SlideShare a Scribd company logo
1 of 35
Albert Hoitingh
@Alberthoitingh
https://linkedin.com/in/appieh
https://alberthoitingh.com
Sr. Consultant Microsoft 365 security, compliance & risk
@InSpark
Brought to you by:
Community for Azure, Microsoft 365 & SharePoint
Join the aMS Quiz to win Prizes !
Attend the aMS
sessions for 2 days
Answer as many
questions as you can
Highest scorers get
rewarded!
Throughout the 2 days aMS sessions, we will share this QR code with you
to participate on a quiz to win some prizes.
Answers can be found in every speaker’s session.
Submit your quiz latest by 11.59pm on the 16th Oct 2021.
◀ Scan for
Feedback & Quiz
Join as many session as you can to get
the hints on the correct answer of the quiz!
Data loss prevention demystified
Session Objectives
During this session we will:
 Talk about data loss prevention in Microsoft 365
 Discuss the different ways to detect information
 Look at data loss prevention policies
 Take a peek at endpoint DLP
Data is
exploding
It’s created, stored, and
shared everywhere
Cloud
Electronic
medical
records
Administrative
data
Platforms
Patient
communications
Interoperability
Corporate
Claims
Vendors
Care
coordination Genetic and
genomic data
Drug
discovery
Research
https://www.varonis.com/blog/wp
-content/uploads/2018/07/world-
in-data-breaches.png
Introduction | DLP
(un)Intentional loss of sensitive data
This can be privacy sensitive, intellectual property or
other classified/sensitive information. Either by losing
the data, sharing it or storing it on unmanaged
environments.
Examples?
Automatic forwarding of e-mails, storing
documents on personal cloud environments,
using non-encrypted USB-drives, sharing from
OneDrive.
Templates
You can use build-in templates, sensitive information
types or configure your own rules and processes to stop
data loss. Information is detected automatically (using
sensitive information types) or manually using labels.
Actions include blocking access, notifying compliance
officers and logging.
Introduction | DLP
What does Microsoft 365 DLP provide?
Protects against unwanted (internal/external) sharing of
information used in SharePoint Online | Microsoft Teams
| Exchange Online | OneDrive for Business | Endpoints |
On-premises
What’s not part of the deal?
Encrypting information is not part of Microsoft 365 DLP
.
DLP does not offer insider risk management but is part of
that solution.
Demonstration: Let’s take a
look at data loss prevention
in SharePoint Online and
Teams
Data loss prevention in Microsoft 365
Search
DLP uses the Microsoft 365 (search) indexing method to
find and classify information. Any new added item
cannot be shared before it has been added to the index.
Data Loss Prevention in Microsoft 365
Several options to configure
Data loss prevention policies
Configure a policy to set different rules for several
Microsoft 365 platforms
Sensitive Information Types
Use the build-in types and templates or create your own
to detect sensitive information.
Retention labels/sensitivity labels
Create a policy which uses a label (in-use) to detect the
sensitive content.
Microsoft 365 Data Loss Prevention | Finding information
Microsoft 365 Data Loss Prevention | Finding information
What are these types?
Sensitive information types are used for
automatic detection of information. Examples
include credit card number and IBAN.
Are accurate are these types?
These are very accurate. But if you want specific
accuracy, then look at creating your own.
How to configure these?
Microsoft supplies and manages a long list of
types. These cannot be modified. You can add
your own or look at trainable classifiers.
Microsoft 365 Data Loss Prevention | Finding information
What are these types?
These classifiers use machine learning to detect
specific content.
What’s the difference with a custom
sensitive type?
A sensitive information type uses accuracy,
keywords, proximity windows and more options to
configure. But these classifiers use the content to
determine the type.
Demonstration: Let’s take a
look at data classifications
Data loss prevention policies
Microsoft 365 Data Loss Prevention | Policies
Policy components
• What locations are to be protected?
• What is considered sensitive?
• What actions have to be checked?
• Is there a difference in accuracy or number of hits required?
• What are the required actions and notifications?
How to create a policy?
• Use the build-in templates or
• Create your own (more advanced)
Microsoft 365 Data Loss Prevention | Conditions
Exchange Online
Many specific conditions. Sender, recipient,
subject, and even the header of an e-mail
message.
Microsoft Teams
Both content focused (shared within a
conversation) as well as conversation/chat based.
SharePoint Online and OneDrive for
Business
Information focused and aimed at protecting
sharing activity.
Beware: combining locations can limit the number of actions you
can select!
Demonstration: Let’s take a
look at a DLP policy
Reporting and alerts
Reporting and alerts
Keep an insight into activities
Alerts
A DLP rule may trigger an alert, which can be accessed
through the portal.
Dashboards
DLP comes with a specific dashboard which shows you all DLP
activity in a specific timeframe.
E-mails
Standard part of the DLP policy is to use e-mail to inform a
security officer (for example) of a DLP policy match.
Microsoft 365 Data Loss Prevention | Reporting
Microsoft 365 Data Loss Prevention | Reporting
Enhanced options
Microsoft 365 Data Loss Prevention | Enhanced
On-premises DLP
• Uses the AIP Scanner functions
• SharePoint on-premises and network shares
• Detect “over-exposed” locations
Endpoint DLP
• Windows 10
• Azure AD joined or hybrid joined
• Microsoft 365 E5 Compliance (!)
• Devices need to be onboarded
Microsoft 365 Data Loss Prevention | Enhanced
Microsoft 365 Data Loss Prevention | Enhanced
What does this platform do?
MCAS is a Cloud Access Security Broker platform. It’s
a platform to monitor access and use of cloud
applications, including Microsoft 365. It can detect
the use of cloud applications and set rules. For
example: data loss prevention, but also data
encryption and deny of downloads.
Your organization from any
location
App connectors
Cloud discovery
Proxy
Access +
Session
License types
• Microsoft 365 E5 (Microsoft 365 Cloud App Security)
• Microsoft 365 E5 (full features)
• Add-on license
Demonstration: Let’s take a
look at Endpoint and on-
premises DLP
Sensitivity labels
These can be used within a DLP policy. But are not
available for a policy tip in Exchange. And are limited to
Office file-types
Final thoughts | DLP
Policy tips and Outlook
Specific versions of Outlook on the desktop/mobile work
differently with policy tips!
Not want to wait?
DLP for SharePoint Online/OneDrive for Business relies on the content search
engine. If you want to be sure that any document “waits” for the DLP rule to be
checked, then use this PowerShell cmdlet: Set-SPOTenant-
MarkNewFilesSensitiveByDefault BlockExternalSharing
Final thoughts: Know Your Data
Identify exposure & risks; guide policy configuration
Understand volume, scope and location of sensitive
information
Visibility into sensitive information types detected
across documents and emails
Identify oversharing, mismanagement or misuse of
important documents
Act on recommendations to enable policies to better
protect and govern data
Helps inform taxonomy and policies for sensitivity
labeling and retention labeling
Microsoft 365 Data Loss Prevention | Final
Join the aMS Quiz to win Prizes !
Attend the aMS
sessions for 2 days
Answer as many
questions as you can
Highest scorers get
rewarded!
Throughout the 2 days aMS sessions, we will share this QR code with you
to participate on a quiz to win some prizes.
Answers can be found in every speaker’s session.
Submit your quiz latest by 11.59pm on the 16th Oct 2021.
◀ Scan for
Feedback & Quiz
Join as many session as you can to get
the hints on the correct answer of the quiz!
Brought to you by:
Community for Azure, Microsoft 365 & SharePoint
Thank You
Do join us for other sessions in different tracks !
Thank you!
@Alberthoitingh
https://linkedin.com/in/appieh
https://alberthoitingh.com

More Related Content

What's hot

Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Albert Hoitingh
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Albert Hoitingh
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Albert Hoitingh
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowJoanne Klein
 
Azure information protection and SharePoint
Azure information protection and SharePoint Azure information protection and SharePoint
Azure information protection and SharePoint Albert Hoitingh
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...NCCOMMS
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
SharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceSharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceAlbert Hoitingh
 

What's hot (20)

Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
 
Azure information protection and SharePoint
Azure information protection and SharePoint Azure information protection and SharePoint
Azure information protection and SharePoint
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
SharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceSharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & compliance
 

Similar to aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention

Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Albert Hoitingh
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
Azure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealAzure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealJoanne Klein
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsFredBrandonAuthorMCP
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365NCCOMMS
 
Information management and data governance in Office 365
Information management and data governance in Office 365Information management and data governance in Office 365
Information management and data governance in Office 365Joanne Klein
 
SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365Joanne Klein
 
Information management in an Office 365 Collaboration World - SPS Toronto 2017
Information management in an Office 365 Collaboration World  - SPS Toronto 2017Information management in an Office 365 Collaboration World  - SPS Toronto 2017
Information management in an Office 365 Collaboration World - SPS Toronto 2017Joanne Klein
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Drew Madelung
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365RalSejas
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
 

Similar to aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention (20)

Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
Azure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealAzure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS Montreal
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365
 
Information management and data governance in Office 365
Information management and data governance in Office 365Information management and data governance in Office 365
Information management and data governance in Office 365
 
SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365
 
Information management in an Office 365 Collaboration World - SPS Toronto 2017
Information management in an Office 365 Collaboration World  - SPS Toronto 2017Information management in an Office 365 Collaboration World  - SPS Toronto 2017
Information management in an Office 365 Collaboration World - SPS Toronto 2017
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 

More from Albert Hoitingh

Meetup DIWUG Januari 2024 - Data Loss Prevention
Meetup DIWUG Januari 2024 - Data Loss PreventionMeetup DIWUG Januari 2024 - Data Loss Prevention
Meetup DIWUG Januari 2024 - Data Loss PreventionAlbert Hoitingh
 
Global Security and Compliance Conference - Cologne
Global Security and Compliance Conference - CologneGlobal Security and Compliance Conference - Cologne
Global Security and Compliance Conference - CologneAlbert Hoitingh
 
Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Purview Information Barriers and Communication Compliance and Micro...Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Purview Information Barriers and Communication Compliance and Micro...Albert Hoitingh
 
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...Albert Hoitingh
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptxCollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptxAlbert Hoitingh
 
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptx
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptxCommsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptx
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptxAlbert Hoitingh
 
Scottish Summit 2022 - Microsoft Information Protection de-mystified
Scottish Summit 2022 - Microsoft Information Protection de-mystifiedScottish Summit 2022 - Microsoft Information Protection de-mystified
Scottish Summit 2022 - Microsoft Information Protection de-mystifiedAlbert Hoitingh
 
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
 
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...Albert Hoitingh
 
Microsoft 365 Chicago - eDiscovery and Microsoft Teams
Microsoft 365 Chicago - eDiscovery and Microsoft TeamsMicrosoft 365 Chicago - eDiscovery and Microsoft Teams
Microsoft 365 Chicago - eDiscovery and Microsoft TeamsAlbert Hoitingh
 
eDiscovery and Microsoft Teams
eDiscovery and Microsoft TeamseDiscovery and Microsoft Teams
eDiscovery and Microsoft TeamsAlbert Hoitingh
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveAlbert Hoitingh
 
Teams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceTeams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceAlbert Hoitingh
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newAlbert Hoitingh
 
Teams Day Online - Microsoft Teams Governance
Teams Day Online - Microsoft Teams GovernanceTeams Day Online - Microsoft Teams Governance
Teams Day Online - Microsoft Teams GovernanceAlbert Hoitingh
 
Microsoft 365 UK Usergroup 2020 Sensitivity labels
Microsoft 365 UK Usergroup 2020 Sensitivity labelsMicrosoft 365 UK Usergroup 2020 Sensitivity labels
Microsoft 365 UK Usergroup 2020 Sensitivity labelsAlbert Hoitingh
 
Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Albert Hoitingh
 

More from Albert Hoitingh (20)

Meetup DIWUG Januari 2024 - Data Loss Prevention
Meetup DIWUG Januari 2024 - Data Loss PreventionMeetup DIWUG Januari 2024 - Data Loss Prevention
Meetup DIWUG Januari 2024 - Data Loss Prevention
 
Global Security and Compliance Conference - Cologne
Global Security and Compliance Conference - CologneGlobal Security and Compliance Conference - Cologne
Global Security and Compliance Conference - Cologne
 
Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Purview Information Barriers and Communication Compliance and Micro...Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Purview Information Barriers and Communication Compliance and Micro...
 
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...
NACS 2022 - Information Barriers and Communication Compliance and Microsoft T...
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptxCollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
CollabDays NL 2022 - Albert Hoitingh - Encryption in M365 - Slideshare.pptx
 
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptx
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptxCommsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptx
Commsverse 2022 eDiscovery and Microsoft Teams - SlideShare.pptx
 
Scottish Summit 2022 - Microsoft Information Protection de-mystified
Scottish Summit 2022 - Microsoft Information Protection de-mystifiedScottish Summit 2022 - Microsoft Information Protection de-mystified
Scottish Summit 2022 - Microsoft Information Protection de-mystified
 
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Teams Day Online V - Information Barriers - Communication Compliance and Micr...
Teams Day Online V - Information Barriers - Communication Compliance and Micr...
 
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...
Dutch Information Worker User Group - January 2022 - eDiscovery and Microsoft...
 
Microsoft 365 Chicago - eDiscovery and Microsoft Teams
Microsoft 365 Chicago - eDiscovery and Microsoft TeamsMicrosoft 365 Chicago - eDiscovery and Microsoft Teams
Microsoft 365 Chicago - eDiscovery and Microsoft Teams
 
eDiscovery and Microsoft Teams
eDiscovery and Microsoft TeamseDiscovery and Microsoft Teams
eDiscovery and Microsoft Teams
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep dive
 
Teams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceTeams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams Compliance
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's new
 
Teams Day Online - Microsoft Teams Governance
Teams Day Online - Microsoft Teams GovernanceTeams Day Online - Microsoft Teams Governance
Teams Day Online - Microsoft Teams Governance
 
Microsoft 365 UK Usergroup 2020 Sensitivity labels
Microsoft 365 UK Usergroup 2020 Sensitivity labelsMicrosoft 365 UK Usergroup 2020 Sensitivity labels
Microsoft 365 UK Usergroup 2020 Sensitivity labels
 
Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention

  • 2. Brought to you by: Community for Azure, Microsoft 365 & SharePoint
  • 3. Join the aMS Quiz to win Prizes ! Attend the aMS sessions for 2 days Answer as many questions as you can Highest scorers get rewarded! Throughout the 2 days aMS sessions, we will share this QR code with you to participate on a quiz to win some prizes. Answers can be found in every speaker’s session. Submit your quiz latest by 11.59pm on the 16th Oct 2021. ◀ Scan for Feedback & Quiz Join as many session as you can to get the hints on the correct answer of the quiz!
  • 4. Data loss prevention demystified
  • 5. Session Objectives During this session we will:  Talk about data loss prevention in Microsoft 365  Discuss the different ways to detect information  Look at data loss prevention policies  Take a peek at endpoint DLP
  • 6. Data is exploding It’s created, stored, and shared everywhere Cloud Electronic medical records Administrative data Platforms Patient communications Interoperability Corporate Claims Vendors Care coordination Genetic and genomic data Drug discovery Research
  • 8. Introduction | DLP (un)Intentional loss of sensitive data This can be privacy sensitive, intellectual property or other classified/sensitive information. Either by losing the data, sharing it or storing it on unmanaged environments. Examples? Automatic forwarding of e-mails, storing documents on personal cloud environments, using non-encrypted USB-drives, sharing from OneDrive.
  • 9. Templates You can use build-in templates, sensitive information types or configure your own rules and processes to stop data loss. Information is detected automatically (using sensitive information types) or manually using labels. Actions include blocking access, notifying compliance officers and logging. Introduction | DLP What does Microsoft 365 DLP provide? Protects against unwanted (internal/external) sharing of information used in SharePoint Online | Microsoft Teams | Exchange Online | OneDrive for Business | Endpoints | On-premises What’s not part of the deal? Encrypting information is not part of Microsoft 365 DLP . DLP does not offer insider risk management but is part of that solution.
  • 10. Demonstration: Let’s take a look at data loss prevention in SharePoint Online and Teams
  • 11. Data loss prevention in Microsoft 365
  • 12. Search DLP uses the Microsoft 365 (search) indexing method to find and classify information. Any new added item cannot be shared before it has been added to the index. Data Loss Prevention in Microsoft 365 Several options to configure Data loss prevention policies Configure a policy to set different rules for several Microsoft 365 platforms Sensitive Information Types Use the build-in types and templates or create your own to detect sensitive information. Retention labels/sensitivity labels Create a policy which uses a label (in-use) to detect the sensitive content.
  • 13. Microsoft 365 Data Loss Prevention | Finding information
  • 14. Microsoft 365 Data Loss Prevention | Finding information What are these types? Sensitive information types are used for automatic detection of information. Examples include credit card number and IBAN. Are accurate are these types? These are very accurate. But if you want specific accuracy, then look at creating your own. How to configure these? Microsoft supplies and manages a long list of types. These cannot be modified. You can add your own or look at trainable classifiers.
  • 15. Microsoft 365 Data Loss Prevention | Finding information What are these types? These classifiers use machine learning to detect specific content. What’s the difference with a custom sensitive type? A sensitive information type uses accuracy, keywords, proximity windows and more options to configure. But these classifiers use the content to determine the type.
  • 16. Demonstration: Let’s take a look at data classifications
  • 18. Microsoft 365 Data Loss Prevention | Policies Policy components • What locations are to be protected? • What is considered sensitive? • What actions have to be checked? • Is there a difference in accuracy or number of hits required? • What are the required actions and notifications? How to create a policy? • Use the build-in templates or • Create your own (more advanced)
  • 19. Microsoft 365 Data Loss Prevention | Conditions Exchange Online Many specific conditions. Sender, recipient, subject, and even the header of an e-mail message. Microsoft Teams Both content focused (shared within a conversation) as well as conversation/chat based. SharePoint Online and OneDrive for Business Information focused and aimed at protecting sharing activity. Beware: combining locations can limit the number of actions you can select!
  • 20. Demonstration: Let’s take a look at a DLP policy
  • 22. Reporting and alerts Keep an insight into activities Alerts A DLP rule may trigger an alert, which can be accessed through the portal. Dashboards DLP comes with a specific dashboard which shows you all DLP activity in a specific timeframe. E-mails Standard part of the DLP policy is to use e-mail to inform a security officer (for example) of a DLP policy match.
  • 23. Microsoft 365 Data Loss Prevention | Reporting
  • 24. Microsoft 365 Data Loss Prevention | Reporting
  • 26. Microsoft 365 Data Loss Prevention | Enhanced On-premises DLP • Uses the AIP Scanner functions • SharePoint on-premises and network shares • Detect “over-exposed” locations Endpoint DLP • Windows 10 • Azure AD joined or hybrid joined • Microsoft 365 E5 Compliance (!) • Devices need to be onboarded
  • 27. Microsoft 365 Data Loss Prevention | Enhanced
  • 28. Microsoft 365 Data Loss Prevention | Enhanced What does this platform do? MCAS is a Cloud Access Security Broker platform. It’s a platform to monitor access and use of cloud applications, including Microsoft 365. It can detect the use of cloud applications and set rules. For example: data loss prevention, but also data encryption and deny of downloads. Your organization from any location App connectors Cloud discovery Proxy Access + Session License types • Microsoft 365 E5 (Microsoft 365 Cloud App Security) • Microsoft 365 E5 (full features) • Add-on license
  • 29. Demonstration: Let’s take a look at Endpoint and on- premises DLP
  • 30. Sensitivity labels These can be used within a DLP policy. But are not available for a policy tip in Exchange. And are limited to Office file-types Final thoughts | DLP Policy tips and Outlook Specific versions of Outlook on the desktop/mobile work differently with policy tips! Not want to wait? DLP for SharePoint Online/OneDrive for Business relies on the content search engine. If you want to be sure that any document “waits” for the DLP rule to be checked, then use this PowerShell cmdlet: Set-SPOTenant- MarkNewFilesSensitiveByDefault BlockExternalSharing
  • 31. Final thoughts: Know Your Data Identify exposure & risks; guide policy configuration Understand volume, scope and location of sensitive information Visibility into sensitive information types detected across documents and emails Identify oversharing, mismanagement or misuse of important documents Act on recommendations to enable policies to better protect and govern data Helps inform taxonomy and policies for sensitivity labeling and retention labeling
  • 32. Microsoft 365 Data Loss Prevention | Final
  • 33. Join the aMS Quiz to win Prizes ! Attend the aMS sessions for 2 days Answer as many questions as you can Highest scorers get rewarded! Throughout the 2 days aMS sessions, we will share this QR code with you to participate on a quiz to win some prizes. Answers can be found in every speaker’s session. Submit your quiz latest by 11.59pm on the 16th Oct 2021. ◀ Scan for Feedback & Quiz Join as many session as you can to get the hints on the correct answer of the quiz!
  • 34. Brought to you by: Community for Azure, Microsoft 365 & SharePoint Thank You Do join us for other sessions in different tracks !