Skip Navigation LinksVideos

Synergy Advisors has created a series of videos detailing various components of Microsoft's Enterprise Mobility + Security Services and its components. These videos can be found on the Synergy Advisors YouTube channel. The following table provides a summary of each video:

Video Name
Video Link
Solution Demonstrated
Abstract
New!
Microsoft Intune + Lookout Technical Overview
 
Microsoft Intune + Lookout​Microsoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. Lookout provides mobile device security from the cloud by installing an application to a device.​ Lookout out provides mobile device security from the cloud and now blends with Microsoft Intune to enable administrators to monitor the compliance of their devices. Administrators can also view details about threats on devices in their enviornment including detailed informaiton about the devices themselves.
​​New!
Microsoft Intune + Lookout  Overview
 
​Microsoft Intune + LookoutMicrosoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. Lookout provides mobile device security from the cloud by installing an application to a device.​ Lookout out provides mobile device security from the cloud. It continously monitors the device for applications that may be illegitimate or malicious. Lookout also integrates with Microsoft Intune to provide targeted device management and security. ​
​​New!
Microsoft Intune + Lookout Administrator and End User Experience
 
Microsoft Intune + Lookout​​Microsoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. Lookout provides mobile device security from the cloud by installing an application to a device. Once this has been completed, Lookout continually monitors the device for applications that may be illegitimate or malicious. Lookout also integrates with Microsoft Intune to provide targeted device management and security.
New!
Azure Information Protection (Preview) Technical Overview

 
Azure Information Protection
Microsoft Information Protection enables you to classify, label, and protect your information directly from Office applications. In this video, we show you how end users can apply classifications and then we dive into how administrators can create a classification structure and how these classifications can invoke labeling and Azure RMS permission policies. We also look at how Microsoft Information Protection provides tracking and revocation for your most sensitive content so authors know who – and from when and where – are accessing their documents.
New!
Azure Information Protection (Preview) Overview
 
Azure Information Protection
Azure Information Protection enables you to classify, label, and protect your information directly from Office applications. Learn more about how easy it is for authors to apply classifications to their documents and emails and how your most sensitive classifications can invoke labeling and encryption in this screencast video.
Azure Active Directory Premium and Multi-Factor Authentication
 
Azure Active Directory Premium
Microsoft’s Azure Active Directory Premium provides single sign-on to thousands of cloud apps and access to web apps you run on-premises. Built for ease of use, Azure Active Directory Premium features multi-factor authentication (MFA); access control based on device health, user location, and identity; and holistic security reports, audits, and alerts.
Microsoft Intune Network Device Enrollment Service
 
Microsoft IntuneMicrosoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. NDES allows devices to access company data by validating certificate profiles configured in the Intune portal which will enable employees to use their own devices to connect to corporate emails, Wi-Fi, and even VPNs.
Microsoft Intune MAM-Only
 
Microsoft IntuneMicrosoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device, while helping to keep corporate information secure. MAM Only gives the ability to restrict commands like cut, copy, and paste between applications without having to enroll a device with the Intune Company Portal. This significantly reduces the chance that sensitive corporate data could be leaked.
Microsoft Intune Data Loss Prevention with Managed Applications
 
Microsoft Intune
Microsoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. DLP policies give the ability to restrict commands like cut, copy, and paste between applications. This significantly reduces the chance that sensitive corporate data could be leaked.
Microsoft Intune Conditional Access on iOS
 
Microsoft Intune
Microsoft Intune provides simplified access to corporate applications, data, and resources from virtually anywhere; on virtually any device while helping to keep corporate information secure. Conditional Access in Intune requires all devices accessing email from Exchange and document libraries in SharePoint to be managed and compliant with company policies.
Microsoft Intune Mobile Device Management on Windows Phones
 
Microsoft Intune
Microsoft Intune enables organizations to provide employees with access to corporate applications, data, and resources from virtually anywhere; on virtually any device, while helping to keep corporate information secure. It maximizes productivity by enabling employees to access corporate resources with the Office mobile apps they know and love while applying policies that can help prevent leakage of company data. It will also eliminate the need to plan, purchase, and maintain hardware and infrastructure by managing mobile devices from the cloud with Intune.​
Microsoft Intune Mobile Device Management on Android Devices
 
Microsoft Intune
As workplaces continue to become more mobile, it is important that companies can have employees use this technology to their advantage. In this video, I will go through the process of enrolling an Android device to allow it to be managed through Microsoft Intune. This process will check whether the device is compliant with company policies, prevent information/data leaks, and allow an employee to access corporate data from their own personal technologies.
Microsoft Intune Mobile Device Management on iOS Devices
 
Microsoft Intune
Microsoft Intune enables organizations to provide employees with access to corporate applications, data, and resources from virtually anywhere; on virtually any device, while helping to keep corporate information secure. It maximizes productivity by enabling employees to access corporate resources with the Office mobile apps they know and love while applying policies that can help prevent leakage of company data. It will also eliminate the need to plan, purchase, and maintain hardware and infrastructure by managing mobile devices from the cloud with Intune.​
Multi-Factor Authentication and Azure RMS
 
Azure RMS
Azure Multi-Factor Authentication provides increased security for end user access to services and applications. Azure RMS now integrates with MFA through Microsoft Office and the RMS Sharing Application.
Azure RMS and Office for Mac 2016
 
Azure RMS
Mac users can now protect and consume sensitive documents with Azure RMS. The recent release of Office for Mac 2016, Outlook for Mac 2016, and the RMS Sharing Application for Mac provide Azure RMS support for all file types. Users can protect and consume documents and emails with Office for Mac 2016. Users can consume protected pdf, text, image, and all file types through the RMS Sharing Application.
Azure RMS Tracking Portal
 
Azure RMSAzure RMS enables end users with a way to trace how RMS-protected documents are accessed through the RMS Tracking Portal. This new feature shows access attempts to protected content through list, graph, and geographical form. Additionally, the RMS Tracking Portal enables users to remove access to protected documents through document revocation.​
RMS Sharing Application and Tracking Portal
​​​
 

Azure RMS
The new RMS Tracking Portal enables users to monitor access attempts on their RMS-protected content.  This video details the process of protecting and tracking all sensitive information, no matter the format, with the RMS Sharing Application and Tracking Portal.
Azure RMS Bring Your Own Key

​​
 

Azure RMS Operations
Hardware Security Modules (HSM) can be used to store the Azure RMS private key improving the security of your private keys by storing them in tamper-resistant hardware. Administrators can use HSMs to generate the Azure RMS private key on premises and upload the key to Azure RMS. This video details the process of the Bring Your Own Key scenario. 
AD RMS to Azure RMS Migration
 

AD RMS and Azure RMS
This video walks you through how you can migrate from an on-premises AD RMS cluster to Azure RMS in the cloud, while still enabling the consumption of previously protected content.
Managing Azure RMS with Departmental Templates
 

Azure RMS Operations
The new departmental templates feature in Azure RMS enables administrators to provide different sets of rights policy templates to different groups of users within the same organization. Using the departmental template feature enables you to sharply refine your information 
Microsoft RMS for Mac
 

Mac Integration
Microsoft Rights Management Services integrates with Mac computers to enable users to consume protected content on their devices. Outlook for Mac 2015 empowers users to send and receive protected email messages. Additionally, the RMS Sharing Application allows users to consume protected files on their Mac computers.
Protecting Data at Rest with OneDrive for Business
 
OneDrive for Business IRM
Microsoft's Rights Management Services integrates with OneDrive for Business to provide protection to data at rest stored in Document Libraries. Users can set policies to these libraries to ensure that data leaving the OneDrive for Business space is always protected.
Integrating RMS with Mobile Devices
 

iOS, Android Mobile DevicesThe RMS Sharing Application enables users to view protected content directly from their mobile devices. This video describes the process of consuming protected content from an iOS and Android device.
Information Protection with the RMS Sharing Application
 

RMS Sharing ApplicationThis video details the process of protecting all sensitive information, no matter the format, with the RMS Sharing Application.
Protecting Data at Rest Using File Classification Infrastructure and Work Folders
 

File Classification Infrastructure
Employees commonly forget to follow appropriate company protocols for safeguarding sensitive information. This video shows how you can ensure automatic protection to documents in your organization.
RMS for Individuals
 
Secure Collaboration
Organizations often find themselves distributing sensitive information to external parties. This video details the process of securely sending protecting content to others.
Protecting Data at Rest Using Microsoft SharePoint
 

SharePoint IRM
Employees commonly forget to follow appropriate company protocols for safeguarding sensitive information. This video shows how you can ensure automatic protection to documents stored in Microsoft SharePoint.
Protecting Data in Motion
 

Exchange IRM
Employees commonly forget to follow appropriate company protocols for safeguarding sensitive information. This video shows how you can ensure automatic protection to emails
Microsoft RMS Sharing Application Overview
 

RMS Sharing Application
This video details the process of protecting all sensitive information, no matter the format, with the RMS Sharing Application.
Information Protection Technical Overview
 
Azure RMS
The need to protect sensitive documents in an organization is becoming more and more apparent. This video covers an in-depth technical overview of the process of protecting your confidential information from unauthorized access and misuse.
Information Protection Technical Overview
 
Azure RMS
The need to protect sensitive documents in an organization is becoming more and more apparent. Learn how to protect your confidential information from unauthorized access and misuse.