Posts

Animation improvements in Google Slides

Animations are an easy way to make your presentations look more dynamic in Google Slides. Starting today, you can improve your Slides

presentations with two new animations: Appear and Disappear. You can also now set the direction (to and from left, right, top, and bottom) of two previously existing

animations: Fly in and Fly out.

Animation-improvements-in-Google-Slides

 

Release track:
Rapid release and Scheduled release

More information:
Help Center

Reference by www.google.com

Admin Quarantine for inbound and outbound Emails

“Quarantine Manager” is added in Google Apps for work increase the Email Control.
inbound-s

The admin quarantine feature provides greater email security and control by allowing admins to moderate when messages satisfying certain conditions are encountered in their domain’s mail traffic.

Gmail administrators can use email quarantines to moderate messages that meet specified criteria. When a message is flagged by a policy for quarantine (e.g. subject contains the word ‘confidential’), it will not be delivered to the intended recipient. Instead, this message will show up in the admin’s quarantine review UI. Admins can then review the message, choose to allow delivery to the intended recipient, deny delivery with or without rejection notice or do nothing. If no action is taken, messages expire and are removed from quarantine after 30 days.

For a quarantined outbound message, the message appears in the sender’s Sent folder but isn’t delivered to the recipient unless the administrator releases it from quarantine. After an outbound message appears in the quarantine, if the sender deletes the message from his or her Sent folder, the message remains in the quarantine until the administrator acts on it or the 30 days passes.

Where the administrator can do one of the following:

  • Allow delivery of the message to the intended recipient

  • Deny delivery of the message

  • Do nothing, in which case the message expires after 30 days

If an inbound message includes multiple recipients, the message appears in the quarantine once for each recipient—for example, a message with five recipients appears in the quarantine five times, once per recipient. If you set the option to send a reject message for denied messages and then deny a message sent to multiple recipients, the sender receives a reject message for each recipient.

Do any of the following:

View quarantined, allowed, or denied messages

View message content

Search for messages

Allow delivery of one or more quarantined messages

Deny delivery of one or more quarantined messages

Coutersy : google apps


Admin quarantine for inbound and outbound email

quarantine2 kb

The admin quarantine feature provides greater email security and control by allowing admins to moderate when messages satisfying certain conditions are encountered in their domain’s mail traffic.

When a message is flagged by a policy for quarantine (e.g. subject contains the word ‘confidential’), it will not be delivered to the intended recipient. Instead, this message will show up in the admin’s quarantine review UI. Admins can then review the message, choose to allow delivery to the intended recipient, deny delivery with or without rejection notice or do nothing. If no action is taken, messages expire and are removed from quarantine after 30 days.

To make quarantine management easier, up to 25 named quarantines may be set up with unique quarantine criteria. Admins may choose to put messages in different quarantines based on several classification criteria by setting mail flow policies (content compliance, objectionable content, etc.).

Reference by : www.google.com


Gmail labels in Google Vault email search results

To make it easier for Google Apps admins to locate specific emails in Google Vault search, Gmail labels are now included in search results. Admins can now view both system labels―i.e. the status of the message as viewed by the user – Unread, Inbox, Spam, Sent, etc―and user-applied labels:

To view Gmail labels and basic header information for a message, click show details in your Vault search results.

Gmail user label metadata will also now be included in XML file exports to aid with deeper analysis.

Reference : Google apps


 

“Last seen” indication in Hangouts

To make it easier to know when people using Hangouts are available to chat, we’ve added timestamps as part of status (e.g. ‘last seen 2h ago’), indicating when one was last using Hangouts.

Comprompt-Google-Hangouts

Individuals can control whether this info is shared from Hangouts chat settings.

This feature is now available on Hangouts in Gmail (gradual rollout), as well as on the latest versions of the Hangouts Android and iOS apps.

 

 courtesy:google apps


Symantec PGP End Point Encryption Solution.

What is Endpoint Encryption?

When it comes to encrypting data, there are various encryption strategies.

Disk encryption protects a hard drive in the event of theft or accidental loss by encrypting the entire disk including swap files, system files,

and hibernation files. If an encrypted disk is lost, stolen, or placed into another computer, the encrypted state of the drive remains

unchanged, ensuring only an authorized user can access its contents.

Some endpoint encryption solutions (like Symantec™ Endpoint Encryption) also include support to encrypt files stored on or copied to

removable media devices. As with disk encryption, removable media encryption helps prevent unauthorized access to information on lost or

stolen devices (in this case the devices are USB flash drives, external hard drives (USB, FireWire, and eSATA), SD cards, and compact flash

cards). In this way, organizations can benefit from the productivity gains associated from collaboration using removable storage without

putting data at risk.

How Disk Encryption Works

During the startup process of an operating system, a boot sequence is executed. The boot system is the initial set of operations that the

computer performs when it is switched on. A boot loader (or a bootstrap loader) is a short computer program that loads the main operating

system for the computer. The boot loader first looks at a boot record or partition table, which is the logical area “zero” (or starting point) of

the disk drive.

Disk encryption modifies the boot sector. For example, a computer protected with Symantec™ Endpoint Encryption presents a modified preboot

environment for the user to authenticate to the computer.

This modified pre-boot screen prompts the user for authentication credentials in the form of a passphrase (typically a longer password, often

resembling a sentence). At this point, the computer may ask for additional credentials such as a smart card, token, or other two-factor

authentication.

After the user enters valid authentication credentials, the operating system continues to load as normal and the user can access the

computer.

Most disk encryption software operates in conjunction with the file system architecture. It filters I/O operations for one or more file systems

or file system volumes.

When a drive is encrypted for the first time, it converts unencrypted drive blocks into encrypted blocks one at a time. Disk encryption allows

users to continue working as normal during this initial encryption process by varying the amount CPU power assigned to the initial encryption

process.

When a user accesses a file, disk encryption decrypts the data in memory before it is presented for viewing. If the user makes any changes to

the file, the data is encrypted in memory and written back to the relevant disk drive block just as it would be without encryption. Decrypted

data is never available on the disk. The encryption/decryption process happens at such a speed that it appears completely transparent to the

User.

How Removable Media Encryption Works

Removable media encryption software provides the ability to encrypt files on removable storage devices.

When a user copies files of a system onto a removable storage device, each file is encrypted to a password, a shared key or a certificate. At

the same time, utilities for Windows or Mac systems can be copied (if permitted by policy) allowing authorized access to data without the

endpoint client installed on a machine.

This file encryption can be governed by policy, user action, or Symantec DLP. In the case of Symantec DLP, the Endpoint Prevent software

monitors users’ machines and understands when a person is moving a sensitive file off his computer. With the integration of Symantec DLP

and Symantec Endpoint Encryption, administrators can ensure files with sensitive information that are moving to removable media are

encrypted rather than blocked, allowing business processes to continue in a secure manner.

To access the information, when the user inserts a removable media device like a USB drive with encrypted files into a computer system, the

removable media encryption software will prompt for passphrase, and upon successful authentication, the user can access the file.

Key Features

  • Built PGP Strong – High performing, strong encryption, built with PGP Hybrid Cryptographic Optimizer (HCO) technology and leveraging AES-NI hardware optimization for even faster encryption speeds.
  • Robust Reporting – Administrators can take advantage of out-of-the-box compliance reports or customize their own reports to help ease the burden of proof to auditors and key stakeholders.
  • Active Directory Support – Individual and group policies and keys can be synchronized with Active Directory to help speed deployments and reduce administration burdens.
  • Key Recovery – Multiple recovery options allow organizations to determine the right solution for them to minimize potential lockouts and reduce HelpDesk calls.
  • Single-Sign-On – SSO means fewer passwords for users to remember.

Key Benefits

 
  • User-Friendly – Installation and registration is completely transparent to users, while CPU utilization during initial encryption is minimized to ensure that users can continue being productive while encryption happens in the background.
  • Flexible – Support multi-user deployments in both Active Directory and non-Active Directory environments.
  • Collaborative – Users can access encrypted data on removable media safely even on systems without Symantec Endpoint Encryption installed.
  • Scalable – Scalable management architecture easily adapts to small and large enterprise environments.
  • Stronger Protection – Symantec’s market leading Data Loss Prevention (DLP) software integrates with removable media encryption to analyze data before it’s transferred and automatically encrypt sensitive outgoing data.

Reference by : www.google.com


 

 

Updated version of Google Apps Password Sync (GAPS)

 

Google Apps Password Sync 1.3 is now available with the following new features:

  • GAPS now uses the Admin SDK – Directory API (version 1)
  • Improved Google Apps validation when configuring GAPS
  • Several bug fixes

Note: All customers running a previous version of GAPS must upgrade to GAPS 1.3 before April 20, 2015. Older versions will stop functioning after this date.

Reference by:www.google.com


Offline access to Google Docs editors auto-enabled when signing into Chrome browser on the web

comprompt-Offline access to Google Docs

Offline access to Google Docs – When working in a Chrome browser, people using the Google Docs editors with offline access enabled can work on files even when not connected to the internet. Files are synced so they can be viewed and edited offline, allowing for continued productivity regardless of one’s internet connection.

Setting up offline access manually can be cumbersome, so in a couple of weeks you’ll be able to just sign into Chrome on the web and visit Drive, Docs, Sheets, or Slides―and offline will be enabled automatically. This is already the default behavior  on Chrome OS, so nothing will change there.

Google Apps admins can still centrally enable or disable offline access for their domain in the Admin console. Existing settings for domain-level offline access will not be altered by this launch.

Note that Google Apps users should not sign into a Chrome browser on public/non-work computers with their Google Apps accounts to avoid unintended file syncing.

Reference by:www.google.com


An update on the migration of older spreadsheets to the new Google Sheets

comprompt- Google Sheets

Back in November 2014, GOOGLE  announced that older spreadsheets (those created prior to Dec 2013, including any subsequent copies) would start being gradually migrated to the new version of Google Sheets for Google Apps domains on the Rapid release track, with Scheduled domains to follow.

While the migration started for consumer spreadsheets, GOOGLE decided to delay the migration for the Rapid release track to ensure a more smooth process. Starting next week, google will formally start the migration for Rapid release domains, with Scheduled release domains to follow 2-3 weeks later (note: we have decided against displaying the migration notification in the Sheets interface for Google Apps customers to prevent unnecessary confusion).

The migrations will take several months to complete, but you’ll be able to take advantage of the new features and capabilities in the new Sheets as older spreadsheets are migrated. Simpler spreadsheets will be upgraded first, while those that use Apps Script and more complex features will be migrated weeks to months later to ensure a seamless transition.

 

Reference by:www.google.com


A new look for the Google Apps Admin console

material design

At Google I/O last June, google introduced material design, a single underlying design system that allows for a beautiful unified experience across platforms and device sizes.These design principles applied to many of Google’s products recently, and today google announcing that the Admin console is next in line.

The Admin console has been redesigned to better meet the needs of Google Apps admins, putting your most important controls front and center and making the most common tasks easier than ever to complete.

To help you get acquainted with the new design, google prepared a design change guide, featuring screenshots of the new navigational elements and guidance on how to change settings, manage and add users, apply filters and access other frequently used features in the new UI. We also pulled together before and after screenshots for context on how things will be changing. google suggest spending some time reviewing these guides to ensure you can hit the ground running with the new design.

reference by:www.google.com