Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
Learn how to protect against and recover from data breaches in Office 365
AntonioMaio2
CSF18 Azure Information Protection - Albert Hoitingh
NCCOMMS
Bridging the Office 365 Security Gap - Redmond Media
Bitglass
20180630 spsnl using office 365 for your first line workers
Arjan Cornelissen
2 Modern Security - Microsoft Information Protection
Andrew Bettany
Azure information protection and SharePoint
Albert Hoitingh
Network security
Donald West Rock
AzureThursday Mirabeau - Azure Information Protection
Albert Hoitingh
1
of
28
Top clipped slide
NIC - Securing one drive and its content
Feb. 13, 2019
•
0 likes
1 likes
×
Be the first to like this
Show More
•
205 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Technology
NIC 2019: How to secure your data with built-in Office 365 and EMS E3/E5 tools.
Olav Tvedt
Follow
MVP Cloud and Datacenter Management, Solution Architect at Lumagate
Advertisement
Advertisement
Advertisement
Recommended
SharePoint Conference - Secure the data, not the device
Olav Tvedt
116 views
•
48 slides
OISC2013_Presentation
Austin Nagel
145 views
•
20 slides
Intelligent Security, Compliance and Privacy in Office 365
Miguel Isidoro
429 views
•
51 slides
Android Security and Peneteration Testing
Surabaya Blackhat
939 views
•
32 slides
Scottish Summit - Azure Information Protection and SharePoint 2020
Albert Hoitingh
262 views
•
29 slides
Securing Data in MongoDB with Gazzang and Chef
MongoDB
2.6K views
•
24 slides
More Related Content
Slideshows for you
(20)
Learn how to protect against and recover from data breaches in Office 365
AntonioMaio2
•
391 views
CSF18 Azure Information Protection - Albert Hoitingh
NCCOMMS
•
64 views
Bridging the Office 365 Security Gap - Redmond Media
Bitglass
•
307 views
20180630 spsnl using office 365 for your first line workers
Arjan Cornelissen
•
134 views
2 Modern Security - Microsoft Information Protection
Andrew Bettany
•
656 views
Azure information protection and SharePoint
Albert Hoitingh
•
914 views
Network security
Donald West Rock
•
34 views
AzureThursday Mirabeau - Azure Information Protection
Albert Hoitingh
•
288 views
SIEM & IAM
Getting value from IoT, Integration and Data Analytics
•
1.7K views
SPS Geneva - Azure information protection
Albert Hoitingh
•
179 views
itsMERocks Pitch Deck
Michael Kapoustin
•
256 views
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Jan Ketil Skanke
•
1.5K views
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
Albert Hoitingh
•
141 views
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Albert Hoitingh
•
104 views
Top 3 tips for security documentation
Michael Furman
•
582 views
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
•
5K views
(130622) #fitalk i cloud keychain forensics
INSIGHT FORENSIC
•
81 views
How to keep track of cloud costs
David Strom
•
527 views
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
Albert Hoitingh
•
236 views
Menofia UN -Mobile Security
Ahmed Samara
•
286 views
Similar to NIC - Securing one drive and its content
(20)
Solving the security & compliance puzzle for Office 365 and Microsoft 365
Albert Hoitingh
•
388 views
What Does a Full Featured Security Strategy Look Like?
Precisely
•
29 views
Learning about Security and Compliance in Office 365
Aptera Inc
•
832 views
Brk30010 - With so many different ways to secure data across the Office 365 p...
Olav Tvedt
•
201 views
Tänased võimalused turvalahendustes - Tarvi Tara
ORACLE USER GROUP ESTONIA
•
576 views
Database Security Threats - MariaDB Security Best Practices
MariaDB Corporation
•
240 views
Prevent Data Leakage Using Windows Information Protection (WIP)
BeyondTrust
•
913 views
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?
Maarten Eekels
•
284 views
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
•
2.6K views
Expand Your Control of Access to IBM i Systems and Data
Precisely
•
126 views
The day when 3rd party security providers disappear into cloud bright talk se...
Ulf Mattsson
•
146 views
Microsoft 365 and Microsoft Cloud App Security
Albert Hoitingh
•
286 views
Identifying Hybrid AD Security Risks with Continuous Assessment
Quest
•
889 views
Controlling Access to IBM i Systems and Data
Precisely
•
885 views
Encryption in the enterprise
Bozhidar Bozhanov
•
1K views
Working securely with Microsoft Teams - Techorama 2021
Albert Hoitingh
•
128 views
Secure the modern Enterprise
Microsoft Österreich
•
1.7K views
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
•
279 views
Essential Layers of IBM i Security: System-Access Security
Precisely
•
108 views
CIO Forum June Microsoft.pdf
Erick Alejandro Antonio
•
7 views
Advertisement
More from Olav Tvedt
(20)
MVP Dagen 2021 - Money for nothing
Olav Tvedt
•
128 views
NIC - Lets put the business into one drive
Olav Tvedt
•
184 views
Securing the weakest link adding security layers while keeping the use
Olav Tvedt
•
116 views
The Windows 10 tips you wished you knew last week
Olav Tvedt
•
170 views
What’s new for SMBs in fall creators update
Olav Tvedt
•
370 views
Let's put the business into onedrive for business
Olav Tvedt
•
366 views
Security As A Service
Olav Tvedt
•
598 views
Hackcon 2017
Olav Tvedt
•
351 views
MTUG - På tide med litt oversikt og kontroll?
Olav Tvedt
•
511 views
ALSO Roadshow - Azure and EMS presentation
Olav Tvedt
•
496 views
Bsm mw10
Olav Tvedt
•
712 views
Microsoft Windows 10 Bootcamp - Windows as a service
Olav Tvedt
•
1.4K views
Microsoft Windows 10 Bootcamp - MDT Offline media
Olav Tvedt
•
1K views
Microsoft Windows 10 Bootcamp - Active directory
Olav Tvedt
•
2.4K views
Modern Workplace Summit 2015 - Management
Olav Tvedt
•
519 views
Modern Workplace Summit 2015 - Surface and offline media
Olav Tvedt
•
512 views
#EVRYWhatsNext EMS Slide Deck
Olav Tvedt
•
1K views
Ms @ evry rs june 2015 slidehide
Olav Tvedt
•
574 views
Win 10 frokost seminar
Olav Tvedt
•
1.1K views
Ignite - The 15 minute deploying surface (pro) guide
Olav Tvedt
•
465 views
Recently uploaded
(20)
Vernacular Architecture - 1.ppt
RekhaVKumar
•
0 views
Cutting Edge Robotics Innovation.pdf
bgoyani3
•
0 views
OODBMSvsORDBMSppt.pptx
MEHMOODNadeem
•
0 views
architecture of android.pptx
allurestore
•
0 views
Office 365
Princy Nadar
•
0 views
Revolution in Retail Experience.pdf
bgoyani3
•
0 views
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
AnoopRamachandran13
•
0 views
Technology Companies Development Story
Hamidreza Soleimani
•
2 views
Bosch BSG8_8100 Service Manual.pdf
ssuser78bec11
•
3 views
Hackolade Tutorial - part 4 - Create your first data model
PascalDesmarets1
•
0 views
【本科生、研究生】英国约克大学毕业证文凭购买指南
foxupud
•
0 views
【本科生、研究生】美国德鲁大学毕业证文凭购买指南
sutseu
•
3 views
Pill Camera.pptx
Md Refatul Amin Refat
•
4 views
【本科生、研究生】英国克兰菲尔德大学毕业证文凭购买指南
akuufux
•
3 views
【本科生、研究生】美国叶史瓦大学毕业证文凭购买指南
foxupud
•
0 views
Raspberry pi presentation.pptx
FrankAnthonyChin
•
2 views
GSM FRAME STRUCTURE.pptx
Rasufsd
•
0 views
Hackolade Tutorial - part 1 - What is a data model
PascalDesmarets1
•
0 views
#9 Calicut MuleSoft Meetup - Munits in Mule 4.pptx
JohnMathewPhilip
•
10 views
Transverse-and-Longitudinal-Waves.pdf
AbdulRehman35508
•
0 views
Advertisement
NIC - Securing one drive and its content
Securing and its content
Layers And Levels
Office 365 EMS
E3 EMS E5 Basic Extended Advanced Information • Controlled Access • Manuel Protection & labelling • Monitoring • Automatic Protection & labelling Devices • Enrolled • Basic MDM • Encryption • Monitoring • MDM • Monitoring with automated responses Identity • Cloud presence • Passwords • MFA • Conditional Access • Monitoring • Monitoring with automated responses • Automation Layers Levels
Microsoft 365 E3 Microsoft 365 E5 Basic
Extended Advanced Information • Controlled Access • Manuel Protection & labelling • Monitoring • Automatic Protection & labelling Devices • Enrolled • Basic MDM • Encryption • Monitoring • MDM • Monitoring with automated responses Identity • Cloud presence • Passwords • MFA • Conditional Access • Monitoring • Monitoring with automated responses • Automation Layers Levels
Microsoft’s Side • Physical
Security • Bitlocker • File Encryption • In Transit Encryption • Lockbox • BYOK
Security, usability, and
data sensitivity Security Usability Data sensitivityLow High
Security, usability, and
data sensitivity SecurityUsability Data sensitivity
Security, usability, and
data sensitivity Security Usability Data sensitivityLow High
Built-In Features • OneDrive •
Admin portal • Self-defense • Office 365 • IRM • DLP • Etc.
OneDrive Self Defense
DEMO: SharePoint OneDrive Portals
SharePoint Built-In
DEMO: SharePoint IRM
EM+S E3 related features •
Intune • Device Access Protection • Multi Factor Authentication • Conditional Access • Azure Information Protection
The ultimate information protection is
when the information protect itself
DEMO: Conditional Access Information Protection
EM+S E5 related features •
AIP Automation • Microsoft Cloud App security
DEMO: Microsoft Cloud App
Security
5 Things we
have learned along the way
#1 Know your information
#2 Know your customers/users.
#3 Avoid frustrated users
#4 Have a dedicated
pilot group
#5 Training and user
motivation is vital.
Knowledge speaks, but wisdom listens Jimi Hendrix
Olav Tvedt Principal Solutions
Architect Twitter: @olavtwitt Blog: https://olavtvedt.blogspot.com LinkedIn: https://www.linkedin.com/in/otvedt
Advertisement