SlideShare a Scribd company logo
Need to Know Microsoft 365
Webinar
March 2023
@directorcia
http://about.me/ciaops
Web cast has started
Web cast is being recorded
If you can’t hear anything check
your speaker settings
For questions after the event:
Email : director@ciaops.com
Twitter : @directorcia
Webinar recordings at:
www.ciaopsacademy.com
Free access for CIAOPS patrons
Please:
- Turn off your mobile
- Turn off your email
- Have somewhere to
take notes
http://www.ciaopslearn.com
Agenda
-Microsoft 365 Update
-Information Protection in Microsoft 365
-Q & A
News
• Welcome to the new era of Microsoft Teams
• https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/27/welcome-to-the-new-era-of-microsoft-teams/
• New Microsoft Loop app is built for modern co-creation
• https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/22/new-microsoft-loop-app-is-built-for-modern-co-
creation/
• Introducing Microsoft 365 Copilot – your copilot for work
• https://blogs.microsoft.com/blog/2023/03/16/introducing-microsoft-365-copilot-your-copilot-for-work/
• Explaining the Microsoft 365 Copilot System
• https://www.youtube.com/watch?v=E5g20qmeKpg
• How to enable Microsoft Authenticator Lite for Outlook mobile (preview)
• https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-authenticator-lite
• New Microsoft Intune Devices experience
• https://techcommunity.microsoft.com/t5/intune-customer-success/new-microsoft-intune-devices-experience/ba-
p/3777342
Information
Protection in
Microsoft 365
© Copyright Microsoft Corporation. All rights reserved.
Introduction to information protection
© Copyright Microsoft Corporation. All rights reserved.
Protect your data
Information protection is integrated into Microsoft 365 apps and services like:
© Copyright Microsoft Corporation. All rights reserved.
Introduction to Microsoft 365 encryption
Data at rest
• Files saved on computers and mobile devices
• Documents and files saved in SharePoint Online
and OneDrive
• Mails saved in Mailboxes in Exchange Online
Data in transit
• Documents and files accessed in SharePoint
Online and OneDrive
• Mails transported between servers
• Shared files and conversations in Teams meetings
What is encryption in Microsoft 365?
• Encoding plain text into cipher text.
• Decryption requires encryption keys.
• Control access to authorized users or machines only.
• Differentiation between 'data at rest' and 'data in transit'
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Purview compliance portal
Microsoft Purview compliance portal
• A view of how the organization is
meeting its compliance requirements.
• Solutions that can be used to help with
compliance.
• Information about active alerts.
• And more…
Navigation
• Access to alerts, reports, policies, compliance
solutions, and more.
• Add or remove options for a customized
navigation pane.
• Customize navigation control.
© Copyright Microsoft Corporation. All rights reserved.
Compliance Manager
Compliance Manager simplifies
compliance and reduces risk by providing:
• Prebuilt assessments based on common standards
• Workflow capabilities to complete risk assessments
• Step-by-step improvement actions
• Compliance score, shows overall compliance posture
Key elements of Compliance Manager
• Controls
• Assessments
• Templates
• Improvement actions
© Copyright Microsoft Corporation. All rights reserved.
Data classification capabilities of the compliance portal
Sensitive information types.
Trainable classifiers: Pre-trained classifiers and Custom trainable classifiers.
Understand and explore the data.
The content explorer: It enables administrators to gain visibility into the content that has been
summarized in the overview pane.
The activity explorer: It can monitor what's being done with labeled content across the organization.
© Copyright Microsoft Corporation. All rights reserved.
Classify data using sensitive information types
Information protection and governance solutions and where in those solutions you can use sensitive
information types:
Information protection: Sensitivity label auto-labeling policies
Data loss prevention (DLP): DLP policies
Data Lifecycle Management: Retention policies and retention label auto-apply policies
Records management: Retention label auto-apply policies
© Copyright Microsoft Corporation. All rights reserved.
Sensitivity labels and policies
Sensitivity labels
Labels are:
• Customizable
• Clear text
• Persistent
Usage:
• Encrypt email and documents.
• Mark the content.
• Apply the label automatically.
• Protect content in containers: sites and groups.
• Extend sensitivity labels to third-party apps and services.
• Classify content without using any protection settings.
Label policies
Policies enable admins to:
• Choose the users and groups that can see labels.
• Apply a default label to all new emails and documents.
• Require justifications for label changes.
• Require users to apply a label (mandatory labeling).
• Link users to custom help pages.
Once a sensitivity label is applied to an email or document,
any configured protection settings for that label are enforced
on the content.
© Copyright Microsoft Corporation. All rights reserved.
Apply sensitivity labels to Microsoft Teams, Microsoft 365
groups, and SharePoint sites
• Labels may be published for use in Microsoft 365 Groups, Microsoft Teams, Yammer
communities and SharePoint sites.
• You must activate labels in the tenant level via the Azure AD PowerShell module before they can
be used.
• Sensitivity labels can be manually assigned to SharePoint Sites and Teams sites through the
creation settings.
• Labels can be changed through the properties of existing SharePoint sites or Microsoft Teams.
• A sensitivity label is applied to a Group in the Azure portal through Azure services > Groups >
properties.
© Copyright Microsoft Corporation. All rights reserved.
Retention labels and policies
Retention settings work with SharePoint, OneDrive, Teams, Yammer and Exchange and help organizations manage
and govern information by ensuring content is kept only for a required time, and then permanently deleted.
Retention labels:
• Are applied at an item level.
• Emails and documents can have only a single
retention label assigned to it at a time.
• Retention settings from retention labels travel
with the content in your Microsoft 365 tenant.
• Can be applied manually or automatically.
• Retention labels support disposition review of
the content before it's permanently deleted.
Retention policies:
• Are applied at site or mailbox level.
• Can be applied to multiple locations or
specific locations or users.
• Items inherit the retention settings from their
container.
• If an item is moved, the retention setting does
not travel to the new location.
© Copyright Microsoft Corporation. All rights reserved.
Records management
Records management helps an organization look after their legal obligations and helps to demonstrate
compliance with regulations.
• When content is labeled as a record, the
following happens:
- Restrictions are put in place to block
certain activities.
- Activities are logged.
- Proof of disposition is kept at the end of
the retention period.
• To enable items to be marked as records,
an administrator sets up retention labels.
DEMO
Windows Information Protection - Sunsetted
https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-sunset-of-windows-information-protection-
wip/ba-p/3579282
© Copyright Microsoft Corporation. All rights reserved.
Data loss prevention overview
Each DLP policy contains:
Where to protect the content
Content is protected in locations like SharePoint
Online, Exchange Online, OneDrive accounts, Microsoft
Teams chat and channel messages, and Windows 10 or
higher devices.
When and how to protect the content
When and how to protect the content is defined by
enforcing rules. A policy contains one or more rules,
and each rule consists of conditions and actions at a
minimum.
© Copyright Microsoft Corporation. All rights reserved.
Identify content to protect
Use the following to identify content:
Content explorer
Content explorer identifies the email and
documents in your organization that contain
sensitive information.
Activity explorer
Activity explorer includes information on activity
related to content that contains sensitive
information, which can also inform what should
be protected by DLP policies.
© Copyright Microsoft Corporation. All rights reserved.
Define policy settings for your DLP policy
To create a DLP policy go to the
Microsoft Purview Portal
© Copyright Microsoft Corporation. All rights reserved.
Choose the information to protect
DLP policy templates consist of
one or more sensitive info types
grouped into categories:
• Enhanced
• Financial
• Medical and health
• Privacy
• Custom
© Copyright Microsoft Corporation. All rights reserved.
Choose locations to apply the policy
Locations are places or service
the DLP policy will apply to:
• Exchange Online email
• SharePoint Online sites
• OneDrive accounts
• Microsoft Teams chat and
channel messages
• Devices
• Microsoft Defender for
Cloud Apps
• On-premises repositories
• Power BI (preview)
© Copyright Microsoft Corporation. All rights reserved.
Define policy settings
DLP policy rules include:
Conditions
Determine what types of
information you are looking for,
and when to take an action.
Exceptions
Prevents the application of a rule
for content matching the
exceptions.
Actions
When content matches a
condition in a rule, you can apply
actions to automatically protect
the content.
User notifications
Use notifications to educate your
users about DLP policies and help
them remain compliant without
blocking their work.
User overrides
Allows the user to override the
policy and share the content.
Incident reports
With a matched rule, you can
send an incident report to your
compliance officer with details of
the event.
© Copyright Microsoft Corporation. All rights reserved.
Test or turn on your DLP policy
• Use test mode to gauge impact before policy activation.
• Policy matches will be reported to you in emails or through DLP reports.
• Test mode allows you to activate policy tips without enforcing protective actions.
• Policy tips allow users to flag false positives.
• Configure exceptions to the policy to reduce false positives.
© Copyright Microsoft Corporation. All rights reserved.
Prepare for Endpoint DLP
• Endpoint DLP extends the activity monitoring and protection capabilities of DLP to
sensitive items on Windows 10, Windows 11, and macOS
• File type limitations exists
• Unsupported file types can create opportunities for data loss
• Management of Endpoint DLP policies can be completed by a Compliance Admin
• Devices are monitored by Microsoft Defender for Endpoint
• Devices onboarded for Defender are automatically also onboarded for Endpoint DLP
© Copyright Microsoft Corporation. All rights reserved.
Prepare for Endpoint DLP (continued)
Endpoint DLP only protects data:
• All Endpoint DLP policies end at the border of the
device
Policies allow you to audit or restrict:
• Uploading to restricted cloud service domains
• Access by unallowed browsers
• Copying to the clipboard from protected items
• Copying protected items to USB removable media
• Copying to network shares
• Printing protected items
• Access by unallowed (bluetooth) apps
• Copy or move using RDP
© Copyright Microsoft Corporation. All rights reserved.
Configure global Endpoint DLP settings
Endpoint DLP settings create a framework in which Endpoint DLP policies work
File path exclusions:
• Are applied to all Endpoint
DLP policies
• Allow you to limit where your
policies are in effect
Restricted apps:
• Are applied when a policy
blocks unallowed apps
• Allow you to limit where you
can work with protected files
Browser and domain
restrictions:
• Are applied when a policy
blocks unallowed browsers
• Allow you to limit where you
can share protected files
Advanced classification
scanning and protection:
• Can use EDM and named
entities in your DLP policies
Business justification in policy
tips:
• Show default options and
custom text box
• Only show default options
and/or custom text box
© Copyright Microsoft Corporation. All rights reserved.
Manage DLP policy alerts
DLP Reports
Provides an overview of DLP
violations
Contains DLP policy matches, DLP
incidents, and DLP false positives
and user overrides reports
Used to fine tune your policies and
identify problematic configurations
or business processes
Can take up to 24h to update
DLP Alerts Dashboard
Provides a deeper insight into DLP
violations
Displays individual alerts
Can aggregate alerts to spot
patterns more easily
Defender for Cloud Apps
Dashboard
Displays alerts of Defender for Cloud
Apps file policies
Shows alerts of all your Defender
for Cloud Apps DLP policies
Drill down to specific policies and
review only a single policy’s
matches
Provides a match history and
quarantine views
© Copyright Microsoft Corporation. All rights reserved.
Data Lifecycle Management overview
© Copyright Microsoft Corporation. All rights reserved.
Explain Retention Tools in Microsoft 365
Different tools to retain data:
• Retention Labels
• Label Policies / Retention Label Policies
• Auto-apply Retention labels
• Retention Polices
• Record Management
• Retention Tags and Retention Policies
• In-place eDiscovery & hold
• eDiscovery
To understand the right tools, know:
• Where is the data stored today and in the
future?
• Which tools are used in the Microsoft 365
environment?
• Which Retention requirements exist?
• Which requirements does the Adoption Team
have?
• Are there other Systems like a DSM on
SharePoint to retain and fulfill all
requirements?
• Which requirements do you want to fulfill in
Microsoft 365
© Copyright Microsoft Corporation. All rights reserved.
Configure retention policies
Differences between retention policies and retention labels
• Retention Policies are focused on service locations.
• Retention Labels are focused on individual items.
• Retention labels are created for certain kinds of business data.
• Label policies are used to publish retention labels.
Type Based on Travel with
the document
Data
lifecycle
examples
Retention Policy Location,
product
no yes Teams Chat,
Junk Folder,
SharePoint Site
Retention Label Single file or
email, library,
or list
yes yes, better Email,
document in a
library
© Copyright Microsoft Corporation. All rights reserved.
Manage and remediate Data Lifecycle Management
Data Lifecycle
Management cards on
the Data classification
page:
• Top sensitive info types
• Top retention labels
applied to content
• Locations where
retention labels are
applied
© Copyright Microsoft Corporation. All rights reserved.
Explain retention in Exchange Online
© Copyright Microsoft Corporation. All rights reserved.
Explain retention in SharePoint Online and OneDrive
© Copyright Microsoft Corporation. All rights reserved.
Records management overview
A record is a document or other electronic or physical entity in an organization that serves as evidence
of an activity or transaction performed by the organization and requires retention for some time period.
• Different actions that possibly needs to be prevented:
• change the assigned Retention Label of an item
• change of the content of an item or it’s metadata
• deletion of a file or remove a retention label from a file
• moving a file between containers (SharePoint libraries for example)
• Four steps to plan and decide:
• Decide to add a Record to a label or not
• Decide to add a Record or a Regulatory Record to a label
• Configure the Record to a label
• Decide to have an auto labeling functionality and configure it
© Copyright Microsoft Corporation. All rights reserved.
Configure file policies in Microsoft Defender for Cloud Apps
File policies can use the Defender for Cloud Apps DLP engine or the same Data Classification Services
as DLP policies
You can configure real-time alerts or review alerts via reports
File policies are configured in the Microsoft Defender for Cloud Apps portal
There is no test mode for file policies, actions will be applied as soon as the policy exists
Use the preview functions to see the files your policy would match if you saved it
© Copyright Microsoft Corporation. All rights reserved.
Manage DLP violations in Microsoft Defender for Cloud
Apps
• Violations of file policies only show up in the Defender for Cloud Apps dashboard and
the individual policy matches overview
• Use the policy overview to review matches of the policy and fine tune your filters
• Get a history of past matches to see where your policy had an effect
• Use the quarantine view to see files that have been quarantined because of governance actions
• Modify file policy filters and review the effects your policy changes have on your
environment before commiting to them by using the preview function
© Copyright Microsoft Corporation. All rights reserved.
eDiscovery in Microsoft Purview
• Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be
used as evidence in legal cases.
• eDiscovery tools: Content search, eDiscovery (Standard), eDiscovery (Premium)
© Copyright Microsoft Corporation. All rights reserved.
Auditing in Microsoft Purview
• Microsoft Purview auditing solutions help organizations effectively respond to security events, forensic
investigations, internal investigations, and compliance obligations.
• Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
DEMO
© Copyright Microsoft Corporation. All rights reserved.
Configure DLP for policy precedence
Policies and rules are processed in priority order
Only the highest priority rule of the highest priority policy is applied
More restrictive rules/policies should be prioritized above less restrictive rules/policies
All processed matches are logged, even if the rule/policy is not applied
© Copyright Microsoft Corporation. All rights reserved.
Manage and respond to DLP policy violations
• DLP policies do not make decisions about the validity of a policy violation
 Compliance officers have the task of monitoring reports and need to decide if violations require technical or organizational actions.
 Compliance admins should be aware of escalation processes and contacts in other departments to coordinate a unified response to violations
• Use Exclusions in your DLP rules to limit the amount of false positives you get
• Allow users to override the protective actions of specific DLP policies if you
identified legitimate use cases in past responses to policy violations
CIAOPS Resources
• Blog – http://blog.ciaops.com
• Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops
• Free documents, presentations, eBooks – http://slideshare.net/directorcia
• Office 365, Azure, Cloud podcast – http://ciaops.podbean.com
• Office 365, Azure online training courses – http://www.ciaopsacademy.com
• Office 365 and Azure community – http://www.ciaopspatron.com
• CIAOPS Github – https://github.com/directorcia
Twitter
@directorcia
Facebook
https://www.facebook.com/ciaops
Email
director@ciaops.com
Skype for Business
admin@ciaops365.com
Get access to the latest
information by becoming a
Patron
http://www.ciaopspatron.com
That’s all folks!
Thanks for attending

More Related Content

What's hot

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
Robert Crane
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Drew Madelung
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Joel Oleson
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
Vignesh Ganesan I Microsoft MVP
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Nikki Chapple
 
May 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarMay 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know Webinar
Robert Crane
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDrive
Drew Madelung
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
Drew Madelung
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
Robert Crane
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
ChrisaldyChandra
 
Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...
Drew Madelung
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
Vignesh Ganesan I Microsoft MVP
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Radhakrishnan Govindan
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
Jasper Oosterveld
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
David J Rosenthal
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 

What's hot (20)

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel Oleson
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
 
May 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarMay 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know Webinar
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDrive
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 

Similar to March 2023 CIAOPS Need to Know Webinar

SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
FredBrandonAuthorMCP
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
Don Daubert
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
Drew Madelung
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
David Broussard
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxTeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
Jasper Oosterveld
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
David Broussard
 
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
Chirag Patel
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
Erica Toelle
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Christian Buckley
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010
Chad Solomonson
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
Juan Carlos Gonzalez
 
Data governance in Office 365
Data governance in Office 365Data governance in Office 365
Data governance in Office 365
CloudFronts Technologies LLP.
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Toni Frankola
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
spsnyc
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
Joanne Klein
 
Administrators guide to managing Microsoft 365 and collaboration workloads - ...
Administrators guide to managing Microsoft 365 and collaboration workloads - ...Administrators guide to managing Microsoft 365 and collaboration workloads - ...
Administrators guide to managing Microsoft 365 and collaboration workloads - ...
Chirag Patel
 
Power Platform Governance
Power Platform GovernancePower Platform Governance
Power Platform Governance
Daniel Laskewitz
 
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and ContrastManaging SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
Christian Buckley
 
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Jasper Oosterveld
 

Similar to March 2023 CIAOPS Need to Know Webinar (20)

SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxTeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptx
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
Data governance in Office 365
Data governance in Office 365Data governance in Office 365
Data governance in Office 365
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
 
Administrators guide to managing Microsoft 365 and collaboration workloads - ...
Administrators guide to managing Microsoft 365 and collaboration workloads - ...Administrators guide to managing Microsoft 365 and collaboration workloads - ...
Administrators guide to managing Microsoft 365 and collaboration workloads - ...
 
Power Platform Governance
Power Platform GovernancePower Platform Governance
Power Platform Governance
 
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and ContrastManaging SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
 
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
 

More from Robert Crane

September 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know Webinar
Robert Crane
 
August 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarAugust 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know Webinar
Robert Crane
 
July 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarJuly 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know Webinar
Robert Crane
 
June 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarJune 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know Webinar
Robert Crane
 
April 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarApril 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know Webinar
Robert Crane
 
January 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarJanuary 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know Webinar
Robert Crane
 
December 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarDecember 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know Webinar
Robert Crane
 
November 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarNovember 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know Webinar
Robert Crane
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
Robert Crane
 
September 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarSeptember 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know Webinar
Robert Crane
 
August 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarAugust 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know Webinar
Robert Crane
 
July 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarJuly 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know Webinar
Robert Crane
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
Robert Crane
 
May 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarMay 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know Webinar
Robert Crane
 
April 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarApril 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know Webinar
Robert Crane
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
Robert Crane
 
March 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarMarch 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know Webinar
Robert Crane
 
January 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know WebinarJanuary 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know Webinar
Robert Crane
 
December 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know Webinar
Robert Crane
 

More from Robert Crane (20)

202310
202310202310
202310
 
September 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know Webinar
 
August 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarAugust 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know Webinar
 
July 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarJuly 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know Webinar
 
June 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarJune 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know Webinar
 
April 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarApril 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know Webinar
 
January 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarJanuary 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know Webinar
 
December 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarDecember 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know Webinar
 
November 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarNovember 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know Webinar
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
 
September 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarSeptember 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know Webinar
 
August 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarAugust 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know Webinar
 
July 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarJuly 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know Webinar
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
 
May 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarMay 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know Webinar
 
April 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarApril 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know Webinar
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
March 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarMarch 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know Webinar
 
January 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know WebinarJanuary 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know Webinar
 
December 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know Webinar
 

Recently uploaded

Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (16)

Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

March 2023 CIAOPS Need to Know Webinar

  • 1. Need to Know Microsoft 365 Webinar March 2023 @directorcia http://about.me/ciaops
  • 2. Web cast has started Web cast is being recorded If you can’t hear anything check your speaker settings
  • 3. For questions after the event: Email : director@ciaops.com Twitter : @directorcia
  • 4.
  • 6. Please: - Turn off your mobile - Turn off your email - Have somewhere to take notes
  • 8. Agenda -Microsoft 365 Update -Information Protection in Microsoft 365 -Q & A
  • 9.
  • 10. News • Welcome to the new era of Microsoft Teams • https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/27/welcome-to-the-new-era-of-microsoft-teams/ • New Microsoft Loop app is built for modern co-creation • https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/22/new-microsoft-loop-app-is-built-for-modern-co- creation/ • Introducing Microsoft 365 Copilot – your copilot for work • https://blogs.microsoft.com/blog/2023/03/16/introducing-microsoft-365-copilot-your-copilot-for-work/ • Explaining the Microsoft 365 Copilot System • https://www.youtube.com/watch?v=E5g20qmeKpg • How to enable Microsoft Authenticator Lite for Outlook mobile (preview) • https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-authenticator-lite • New Microsoft Intune Devices experience • https://techcommunity.microsoft.com/t5/intune-customer-success/new-microsoft-intune-devices-experience/ba- p/3777342
  • 12. © Copyright Microsoft Corporation. All rights reserved. Introduction to information protection
  • 13. © Copyright Microsoft Corporation. All rights reserved. Protect your data Information protection is integrated into Microsoft 365 apps and services like:
  • 14. © Copyright Microsoft Corporation. All rights reserved. Introduction to Microsoft 365 encryption Data at rest • Files saved on computers and mobile devices • Documents and files saved in SharePoint Online and OneDrive • Mails saved in Mailboxes in Exchange Online Data in transit • Documents and files accessed in SharePoint Online and OneDrive • Mails transported between servers • Shared files and conversations in Teams meetings What is encryption in Microsoft 365? • Encoding plain text into cipher text. • Decryption requires encryption keys. • Control access to authorized users or machines only. • Differentiation between 'data at rest' and 'data in transit'
  • 15. © Copyright Microsoft Corporation. All rights reserved. Microsoft Purview compliance portal Microsoft Purview compliance portal • A view of how the organization is meeting its compliance requirements. • Solutions that can be used to help with compliance. • Information about active alerts. • And more… Navigation • Access to alerts, reports, policies, compliance solutions, and more. • Add or remove options for a customized navigation pane. • Customize navigation control.
  • 16. © Copyright Microsoft Corporation. All rights reserved. Compliance Manager Compliance Manager simplifies compliance and reduces risk by providing: • Prebuilt assessments based on common standards • Workflow capabilities to complete risk assessments • Step-by-step improvement actions • Compliance score, shows overall compliance posture Key elements of Compliance Manager • Controls • Assessments • Templates • Improvement actions
  • 17. © Copyright Microsoft Corporation. All rights reserved. Data classification capabilities of the compliance portal Sensitive information types. Trainable classifiers: Pre-trained classifiers and Custom trainable classifiers. Understand and explore the data. The content explorer: It enables administrators to gain visibility into the content that has been summarized in the overview pane. The activity explorer: It can monitor what's being done with labeled content across the organization.
  • 18. © Copyright Microsoft Corporation. All rights reserved. Classify data using sensitive information types Information protection and governance solutions and where in those solutions you can use sensitive information types: Information protection: Sensitivity label auto-labeling policies Data loss prevention (DLP): DLP policies Data Lifecycle Management: Retention policies and retention label auto-apply policies Records management: Retention label auto-apply policies
  • 19.
  • 20. © Copyright Microsoft Corporation. All rights reserved. Sensitivity labels and policies Sensitivity labels Labels are: • Customizable • Clear text • Persistent Usage: • Encrypt email and documents. • Mark the content. • Apply the label automatically. • Protect content in containers: sites and groups. • Extend sensitivity labels to third-party apps and services. • Classify content without using any protection settings. Label policies Policies enable admins to: • Choose the users and groups that can see labels. • Apply a default label to all new emails and documents. • Require justifications for label changes. • Require users to apply a label (mandatory labeling). • Link users to custom help pages. Once a sensitivity label is applied to an email or document, any configured protection settings for that label are enforced on the content.
  • 21. © Copyright Microsoft Corporation. All rights reserved. Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites • Labels may be published for use in Microsoft 365 Groups, Microsoft Teams, Yammer communities and SharePoint sites. • You must activate labels in the tenant level via the Azure AD PowerShell module before they can be used. • Sensitivity labels can be manually assigned to SharePoint Sites and Teams sites through the creation settings. • Labels can be changed through the properties of existing SharePoint sites or Microsoft Teams. • A sensitivity label is applied to a Group in the Azure portal through Azure services > Groups > properties.
  • 22. © Copyright Microsoft Corporation. All rights reserved. Retention labels and policies Retention settings work with SharePoint, OneDrive, Teams, Yammer and Exchange and help organizations manage and govern information by ensuring content is kept only for a required time, and then permanently deleted. Retention labels: • Are applied at an item level. • Emails and documents can have only a single retention label assigned to it at a time. • Retention settings from retention labels travel with the content in your Microsoft 365 tenant. • Can be applied manually or automatically. • Retention labels support disposition review of the content before it's permanently deleted. Retention policies: • Are applied at site or mailbox level. • Can be applied to multiple locations or specific locations or users. • Items inherit the retention settings from their container. • If an item is moved, the retention setting does not travel to the new location.
  • 23. © Copyright Microsoft Corporation. All rights reserved. Records management Records management helps an organization look after their legal obligations and helps to demonstrate compliance with regulations. • When content is labeled as a record, the following happens: - Restrictions are put in place to block certain activities. - Activities are logged. - Proof of disposition is kept at the end of the retention period. • To enable items to be marked as records, an administrator sets up retention labels.
  • 24. DEMO
  • 25. Windows Information Protection - Sunsetted https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-sunset-of-windows-information-protection- wip/ba-p/3579282
  • 26. © Copyright Microsoft Corporation. All rights reserved. Data loss prevention overview Each DLP policy contains: Where to protect the content Content is protected in locations like SharePoint Online, Exchange Online, OneDrive accounts, Microsoft Teams chat and channel messages, and Windows 10 or higher devices. When and how to protect the content When and how to protect the content is defined by enforcing rules. A policy contains one or more rules, and each rule consists of conditions and actions at a minimum.
  • 27. © Copyright Microsoft Corporation. All rights reserved. Identify content to protect Use the following to identify content: Content explorer Content explorer identifies the email and documents in your organization that contain sensitive information. Activity explorer Activity explorer includes information on activity related to content that contains sensitive information, which can also inform what should be protected by DLP policies.
  • 28. © Copyright Microsoft Corporation. All rights reserved. Define policy settings for your DLP policy To create a DLP policy go to the Microsoft Purview Portal
  • 29. © Copyright Microsoft Corporation. All rights reserved. Choose the information to protect DLP policy templates consist of one or more sensitive info types grouped into categories: • Enhanced • Financial • Medical and health • Privacy • Custom
  • 30. © Copyright Microsoft Corporation. All rights reserved. Choose locations to apply the policy Locations are places or service the DLP policy will apply to: • Exchange Online email • SharePoint Online sites • OneDrive accounts • Microsoft Teams chat and channel messages • Devices • Microsoft Defender for Cloud Apps • On-premises repositories • Power BI (preview)
  • 31. © Copyright Microsoft Corporation. All rights reserved. Define policy settings DLP policy rules include: Conditions Determine what types of information you are looking for, and when to take an action. Exceptions Prevents the application of a rule for content matching the exceptions. Actions When content matches a condition in a rule, you can apply actions to automatically protect the content. User notifications Use notifications to educate your users about DLP policies and help them remain compliant without blocking their work. User overrides Allows the user to override the policy and share the content. Incident reports With a matched rule, you can send an incident report to your compliance officer with details of the event.
  • 32. © Copyright Microsoft Corporation. All rights reserved. Test or turn on your DLP policy • Use test mode to gauge impact before policy activation. • Policy matches will be reported to you in emails or through DLP reports. • Test mode allows you to activate policy tips without enforcing protective actions. • Policy tips allow users to flag false positives. • Configure exceptions to the policy to reduce false positives.
  • 33. © Copyright Microsoft Corporation. All rights reserved. Prepare for Endpoint DLP • Endpoint DLP extends the activity monitoring and protection capabilities of DLP to sensitive items on Windows 10, Windows 11, and macOS • File type limitations exists • Unsupported file types can create opportunities for data loss • Management of Endpoint DLP policies can be completed by a Compliance Admin • Devices are monitored by Microsoft Defender for Endpoint • Devices onboarded for Defender are automatically also onboarded for Endpoint DLP
  • 34. © Copyright Microsoft Corporation. All rights reserved. Prepare for Endpoint DLP (continued) Endpoint DLP only protects data: • All Endpoint DLP policies end at the border of the device Policies allow you to audit or restrict: • Uploading to restricted cloud service domains • Access by unallowed browsers • Copying to the clipboard from protected items • Copying protected items to USB removable media • Copying to network shares • Printing protected items • Access by unallowed (bluetooth) apps • Copy or move using RDP
  • 35. © Copyright Microsoft Corporation. All rights reserved. Configure global Endpoint DLP settings Endpoint DLP settings create a framework in which Endpoint DLP policies work File path exclusions: • Are applied to all Endpoint DLP policies • Allow you to limit where your policies are in effect Restricted apps: • Are applied when a policy blocks unallowed apps • Allow you to limit where you can work with protected files Browser and domain restrictions: • Are applied when a policy blocks unallowed browsers • Allow you to limit where you can share protected files Advanced classification scanning and protection: • Can use EDM and named entities in your DLP policies Business justification in policy tips: • Show default options and custom text box • Only show default options and/or custom text box
  • 36. © Copyright Microsoft Corporation. All rights reserved. Manage DLP policy alerts DLP Reports Provides an overview of DLP violations Contains DLP policy matches, DLP incidents, and DLP false positives and user overrides reports Used to fine tune your policies and identify problematic configurations or business processes Can take up to 24h to update DLP Alerts Dashboard Provides a deeper insight into DLP violations Displays individual alerts Can aggregate alerts to spot patterns more easily Defender for Cloud Apps Dashboard Displays alerts of Defender for Cloud Apps file policies Shows alerts of all your Defender for Cloud Apps DLP policies Drill down to specific policies and review only a single policy’s matches Provides a match history and quarantine views
  • 37. © Copyright Microsoft Corporation. All rights reserved. Data Lifecycle Management overview
  • 38. © Copyright Microsoft Corporation. All rights reserved. Explain Retention Tools in Microsoft 365 Different tools to retain data: • Retention Labels • Label Policies / Retention Label Policies • Auto-apply Retention labels • Retention Polices • Record Management • Retention Tags and Retention Policies • In-place eDiscovery & hold • eDiscovery To understand the right tools, know: • Where is the data stored today and in the future? • Which tools are used in the Microsoft 365 environment? • Which Retention requirements exist? • Which requirements does the Adoption Team have? • Are there other Systems like a DSM on SharePoint to retain and fulfill all requirements? • Which requirements do you want to fulfill in Microsoft 365
  • 39. © Copyright Microsoft Corporation. All rights reserved. Configure retention policies Differences between retention policies and retention labels • Retention Policies are focused on service locations. • Retention Labels are focused on individual items. • Retention labels are created for certain kinds of business data. • Label policies are used to publish retention labels. Type Based on Travel with the document Data lifecycle examples Retention Policy Location, product no yes Teams Chat, Junk Folder, SharePoint Site Retention Label Single file or email, library, or list yes yes, better Email, document in a library
  • 40. © Copyright Microsoft Corporation. All rights reserved. Manage and remediate Data Lifecycle Management Data Lifecycle Management cards on the Data classification page: • Top sensitive info types • Top retention labels applied to content • Locations where retention labels are applied
  • 41. © Copyright Microsoft Corporation. All rights reserved. Explain retention in Exchange Online
  • 42. © Copyright Microsoft Corporation. All rights reserved. Explain retention in SharePoint Online and OneDrive
  • 43. © Copyright Microsoft Corporation. All rights reserved. Records management overview A record is a document or other electronic or physical entity in an organization that serves as evidence of an activity or transaction performed by the organization and requires retention for some time period. • Different actions that possibly needs to be prevented: • change the assigned Retention Label of an item • change of the content of an item or it’s metadata • deletion of a file or remove a retention label from a file • moving a file between containers (SharePoint libraries for example) • Four steps to plan and decide: • Decide to add a Record to a label or not • Decide to add a Record or a Regulatory Record to a label • Configure the Record to a label • Decide to have an auto labeling functionality and configure it
  • 44. © Copyright Microsoft Corporation. All rights reserved. Configure file policies in Microsoft Defender for Cloud Apps File policies can use the Defender for Cloud Apps DLP engine or the same Data Classification Services as DLP policies You can configure real-time alerts or review alerts via reports File policies are configured in the Microsoft Defender for Cloud Apps portal There is no test mode for file policies, actions will be applied as soon as the policy exists Use the preview functions to see the files your policy would match if you saved it
  • 45.
  • 46. © Copyright Microsoft Corporation. All rights reserved. Manage DLP violations in Microsoft Defender for Cloud Apps • Violations of file policies only show up in the Defender for Cloud Apps dashboard and the individual policy matches overview • Use the policy overview to review matches of the policy and fine tune your filters • Get a history of past matches to see where your policy had an effect • Use the quarantine view to see files that have been quarantined because of governance actions • Modify file policy filters and review the effects your policy changes have on your environment before commiting to them by using the preview function
  • 47. © Copyright Microsoft Corporation. All rights reserved. eDiscovery in Microsoft Purview • Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. • eDiscovery tools: Content search, eDiscovery (Standard), eDiscovery (Premium)
  • 48. © Copyright Microsoft Corporation. All rights reserved. Auditing in Microsoft Purview • Microsoft Purview auditing solutions help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. • Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
  • 49. DEMO
  • 50. © Copyright Microsoft Corporation. All rights reserved. Configure DLP for policy precedence Policies and rules are processed in priority order Only the highest priority rule of the highest priority policy is applied More restrictive rules/policies should be prioritized above less restrictive rules/policies All processed matches are logged, even if the rule/policy is not applied
  • 51. © Copyright Microsoft Corporation. All rights reserved. Manage and respond to DLP policy violations • DLP policies do not make decisions about the validity of a policy violation  Compliance officers have the task of monitoring reports and need to decide if violations require technical or organizational actions.  Compliance admins should be aware of escalation processes and contacts in other departments to coordinate a unified response to violations • Use Exclusions in your DLP rules to limit the amount of false positives you get • Allow users to override the protective actions of specific DLP policies if you identified legitimate use cases in past responses to policy violations
  • 52.
  • 53. CIAOPS Resources • Blog – http://blog.ciaops.com • Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops • Free documents, presentations, eBooks – http://slideshare.net/directorcia • Office 365, Azure, Cloud podcast – http://ciaops.podbean.com • Office 365, Azure online training courses – http://www.ciaopsacademy.com • Office 365 and Azure community – http://www.ciaopspatron.com • CIAOPS Github – https://github.com/directorcia Twitter @directorcia Facebook https://www.facebook.com/ciaops Email director@ciaops.com Skype for Business admin@ciaops365.com
  • 54. Get access to the latest information by becoming a Patron http://www.ciaopspatron.com
  • 55.
  • 56. That’s all folks! Thanks for attending