 Good afternoon, everyone. My name is Rajesh Shah. I'm a systems engineer for just tech Welcome to this webinar on email encryption in office 365 with a concentration on om e Which is office message encryption presented by just tech I'd like to thank my colleague Joseph Mello a resident technical guru and our director of engineering who will be joining me on this webinar. I Like to start with a little bit of information about just tech So just tech is a technology firm that started out in 2015 that is dedicated to the specialized IT needs of legal services providers nationwide Our services include but are not limited to IT management planning and strategy for preliminary IT assessments evaluations and recommendations cloud-based IT services and Like Microsoft Azure and office 365 case matter management system design implementation training and support Our website is HTTPS www.just hyphen tech comm if you'd like more information about our company some of the services that we offer or just in general You want to navigate our website? Please? Feel free to go to the link below All right, let's get started and look at our agenda for the webinar In order to talk about email encryption in office 365 It's good to build a foundation on the subject matter that we'll cover here So I'd like to start with a brief description of email. What is it and how it gets from its center to its recipient? We will then move on to talking about the biggest cyber cyber threats for email Which has made it imperative to have several means of data protection Including systems like spam and email email filters and our virus and I malware solutions different forms of encryption methodologies and end user education on best practices with email We will then take a look at a brief history of encryption and the current types in use today primarily symmetric and asymmetric encryption On which different encryption methodologies are built upon From there we move on to office 365 and the encryption methods used within office 365 to encrypt data files and Your emails which can either be at rest or in transit Last we delve into an example of a specific type of encryption method native to office 365 and Do a walkthrough of an example of a user experience when drafting an email using Microsoft app look We then will end with a quick Q&A session for any questions that you may have about the webinar So email What is it? Email is short for electronic mail It is defined as a message that may contain attachments which are distributed by electronic means from one computer user To one or more recipients via a public or a private network a public network could be the internet The private network could be your local area connection that is behind the security perimeter like a firewall In layman's turns instead of using pen and paper we compose a message in a mail client on the device of our choice The process is much quicker and much more efficient than the traditional postal service When email was first developed sometime around 1971 It's sole purpose was to send a single line of text from one location to another without much or frankly any concern for security Email today has evolved considerably and has become a core day-to-day application for businesses We rely on it extensively for our communications and Sharing of data via attachments in some cases extremely sensitive data That's making email security an essential need for every business Now that we have an understanding of what email is let's take a look at how it gets from the sender to the recipient in This diagram we will illustrate how email flows from its origin to its destination an Individual using a device of their choice Composes a message which is usually done in an email client like Microsoft Outlook Apple mail or in a web browser for internet email services like Gmail or Yahoo Once the message is composed and sent it hits your mail server Your mail server then formats or packages the email to be transmitted over the internet using a standard call SMTP or single or simple mail transfer protocol The sender's mail server looks up the at domain.com portion of the recipient's email address in a domain name System server to determine which destination mail server also referred to as a mail exchanger It should contact to deliver the message over the internet Once that has been established the email is sent over the internet. I'd like to elaborate a little bit on this process an Email address consists of two parts a local part and a domain part separated by the at symbol in our example The user is the local part users the actual account that we're sending it to Test.com is the domain part the domain part is all that is needed to know to work out via DNS look up Where an email needs to be sent to The local part is used by the recipient's mail server to work out what to do with the email once it is received by it The DNS server in this case is like a phone book It maintains a directory of domain names and translates them to IP addresses Which is what is used to get from one place to another on the internet an example of that would be gmail.com Which is very easy for human beings to remember, but if I told you to remember 172.2 17.10.37 for Gmail most people would have no idea and this is where DNS makes our lives a lot easier Once the location of the receiving mail server is determined the sending and receiving servers communicate using the aforementioned SMTP protocol the receiving server accepts the message and Verifies that the actual user account of the local part in the email address has a mailbox on its server If so, it delivers the mail to the recipient The recipient's email client retrieves the message using standards like Post office protocol or pop or internet message access protocol. I map to download the messages to the client The key here is when email traverses the internet bubble. It is prone to all types of cyber attacks We have no control or visibility as to what routers the email pass through on its way to the destination servers During this process evil can be intercepted red Altered or potentially deleted that's making encryption along with other safety protections necessary for emails My colleague Joseph will now talk to you over the next few slides on the threat of cyber attacks and emails on cyber attacks on emails and The benefits and challenges of encryption Joseph Hello everyone So my name is Joseph mellow and let me just apologize in advance I've been feeling sick the past few days because I have a son in pre-k who brings home more than just macaroni art So Cyber attacks as mentioned earlier email was not designed with security in mind For decades email has been the predominant end user network application So it should be no surprise that attackers have focused their attention on Exploiting email security threats. I It just it Excuse me. It provides a mechanism capable of placing almost any kind of threat in front of almost any target Today's email threats can fall under three general categories Some of these I'm sure you you know and familiar with Whatever since email applications began to include attachments. They have been used to deliver malware And a good example of malware is known as ransomware, which is perhaps one of today's greatest email security threats Once you're infected, it's designed to deny access to your computer or files until a ransom is paid And you might have seen news reports on businesses government agencies and hospitals being hit with ransomware Fishing emails is the practice of the attackers pretending to be a trusted entity like a friend or a co-worker in the business In an effort to convince the victim to perform some action Ordinary fishing campaigns spread emails to a broad spectrum of potential targets in order to harvest user credentials And they're usually Generally a panic email like quick something's gonna happen. Your account's gonna be locked out Or we're closing your bank account. You have to do these steps and log in provide your credentials so that we can continue It's very good scare tactic Spoofing is a common tactic attackers use on email as well The spoofed email is a message which is trying to fool the recipient into believing that the email originated from a known address For example, the attacker may send the message that appears to have originated from your employer or a bank or another trusted source When it comes to email protection though systems do exist that can scan your emails and check for some of those examples above Some may do a better job than others But it's really a cat and mouse game where attacks keep evolving and email protections have to evolve with them and Then there are users who have to remain vigilant since malicious emails may slip through the cracks Being able to identify that the domain name does not match the domain name. You know, it could be misspelled or off by a character You know email encryption is not a panacea It's not designed to fix all of the inherent flaws with email, but it does address certain weaknesses Roger can you move to the next slide? So what is encryption? Encryption is the process of converting information or data into code especially to prevent unauthorized access in Early form of encryption was used by Julius Caesar when communicating with his generals For example using the alphabet the letter a was written as the letter D by shifting positions like three letters down a Simple sentence would look like gibberish if you didn't understand the pattern Encryption requires the use of a key to encode or decode data An encryption keys typically a long random string of bits and are created with algorithms designed to ensure that each key is unique and unpredictable Today's encryption requires the use of a program or some form of authentication There are two prevalent encryption methods called symmetric and asymmetric encryption, which we'll discuss later and show examples of an upcoming slides Next slide please rush So what are the benefits of email encryption? A lot of information is sent over emails and a good deal of that data may be private and sensitive and Privacy is important if I want to send you an email and I only want you to be able to read it then I need encryption With smartphones and other mobile devices gaining popularity in recent years Many companies have struggled to find a solution for keeping data stored and passed through these devices safely Luckily data encryption software will allow you to ensure that all data across any device is Completely encrypted with the same protections in place that you would find on your desktop computer One of the most vulnerable aspects of data emerges during the transport process Should your encrypted email be snooped while in transit? The only thing they'll see is gibberish The encryption keeps your data safe from alterations as well and recipients of the data will be able to see if it's been tampered with This is helpful when it comes to spam and spoofed emails Alteration of data is something that many businesses often overlook when they're looking into ways to keep their data safe Finally compliance is extremely important and many organizations have to comply with legal insurance and industry restrictions On how data can be handled and transmitted Encryption provides one of the safest ways for your business to transmit and store data and comply with the restrictions That your business currently has in place or may have in place like F.I.P.S. HIPAA or PCI Next slide, please So there are some challenges involved with encryption There may be issues with deciding what data should be encrypted Defining what is sensitive information and this can be solved with some thought some organizational policies User training and awareness But ideally with an encryption solution that has a set of rules to encrypt emails for you, which can take the guesswork out of it Some encryption methods may involve the few extra steps such as having to exchange encryption keys Which we'll talk about later With your intended recipient They need your key and you need theirs in order to send encrypted emails to each other And that's just with one recipient if you have another person you want to send encrypted emails to then you need their key and so on As you guessed that there is the management of all these keys The more people you exchange encrypted emails with the more keys you'll add to your collection And if they change their keys for whatever reason then you'll need to update what you have for them There's also a human element to all of this these extra steps have caused people to shy away from it The process of getting started with encryption may mean getting your own set of keys like registration or authenticating yourself to prove who you are Then you have to configure your email program like outlook to use those keys Which may mean digging into your settings and into the menu options to apply the key that you have It can be confusing and once it's all in place There's also having to remember to encrypt sensitive emails which could be checking a box or clicking on a button It's easy to send an email without encryption and we do it every day and we're very used to it All right, so now I've been talking about encryption keys this past slide And so it'd be helpful if we explained a little bit more by what we mean when we say encryption keys Raj, that's up to you now Thank you, Joseph. I appreciate you taking the time to join me on this webinar and I hope you and the kids feel a lot better Thank you. Well So Joseph talked about encryption. There's two major encryption types that exist. It's symmetric and asymmetric Symmetric encryption is an encryption type that uses a single key to encrypt and decrypt data It is the oldest and most well-known technique for encryption The secret key Can be a word it could be a passphrase a number or a very long string of characters Which is generally what's used now and it's applied to a message along with the encrypt along with the encryption algorithm asymmetric encryption is a form of encryption where keys come in pairs for a user every user needs a public and a private key the The keys are linked, but just because you know someone's public key does not mean that you're able to decipher their private key Let's take a look at both these types in an example Here we have two individuals Bob and Alice Bob and Alice want to communicate Bob wants to send Alice an encrypted message He starts by composing the message in his mail client and then with the help of an encryption program And a key that's been generated He encrypts the email and he sends it over to Alice Alice gets the locked file But she has no way to unlock it right now because she needs the secret key that Bob has generated The issue now becomes how do you get the key to Alice if you risk sending it by email? It can be intercepted and hence compromise for this email plus any other future emails that have been created using that key Can you encrypt that key and send that message? Sure But then again, what do you do with the encrypted key? You have to send that as well So this process just doesn't really work for email encryption Now having said that symmetric encryption does exist and is applied in many places in technology But for email encryption the solution was asymmetric encryption Here's an example of asymmetric encryption Bob and Alice would like to communicate again and Bob would like to send an email to Alice This time Bob with the aid of an encryption program and Alex's Alice's public key, which he's aware of Encrypts his message and sends it over to Alice Alice is then able to Decrypt it using her private key Keep in mind you can share public keys and it's irrelevant if other people have access to your public keys Because your private key is confidential and secure and that is what's needed to decrypt the message So to reiterate public keys can encrypt the data, but only the corresponding private key can decode it. I Came across mailbox analogy that I think where that works very well to describe asymmetric encryption Let's take account of a mailbox on the street. The mailbox is exposed to anyone who knows the location We can say the location of the mailbox is completely public Anyone who knows the address can go in and drop a letter However, only the owner of the mailbox has a key to unlock it and read the messages inside In terms of that analogy The mailbox address is the public key and the physical key to open the mailbox is the private key Now that we've covered encryption types, let's move on to Looking at scenarios on when we would use email encryption I'm sure everyone can come up with a host of reasons to use email encryption, but I have listed five here that That pretty much show Good to good reason to use them a bank Sending a credit card statement to customers There's a lot of sensitive information when a bank is actually sending credit card statements You have your account numbers. You have your balances. You have your debit and credits You have your personal information about your home, your residence, your name, and perhaps some other data as well I don't know about everyone, but I use paperless Communications with my bank. So all my stuff comes over emails and I feel very comfortable knowing that there's encryption being applied when this data is being sent over to me Another example is a doctor's office sending medical records to patients In addition to ethical obligations to keep that data private There are also HIPAA laws, which require us to use encryption. It means the two parties communicating A third scenario is attorneys and clients sending confidential or legal information to another courthouse or attorney or a client Same as a doctor, you would have ethical laws that basically Obligate you to keep the person's information private. You could be working on a trust You could be working on a real estate deal. People could be going through divorces There's a lot of personal information that's been exchanged from attorneys to clients that needs to be kept private And you're liable to keep that data as secure as possible Another scenario could be where a company is Working with a client and they've recently done an assessment for the client And the client is very happy with the assessment and wants to move forward with the contract So the manager sets up a contract and he wants the contract to be reviewed by one of the employees at the company But they want to restrict what can be done with that contract that contract can't be downloaded Printed or forwarded. That's another scenario where email encryption is critical And then last secure communication with the government agency I have previously worked with generic pharma companies And any communication that's being done from the company to the FDA has to be encrypted and visually signed for the FDA to approve it or accept it That's the uh scenario where you would use that Let's take a quick look at office 365 So what exactly is office 365? Office 365 is Microsoft's cloud-based subscription service for its suite of products, which was launched in 2011 It gives you access to a host of applications depending on your subscription and license type I've the many products that are provided but not limited to just these three are the office suite Which includes microsoft word excel powerpoint one notes access Uh, there's share point which is a cloud-based repository for your files and allows live collaboration on them and one drive personal and business which is cloud storage for your files That allow you to access your files anywhere and from any device where you have an internet connection So you don't need a vpn connection or you don't need to carry usv drive with your files on it office 365 uses native encryption methods And the four that i'm going to talk about are listed here. They're ome smine irm and tls ome stands for office message encryption It's built on a service called azure rights management, which is an inherent data protection technology within office 365 The way it works is your administrator sets up a transport rule that defines the policy that is required for encryption As a user when you comply with this policy your message is encrypted and sent to the recipient You are allowed to send encrypted emails to people inside and outside your organization Regardless of the destination email address. That means you don't have to be on an office 365 account You could be using third-party email providers like gmail or yahoo or you can even send it to people that are hosting their own mail servers Once the email is encrypted and sent and received by the recipient the recipient has three options To access the encrypted message they can use an office 365 account If they don't have one they can create a microsoft account, which is done for free And you can associate that with a gmail or yahoo account if needed Or if you don't have if you don't want to do that option as well You can generate a one-time passcode which is actually sent to the email that you can apply to view the encrypted email The great part about this is the recipient does not need an office 365 account They can actually reply to the email and continue an encrypted thread when the recipient Receives the email it's in a format That ends in html html is a format that can be viewed by any browser And no special client or additional software is needed to view it You can customize your message By using your company's logo or colors if you like for branding purposes Encryption is done On the cloud microsoft servers. So in terms of the keys they're stored in the cloud And users don't have to worry about managing the keys locally When do we recommend using encryption methods? Based on the scenarios that I gave you previously communications between banks and clients Doctors and patients and attorneys and clients are ideal scenarios for ome in terms of licensing people need an office Enterprise e3 license to use ome because it's built on azure rights management And anything higher than e3 will work as well The next Encryption method that we're going to look at is s mine which stands for secure multipurpose internet mail extensions S mine is a certificate based encryption that allows you to encrypt and digitally sign your emails It's a peer-to-peer or end-to-end encryption meaning it's encrypted on the sender's machine And decrypted on the recipients machine as opposed to being done on the servers There is no visibility at all even when your mail hits the mail servers It's completely scrambled So no one has access to it A digital signature helps the recipient validate the identity of the center of the sender This is accomplished via a digital certificate that contains the keys for verifying digital signatures and encrypting or decrypting messages One should you use s mine When you communicate with government organizations that require you to encrypt your message and verify yourself as a as a sender This requires an e1 or enterprise one license in office 365 to set up There may be an additional cost to using this encryption methodology And that would be to purchase a digital certificate from a third party ca or a certificate authority Kind of like go daddy Versa or komodo The third encryption methodology we're going to talk about is irm, which is information rights management It's also built on the azure rights management service And it applies usage restrictions to email messages Meaning users are restricted from printing forwarding or copying the message or any attachments within the message by unauthorized people for example if I want to send a message an attachment and I want to Restrict people from printing it when they get the message and to go ahead and try to Decrypt it They'll be able to do it. They'll be able to download the message too and store it on the hard drives but The restriction of printing will still follow them there They won't be able to print that message despite the fact that it's off the servers and downloaded and stored locally users have the ability once the iron policies are set up on the back end to apply these policies or protection rules to the messages and attachments They can dictate if they want to use all three restrictions or one or just two That's granular for the users There are some restrictions to irm. It's a technology that's still being caught up by a lot of A lot of different devices and applications So there are some cases where some applications may not support irm emails I don't have a comprehensive list of those applications or devices But that's something I can definitely research and let you know if you have questions about that later The last thing we're going to talk about is tls transport layer security This isn't an encryption email encryption methodology, but it's a type of encryption That is used by microsoft 365 natively To encrypt the connections From a client's device to the server as the email is going as the email is traversing to the server or between two servers So how's email encrypted in office 365? So when a message is composed, it's encrypted or transformed from plain text to unreadable Cybertext on a central server in the case of ome or irm In the case of esmine the actual Encryption is taking place on the client's machine. Remember, it's an end-to-end or peer-to-peer encryption method While the message is in transit. It's also using tls as a second layer of security To protect the messages from being read or altered in case they're intercepted Once it hits the recipient The message is transformed back into readable text in one of two ways If it's done on the client's machine, it's the same as mine and if it's done on The central server for the recipient. It's either done through ome and irm So now I want to focus on looking at an encryption example using office message encryption In this case, I have opened up My default web client, which is outlook microsoft outlook I compose a message like I would do normally On the back end my network administrator has set up A transport rule which basically states You have to use the word encrypt or encrypted in the subject line of the email For the email to be encrypted So I'm sending over a family recipe for like awesome and chutney and I'm sending it to a person that's not on office 365 It's on gmail.com And I use the word encrypt and I put in my subject and I put in my contents And I go ahead and hit send Once I hit send the person that has gmail opens up their gmail account And they get a message that looks similar to this The very top has the subject line including the word The very top has a subject line The body of the message basically said you've received an encrypted message from Your sender to view your message save and open the attachment Which is at the bottom message dot html and follow the instructions for signing in Using the recipient's email address There's a little padlock at the bottom of that that tells you that this message has been encrypted by office 365 And the actual message contents is in this link Please note that the email actually is received By the recipient But the contents of what was written in that email are not downloaded to your email client They are still residing on the server in Microsoft's cloud So I go ahead and click on the message dot html link and it brings me to this page It tells you that you have an encrypted message It tells you who it's from and who it's addressed to and it gives you two options An option to sign in or use a one-time passcode and again at the bottom There's a padlock that tells you the message has been encrypted by Microsoft office 365 In this case I have three options that I mentioned you can use to log in you can sign in and use a free Microsoft Account and you can have that link to your gmail or your yahoo account or aol even some of you still have that Or you can use your Microsoft 365 account or you could use a one-time passcode In this case since the email was addressed to my gmail account and I have already linked my gmail account to a Microsoft office Microsoft account. I'm going to go ahead and click sign in When I hit sign in I get this little window For um From Microsoft that gives me the address that it's addressed to and it prompts me for a password The password is the one that I've used to link to my Microsoft account and I have to go ahead and put in that password and hit sign in When I hit sign in It takes me to this page Which tells me it's an encrypted message and it actually opens up the contents of the message would now reside on the server and allow me to view it I have the option now to just accept the email or I can reply to the email if I continue The email thread and I choose to reply to it because I'm missing some information or I'm looking for more information The email chain continues to stay encrypted despite the fact that I don't have a Microsoft 365 account So I can go ahead and hit reply When I hit reply it sends the message back to the sender And the sender receives an message that looks like this You have an encrypted message from so from the recipient's account to the sender's account And you have the same options to sign in or use a one-time passcode In this case, I don't want to use my sign in to office 365 So I've decided to use a one-time passcode Please note the padlock is still at the bottom and it shows message encryption by office 365 So when I click on the one-time passcode option It sends me a message to my email address And It will pop me with a one-time passcode And it gives me 15 minutes to enter that one-time passcode in here I have an option to say this is a private computer and keep me signed in for 12 hours You can go ahead and do that if you'd like, but I don't recommend it. It's just a extra layer of security So I get the email from Microsoft and it looks like this It basically comes from Microsoft 3 office 365 messaging and microsoft.com It has the branding for office 365 It generates this one-time passcode and it tells me that I need to enter this into the previous screen that I had Which is here So I go ahead and take that I will enter that into the one-time passcode And once you had the one-time passcode you can hit continue And you should be able to see your emails that you have And you can either continue the chain or you can end it there if you like And that's an example of ome office messaging encryption I usually get frequently asked questions and these are some of the main questions that we get Email encryption will not occur without the following words in the subject line those Words Are not set to encrypt or encrypted. It's set to whatever your network admin sets for you Any misspellings or other forms of the word will not encrypt the message So in my case, I have to use encrypt or encrypted if I actually typed an encryption in the subject line It would not encrypt the message Email encryption protects you from emails being intercepted But it does not protect you from sending your emails to the wrong person If you encrypt your message and send it to the wrong recipient That is a user error That is not going to be addressed by email encryption You can protect yourself by starting an encrypted email chain with someone To confirm that it's the right user prior to sending your actual contents External recipients that do not have a subscription to microsoft office 365 Can read view and reply your messages in an encrypted form You can also access your encrypted emails on mobile devices by downloading ome viewer apps for ios and android They're on the place in the google play store and in the app store for I have some helpful links here if people like to do some further reading The first link is for email encryption in office 365. It generally talks about The different methodologies for email encryption The second one looks specifically at the example that we looked at which is the outlook message encryption And the third one is a general encryption in office 365 on how it works for on more of a technological Form so I'd like to Thank you for joining our webinar. I think we are a little bit earlier Early uh joseph, would you like to add anything that i've missed in the presentation? Yeah, I could add that uh office 365 is constantly updating their platform In various ways and so the example of like say Setting up a mail rule that says use the word encrypted encrypted. That's just one way That you can use as an admin to set up Encryption in your environment to try to make it easy for users to use But there's other ways that you could set it up microsoft has recently a few months ago Added the capability for you to sort of set up rules that say if you're going to email this specific person Then always encrypt your email And so the the mail room the transport rule is basically going to recognize you're sending an email to this This individual which is part of a rule that you've created and so that that email will be encrypted And then you could mess around with sort of the way you want to set up those rules I think I don't think that link was it was added into the slide so I could I could pass that on to start so that could be included Yeah, so there's there's different ways that you could do it And then you know, there's also the possibility that you know later microsoft will add Further capabilities and tying more things like the information rights management into it Which uh, which roge kind of talked about earlier, which is the ability to sort of protect Contents or data sort of being downloaded or printed or forwarded out to Other individuals because you want to have that that kind of control So that people could just view the content of the data but not sort of pass it around to someone you did not authorize Should be able to view that content But that's it for me. Thank you great awesome, um, so Both Joseph and I have our information on here if everyone like anyone anyone would like to reach out to us Feel free to email us for any questions that you may have I'd like to thank everyone for attending this webinar And I hope it was informative and I'd like to open it up to any questions at this point does Anyone have any questions The only question that we received online was Can we get a copy of the slide presentation? There was a lot of useful information in there. We're definitely happy to distribute that Um Otherwise like thank you. This was very comprehensive. I I think the basic intro foundation Really helped a lot before diving into the more technical stuff Oh, thank you. Appreciate that. So I guess we're we still have 16 minutes or um All the content I'm Happy to end early at this point I would like to remind individuals that we have two more webinars coming up They are december 4th and december 5th One is on user rights Management and security. Um, the other is on help desk management. I definitely recommend people checking those out This webinar has been recorded and will be posted to our youtube channel here within the next week or so We will be updating our website Probably about a week after that with all of our recent trainings on Our website, but they're all currently also up on our youtube channel As a reminder lsc is going to be taking over the lsn tap Program here near the end of the year It will be continuing next year and we'll probably see a survey Very soon that asks people what types of trainings they would like to see for next year The training series. It sounds like we'll be continuing on There's also a conference coming up The innovations and technology conference is coming up in january in portland I look forward to seeing individuals out there. It's my home city. So I will definitely be there Thank you guys so much from just tech and coming out here and Putting this training together for us sure Just just to throw this in I uh, I got the links from directly from microsoft on how to set up Encryption and sort of defining those mail rules in which I added into our chat But it's only for organizers and panelists. I was wondering if you could paste that for everyone distribute that out to everyone here in the chat and Hopefully for all the it administrators who are itching to get this in place Excellent Now I look forward to these practices becoming The standard in the industry. I think there's there's so much more that legal Can really learn from what has happened in the health and in banking To really up the level of security that is available for our clients Absolutely, I agree on that Excellent You all have a wonderful afternoon and I encourage people that have further questions over this to Reach out to our panelists also join the ls tech email list. There is a Google form on the front page of lsm tap.org that lets people get directly added to that But we've got about 800 people who deal with these issues on a daily basis that can answer questions and share best practices there Great. Thank you sir. Thank you everyone Thank you everyone