Categories: Articles

Encryption in Office 365

used with permission from Microsoft

Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can easily view their encrypted messages and return encrypted replies. Regardless of the destination email service—whether it’s Outlook.com, Yahoo, Gmail, or another service—email users can send confidential business communications with an added level of protection against unauthorized access.

  • There are many scenarios in which email message encryption might be required, including the following:
  • A bank employee sending credit card statements to customers
  • An insurance company representative providing policy details to customers
  • A mortgage broker requesting financial information from a customer for a loan application
  • A health care provider sending health care information to patients
  • An attorney sending confidential information to a customer or another attorney
  • A consultant sending a contract to a customer

Exchange Online and Exchange Online Protection (EOP) administrators set up Office 365 Message Encryption by defining encryption rules. As an administrator, you can also customize encrypted messages with your own text and logo, presenting a company brand that’s familiar to message recipients.

About Office 365 Message Encryption

Office 365 Message Encryption is an online service that’s built on Microsoft Azure Rights Management. With Azure Rights Management set up for an organization, administrators can enable message encryption by defining transport rules that determine the conditions for encryption. A rule can require the encryption of all messages addressed to a specific recipient, for example.

When an Exchange Online user sends an email message that matches an encryption rule, the message is sent out with an HTML attachment. A recipient opens the HTML attachment in the email message, recognizes a familiar brand if that’s present, and follows the embedded instructions to sign in, open, and read the encrypted message on the Office 365 Message Encryption portal. The sign-in process helps ensure that only intended recipients can view encrypted messages.

The following diagram summarizes the passage of an email message through the encryption process.

  1. An Exchange Online user sends a message to the recipient.
  2. The message is filtered based on administrator-defined rules that define conditions for encryption.
  3. The tenant key for your Office 365 organization is accessed and the message is encrypted.
  4. The encrypted message is delivered to the recipient’s Inbox.
  5. The recipient opens the HTML attachment and connects to the Office 365 encryption portal.
  6. The recipient authenticates using a Microsoft account or an Office 365 organizational account.
  7. The tenant key for your Office 365 organization is accessed to remove encryption from the message and the user views the unencrypted message.

To learn more about enabling and using Office 365 encryption, contact eMazzanti.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Empower Your Tech

Discover how eMazzanti empowers clients with tech strategies, personalized training, and proactive support to navigate…

6 days ago

The Impact of GDPR and Other Privacy Regulations on Website Security

Explore how GDPR and other privacy regulations reshape website security, ensuring data protection and building…

6 days ago

The Impact of Website Downtime on Business and How to Prevent It

Discover the significant impacts of website downtime on your business and learn effective strategies to…

6 days ago

IT Consulting Services: Strategic IT Leadership for Business Growth

Discover how IT Consulting Services from eMazzanti Technologies provide the strategic leadership needed for smart…

1 week ago

Engage Your Workflows with Microsoft Viva

Discover how Microsoft Viva can transform your workplace into a hub of engagement, productivity, and…

1 week ago

Collaboration Made Simple with Microsoft SharePoint

Discover how Microsoft SharePoint optimizes document workflow, enhancing team collaboration and productivity.

1 week ago