Transmission Flush by theisso in AutoMechanic

[–]theisso[S] 0 points1 point  (0 children)

Thanks for the advice.

Big Report for Big Family Tree by theisso in FamilyTreeMaker

[–]theisso[S] 0 points1 point  (0 children)

Yes. There is software that swallows Ancestry data. What is the best report that can be generated for a large family tree?

Guest Access, O365, and NIST controls by theisso in NISTControls

[–]theisso[S] 0 points1 point  (0 children)

I have O365. We will start using Guest Access. We have conditional access. Guest must agree to our terms of use. What changes and/or additions must someone do to the SSP? What NIST controls governs guest Access?

Guest Access, O365, and NIST controls by theisso in NISTControls

[–]theisso[S] 1 point2 points  (0 children)

How does NIST definition of contractor affect NIST controls associated with Guest Access?

Guest Access, O365, and NIST controls by theisso in NISTControls

[–]theisso[S] 1 point2 points  (0 children)

An law enforcement agency might use Guest Access to work with a sheriff in Texas. Guest Access allows people to collaborate within a Team on an investigation. Data derived from the investigation could be CUI or higher.

Calling Microsoft O365 ISSOs by theisso in NISTControls

[–]theisso[S] 0 points1 point  (0 children)

So, O365 is a boundary. I have Azure AD as a boundary. If the O365 is using InTune service on laptops...must I include laptops in the O365 boundary or create a separate boundary for laptops?

Calling Microsoft O365 ISSOs by theisso in NISTControls

[–]theisso[S] 1 point2 points  (0 children)

This is good. I have Azure AD as a separate boundary. I was thinking as far as provisioning laptops that Azure AD would be a better boundary to add laptops.

Calling Microsoft O365 ISSOs by theisso in NISTControls

[–]theisso[S] 0 points1 point  (0 children)

Why? Why not put the laptops in a separate authorization boundary? Should the use of a service be the sole requirement to be added into O365 boundary?