This document provides an overview of data loss prevention (DLP) in SharePoint 2016. It defines DLP and describes how DLP can help prevent accidental or malicious sharing of sensitive data outside an organization. It explains the types of sensitive data that can be identified and protected using DLP policies in SharePoint 2016. It also outlines how to create and assign DLP policies to site collections to automatically identify, monitor, and protect sensitive content across a SharePoint deployment. The document notes some limitations of DLP in SharePoint 2016 and provides references for further information.
The document introduces the Office 365 Security & Compliance center, which allows users to search for and retrieve data, retain and preserve content through deletion policies and holds, and protect and manage data through features like data loss prevention and mobile device management. It provides an overview of the center's capabilities and demonstrates searching for content, applying retention policies, and enrolling a mobile device for access to Office 365 data.
Intro to Office 365 Security & Compliance CenterCraig Jahnke
This is a session I gave at SharePoint Saturday Atlanta --> The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Microsoft has been adding many new features and services for those companies that have data protection or compliance needs, or want to audit user activity in their organization. Come to my session to learn how to get started with Security & Compliance Center, and find out you can better manage and secure you data.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Microsoft Teams is a chat-based workspace in Office 365 that brings together chat, content, and tools for teamwork. It allows teams to communicate in the moment and keep everyone in the know through customizable team workspaces that include chat, files, and tools. Teams provides a hub for teamwork where people have quick access to information they need and security features that IT departments trust like compliance, encryption, and authentication.
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Tips for a successful SharePoint Migration strategyDon Daubert
This document provides tips for a successful SharePoint migration strategy. It discusses various migration options such as in-place upgrades, database attach methods, and third-party migration tools. It emphasizes the importance of discovery and planning, including inventorying the current farm configuration and content. The document also covers implementation, testing the migration plan, and potential issues to watch out for such as metadata not transferring accurately. Post-migration steps are also highlighted like validating content and functionality transferred correctly.
M365 Records Management Community WebinarDrew Madelung
Information governance is necessary for enterprises. The management of content lifecycles is needed to be compliant and secure. Records management in M365 has many new features and capabilities that we will highlight in this webinar. We will also have real-world conversations on use cases of moving to modern records management in M365 and the challenges, opportunities, and overall guidance for this process. Bring your questions to this exciting webinar!
The document introduces the Office 365 Security & Compliance center, which allows users to search for and retrieve data, retain and preserve content through deletion policies and holds, and protect and manage data through features like data loss prevention and mobile device management. It provides an overview of the center's capabilities and demonstrates searching for content, applying retention policies, and enrolling a mobile device for access to Office 365 data.
Intro to Office 365 Security & Compliance CenterCraig Jahnke
This is a session I gave at SharePoint Saturday Atlanta --> The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Microsoft has been adding many new features and services for those companies that have data protection or compliance needs, or want to audit user activity in their organization. Come to my session to learn how to get started with Security & Compliance Center, and find out you can better manage and secure you data.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Microsoft Teams is a chat-based workspace in Office 365 that brings together chat, content, and tools for teamwork. It allows teams to communicate in the moment and keep everyone in the know through customizable team workspaces that include chat, files, and tools. Teams provides a hub for teamwork where people have quick access to information they need and security features that IT departments trust like compliance, encryption, and authentication.
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Tips for a successful SharePoint Migration strategyDon Daubert
This document provides tips for a successful SharePoint migration strategy. It discusses various migration options such as in-place upgrades, database attach methods, and third-party migration tools. It emphasizes the importance of discovery and planning, including inventorying the current farm configuration and content. The document also covers implementation, testing the migration plan, and potential issues to watch out for such as metadata not transferring accurately. Post-migration steps are also highlighted like validating content and functionality transferred correctly.
M365 Records Management Community WebinarDrew Madelung
Information governance is necessary for enterprises. The management of content lifecycles is needed to be compliant and secure. Records management in M365 has many new features and capabilities that we will highlight in this webinar. We will also have real-world conversations on use cases of moving to modern records management in M365 and the challenges, opportunities, and overall guidance for this process. Bring your questions to this exciting webinar!
Azure Information Protection - Taking a Team ApproachJoanne Klein
This document summarizes the key steps for taking a team approach to adopting Azure Information Protection in an organization:
1. Planning involves defining labels, protection controls, and pilot users.
2. Configuration includes setting up classification, labeling, and protection policies.
3. Adoption requires training users through materials like labeling wizards and an AIP bot.
4. Demos showcase how AIP provides persistent protection of files across apps like Word, SharePoint, and mobile devices.
Communication Compliance in Microsoft 365Joanne Klein
Communication Compliance is part of the Insider Risk solution set in Microsoft 365. Its purpose is to monitor communication methods used both within and outside of the Microsoft 365 cloud to help identify insider non-compliant and risky communication. In the modern workplace today, communication methods are vast and varied and all can be a potential channel for non-compliance. The Communication Compliance tool has been purpose-built to help identify potential areas of non-compliance across these communication methods and remediation actions that can be taken depending on the severity of the activity.
Protecting your Teams Work across Microsoft 365Joanne Klein
Microsoft Teams and SharePoint sites are being created rapidly to enable team collaboration. There are concerns about how to securely protect, retain, and govern content within these sites. The document discusses Microsoft's shared responsibility model and how various Office 365 features can address requirements for sensitive information protection, retention of teamwork content, and oversight of collaboration. Key topics covered include applying sensitivity labels and retention policies, using data loss prevention policies, and understanding each stakeholder's role in information governance.
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
Starting from May 25, 2018 all European businesses and all worldwide businesses that are trading partners of European businesses will have to adhere to the new General Data Protection Regulation (GDPR). In this session, learn what are the main requirements of GDPR, from an IT perspective, and what are the out-of-the-box capabilities of Microsoft Office 365 and of SharePoint Online that can help you to be compliant with the GDPR rules.
Moreover, see a sample project, based on SharePoint Online, that you can use as a starter kit to satisfy the GDPR basic requirements.
Paolo Pialorsi, Microsoft Certified Master in SharePoint, MVP and SharePoint PnP Core Team Member, joined us in this webinar to talk about how GDPR is affecting your Office 365.
SPFest Chicago - Information Management and Data Governance in Office 365Joanne Klein
Joanne Klein gave a presentation on information management and collaboration tools in Office 365. She discussed how the digital workplace is being disrupted by increased remote work and data growth. She covered challenges around choosing the right collaboration tools and outlined strategies for structuring collaboration. Klein also provided guidance on using tools like Azure Information Protection and retention policies to classify, label, and protect information according to an organization's needs. She emphasized starting small and focusing on use cases.
The document discusses Microsoft's cybersecurity reference architecture and how it can help protect organizations by protecting access at the front door, detecting and remediating attacks, and protecting data anywhere through solutions like identity management, threat protection, information protection, and advanced security monitoring. It provides examples of how conditional access policies and user risk assessments can help secure access to applications and detects anomalies and threats across on-premises, cloud, and mobile environments. The reference architecture leverages solutions from Enterprise Mobility and Security to classify and label sensitive data and monitor for policy violations to help organizations discover, protect, and govern their most important information throughout its lifecycle.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowJoanne Klein
Presentation from the M365 Virtual Marathon. Session was all about Retention and answers the many questions surrounding it suggesting deep knowledge before you can start.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
This document provides a summary of a presentation on the principles of retention in Microsoft 365. It discusses why understanding the principles is important for ensuring compliance with retention requirements. The presentation covers the essentials to understand before learning the principles, including how retention policies and labels differ and how they can be applied. It then walks through the four principles of retention - that retention wins over deletion, the longest retention period wins, explicit settings win over implicit ones, and the shortest deletion period wins. Examples are provided to illustrate how the principles are applied.
Information management and data governance in Office 365Joanne Klein
Joanne Klein presented on information management and collaboration challenges in Office 365. She discussed how the digital workplace is disrupting traditional work models and driving new collaboration needs. She covered Microsoft tools for information management like Azure Information Protection and retention policies that can classify, label, and protect data across Office 365. Klein also demonstrated how to set up policies with these tools and provided best practices for rolling out information management successfully.
Protecting your files in SharePoint and OneDrive for Business When choosing a cloud collaboration platform, the most important consideration is trust in your provider. Microsoft SharePoint and OneDrive for Business are covered by the core tenets of earning and maintaining trust: security, privacy, compliance, and transparency. With SharePoint and OneDrive, they’re your files. You own them and control them.
The Microsoft approach to securing your files involves:
1. A set of customer-managed tools that adapt to your organization and its security needs.
2. A Microsoft-built security control framework of technologies, operational procedures, and policies that meet the latest global standards and can quickly adapt to security trends and industry-specific needs.
These tools and processes apply to all Microsoft Office 365 services—including SharePoint and OneDrive—so all your content beyond files is secure.
Microsoft focuses its investments in the following areas:
1. Platform security
a. Infrastructure and processes of our datacenters
b. Strong encryption technologies (at rest and in transit)
2. Secure access and sharing
a. Restrict access to files to approved people, devices, apps, locations, and data classifications
b. Enforce who can share files and with whom
3. Awareness and insights
a. Complete understanding of how people in your organization are using SharePoint and OneDrive
b. Analyze usage to measure return on investment
c. Identify potentially suspicious activity
File security in SharePoint and OneDrive 6
4. Information governance
a. Classify what constitutes sensitive data and enforce how it can be used
b. Protect your organization in the event of litigation
c. Retain business-critical files when people leave your organization
5. Compliance and trust
a. Ensure that service operations are secure, compliant, trustworthy, and transparent
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsDrew Madelung
Drew Madelung presented on new security and compliance features for Microsoft Teams, SharePoint, and OneDrive at M365 Chicago 2022. The presentation covered updates to Microsoft 365 Defender and other security products, new information protection capabilities like sensitivity labels and retention policies, improved data governance and auditing, and additional regulatory assessments. Questions were invited at the end regarding any of the new features covered in the presentation.
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
Webinar presented on Oct 21st (US) and Oct 23rd (EMEA), 2014 by Christian Buckley, Managing Director at GTconsult and Steve Marsh, Director of Product Marketing at Metalogix.
Create a Compliance Strategy for Office 365Erica Toelle
SharePoint, OneDrive, Microsoft Teams, Exchange, Skype…there are a lot of collaboration tools for creating and content in the Microsoft stack. Highly regulated and government organizations have advanced compliance and records management needs, some of which are tricky to meet with out of the box Microsoft tools, such as Cloud App Security, Azure Information Protection and Advanced Data Governance in Office 365. How can you ensure that content is retained properly for compliance purposes and that the proper processes are in place to ensure compliance?
In this session, you will learn about Microsoft’s out of the box compliance and records management features, as well as how to extend them to meet advanced requirements. Whether you are a decision maker, IT Pro tasked with implementation, or an information management professional tasked with compliance, this workshop is for you.
This document discusses information rights management and protecting data in the cloud. It introduces Microsoft's Enterprise Mobility + Security solution, which provides identity-driven security, comprehensive security solutions, and managed mobile productivity. Key capabilities include Azure Active Directory for identity management, Azure Information Protection for data protection across apps and devices, and Microsoft Cloud App Security. The document also discusses challenges of protecting data and identities in complex environments and how these solutions can help.
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
Popular collaboration platforms like SharePoint are increasingly used to store private information, raising data security concerns. While encryption at the disk or database levels provide some protection, they do not prevent access by privileged users like administrators. Transparent encryption at the application level protects against both external and insider threats by encrypting data and restricting access based on need-to-know. This provides the most comprehensive security for sensitive information stored in SharePoint.
This document provides an overview of data loss prevention (DLP) offerings from Microsoft to help businesses stay secure. It describes what DLP is, who should implement a DLP strategy, and how DLP works with other Microsoft tools like Rights Management Services, Intune, and sharing features. Key aspects of DLP in Office 365 are discussed, including how policies are configured to identify and protect sensitive data types across Exchange Online, SharePoint Online, and OneDrive for Business. The document also outlines how DLP policies are deployed and enforced to prevent accidental or intentional sharing of sensitive information.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Azure Information Protection - Taking a Team ApproachJoanne Klein
This document summarizes the key steps for taking a team approach to adopting Azure Information Protection in an organization:
1. Planning involves defining labels, protection controls, and pilot users.
2. Configuration includes setting up classification, labeling, and protection policies.
3. Adoption requires training users through materials like labeling wizards and an AIP bot.
4. Demos showcase how AIP provides persistent protection of files across apps like Word, SharePoint, and mobile devices.
Communication Compliance in Microsoft 365Joanne Klein
Communication Compliance is part of the Insider Risk solution set in Microsoft 365. Its purpose is to monitor communication methods used both within and outside of the Microsoft 365 cloud to help identify insider non-compliant and risky communication. In the modern workplace today, communication methods are vast and varied and all can be a potential channel for non-compliance. The Communication Compliance tool has been purpose-built to help identify potential areas of non-compliance across these communication methods and remediation actions that can be taken depending on the severity of the activity.
Protecting your Teams Work across Microsoft 365Joanne Klein
Microsoft Teams and SharePoint sites are being created rapidly to enable team collaboration. There are concerns about how to securely protect, retain, and govern content within these sites. The document discusses Microsoft's shared responsibility model and how various Office 365 features can address requirements for sensitive information protection, retention of teamwork content, and oversight of collaboration. Key topics covered include applying sensitivity labels and retention policies, using data loss prevention policies, and understanding each stakeholder's role in information governance.
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
Starting from May 25, 2018 all European businesses and all worldwide businesses that are trading partners of European businesses will have to adhere to the new General Data Protection Regulation (GDPR). In this session, learn what are the main requirements of GDPR, from an IT perspective, and what are the out-of-the-box capabilities of Microsoft Office 365 and of SharePoint Online that can help you to be compliant with the GDPR rules.
Moreover, see a sample project, based on SharePoint Online, that you can use as a starter kit to satisfy the GDPR basic requirements.
Paolo Pialorsi, Microsoft Certified Master in SharePoint, MVP and SharePoint PnP Core Team Member, joined us in this webinar to talk about how GDPR is affecting your Office 365.
SPFest Chicago - Information Management and Data Governance in Office 365Joanne Klein
Joanne Klein gave a presentation on information management and collaboration tools in Office 365. She discussed how the digital workplace is being disrupted by increased remote work and data growth. She covered challenges around choosing the right collaboration tools and outlined strategies for structuring collaboration. Klein also provided guidance on using tools like Azure Information Protection and retention policies to classify, label, and protect information according to an organization's needs. She emphasized starting small and focusing on use cases.
The document discusses Microsoft's cybersecurity reference architecture and how it can help protect organizations by protecting access at the front door, detecting and remediating attacks, and protecting data anywhere through solutions like identity management, threat protection, information protection, and advanced security monitoring. It provides examples of how conditional access policies and user risk assessments can help secure access to applications and detects anomalies and threats across on-premises, cloud, and mobile environments. The reference architecture leverages solutions from Enterprise Mobility and Security to classify and label sensitive data and monitor for policy violations to help organizations discover, protect, and govern their most important information throughout its lifecycle.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowJoanne Klein
Presentation from the M365 Virtual Marathon. Session was all about Retention and answers the many questions surrounding it suggesting deep knowledge before you can start.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
This document provides a summary of a presentation on the principles of retention in Microsoft 365. It discusses why understanding the principles is important for ensuring compliance with retention requirements. The presentation covers the essentials to understand before learning the principles, including how retention policies and labels differ and how they can be applied. It then walks through the four principles of retention - that retention wins over deletion, the longest retention period wins, explicit settings win over implicit ones, and the shortest deletion period wins. Examples are provided to illustrate how the principles are applied.
Information management and data governance in Office 365Joanne Klein
Joanne Klein presented on information management and collaboration challenges in Office 365. She discussed how the digital workplace is disrupting traditional work models and driving new collaboration needs. She covered Microsoft tools for information management like Azure Information Protection and retention policies that can classify, label, and protect data across Office 365. Klein also demonstrated how to set up policies with these tools and provided best practices for rolling out information management successfully.
Protecting your files in SharePoint and OneDrive for Business When choosing a cloud collaboration platform, the most important consideration is trust in your provider. Microsoft SharePoint and OneDrive for Business are covered by the core tenets of earning and maintaining trust: security, privacy, compliance, and transparency. With SharePoint and OneDrive, they’re your files. You own them and control them.
The Microsoft approach to securing your files involves:
1. A set of customer-managed tools that adapt to your organization and its security needs.
2. A Microsoft-built security control framework of technologies, operational procedures, and policies that meet the latest global standards and can quickly adapt to security trends and industry-specific needs.
These tools and processes apply to all Microsoft Office 365 services—including SharePoint and OneDrive—so all your content beyond files is secure.
Microsoft focuses its investments in the following areas:
1. Platform security
a. Infrastructure and processes of our datacenters
b. Strong encryption technologies (at rest and in transit)
2. Secure access and sharing
a. Restrict access to files to approved people, devices, apps, locations, and data classifications
b. Enforce who can share files and with whom
3. Awareness and insights
a. Complete understanding of how people in your organization are using SharePoint and OneDrive
b. Analyze usage to measure return on investment
c. Identify potentially suspicious activity
File security in SharePoint and OneDrive 6
4. Information governance
a. Classify what constitutes sensitive data and enforce how it can be used
b. Protect your organization in the event of litigation
c. Retain business-critical files when people leave your organization
5. Compliance and trust
a. Ensure that service operations are secure, compliant, trustworthy, and transparent
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsDrew Madelung
Drew Madelung presented on new security and compliance features for Microsoft Teams, SharePoint, and OneDrive at M365 Chicago 2022. The presentation covered updates to Microsoft 365 Defender and other security products, new information protection capabilities like sensitivity labels and retention policies, improved data governance and auditing, and additional regulatory assessments. Questions were invited at the end regarding any of the new features covered in the presentation.
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
Webinar presented on Oct 21st (US) and Oct 23rd (EMEA), 2014 by Christian Buckley, Managing Director at GTconsult and Steve Marsh, Director of Product Marketing at Metalogix.
Create a Compliance Strategy for Office 365Erica Toelle
SharePoint, OneDrive, Microsoft Teams, Exchange, Skype…there are a lot of collaboration tools for creating and content in the Microsoft stack. Highly regulated and government organizations have advanced compliance and records management needs, some of which are tricky to meet with out of the box Microsoft tools, such as Cloud App Security, Azure Information Protection and Advanced Data Governance in Office 365. How can you ensure that content is retained properly for compliance purposes and that the proper processes are in place to ensure compliance?
In this session, you will learn about Microsoft’s out of the box compliance and records management features, as well as how to extend them to meet advanced requirements. Whether you are a decision maker, IT Pro tasked with implementation, or an information management professional tasked with compliance, this workshop is for you.
This document discusses information rights management and protecting data in the cloud. It introduces Microsoft's Enterprise Mobility + Security solution, which provides identity-driven security, comprehensive security solutions, and managed mobile productivity. Key capabilities include Azure Active Directory for identity management, Azure Information Protection for data protection across apps and devices, and Microsoft Cloud App Security. The document also discusses challenges of protecting data and identities in complex environments and how these solutions can help.
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
Popular collaboration platforms like SharePoint are increasingly used to store private information, raising data security concerns. While encryption at the disk or database levels provide some protection, they do not prevent access by privileged users like administrators. Transparent encryption at the application level protects against both external and insider threats by encrypting data and restricting access based on need-to-know. This provides the most comprehensive security for sensitive information stored in SharePoint.
This document provides an overview of data loss prevention (DLP) offerings from Microsoft to help businesses stay secure. It describes what DLP is, who should implement a DLP strategy, and how DLP works with other Microsoft tools like Rights Management Services, Intune, and sharing features. Key aspects of DLP in Office 365 are discussed, including how policies are configured to identify and protect sensitive data types across Exchange Online, SharePoint Online, and OneDrive for Business. The document also outlines how DLP policies are deployed and enforced to prevent accidental or intentional sharing of sensitive information.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
Have you ever wanted to tell your users "I am the LAW!" when they ask why they have to tag a file in SharePoint? This session looks at what governance is, why its important, why our data is like laundry, and what tools Microsoft gives us to help you rein in your users and lay down the law!
March 2023 CIAOPS Need to Know WebinarRobert Crane
The document provides information about an upcoming webinar on Microsoft 365 hosted by @directorcia on March 2023. The webinar will cover Microsoft 365 updates, information protection in Microsoft 365, and include a Q&A session. The agenda includes discussing the Microsoft 365 update, information protection in Microsoft 365, and a Q&A. Recordings of past webinars are available on ciaopsacademy.com. Attendees are asked to turn off their mobile devices and email and take notes during the webinar.
Microsoft provides several compliance solutions within its Microsoft 365 platform:
- The Microsoft 365 Compliance Center provides a centralized view of how an organization is meeting compliance requirements through solutions like Compliance Manager.
- Sensitivity labels and data loss prevention capabilities help organizations classify, protect, and govern their data across Microsoft 365 and third-party applications. This includes capabilities for data classification, encryption, and automatic retention and deletion of records.
- Insider risk management solutions help minimize risks from internal users through communication monitoring, information barriers between groups, and controls over privileged access. These solutions aid with detection, investigation and response.
SPUnite17 SharePoint and Data Loss PreventionNCCOMMS
Data loss prevention (DLP) identifies and protects sensitive information across SharePoint Online, Exchange Online, and OneDrive for Business. It can prevent accidental sharing of private data and monitor desktop Office apps. DLP creates labels for different types of sensitive content and policies that block sharing of labeled files outside the organization. The system also provides reporting on content that matches DLP policies and new features include blocking content and in-app policy tips.
HSPUG presentation - Advanced Data GovernanceDavid Broussard
This document discusses data governance capabilities in Office 365. It describes how advanced data governance in O365 can help customers achieve organizational compliance by classifying and setting policies for data. Key capabilities discussed include labels to classify data, data loss prevention, records management, information rights management, auditing, and eDiscovery. Advanced data governance in O365 provides tools to intelligently govern data across different repositories like OneDrive, SharePoint and Exchange.
The document provides an agenda and overview for a SharePoint governance training session. The agenda covers topics such as defining governance, governance models and philosophies, developing a governance plan, making governance-related decisions, and establishing a governance committee. It emphasizes that governance is unique to each organization and requires buy-in. The training aims to help participants understand the importance of governance and their role in the process.
70% of all security breaches are due to an organization’s own staff. Register for this webinar and find out how not to become a statistic. Security is increasingly becoming a significant challenge, regarding how ensuring unstructured and semi-structured content is protected, and also the security rights of the individuals within the organization that need to be given or denied rights to organizational assets.
This Concept Searching webinar will focus on all aspects of security in a SharePoint environment, using native SharePoint tools, conceptClassifier for SharePoint, or integrated with your security application. conceptClassifier for SharePoint and conceptClassifier for Office 365 deliver semantic metadata generation, auto-classification, and taxonomy tools integrated natively with the SharePoint Term Store.
How does it work with privacy and confidential content? The products identify unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary can also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.
My presentation to the Oklahoma City SharePoint User Group, September 7, 2016
The basics of SharePoint Governance - what you need to consider when implementing governance, how to create a plan, and how to make governance work in the long term.
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...SlideTeam
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Framework and has templates with professional background images and relevant content. This deck consists of total of twelve slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below. https://bit.ly/2LTC6YA
Think tank - Data Culture for a Better BusinessDan Cave
Growth Hacker and Data Punk Daniel Cave talks about how how to put Data at the heart of your business.
What you should track, what you should share and who you should share it with to drive the best business decisions possible.
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
Regardless if you've implemented IBM Connections, are considering it or in the middle of the planning stages - there are wrong (and right) turns to take at every step. Join Femke to learn about misconceptions and tribulations others have faced while striving to become a socially enabled company. Hear about real World examples and often funny anecdotes from the trenches of adoption to show you how NOT to do it and giving you tips on how to do it better along the way.
Walk away with a grasp on what to focus on to make a success out of your IBM Connections environment.
How do we separate hype from useful information in Cyber Security? As Congress is debating a National privacy law, and several states have privacy and breach reporting laws, how will that impact our workload? Privacy starts with good cyber-hygiene. We will look at how we can leverage the focus on Privacy to address standards for:
Firewall and network Configs,
Cloud security
Protocols and ports that need attention
Authentication best practices
Server and network rights
Password rules
September 14, 2016 - Austin SharePoint User Group
What does governance mean in SharePoint? How do you get to good governance? Do you really need governance? What happens if you don’t have governance, or do it poorly?
Jim brings his experience building SharePoint governance in multiple organizations. The session covers governance basics to help get you going in the right direction.
(Unlike the "Group Therapy" session, this is a straight-up presentation, though the Q&A at the end can be used by the audience to ask their specific questions)
This slide deck is from the presentation On September 14, 2016 at the Austin O365 & SharePoint User Group
Governance - O365 How It's Affected & Where Do I StartStacy Deere
Office365 governance is affected by changes introduced by Office365. Key areas of governance for Office365 include OneDrive, Yammer, development processes, and third party tools. It is important to establish governance policies, procedures, roles and responsibilities to manage these services and ensure compliance, security and business value. Governance starts with developing a free template and forming a cross-functional governance team to develop and maintain policies.
Atlan Product Metering Case Challenge Summary:
The document outlines the importance of metering a SaaS product, specifically for SaaS B2B products. It highlights the benefits of accurate usage tracking, fair billing, resource optimization, cost control, upselling opportunities, and competitive differentiation. The goal is to align pricing with customers' ROI, optimize internal resources, and provide cost and usage visibility patterns.
The tasks for the product manager include researching different SaaS tools, capturing how metering is implemented in at least three tools, and defining the metrics and usage parameters for product metering. The proposed approach should be simple to implement and easy for both internal teams and customers to understand.
The desired outcomes are to create a flexible metering framework that accommodates various pricing models and billing structures and to provide a recommendation in the form of a document.
The document also includes a table of contents with sections discussing the need for data catalog software, the users of data catalog software in a company, capturing product metrics, factors driving data catalog pricing, and specific pricing details of Alation, castorDoc, Google Cloud Data Catalog, and Atlan.
The solution section presents two recommended pricing solutions for Atlan: a simple and transparent pricing model and a usage-based pricing model. The document concludes with a thank you note.
Overall, the document provides a comprehensive overview of the Atlan Product Metering Case Challenge, covering various aspects related to SaaS product metering and pricing.
How do we separate hype from useful information in Cyber Security? As Congress is debating a National privacy law, and several states have their own privacy and breach reporting laws including Georgia, how will that impact our workload? Privacy starts with good cyber-hygiene. We will look at how we can leverage the focus on Privacy to address standards for:
Firewall and network setups
Cloud security
Protocols and ports that need attention
Authentication best practices
Server and network rights
Password rules
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Intro to Data Loss Prevention in SharePoint 2016
1. Intro to Data Loss Prevention
In SharePoint 2016
By Craig Jahnke
Strategic Advisor
March 30, 2017
2. Agenda
• What is Data Loss Prevention
(DLP) ?
• Sensitive Data
• DLP in SharePoint 2016
• DLP Queries & Policies
• Limitations
• Reminders
• Questions
3. What is Data Loss Prevention (DLP)?
• Data loss prevention (DLP) is a strategy for
making sure that end users do not send
sensitive or critical information outside the
corporate network.
• DLP Software products help a network
administrator control what data end users can
transfer so that users cannot accidentally or
maliciously share data that could put the
organization at risk.
4. Types of Data in Regards to DLP
• In Use
• In Motion
• Exchange Online
• At Rest
• SharePoint On-Premises
5. Data Loss Prevention In SharePoint 2016
• With a data loss prevention (DLP) policy in
SharePoint Server 2016, you can identify,
monitor, and automatically protect sensitive
information across your site collections.
• Search for sensitive content in your existing
eDiscovery Center enabling real time searching
while keeping content in place.
• Searches across SharePoint 2016, One Drive for
Business and SharePoint Online.
6. Examples of Sensitive Information
Data loss prevention (DLP) includes 80 sensitive information types that are ready
for you to use in your DLP policies.
• Personal Identifiable Information (PII)
• Credit Card Numbers
• Social Security Numbers
• Bank Account Numbers
• Passport Numbers
• Driver’s License Numbers
• https://technet.microsoft.com/en-us/library/jj150541(v=exchg.160).aspx
7. DLP Processing in SharePoint 2016
Content
Sources UserCrawler Content Processing Index
Policy Definitions Unified Policy Processing Tasks
Query
8. DLP Queries & Policies
• DLP Queries
• See what and where sensitive information exists.
• Better understand your risks,
• Determine what and where is the content that your DLP policies need to protect
• DLP Policies
• Conditions that the content must match before the rule is enforced -- for example,
look only for content containing Social Security numbers that have been shared with
people outside your organization.
• Actions that you want the rule to take automatically when content matching the
conditions is found -- for example, block access to the document and send both the
user and compliance officer an email notification.
10. Compliance Policy Center
To create DLP Policies, you must set up a Compliance Policy Center
site collection.
11. DLP Templates
• When you create a DLP query or a
DLP policy, you can choose from a
list of DLP templates that
correspond to common regulatory
requirements.
• Each DLP template identifies
specific types of sensitive
information
12. DLP Queries
• Before you create your DLP policies, you might want to see what
sensitive information already exists across your site collections. To
do this, you create and run DLP queries in the eDiscovery Center.
13. DLP Queries
• A DLP query works the same as an eDiscovery query.
• Based on which DLP template you choose, the DLP query is
configured to search for specific types of sensitive information.
14. DLP Policies
• A DLP policy helps you identify, monitor, and automatically protect sensitive
information that’s subject to common industry regulations.
• You choose what types of sensitive information to protect, and what actions
to take when content containing such sensitive information is detected.
• A DLP policy can notify the compliance officer by sending an incident
report, notify the user with a policy tip on the site, and optionally block
access to the document for everyone but the site owner, content owner, and
whoever last modified the document.
• Finally, the policy tip has an option to override the blocking action, so that
people can continue to work with documents if they have a business
justification or need to report a false positive.
15. Creating DLP Policies
• You create and manage DLP
policies in the Compliance
Policy Center.
• Creating a DLP policy is a two-
step process: first you create
the DLP policy, and then you
assign the policy to a site
collection.
16. Step 1 – Create DLP Policy
• When you create a DLP policy, you choose a DLP
template that looks for the types of sensitive
information that you need to identify, monitor, and
automatically protect.
• When a DLP policy finds content that includes the
minimum number of instances of a specific type of
sensitive information, it can automatically protect
the sensitive information by taking the following
actions:
• Send an Incident Report
• Notify the user with a policy tip
• Block access to the content
17. Step 2 - Assign the DLP Policy
• After you create a DLP policy, you need to assign it to one or more
site collections, where it can begin to help protect sensitive
information in those locations.
• A single policy can be assigned to many site collections, but each
assignment needs to be created one at a time.
18. Policy Tips
• You want people in your organization who work with sensitive
information to stay compliant with your DLP policies, but you don’t want
to block them unnecessarily from getting their work done.
• A policy tip is a notification or warning that appears when someone is
working with content that conflicts with a DLP policy
• You can use policy tips to increase awareness and help educate people
about your organization’s policies.
• Policy tips also give people the option to override the policy, so that
they’re not blocked if they have a valid business need or if the policy is
detecting a false positive.
19. Viewing or overriding a policy tip
• To take action on a document, such as
overriding the DLP policy or reporting a
false positive, you can select the Open
... menu for the item > View policy tip.
• The policy tip lists the issues with the
content, and you can choose Resolve,
and then Override the policy tip or
Report a false positive.
20. How DLP Policies Work
• DLP detects sensitive information by using deep content analysis.
• This deep content analysis uses keyword matches, the evaluation of regular
expressions, internal functions, and other methods to detect content that
matches your DLP policies.
• Potentially only a small percentage of your data is considered sensitive. A DLP
policy can identify, monitor, and automatically protect just that data..
• After you create a DLP policy in the Compliance Policy Center, it’s stored as a
policy definition in that site.
• Assign the policy to different site collections, it starts to evaluate content
and enforce actions like sending incident reports, showing policy tips, and
blocking access.
21. Policy Evaluation in Sites
• Across all of your site collections, documents are
constantly changing.
• They are continually being created, edited,
shared, and so on.
• This means documents can conflict or become
compliant with a DLP policy at any time.
• DLP policies check documents for policy matches
frequently in the background.
• You can think of this as asynchronous policy
evaluation.
22. View DLP Events in the Usage Logs
• You can view DLP policy activity in the usage logs
on the server running SharePoint Server 2016.
• Example - view the text entered by users when
they override a policy tip or report a false positive.
• Turn on the option in Central Administration
(Monitoring > Configure usage and health data
collection > Simple Log Event Usage
Data_SPUnifiedAuditEntry).
• For more information about usage logging, see
Configure usage and health data collection.
23. Limitation
• Cannot Create Custom Rules
• 1 Policy Center Per Web Applications
• No “Clean” PowerShell CMDLETS for Automation
• One-to-one Site Collections & Policy Mappings
• Hybrid Does not Work That Well…
• Systems actions – Blocking, flagging, etc. works by timer jobs
• Office 365 cannot access On-Premises timer jobs
• Cannot Edit Emails That Are Sent To End User
24. DLP Reminders
• Start the search service and define a crawl schedule for your content.
• Turn on out-going email.
• To view user overrides and other DLP events, turn on the usage report.
• For DLP queries, create the eDiscovery Center site collection.
• For DLP policies, create the Compliance Policy Center site collection.
• Create a security group for your compliance team, and add security group
to the Owners group in the eDiscovery Center or Compliance Policy Center.
• To run DLP queries, view permissions are required for all content that the
query will search – for more information
27. Wait there is more…
• Data Theft
• Bad actors
• SharePoint 2016 – monitors but can’t stop
• Office 365 can stop
28. Data Theft
• Data theft is a term used to describe when information is illegally
copied or taken from a business or other individual. Commonly,
this information is user information such as passwords, social
security numbers, credit card information, other personal
information, or other confidential corporate information.
Typically Search works like this
Backend
You have searchable content
It is crawled – goes in the content and capture all the information
Content processing will analyze and apply exclusion and pass to index
Front End
A user makes a query
The query searches the index for the information and responds back to the user
DLP creates uses the Policy Definition
Looks for information in the index.
You need to have the information in the index before you can apply policies to it
*** If you don’t search a site collection you can’’ apply policies to it.
If you are doing daily crawls, you could have a gap of 24 hours before it is indexed.
When you create a DLP query or a DLP policy, you can choose from a list of DLP templates that correspond to common regulatory requirements. Each DLP template identifies specific types of sensitive information – for example, the template named U.S. Personally Identifiable Information (PII) Data identifies content that contains U.S. and U.K. passport numbers, U.S. Individual Taxpayer Identification Numbers (ITIN), or U.S. Social Security Numbers (SSN).
A DLP query works the same as an eDiscovery query. Based on which DLP template you choose, the DLP query is configured to search for specific types of sensitive information. First choose the locations you want to search, and then you can fine tune the query because it supports Keyword Query Language (KQL). In addition, you can narrow down the query by selecting a date range, specific authors, SharePoint property values, or locations. And just like an eDiscovery query, you can preview, export, and download the query results.
A DLP query works the same as an eDiscovery query.
Based on which DLP template you choose, the DLP query is configured to search for specific types of sensitive information.
First choose the locations you want to search, and then you can fine tune the query because it supports Keyword Query Language (KQL).
In addition, you can narrow down the query by selecting a date range, specific authors, SharePoint property values, or locations.
And just like an eDiscovery query, you can preview, export, and download the query results.
A DLP policy helps you identify, monitor, and automatically protect sensitive information that’s subject to common industry regulations.
You choose what types of sensitive information to protect, and what actions to take when content containing such sensitive information is detected.
A DLP policy can notify the compliance officer by sending an incident report, notify the user with a policy tip on the site, and optionally block access to the document for everyone but the site owner, content owner, and whoever last modified the document.
Finally, the policy tip has an option to override the blocking action, so that people can continue to work with documents if they have a business justification or need to report a false positive.
When a DLP policy finds content that includes the minimum number of instances of a specific type of sensitive information that you choose – for example, five credit card numbers, or a single social security number – then the DLP policy can automatically protect the sensitive information by taking the following actions:
Sending an incident report to the people you choose (such as your compliance officer) with details of the event. This report includes details about the detected content such as the title, document owner, and what sensitive information was detected. To send incident reports, you need to configure outgoing e-mail settings in Central Administration.
Notifying the user with a policy tip when documents that contain sensitive information are saved or edited. The policy tip explains why that document conflicts with a DLP policy, so that people can take remedial action, such as removing the sensitive information from the document. When the document is in compliance, the policy tip disappears.
Blocking access to the content for everyone except the site owner, document owner, and person who last modified the document. These people can remove the sensitive information from the document or take other remedial action. When the document is in compliance, the original permissions will be automatically restored. It’s important to understand that the policy tip gives people the option to override the blocking action. Policy tips can thus help educate users about your DLP policies and enforce them without preventing people from doing their work.
You want people in your organization who work with sensitive information to stay compliant with your DLP policies, but you don’t want to block them unnecessarily from getting their work done. This is where policy tips can help.
A policy tip is a notification or warning that appears when someone is working with content that conflicts with a DLP policy — for example, content like an Excel workbook that contains personally identifiable information (PII) and that’s saved to a site.
You can use policy tips to increase awareness and help educate people about your organization’s policies.
Policy tips also give people the option to override the policy, so that they’re not blocked if they have a valid business need or if the policy is detecting a false positive.
Details about how policy tips work
Note that it’s possible for content to match more than one DLP policy, but only the policy tip from the most restrictive, highest-priority policy will be shown. For example, a policy tip from a DLP policy that blocks access to content will be shown over a policy tip from a rule that simply notifies the user. This prevents people from seeing a cascade of policy tips. Also, if the policy tips in the most restrictive policy allow people to override the policy, then overriding this policy also overrides any other policies that the content matched.
DLP policies are synced to sites and contented is evaluated against them periodically and asynchronously (see the next section), so there may be a short delay between the time you create the DLP policy and the time you begin to see policy tips.
DLP detects sensitive information by using deep content analysis (not just a simple text scan).
Across all of your site collections, documents are constantly changing — they’re continually being created, edited, shared, and so on. This means documents can conflict or become compliant with a DLP policy at any time. For example, a person can upload a document that contains no sensitive information to their team site, but later, a different person can edit the same document and add sensitive information to it.
For this reason, DLP policies check documents for policy matches frequently in the background. You can think of this as asynchronous policy evaluation.
Here’s how it works. As people add or change documents in their sites, the search engine scans the content, so that you can search for it later. While this is happening, the content’s also scanned for sensitive information. Any sensitive information that’s found is stored securely in the search index, so that only the compliance team can access it, but not typical users. Each DLP policy that you’ve turned on runs in the background (asynchronously), checking search frequently for any content that matches a policy, and applying actions to protect it from inadvertent leaks.
Finally, documents can conflict with a DLP policy, but they can also become compliant with a DLP policy. For example, if a person adds credit card numbers to a document, it might cause a DLP policy to block access to the document automatically. But if the person later removes the sensitive information, the action (in this case, blocking) is automatically undone the next time the document is evaluated against the policy.
DLP evaluates any content that can be indexed. For more information on what file types are crawled by default, see Default crawled file name extensions and parsed file types.
You can view DLP policy activity in the usage logs on the server running SharePoint Server 2016. For example, you can view the text entered by users when they override a policy tip or report a false positive.
First you need to turn on the option in Central Administration (Monitoring > Configure usage and health data collection > Simple Log Event Usage Data_SPUnifiedAuditEntry). For more information about usage logging, see Configure usage and health data collection.