[vc_row][vc_column][vc_column_text]

View and edit your profile in Office Delve

The profile page in Delve makes it easy for you to update your profile information, and for others to find and connect with you. With the new profile page in Delve, you can also quickly get back to documents you've worked on recently, or go to other people's profile pages to see what they're up to.
This article describes how you can edit your profile information.
View and edit your profile
Note: You may not be able to change all information in your profile. Some information, such as your name or title, may be collected from other systems that your IT or human resources department control. If you want to update those details, contact them or your admin.
1.To go to your profile page, select your picture in the Office 365 header, and then select About me.

delve1

If you're already in Delve, you can go to your profile page by selecting Me from the left-hand menu.
2.To change your information, choose Edit profile.

delve2

3.Update your profile information as desired. For example, click Upload picture on the Basic Information page to change your profile picture.
4.Choose Contact information and Details to see different pages of your profile. Choose the ellipsis … to see additional profile pages.
5.Choose Save all and close.
How do I keep certain profile details private?
Your profile contains information about you that people in your organization see when they visit your profile page. Some of this information is fixed by your organization and always shared with everyone, such as your name, title, department and manager.
For some details, you can choose to keep the information private by selecting 'Only Me' under 'Who can see this?'
What are the guidelines for adding a profile picture?
You can upload a photo in one of these image formats: .bmp, .jpeg, or .png. An optimal picture size is 96 x 96 pixels.
How can I change the cover photo?
Your cover photo is the large image at the top of your profile. Choose one you like from the photos provided. For now, you can't upload your own photo here.
On your page, click Change cover photo in the top right corner, and then choose a photo from the list.

delve3

How do I follow someone?
There's no option to follow someone from their profile in Delve.
For information about how to follow someone in Newsfeed or Yammer, see Follow people to keep track of their activities.
Why can't I see if someone is online?
The online presence feature will be available in a future release.
Where can I find my Newsfeed?
If your company enables Newsfeed, you can access your Newsfeed by clicking the Newsfeed tile in the Office 365 suite navigation. If your company is using Yammer for Enterprise Social Collaboration, a Yammer tile will appear in the Office 365 suite navigation.

delve4

Where can I find my links?
Custom links are no longer supported.
How do I view or add apps?
You can view or add apps by clicking the OneDrive tile in the Office 365 suite navigation, then clicking on Settings > Add an app.

delve5

How do I view or add subsites?
You can view or add subsites by clicking the OneDrive tile in the Office 365 suite navigation, then clicking on Settings > Site contents.

delve6

Why does my profile look different than you describe?
Some of the functionality on the profile pages is currently only available if your organization has opted in to the First release program.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="See how Managed Solution and other Office 365 products can help your company thrive!" txt_align="center" title="Office 365 Free Trials" color="orange" size="lg" position="bottom" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fpay-as-you-go-microsoft-licensing-free-trials%2F||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

Pokémon Go Brings Physical, Data Security Threats to Your Company

By Wayne Rash as written on www.eweek.com

PokemonGo

NEWS ANALYSIS: The wildly popular phone app from Nintendo now has more users than Twitter and is causing concern where gamers randomly show up in search of Pokémon characters.
WASHINGTON—There already are signs at the National Holocaust Museum and at Arlington National Cemetery asking visitors not to play the Pokémon Go mobile augmented reality game while they are there.
There are reports that some of our nation's lawmakers were seen playing Pokémon Go on the floor of the U.S. House of Representatives. There have been several armed robberies here of Pokémon Go players by criminals who used the game's features to attract users, who were relieved of their smartphones and other valuables.
But the Pokémon Go phenomenon is not specific to Washington. It has become an international craze to the point that it's now the lead story on some television network news programs. To some extent, the game, which has been available for only a week, seems fairly harmless and even seems to have some benefits—it's getting people outside to walk around in search of Pokémon characters.
But for your company Pokémon Go has a more sinister side. The game has a huge potential as a cyber-security risk, malware vector, safety hazard, on-the-job time-waster for your employees and a waste of your company's computing resources. Worse, the game may become a gateway into your company's data stores and it can introduce malware that spreads within your network.
According to Chester Wisniewski, senior security advisor at Sophos, Pokémon Go brings threats from two different areas to people who play the game. If those people are your employees, they can bring those threats into your company. One of the most insidious is the fact that a spinoff of Google's parent company Alphabet is the force behind the game and is handling the location and points-of-interest data for the game.
Niantic Labs uses Pokémon Go to gather information about its users so they can play the game successfully, but the company also has the ability to use that information for other purposes. "It's an app that's designed to track you," Wisniewski pointed out. "Alphabet knows where you're at," he said.
Problems at Niantic Labs have added to the security issues with Pokémon Go. Wisniewski said that because of the company's scalability problems, millions of users are forced to download the app from third-party Websites, where some of the software contains malware along with the game.
One version of the malware, called DroidJack, is able to gain access to anything on your Android phone, including all of your email, your contacts and your text messages. In addition, this malware can access your keystrokes, on-board microphone and camera.
So far this malware doesn't affect versions of Pokémon Go for iOS devices and it doesn't affect versions from the Google Play store, but because the app is only available in five countries, users elsewhere have to go to third-party sites. However, even users in places where the official download of Pokémon Go are available apparently are downloading it from third-party sites, either because their Android devices don't work with the Play store or because of performance issues.
Either way, the malware is a significant problem, especially for employees who keep critical or proprietary information on their phones where Pokémon Go or the malware can find it. But that's not the only threat to the enterprise.
John Reed, senior executive director for Robert Half Technology, warns that games such as Pokémon Go can hurt productivity if employers aren't careful about its use. "Any productivity loss would be on a case-by-case basis—sometimes mobile games can create a false sense of urgency for users, but employees can find a balance between their responsibilities and entertainment," Reed said. He noted that allowing the use of games such as this during downtime, such as lunchtime and breaks, can actually encourage creativity.
But then there's the other side of security, which is keeping people out places where the public isn't allowed to wander. The New York Times has reported an influx of people in its building in search of game characters. Several federal buildings in Washington have reported visitors entering because of the game, rather than because they were on government business.
The problem with a game that's exploded in popularity in the way Pokémon Go has is 'people and companies not involved with the game don't know what to expect. In addition to the privacy concerns, the potential for malware and the problem of physical intrusions, people are simply showing up out of nowhere and then leaving in response to the game.
One action companies can take, Wisniewski said, is to set policies for what apps can be run on mobile devices that also contain company data. He suggests making it a requirement that only apps obtained from the app stores of the phone company can be used. Neither Apple's App Store nor the Google Play store allow malware-infested apps, and while there have been occasional problems, it's still a safer way to get apps than finding them in the wild.
And while you're setting mobile app policies, it's also probably important to require security software for mobile devices as a way to reduce the likelihood of malware infections that can threaten your network's integrity.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="See how else Pokémon Go is taking the world by storm" txt_align="center" title="Here" color="orange" size="lg" position="bottom" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fdont-let-productivity-slip-while-your-employees-catch-em-all%2F||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

Recommended Practices for your Hybrid Identity Admin accounts

By Sander Berkouwer as written on dirteam.com

Application

I’ve been involved in quite some Microsoft Hybrid Identity implementations: Big and small implementations, with and without AD FS next to Azure AD Connect, with Azure AD Connect and 3rd party tooling.
One thing though, all these implementations had in common was the admin account(s) they needed done right.
You can dial a lot of knobs when implementing Hybrid Identity. One of the more important knobs is the one that turns on federated single sign-on to your organization’s on-premises Active Directory Federation Services (AD FS) implementation. This particular setting is changed using the Azure Active Directory PowerShell Module.
Many early adopters of Microsoft Hybrid Identity using AD FS have already experienced a common pitfall: when you’ve converted a DNS Domain in Azure Active Directory to federated, you need AD FS to authenticate. Even to change the setting from federated back to standard.
Note: The main reason to convert from federated to standard is because there’s something wrong with the AD FS implementation…
So, how do you cope with this challenge?
Global admins and/or on-premises admins
One of the first things, prospect admins learn during training is to use separate accounts for admin purposes and day-to-day usage, like e-mail and browsing. This is based on the principle of least (administrative) privilege. The same holds true for Azure Admins:
You don’t want to assign Global Admin rights in Azure Active Directory to your day-to-day account.
In most on-premises environments, admin accounts are prefixed with adm in their username or postfixed with a number. The latter number strategy allows for a quick overview of the impact of an account; when 1 represents print admin or account operator rights and 9 represents both on-premises Enterprise Admin and Azure Global Admin, the number quickly indicates how much impact deleting the account might have or what account to use for a specific task.
However, there is a dark side to this practice: a person with malicious intent, might quickly target accounts of the most interest.
Admin roles in Azure Active Directory
Azure Active Directory offers the following administrator roles

TableAdminRoles_fw_

These roles can be the basis for number postfixing your Azure Active Directory admins.
Note: For Azure Resource Management (ARM)-based resources, you can additionally add your own Roles-based Access Control (RBAC) for finer-grained access management. While the users and groups would live in Azure Active Directory, none of the Azure Active Directory resources, themselves, are ARM-based, momentarily.

AzureADPIM

Azure Active Directory Privileged Identity Management
Azure Active Directory Privileged Identity Management (PIM) allows for non-permanent and more granular just-in-time admin roles. Auditing and reporting allows for insights on the actual usage of administrative privilege and accounts that no longer need administrative privileges. By acting on these insights, the attack surface of privileged accounts is minimalized
Multi-factor Authentication
Authentication is the process of confirming the truth of an attribute of an entity – in short, confirming its identity. The most common attribute checked to confirm the identity of the person signing in with a user account (object) in networking environments is the password attribute. The password attribute is a value that the person sets. It is something the person (can prove he/she) knows. To make authentication more reliable and, thus, confirm the identity without a doubt, multiple authentication factors may be combined. For instance, something the person (can prove he/she) has in physical possession and/or something the person (can prove he/she) is are authentication factors that can be used for Multi-Factor Authentication beyond mere password validation.
Microsoft offers free Multi-Factor Authentication for Global Admins in Azure Active Directory. This solution offers reliable authentication for these accounts.
Note: Azure Multi-Factor Authentication for Admins is only free, when Azure Active Directory has not yet been configured with a consumption-based license (pey-per-authentication) for Azure Multi-Factor Authentication.
It is highly recommended to enable multi-factor authentication on each account that has the Global Administrator role assigned in Azure Active Directory. If your organization, utilizes other admin roles (either the pre-defined roles, Azure AD PIM roles and/or Azure ARM RBAC) MFA could be applied according to the combination of (some sort of) classification of the administrative privilege(s) and day-to-day burden.
For instance, you may decide not to enforce MFA for logins for User management administrators, as their privileges are not as high-impact as other privileges and these people may need to use their privileges often.
From a technical perspective, the tooling used, needs to support modern authentication. If you want to use multi-factor authentication for admin purposes, you will need to use at least the following versions of the admin tools:
Version 8362.1 of the Azure Active Directory PowerShell Module (released January 19, 2015)
Version 1.1.105.0 of Azure AD Connect (released February 2016)
The curse of the Microsoft Account
With Windows 8, Microsoft introduced the Microsoft Account. This account, formerly known as a Windows Live ID, can be used to log onto Windows devices ever since or provide single sign-on to consumer-based Microsoft services when logged on with a domain account (Windows Store, Cortana, etc.). The functionality is called the Connected Accounts feature. This was Microsoft’s solution to bridging the work-life divide. However, Microsoft accounts are not company-owned, but personally-owned.
Microsoft Accounts can also be used in Azure Active Directory. They can even be assigned admin roles (although some limitations apply).
You should really need to decide whether you want to assign roles to accounts your organization does not own and/or manage.
I feel strongly, that admin accounts with e-mail addresses like bigmomma50@live.com are not that professional. When hiring a consultant, this kind of administrative practices might lead to some raised eyebrows.
To add to injury, several display and sign-in problems occur when admins use Microsoft Accounts with the same domain part (everything after the @-sign) as your organization does.
There are two ways to create an Azure Active Directory directory:
1.The Azure route
2.The Office365 route
Azure tenant names, created by default, when the Azure tenant is created from a Microsoft account might raise the same eyebrows: For the joshaarbos@outlook.com Microsoft account you’ll end up with the joshaarbosoutlook.onmicrosoft.com tenant name. Again, think of when the person of the named account leaves, the tenant name will leave a permanent mark on the organization.
Note: When you take the Office365 route to create the Azure Active Directory tenant, the tenant name for Azure Active Directory is the same as the tenant name for Office365. This name is defined when you create the Office365 tenant.
To sync or not to sync admin accounts
In line with the principle of least administrative effort, you might not even want to assign Azure admin privileges to on-premises admin accounts, that are synchronized to Azure Active Directory.
Although this might result in a situation where an admin person needs to use six accounts, instead of having the benefit of single sign-on, like everyone else, it does provide a separation of administrative privileges and fault domains…
How to name these accounts? AdminHansWorst6@joshaarbosoutlook.onmicrosoft.com might not look very sexy and might possibly cause RSI, it does the job for a privileged account that is assigned the Service Administrator role in Azure Active Directory. A separate (default) vanity UPN Suffix might become a requirement when the person to which the original Microsoft account belongs, leaves the organization.
Note: Don’t forget to add other Global Admins and remove the original Microsoft Account from the Global Administrator role and/or your Azure directory.
To federate or not to federate admin accounts
When synchronizing accounts. another big question remains: To federate admin accounts, or not.
In my opinion, federation offers benefits for everyone. However, I don’t feel that strongly for admin accounts. Password Synchronization using Azure AD Connect offers a solution that is equally beneficial for admins, yet provides an exit strategy for when the on-premises Active Directory Federation Services (AD FS) implementation fails.
Since federation in Azure Active Directory is governed using DNS domains, a quick and dirty way of removing admin accounts from the scope of federation is by assigning a separate userPrincipalName (UPN) Suffix to admin accounts on-premises. For instance yourorganizationsadmins.com can be used for admins, while yourorganization.com is used for the day-to-day user accounts.
Converting child and parent domains
One of the reasons why I choose yourorganizationsadmins.com in the above example is because this introduces an entirely new DNS Domain, instead of a subdomain.
While you can use subdomains for your admin accounts, it is not recommended: When converting domains in Azure Active Directory (from standard to federated, and vice versa), by default, all subdomains will be converted too.
Note: The way around this, although unsupported, is to place the parent domain and the child domain in different Azure tenants.
Concluding
Use these recommended practices for Azure Admins in Hybrid Identity scenarios:
  • Separate admin privileges from day-to-day accounts
  • Deploy Multi-factor Authentication
  • Deploy Azure AD Privileged Identity Management (PIM)
  • Use admin account and password synchronization for your convenience
  • Don’t use Microsoft Accounts
  • Don’t federate admin accounts
  • Assign admin accounts a separate UPN Suffix on-premises and/or in Azure AD

[/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

Outlook 2016 Quick Start Guide

New to Outlook 2016 or upgrading from a previous version? Use this guide to learn the basics. Helpful tips and tricks including:

outlook 2016 quick start guide screenshot

1. Organizing your mail
2. Switching between views
3. Setting your preferences
And more!
After becoming a pro, see what Managed Solution and other Microsoft products can do for your company.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="Download the Outlook 2016 Quick Start Guide here!" txt_align="center" title="Download" color="orange" size="lg" position="bottom" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2016%2F07%2FOUTLOOK-2016-QUICK-START-GUIDE.pdf||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_single_image image="10306" img_size="750x550" alignment="center"][vc_column_text]

Employees “Catching ‘em all”? Don’t Let Your Business Play Victim

Don’t let productivity or security slip while your employees Poke Mon Go!

By Kelly Cronin
Sources: inc.com, pasadenastarnews.com, usatoday.com
On July 6, 2016, the workplace as we know it changed forever.  Okay maybe not forever, but it has changed for as long as employees remain more or less obsessed with being "the very best, like no one ever was" (for full Pokémon theme song lyrics click here).  According to staff reporter Tess Townsend of inc.com, Pokémon Go is creating distractions in a variety of office settings.  One company has warned employees there will be consequences for playing at work, putting up a sign saying, "We are paying you to work, not chase fictional video game characters  with your cell phone all day.  Save it for your break time or lunch. Otherwise you'll have plenty of time unemployed to 'catch them all.'"  In addition, a recent CareerBuilder survey shows about 24 percent of employees spend time at work on their smartphones playing online games (pasadenastarnews.com).
If this doesn't scare you, maybe the thought of your employee's phone with company data being stolen at a Pokémon Lure will.  Ryan Miller of USA Today reports, "teens, whose ages range from 16 to 18, are suspected to be behind 10 to 11 armed robberies in St. Louis and St. Charles counties in which they allegedly used the app to bait victims".  The teens reportedly used lures at Poke Stops to bring more people to an area, and then robbed them, including mainly stealing their smartphones.  Now imagine if one of your employee's becomes a victim, leading to a major security breach at your company.  Suddenly a fun, nostalgic game has cost your company a boatload of money.

But what if Managed Solution could give your business the tools you need to keep your employees on track, while also protecting your company data from theft at popular Poke Stops and Lures?

The answer:

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width="1/2"][vc_column_text]

Mobile Security

Enterprise Mobility Suite (EMS):

Keeping Your Data Safe while Employee's "Search Far and Wide"

You've just updated a document containing private client information and sent it to your top salesperson.  Then, said salesperson finds a Poke Stop by his favorite pizza place featuring a Lure.  He only needs to catch one more Eevee to evolve, so after grabbing a few slices, he heads over to the Lure.  But BAM! out of nowhere two people wearing masks push him down, steal his phone, and eat his pizza.  Now your company's private information is at risk for being viewed, shared, and possibly even sold.  What do you do next?

The Enterprise Mobility Suite (EMS) is the comprehensive cloud solution to address your consumerization of IT, BYOD, and SaaS challenges.  As your employees are out getting robbed, EMS lets you protect your data with:

  • A comprehensive set of access control and data protection capabilities.
  • Self-service password reset for your people, to reduce helpdesk calls
  • Multi-factor authentication options for greater security
  • Machine learning-driven security reports for visibility and threat management
  • Selective wipe of apps and data for greater security
  • Information protection from the cloud or in a hybrid model with your existing on-premises infrastructure

Meet the needs of your mobile workforce—and their runaway devices.

The best part? With Microsoft EMS, you can instantly wipe a stolen device, with just one click.  Now you no longer have to send passive aggressive emails warning employees about the dangers of Pokemon Go.  As far as you are concerned, you can have peace of mind with your data safe and sound.

[/vc_column_text][vc_button2 title="Learn More" align="center" color="belizehole" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fems%2F|title:managedsolution.com%2Fems|target:%20_blank"][/vc_column][vc_column width="1/2"][vc_column_text]

Mobile Productivity

Office 365:

Mobility

One of the highlights of Pokémon Go is getting players outside and on-the-go, but the downfall to this is employees need constant mobility with their work accounts so they can stay connected while making sure their eggs hatch.  Office 365 has mobile apps available on both iOS and Androids.  With Office 365, you can be sure that employees will still get your Outlook emails, be able to edit spreadsheets with Excel, and access OneNote - no matter where their Pokémon Go adventures take them.

Real-time co-authoring

Excel, Word, PowerPoint, and other Office tools make collaboration effortless with real-time co-authoring.  Let multiple employees work on a single spreadsheet at the same time, so you can avoid constantly editing, sharing, re-editing, and re-sharing documents.  Just make sure co-workers aren't making spreadsheets about where the coolest Pokémon are located nearby.

Collaboration and connectivity

As Pokémon Go has created more and more travel opportunities, Skype for Business  prioritizes collaboration and connectivity to keep everyone in the office in the loop, no matter where they work from.  If your employee is working outside to train at the gym by the office, Skype for Business lets you show them step-by-step how to do something on the new database by presenting your desktop so they can see exactly what you're doing on your screen.  Communicating, collaborating, and connecting with remote employees (or simply those die-hard Poke masters), is perfectly attainable with Skype for Business on Office 365.

Productivity tracking

Track what employees are doing, so they know they need to stay productive, and you know when they're doing more Pikachu hunting than actual work.  Office 365's Planner gives you the capability to create and assign tasks, both to yourself and to anyone within your company.  For each task, you can state your progress, add files and links, and update with comments.  This keeps both you and your employees on track, whether or not the nearby Pokémon gym just got taken over by Team Valor.

Managed Solution is a full-service technology firm that empowers business by delivering, maintaining and forecasting the technologies they’ll need to stay competitive in their market place. Founded in 2002, the company quickly grew into a market leader and is recognized as one of the fastest growing IT Companies in Southern California.

 

We specialize in providing full managed services to businesses of every size, industry, and need.

 

[/vc_column_text][vc_button2 title="Office 365" align="center" color="belizehole" link="url:http%3A%2F%2Fmanagedsolution.com%2Foffice-365%2F|title:managedsolution.com%2Foffice-365|target:%20_blank"][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row][vc_row css=".vc_custom_1468953914905{background-color: #1e73be !important;}"][vc_column][vc_column_text css_animation="appear"]

FREE  SECURITY RISK ASSESSMENT

Offering an in-depth view into your network providing documentation to identify security risks

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_posts_grid grid_style="sliderstyle" as_style="classic" as_thumbsize="yes" as_mouse_parallax="yes" loop="size:5|order_by:date|order:DESC|post_type:post|categories:83,968"][/vc_column][/vc_row]

Contact us Today!

Chat with an expert about your business’s technology needs.