Our Office 365 Managed service packages are purpose built for organisations with a small IT team. We ensure that your organisation is secure and that your users have the Office 365 expertise on hand to support them at all times. See below for what’s included in the plans…
Having your Office 365 and Microsoft 365 managed by Circle Cloud can offer your organisation a great return on investment. Not only do you free time and resource by letting our UK based team deal with your day to day support requests, but Circle Cloud’s structured offerings also ensure that you get the most from the product suite.
Circle Cloud offer a choice of 3 levels of support, designed using our experience from working with Office 365 since its release ten years ago. Our purpose-built managed services offer efficient support and maintenance of your Microsoft 365 environment, ensuring that your organization is secure and your user experience is optimised by having the Office 365 resource on hand to support them at all times.
Windows updates can be easily overlooked when it comes to your security strategy. There are countless examples of organisations being breached due to hackers taking advantage of computers that don’t have the latest security patches. As part of this service, Circle Cloud will ensure your machines are patched to the latest Windows Updates.
Windows Updates also provide the ability to access the latest features released from Microsoft. Without these updates your users won’t be able to utilise all the latest features and innovations that are available through Microsoft 365. As part of this service, Circle Cloud will:
Performance & Capacity Monitoring
It’s important that you know if your organisation’s computers are performing correctly and that they are fit for purpose. Our remote monitoring agent collects performance data from your machines which allows us to:
- Use this on our helpdesk when troubleshooting user issues, making the process of identifying issues much more efficient
- Aid the customer in identifying systems that may need replacing or upgrading to ensure the right machines are prioritised when applying budget to hardware refreshes
- Receive alerts to our managed services teams when any events are detected that could indicate an impending fault on a user’s machine, such as a full or faulty hard drive, allowing us to intervene proactively and reduce downtime.
- Provide you with performance and capacity reports for your computer estate
It’s important that you know if your organisation’s computers are performing correctly and that they are fit for purpose. Our remote monitoring agent collects performance data from your machines which allows us to:
Onboarding new computers for existing and new employees can be time consuming if not done correctly. In a cloud environment where people expect to work remotely, it seems old fashioned to have to setup a computer for each person manually or attend the office to have an image applied to a machine. Windows Autopilot comes with Microsoft 365 Business Premium and allows the automation of building new computers to your organisation’s specification directly over the internet. Our Autopilot management service allows us to:
- Automatically sets up a user’s computer over the internet, including connecting the device to your Office 365 or Active Directory domain
- Ensure new starters are onboarded efficiently
- Automatically installs software that is appropriate for the specific user upon setup
- Configures office, Outlook and Teams for the user upon first logon
- As part of this service, we will build a test computer in our hosted environment that will be used as your standard configuration which will include your required software.
- This allows us to test automated application deployments and autopilot prior to releasing them to your users
Installing new software for users can be very inefficient if not managed correctly. Locating installation files, licenses and ensuring everybody is using the same version is not always simple. Using Microsoft Endpoint Manager, Circle Cloud can automate the installation of software, both for specific user types, as well as on a user’s request. Using Endpoint Manager, Circle Cloud will:
- Package your third party applications into Endpoint Manager to make them compatible with automated deployment
- Maintain an application library with all your organisation’s software within it, ensuring software versions are the same for all users
- Complete end user software installations upon request using Endpoint Manager
- Automatically deploy Apps to both iPhone & Android devices
For all the benefits your Microsoft 365 subscription provides, the cloud way of working also poses significant security challenges (such as the ability to login from anywhere on any device). As an organisation, the following challenges must be considered;
As part of our managed service, Circle Cloud will configure conditional access to ensure that if a user connects to Office 365 on a device that isn’t owned by your organisation, they will be forced to confirm their identity with a text or authenticator app.
When a user is using an unknown device, such as a personal laptop or smartphone, Circle Cloud will only allow them to login and use the Office 365 Online Services, such as Outlook on the Web. However, they will be restricted from downloading documents or emails to their device.
Most organisations will have a security strategy for their endpoint devices which will typically include some fundamentals such as encryption technologies (e.g. Bitlocker), ensuring all devices have anti-virus running at all times, and ensuring devices are using a supported and recent version of Windows
The challenge for organisations has not necessarily been to implement the above security standards but to maintain them without manual check routines. Using Microsoft Endpoint Manager, Circle monitor the device continuously to ensure the above security measures are in place. A device that meets the security standards will be determined as a “Compliant Device” and a device that doesn’t will be deemed “Non-Compliant”. When a device is “Non-Compliant” the following happens:
- Conditional Access will restrict the device’s access to online resources, but only after the grace period for rectifying issues has passed
Encryption of laptops and desktops has been a fundamental security principal for many years and is no less relevant today. In short, if a device isn’t encrypted and it gets lost or stolen, then any data on that device (such as documents and emails) can be recovered. This poses a significant security threat to your organisation and would usually be an incident that needs reporting to the Information Commissioners Office.
This scenario becomes a more significant threat when considering the increased mobility of today’s IT users. An increase in travelling and working from home (as well as many other remote locations) increases the likelihood of a physical device being stolen, versus when devices are locked securely in the office.
As part of our managed service, Circle Cloud utilise Endpoint manager to enforce Bitlocker encryption on all desktops and laptops. This will be monitored using “Device Compliance Monitoring” to ensure that devices without Bitlocker can’t download company data and put this data at risk.
A staple of any security strategy is having anti-virus software running on all your computers. Equally as important is ensuring this anti-virus is kept up to date so it can handle new threats, and that regular scans are running, ensuring that your devices always have anti-virus installed. Circle Cloud’s managed service takes care of the management headache that comes with antivirus:
Barracuda Advanced Threat Protection (Mail Filtering)
Email has become one of the most significant attack vectors and the sophistication of social engineering and phishing attempts have increased dramatically over recent years. It seems most businesses have a story of an employee wrongfully transferring money or paying an invoice from a fictitious supplier as a result of malicious emails.
Included in our level 2 and 3 packages is Barracuda Advanced Threat Protection which is a multi-layered email security product that filters emails before they arrive in your Office 365 tenant. Barracuda ATP includes the following features and threat protection;
It also includes cloud-based protection against Spam, Email-borne viruses (inbound and outbound), Email-based malware, Data leaks, Phishing emails, Unsecured emails and Denial-of-Service attacks.
Email has become one of the most significant attack vectors and the sophistication of social engineering and phishing attempts have increased dramatically over recent years. It seems most businesses have a story of an employee wrongfully transferring money or paying an invoice from a fictitious supplier as a result of malicious emails.
Included in our level 2 and 3 packages is Barracuda Advanced Threat Protection which is a multi-layered email security product that filters emails before they arrive in your Office 365 tenant. Barracuda ATP includes the following features and threat protection;
It also includes cloud-based protection against Spam, Email-borne viruses (inbound and outbound), Email-based malware, Data leaks, Phishing emails, Unsecured emails and Denial-of-Service attacks.
You are now using the cloud and have all your data stored within Office 365, reaping the rewards of its uptime guarantees. However, despite Office 365 providing version history features, backup is something organisations still need to consider in order to protect themselves from accidental deletion, or from the unlikely event of a Microsoft outage;
As part of the level 2 and 3 packages, Circle Cloud implement a backup solution that performs the following:
Most businesses are using Software as a Service (SaaS), browser based applications from multiple vendors within their business. This might be an online CRM such as Salesforce, a finance system such as Sage Online, or a Human Resources platform. The challenges that arise when using multiple browser based, SaaS offerings are;
Mobile devices such as smartphones and tablets are commonly used with Microsoft 365 services to access email, documents and Teams. Accessing these services provides productivity and mobility benefits to your employees. However, it also provides further opportunities for security breaches to occur. It’s important to ensure that we have control over mobile devices when users have access to company information. Using Microsoft EndPoint Manager, Circle Cloud will perform the following;
The ability to have a log of all emails that are sent from and to your business is essential for most businesses. This service captures all emails when they are sent and received and stores them in a portal that is separate to Office 365. Additionally, this means that any emails that are deleted by employees within Office 365 are stored within the Barracuda solution. This ensures that no information is missing when a matter arises that requires the ability to search all mail activity.
A user friendly portal means we can delegate access to specific people within your organisation who can have this ability available to them on demand.
Ensuring information is accessible only by the people we intended has been a challenge for organisations for a long time. Using file and folder permissions have historically provided a degree of control over who can access what documents within our business. However, a constant concern is how we protect data, such as documents and emails, when they leave our internal file servers and SharePoint sites. Consider these scenarios:
Using Azure Information Protection labelling, Circle Cloud create labels for the various sensitivity of documents within your organisation. When applied, these labels apply security policies to the document that can’t be removed, controlling who can access the document, even when the document has left your organisation.
In order to provide a complete end to end solution to our customers, it’s important that Circle Cloud provide helpdesk support for any day to day issues your users may encounter when using their computers. Our helpdesk team will have the ability to assist users with Windows, Office and computer performance issues, and are available via email and phone. Using a remote agent that will be installed on all your user’s computers, our helpdesk team can remote control onto their device and provide immediate troubleshooting and support.
In order to ensure you get the most out of your organisation’s Office 365 platform, Circle Cloud provide end user support for issues encountered when using the Microsoft 365 platform. This includes issues relating to using email, OneDrive, SharePoint or Teams. Our helpdesk will be available to advise and remediate issues with any of these services.
Microsoft 365 Service Requests
Specific service requests are included in the managed service to aid our customers with adds, moves and changes within their business. We include the following as part of the service: