AGAT

Categories
Microsoft Teams

Information Barriers for Microsoft Teams: capabilities and limitations

In this article we are going to explain what is Information Barriers for Microsoft Teams as well as comment about its advantages and disadvantages for different businesses types.

Update: for more info on Information Barriers for SharePoint and OneDrive, go to our new blog post here

Table of contents

1- What is Information Barriers for Microsoft Teams

2- Requirements for Information Barriers

3- Permission Requirements and Prerequisites for Microsoft Teams

4- Capabilities and Limitations

1- What is Information Barriers for Microsoft Teams

Information Barriers for Microsoft was first introduced to the community in May 2019, as a solution to restrict communication and collaboration between groups to avoid any type of conflict of interests or to safeguard information. This kind of solution is not new to the business world (specially, to finance companies) and is known as “Ethical Wall” or “Chinese Walls”.

Corporations, brokerage firms, investment banks, and retail banks have been using Chinese walls to describe situations where there is a need to maintain confidentiality in order to prevent conflicts of interest.

A classic example, addressed by FINRA regulation, is when a financial company (banks, credit rating, etc) that handles non-public information needs to block its investment departments communications with researchers or any other department. Other examples are contact centers that need policies to have agents isolated with each other.

As a more general example, many companies do not let employees communicate with higher ranked positions (although they could choose to allow the opposite) as well as setting different permissions, as file sharing, for specific categories of employees.

2- Requirements for Information Barriers

As this service is not included on Microsoft’s basic packages, companies need to have one of the following subscriptions:

  • •Microsoft 365 E5
  • •Office 365 E5
  • •Office 365 Advanced Compliance
  • •Microsoft 365 E5 Information Protection and Compliance

3- Permission Requirements and Prerequisites for Microsoft Teams


As Information Barriers is a product intended for compliance officers (or any other compliance related position) use, in order to define, or edit rules one must be assigned with one of the following roles:

  • •Microsoft 365 global administrator
  • •Office 365 global administrator
  • •Compliance administrator
  • •IB Compliance management

There are a few checklist items to have completed in order to get Information Barriers configured

  • •Required permission and licenses have been assigned
  • •Verify your directory includes data for segmenting users
  • •Enable scoped directory search for Microsoft Teams (need to wait 24 hours after enabling)
  • •Make sure audit logging is turned on
  • •Make sure no Exchange address book are policies are in place
  • •Provide admin consent for Microsoft Teams

As this article is not going to deal with the complex process of how to configure Information Barriers, we recommend these by Microsoft expert Tony Redmond:


Part 1 | Part 2

4- Capabilities and Limitations

Microsoft Information Barriers works blocking files, messages and adding team members using customizable filters such as department, alias, email address. Many custom filters can be set in order to manage the policies. More information here

As for Information Barriers limitations, these are regarding general aspects.

  • •Policies can only be set using Powershell. No UI. Can be very difficult for a compliance officer to use.
  • •No control of  communication with external domain during meetings
  • •No control of external Users and guests
  • •No auditing of blocked operation that can assist in training 
  • •No notification for compliance admin
  • •No granular control of specific operation – such as screen sharing
  • •Policies can be set only to either block files and messages – no control over functionalities such as audio, video and screen sharing
  • •If previous address book policies are present they must be deleted before configuring
  • •Policies can take several hours to apply after configuration

As for users that want to know how to overcome these limitations and gain extra functionality to the Information Barriers, we recommend checking SphereShield Ethical Wall for Microsoft Teams.
SphereShield by AGAT provides a powerful yet intuitive solution to control communications in Microsoft Teams offering advanced options such as audio, video/screen sharing and granular control. 

Here is a short Demo

For a more comprehensive understanding, check this comparison table

Ethical Wall



Office 365
AGAT
License →  Essential/E3E5 –  Information BarriersSPT2 (E.W. License)
Internal control by Groups/Users (Allow/Block)
External Control By External User (Allow/Block)
External Control by Internal group/users/domain
Granular Control capabilities (IM’s/files/audio/video/sharing)
Can be fully controlled by compliance role only 
Web User Interface (GUI) – Easy to operateN/A
Notifications to end user/admin
Incident auditing for compliance awareness and training
Reports by user/policy/domain
External system integration/SIEM 
Restrict Guests communication only to Team members
Restrict access for guest only to specific channels in a team

SphereShieldForMSTeams gfv7p1
SphereShield Ethical Wall diagram. Information Barriers for Microsoft Teams

Contact Us for more information


Categories
Microsoft Teams

Data Loss Prevention (DLP) for Microsoft Teams: capabilities and limitations

This article will be dealing with the difference between using real-time and near-real-time Data Loss Prevention (DLP) for Microsoft Teams and featuring a video with an experiment on the topic. We will also discuss how does Microsoft address policies when signing in as a guest.

Introduction

Data Loss Prevention (Also called Data Leak Prevention) Solutions can be different in many aspects like rule setting, customization options and platforms covered. It does not matter which industry or business type, data is transferred at an extreme fast pace and those who need a DLP want to see an action taking place that can mitigate the effects of sensitive information being transferred on messages, files, and more relevant to our days, video and audio conversations.

What is more, companies want to keep consistency in blocking internal employees from sharing sensitive information while being guests or external users with other companies, which arguably could be one of the most important concerns.

DLP approaches – Real-Time preventive or Near-Real-Time proactive 

Companies adopt different approaches to handle Data Loss Prevention needs
When Intellectual Property (IP)  protection is on the table, prevent or block-  is the approach that is needed while in other cases a proactive approach is good enough. Proactive can also be used for compliance awareness. Companies can adopt a proactive approach realizing that there is no limit to the channels that an employee can cause data leakage and rather invest in training and awareness.

Microsoft near real-time DLP for messages and files 

Microsoft has been offering for a good time DLP services for their Teams Unified Communications Software and since then it has had different feedback from its users.

While many users praise their near-real-time handling of messages, others are quite unfulfilled with the DLP capabilities of files
The main point has been described as long delays to handle those files, which could allow the end users to download and see before anything occurs. The second point is that custom rules, ie. those specifically designed by users, do not apply to files and can result in lack of coverage.

As for now, Microsoft has been improving the handling of DLP policies for messages, while it has been said that they will release the ability to block files from arriving to the end user, turning the platform into non-real-time.

Definitions that matter

It is important to highlight that Microsoft describes their DLP as near-real-time, and here definitions play a big role.

The comparison would be as following: 

Let’s take a situation of getting wet in the rain or touching a hot stove as a situation you want to avoid in some cases. We can all understand that opening the umbrella after the rain has started or quickly removing your hand from the hot stove is less good than avoiding the situation from the first place as damage is done. Near Real-time is near protection. Almost protected against damage and threats. For many this is sufficient but for others it is not an applicable solution.

In the world are various examples of both real-time systems, those who require a continual input, constant processing and steady output of data: Data streaming – Radar systems – Customer service systems – Bank ATMs

For near-real time, when speed is important but processing time is accepted to be in minutes instead of seconds, these are the usual examples: Processing sensor data – IT systems monitoring – Financial transaction processing

Some of this information was based on a blog post by syncsort.

See how a user can get access to sensitive file even when Microsoft DLP is enforced 

In this video it’s possible to see a simulation of a real-life scenario of Microsoft intervening on a “sensitive” (DLP defined) file being sent from one user to another. As it’s shown, Microsoft DLP takes around 50 minutes to detect a file containg sensitive information (defined on policies). That time is more than enough to download the file and

Microsoft Teams DLP Limitations and risks

DLP Limitations when signing in as a guest

If sharing sensitive data within the internal scope of the company presents a big risk, all the more so when talking about employees sharing it externally. If this sounds logic to you, then pay attention. This next video is going to show that on Microsoft Teams Data Loss Prevention.

In the experiment a DLP policy is set up to catch sensitive data. At first it shows working when dealing with internal employees. Now, when the same user logs in to another company as a guest, the policy won’t take effect.

This shows an existential threat when dealing with Data Leak Prevention policies

DLP not working when dealing as a Guest

Our approach: Sphereshield Real-Time DLP for Microsoft Teams

Here at AGAT software we have developed a real-time approach for a DLP in Microsoft Teams. The solution works by analyzing the content being sent before it can reach the end user, not giving any chance to the end user to see or download anything. We believe that it is the difference between pressing the brakes a little bit late and not even turning on the engine.

On the other side, SphereShield Data Loss Prevention policies are context-aware and can apply to both internal and external communications. This addresses the biggest risks making it impossible to circumvent the system.

When Data Loss prevention is a real concern and a need, the only solution is a real-time DLP that is context-aware

For more information CONTACT US

Categories
Guest Users Microsoft Teams

Everything you need to know on granting external and guest access in Microsoft Teams.


In this article we’ll explain to you in a very simple and concise way everything you need to know on external and guest access for Microsoft Teams, plus a lifesaving tip to increase productivity in this platform.

1-External Sharing

1- External Sharing: gives you the chance to communicate through chat, and coordinate meetings with a common calendar. Also, it is handy sharing documents, files, libraries and event complete sites by SharePoint Online. This feature is the best option to collaborate with someone outside your institution, when you invite him this member becomes a guest access. 

Now let’s dig into this type of access and its characteristics. Allows you to invite external users to become members of your team, which means you are giving access to an individual and not to a domain.  

So, what are the permissions for a guest access? 

  • They will have the capability to create channels, and share the channel files 
  • Can participate in a channel conversation, and private chats  
  • Be able to post, delete, and edit messages 

Permissions of Team Members and External Users with Guest Access

2- How to enable guest access in Microsoft Teams? 

In teams guest access is turned off by default and the only way to enable it is to be an Office 365 global admin. These are the following steps you need to go through:  

  • In the Microsoft Team Admin Center go to Org – Wide Settings and tap on “Guest Access” 

wWx1ZFmlHmp0N20yQ ns81JyHqwz JK9kNEDoTwOMBYaCbeVmCOC iWUzGtblfxLQHv3 B2rZEtzhsJKVqyjc06QpiZDsG8F1HVplV99JnLGq2Ic cIGo3BAfPMn My6dXXTjlUM

  • Switch the “Allow guest access in teams” to ON and click save (Can usually take up to 24:00 hours for changes to become effective) 

uhyGSrpU7RR2 3G5pjUoiLF4PJ0qlMspaPChO1qT zPMgTyz2qzMgmjeIaLuXFxHzbTvx CPV7L2mYsYQICZO3v ESH Bff1 N5Uq85O2bI Nez8iMuretMu

3 – Configure guest access in Microsoft Teams

This is a vital section of the setting up phase, because here you will manage what the guest will be able to see and do. In the same spot where we allowed guest access you can configure the settings for (Calling, Meeting and Messaging). Leaning on what you want to allow by clicking on or off and afterwards save it so it applies to your new settings  

VsNweq4d6lKgkkGWhtj2sFrimGbT iLOK5VTmp2PEoF
1y7WcGJFeb76OQOUKMn

Remember guests once in the team can get access to all public channels, be aware.

Also a guest is not limited in actions (file sharing, calls, etc.)

4 – Now it is time to start adding some guests !!  

Only Team Owners can add guests in teams. Firstly, make yourself an owner of a team in (Teams > Manage) and start adding new users 

  • In the teams app on the left sidebar select “Team” and go to the team you want to add a guest  
  • Select more options and click on add a member  
  • Introduce the guest email address, afterwards click save and your guest will receive a welcome invitation email  

ZaynS1GY9W9cXJ8901AqAS8VW6JG4QGcHoTtJuHLj1JjO5kYJhl3puMIfJKouEaOFoYSG8uTtc5waR2o9xEkqVv2ADed7qS7NQfPktpO n8Ucn 0vFJ cesQq577k ltnqgOXFuv

With guest access your content never leaves your sight, because all your data gets saved on your tenant. Here you can protect it, oversee it and manage it. Different projects require different needs that’s why it’s essential to educate your users in order to have a secure environment where your data is secure.  

How to solve the issue with guest access being able to participate in every channel?

There is bad news and good news with this respect. The bad news is that this kind of control is not possible within the platform itself.

The great news is that AGAT has the simplest way to manage guest access into Microsoft Teams. Sphereshield for Microsoft Teams offers, amongst its complete suite, the possibility to get a granular customization on guest access and define which channels a guest can and can’t do.

To get a FREE live demo, contact us today.

Most of the content in this article was retrieved from https://sharegate.com/blog/microsoft-teams-guest-access-permissions-settings-how-to-add-guest

For more information on the capabilities and limitations of Microsoft Information Barriers read this post -> https://agatsoftware.com/blog/information-barriers-microsoft-teams-capabilities-and-limitations/