{"id":179529,"date":"2019-02-13T19:04:23","date_gmt":"2019-02-14T00:04:23","guid":{"rendered":"https:\/\/www.ntegrait.com\/what-is-customer-lockbox-and-privileged-access-management-in-office-365\/"},"modified":"2019-02-13T19:04:23","modified_gmt":"2019-02-14T00:04:23","slug":"what-is-customer-lockbox-and-privileged-access-management-in-office-365","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/what-is-customer-lockbox-and-privileged-access-management-in-office-365\/","title":{"rendered":"What Is Customer Lockbox And Privileged Access Management In Office 365"},"content":{"rendered":"
[youtube https:\/\/www.youtube.com\/watch?v=30_igb5r1eE]\u00a0<\/p>\n
Microsoft Office 365 is a suite of services that includes Customer Lockbox and\u00a0Privileged Access Management<\/a>. Both tools to assist customers in meeting their compliance obligations and maximizing data security and privacy. These tools are currently only available for customers with\u00a0Office 365<\/a>\u00a0Enterprise and Advanced Compliance\u00a0SKUs<\/span>.<\/p>\n Privileged accounts are being compromised more rapidly every day and sensitive data can be exposed in shorter and shorter periods of time. Therefore, organizations must establish multiple regulations, procedures, and compliance obligations that must be followed before access is provided by anyone. Microsoft Office 365 understands this and has built-in Privileged Access Management to meet these higher levels of security. Lockbox and\u00a0Privileged Access Management<\/a>\u00a0provide granular task-based access control within an approval workflow so organizations can gather privileged access as well as monitor and control sensitive tasks.<\/p>\n Multiple Layers of Protection<\/strong><\/p>\n Microsoft 365 Customer Lockbox and Privileged Access can assist organizations to meet their compliance obligations through a built-in set of tools offering multiple layers of protection to:<\/p>\n 1.\u00a0access<\/span>\u00a0their compliance\u00a0posture<\/span><\/p>\n 2.\u00a0protect<\/span>\u00a0sensitive\u00a0data<\/span><\/p>\n 3.\u00a0respond<\/span>\u00a0to\u00a0requests<\/span><\/p>\n 4.\u00a0maintain<\/span>\u00a0business\u00a0continuity<\/span><\/p>\n 5.\u00a0efficiently<\/span>\u00a0reduces\u00a0costs<\/span><\/p>\n This is accomplished by\u00a0ensuring<\/span>\u00a0there is a regulated process flow to handle incoming requests. Virtually all Microsoft operations are fully automated unless during very rare circumstances requiring human involvement that is necessary to troubleshoot and correct a problem. If this intervention is needed, an approval request is generated, and then the approval group is notified by email. The request can either be approved or denied and even blocked. If the request is approved, the task is processed and checked against the privileged access policy and then logged in the Office 365 Security and Compliance Center.<\/p>\n