cloud applications.
Using this tool, it is possible to have visibility over the IT shadow, identifying the cloud applications that are being used. This way, once the service is authorized, you will be able to monitor and protect the data contained in the applications.
But what does this have to do with i-Vertix? Once again, i-Vertix NMS offers a connector that allows you to receive the log files coming from all kinds of events related to the Cloud App Security, transforming the threats analysis into something quite simple and intuitive.
Don’t you feel safer already?
Like we said, we do not want to bore you with too many details, but you can always get in touch with us by sending an email at email@example.com. We will be more than happy to share with you all the information you need and to help you manage your Smart Working in the safest way possible!