OneDrive - Safeguard files and folders. SharePoint - Secure site collections, team sites and communication sites. Exchange - Protect emails and attachments. calendar events and contacts. Teams - Back up and restore teams, channels, posts, files and tabs. OneNote - Protect OneNote notebooks, including Class and Staff notebooks, in whatever M365 app they were created in.
1) Log into Redstor’s cloud portal 2) Select accounts or sites that need protecting 3) Start backing up immediately 4) Schedule subsequent incremental backups to occur daily or on specific days 5) Monitor backup progress from cloud portal
Role-based permissions Only your relevant IT staff will have the ability to download mailboxes. Microsoft will not have access to any of your organisation’s mailboxes.
Advanced Encryption Standard Before data is transferred during backup or recovery, it will be encrypted with 256-bit AES. Furthermore, all communication between Redstor’s cloud backup service and its storage platform (where your data is stored) is secured with Transport Layer Security (TLS)
Data sovereignty Local data centres are used to ensure you comply with data residency or data sovereignty regulations
Activity log Logs provide a full record of administrator and user actions.
Without MFA, your users' passwords will be the only method of restricting access to your data. With Redstor, you can add an additional layer of security, like authentication via a trusted device or fingerprint.
Redstor utilises AI to detect, isolate and delete malware from backups, providing an additional layer of protection and peace of mind.
With automated malware detection, every M365 backup will be checked for files that resemble malware in appearance or behaviour.
Artificial intelligence can be purchased as an add-on to flag malware in backups from SharePoint, Exchange (including attachments), OneDrive, Teams and OneNote.
The option is also available to check backups from servers, laptops and any other end-point machines or devices.
Our machine-learning model does all the hard work, constantly improving its accuracy, based on shared community insights. This provides enhanced protection against zero-day threats that exploit previously unknown vulnerabilities, leaving you free to make malware-free recoveries.
With Redstor’s malware detection for M365 backups, you can view suspicious files by:
Manual intervention is only required when a suspicious file is detected.
A notification then gives the option to:
These actions can be taken in bulk by selecting multiple files or made against a single file. If an attachment is flagged as suspicious, the entire email will be quarantined.