365 Total Backup Changes March 2024

Enhancements

  • It is now possible to store backup data in a French data center.

Improvements

  • The subfolder “Recoverable Items” has been added when restoring a mailbox. It includes the subfolders “Deletions”, “Purges” and “DiscoveryHolds”. “Recoverable Items” are supported in Granular Restore, as well as automatically restored via full restore.
  • The filter “Backup issues requiring your action to resolve” in the “Users” and “Groups & SharePoint” pages will no longer show users or groups who don’t have a valid license.
  • An issue in which the email address was not being backed up as part of the contact in mailbox backups has been fixed.
  • An issue was addressed during the Mailbox Discovery process where the folder “Recoverable Items” did not exist within a Mailbox has been fixed.
  • The speed of restore operations for Mailbox, OneDrive and SharePoint has been improved.

Control Panel Version 6.35.3.0

Enhancements

  • For customers with the Security Awareness Service, a banner is now displayed if the “Department” field is filled for less than 30 percent of the users.
  • The CSV export of mailboxes has been reworked. Now all information under the basic data of a mailbox can be exported. Furthermore, the header line includes all selected columns. It is now possible to import the exported CSV file.
  • The CSV import of mailboxes has been reworked. Now it is possible to leave out certain fields completely. Only the fields “Name”, “Aliases” and “Environment” are mandatory.

Improvements

  • The synchronization with Microsoft 365 has been improved.

Release of New E-Trainings March 2024

The following new trainings are being released:

  • Phishing Introduction
    • Content: Phishing is one of those terms that many people may have heard but very few actually have a grasp on. One of the reasons surely is that it’s an umbrella term, and individual attack types are known by their individual names. In this course we will introduce you to what phishing is and give you an overview of the different phishing methods you might encounter.
  • Tailgating
    • Content: Cybercriminals and other bad actors don’t just target organizations digitally. Some of them are bold enough to try to sneak into office buildings, warehouses, and other restricted areas. In this training, you will learn how to spot potential attackers, how to prevent them causing any damage, and what to do when you suspect that someone unauthorized might have gained access to a restricted area.
  • Phishing & AI
    • Content: Artificial intelligence has developed significantly over the past few years. Unfortunately, cybercriminals have quickly found ways to abuse it for their malicious schemes. In this training, you will learn how cybercriminals make use of AI to improve their Spear Phishing attacks and what you can do to protect yourself against them.
  • Ransomware
    • Content: Ransomware attacks represent one of the biggest cyber threats to organizations worldwide and often result in enormous financial damage and data loss. It is a form of malware that is capable of locking screens or encrypting files and entire systems in order to demand an often large ransom for their release. In this e-training, you will learn about the characteristics of a ransomware infection, the dangers of this type of malware, and what you can do to protect yourself and your organization.
  • Dark web
    • Content: Cybercriminals have been drawn to the dark web for a long time. It is the perfect place for them to organise and execute their criminal activities in secret. In this training, you will learn more about the particularities of the dark web that make this possible and what you can do to protect yourself.
  • BEC Attacks
    • Content: A BEC attack is a social engineering scam that is becoming increasingly popular with criminals. In these scams, attackers impersonate known authorities or partners in order to convince organizations to transfer large amounts of money, change account information, or hand over confidential information. Learn more about this scam, the dangers of a successful BEC attack, and how to protect yourself and your organization in this e-training.

In the following trainings, some typos and other minor issues have been fixed:

  • Virtual Private Network (VPN)
  • Vishing

The following trainings have been overhauled and received new content:

  • Bring your own device (BYOD)
  • Quick Check: Bring your own device (BYOD)

Control Panel Version 6.35.2.0

Enhancements

  • Under Security Settings > Content Control, information about the maximal allowed email size has been added.
  • Under Customer Settings > Mailboxes, customers can now filter for deactivated mailboxes.
  • When importing mailboxes from a CSV file in the Customer Settings > Mailboxes module, a confirmation window is now displayed if all existing mailboxes would be overwritten with those from the CSV file.
  • Under Security Settings > Email Authentication, an alias domain can now be excluded from the DMARC check when it does not have a DMARC record.
  • Users now can now authenticate their login to the User Panel/Control Panel via single sign-on using their registered alias.
  • In the Email Live Tracking module, the search has been enhanced and now highlights terms that are ignored. When hovering over the highlighted term, additional information is shown.

Improvements

  • Under Reporting & Compliance > Email Statistics and under Security Awareness Service > Statistics > Phishing, the table has been reworked.
  • An error that impeded the Security Settings > Microsoft 365 Settings module to be shown in the Control Panel after a customer has migrated to 365 Total Protection has been fixed.
  • Under Customer Settings, a minor translation error has been fixed.
  • An error that prevented individual reports and the statistics of successful phishing scenarios of the Security Awareness Service to be created in the customer’s and user’s selected language has been fixed.
  • In the E-Training module of the User Panel, an error that caused overlapping of progress information and the language selection has been fixed.
  • Under Security Awareness Service > Statistics > E-Training > Training status, an error that lead to the “Last assigned on” field to be shown as empty has been fixed.
  • An error that caused the teachable moment of the Security Awareness Service to only be displayed in English has been fixed. Now the teachable moment gets displayed in the user’s configured language.
  • Under Customer Settings > Authentication, for customers who use LDAP or Microsoft 365 for authentication, the option to activate the magic link for the authentication of users is now greyed out instead of hidden.
  • Emails that are reported using the “Send email to admin” functionality in the Email Live Tracking now are prefixed with “[REPORTED MAIL]”.
  • In the Security Awareness Service module, an error that prevented users with the security_awareness role to access the e-training statistics and configuration has been solved.
  • Under Service Dashboard > LDAP Connection, an error that disabled some settings has been fixed.
  • A minor error causing some tables not to show the value 0 has been fixed.
  • An error that sometimes caused e-trainings to be shown twice has been fixed.
  • Users are now able to see unassigned e-trainings, if they are made available for them.
  • The French translations for several services have been improved.
  • Under Security Awareness Service > Statistics, the display of French titles in the table about successful phishing emails has been improved.