SlideShare ist ein Scribd-Unternehmen logo
1 von 62
MICROSOFT 365
Virtual MARATHON
May 27 & 28, 2020
36 hours / 2 days
MICROSOFT 365 VIRTUAL MARATHON
Protecting your Teamwork across Microsoft 365
JOANNE KLEIN
Sponsored by
MICROSOFT 365
Virtual MARATHON
May 27 & 28, 2020
36 hours / 2 days
Mark Your Calendars:
March 23-25, 2021, MGM Grand Resort
Las Vegas, Nevada, USA
M365Conf.com
#M365CONF
TheSharePoint Conferenceis nowTheMicrosoft 365 CollaborationConference
#M365VM
M365VirtualMarathon.com
Broughtto youby:
TheGlobalMicrosoft Community&
M365Conf.com | #M365CONF
THANK YOU TO ALL OUR GENEROUS SPONSORS
 Joanne Klein, Canada
 Independent Microsoft 365 Consultant
 Microsoft MVP, Office Apps & Services
 Data Protection, Data Retention, Data Governance, eDiscovery
LET ME INTRODUCE MYSELF…
Broughtto youby
M365Conf.com| #M365CONF
AGENDA
THE ROOT CONCERN THE SHARED
RESPONSIBILITY
MODEL
PROTECTING YOUR
SENSITIVE
INFORMATION
RETAINING YOUR
TEAMWORK
COLLABORATING
WITH EXTERNAL
PARTIES SECURELY
TAKEAWAYS
DISCOVERING AND MANAGING DATA IS CHALLENGING
of corporate data is “dark” –
it’s not classified, protected
nor governed2
>80%
Protecting and governing
sensitive data is the biggest
concern in complying with
regulations3
#1
of organizations no longer
have confidence to detect
and prevent loss of
sensitive data1
88%
1. Forrester. Security Concerns, Approaches and Technology Adoption, December
2018
2. IBM. Future of Cognitive Computing, November 2015
3. Microsoft GDPR research, 2017
THE IMPACT OF COVID-19
CXOs indicate that
Information Security is a
primary risk from COVID-
192
40%
CXOs indicate that employee
health and safety is a key
consideration2
69%
Global office workers are
expected to be working
from home1
300M
1.BCG remote work study
2.Gartner CXO survey
NOT ALL TEAMS ARE CREATED EQUAL
Company
Department/Division
Workgroups
Authoritative curated content
1:many broad conversations
Functional units
Few:many specific conversations
Transient groups
Microsoft Teams, Yammer,
SharePoint
Cross-collaboration
A Shared
Responsibility
Model
200+ updates per day from 750 regulatory bodies¹
Get your digital house in order!
¹ Thomson Reuters, "Cost of Compliance 2018 Report: Your biggest challenges revealed," 2018
• Leverage the shared responsibility model
• Coordinated effort of 3 groups
INFORMATION GOVERNANCE HAS 3 STAKEHOLDER GROUPS!
Business information
workers
BE “CYBER-SECURITY” AWARE
SHIFT FROM AN “IN-PERSON”
TO AN “ONLINE” MINDSET
EFFECTIVELY USE MODERN
COLLABORATION TOOLS
COLLABORATE SECURELY
ACROSS ALL NETWORKS
BUSINESS INFORMATION WORKERS
A DIGITAL MIND-SHIFT IS REQUIRED
#WFH
COVID-19 TRAINING KIT (FREE)
• 3 end user phish and privacy education courses
• 2 videos about how attackers using pandemic to target victims
• Blog posts, posters, newsletters, infographics
• Download here:
https://security.microsoft.com/attackSimulatorTrainings
INFORMATION GOVERNANCE HAS 3 STAKEHOLDER GROUPS!
Business information
workers
IT Teams Legal, Risk, Compliance
Teams
LEGAL, RISK, COMPLIANCE TEAMS…
Legal constraints and obligations (eDiscovery)
Regulatory obligations (Government/Industry regulation)
Contractual obligations (Payment card industry requirements)
TYPES OF GOVERNANCE
SCENARIO-BASED GOVERNANCE AND CONTROLS
John works in the IT
department of
Woodgrove bank.
They usually use
restrictive settings.
Kate works in the IT
department of Contoso.
They always try to find
the best balance
between user freedom
and IT control.
Chad works in the IT
department of Tailspin Toys.
They want to drive
productivity by removing
as many barriers as possible.
John Kate Chad
We control site provisioning with a strict approval
process and automation to control external
access, naming conventions, and protection.
EXAMPLE SCENARIO: SELF-SERVE SITE CREATION
We leverage consistent site designs for our users
and allow them to provision sites without
approval. We follow-up after-the-fact for
additional guidance and controls.
We use out-of-the-box provisioning features in
our tenant. End-users know what they want, and
we don’t want to get in their way.
John
Kate
Cha
d
 Protecting your (sensitive) teamwork
 Retaining your teamwork
CONTAINER AND CONTENT GOVERNANCE
Broughtto youby
M365Conf.com| #M365CONF
CONTAINER AND CONTENT GOVERNANCE
IDENTIFY
VALUABLE
CONTENT
Require classification for
containers
Scan w/Data Loss Prevention
(DLP)
Sensitivity auto-labeling
PROTECT
ASSETS
Retention/Deletion
Use Conditional Access
Use Rights Management
ENSURE
ACCOUNTABILITY
Manage group/site ownership
Review external membership
EMPOWER
EMPLOYEES
Self-service site creation
Life-cycle management
Understand Sharing settings
DATA LOSS PREVENTION (DLP)
Use DLP to govern your sensitive data (team work)
SENSITIVITY LABELS
Use sensitivity labels to identify and protect your data (team
work)
KNOW YOUR DATA
Understand where your sensitive data lives, what
users are doing with it and why it may be at risk
GET READY
Define your classification scheme
WHEREVER IT LIVES!PROTECT YOUR SENSITIVE TEAMWORK
DEFINE YOUR OWN CLASSIFICATION SCHEME
Highly confidential
This is the most critical data for Microsoft. Share it only with named
recipients.
Confidential
This content is key to achieving our goals. Limited distribution – on
a need-to-know basis.
General
Product used and shared throughout Microsoft, like personal
settings and zip codes. Share it throughout Microsoft internally.
Public
Non-restricted data meant for public consumption like publicly
released source code and announced financials. Share it freely.
DO YOU KNOW WHERE YOUR
(SENSITIVE) DATA IS AND IF ITS
BEING PROTECTED AND
RETAINED?
KNOW YOUR DATA
Link: aka.ms/MIPDataClassification
SENSITIVITY LABELS
• Content markings
• Protection (encryption)
• Rights management
• Auto-apply/Recommend based on
sensitive information type (and
Trainable Classifiers*) on the Client
• On the Service side, auto-apply
SP/OD content at rest, EXO emails
in-transit*
Office apps:
Outlook on the web:
iOS Outlook app:
Office for the web:
END-USER EXPERIENCE WITH SENSITIVITY LABELS
BASED ON SENSITIVE
INFORMATION TYPES
HELPS IF USER FORGETS TO
SET A LABEL
WILL SEE IN SENSITIVITY
COLUMN IN SHAREPOINT LISTS
AND LIBRARIES
ENCRYPTED (PROTECTED) FILES
OPEN AND EDIT IN OFFICE ONLINE
CO-AUTHORING ALLOWED
SEARCHABLE
Allows for DLP and eDiscovery
2 NEW SENSITIVITY LABEL FEATURES
AUTO-LABELING FILES AT RES
IN SHAREPOINT/ODFB
Now GA! Public Preview
SHAREPOINT LIBRARY SENSITIVITY COLUMN
Public
Preview
now
END-USEREXPERIENCE
INCOMPATIBLE SENSITIVITY
LABEL
• Upload is not prevented
• Sensitivity label events are
audited, and notifications
sent
MOVING FROM AIP TO UNIFIED SENSITIVITY LABELS
• AIP Classic client and Label Management in the Azure Portal will be
deprecated on March 31, 2021
• Steps for migrating:
 https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-migrate-labels
• Compare the labeling clients:
 AIP Classic client VERSUS Unified Labeling client VERSUS Office built-in labeling client
 https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client#compare-the-
labeling-clients-for-windows-computers
DATA LOSS PREVENTION (DLP) TO GOVERN TEAMWORK
• Detects when a user action conflicts with a DLP
policy
• They can:
 Prevent sensitive content from being shared
 Allow end-user to override
 Use sensitive information types and retention labels as conditions
 Soon…use a sensitivity label as a condition
• DLP for Microsoft Teams blocks sensitive content
when shared with Microsoft Teams users who
have:
 guest access in teams and channels; or
 external access in meetings and chat sessions
DLP ACROSS YOUR TEAMWORK
Outlook client: Sharing from SP/ODFB:
DLP
AND MICROSOFT
TEAMS
“Communications
DLP”
External user sees this…
Set-SPOTenant-MarkNewFilesSensitiveByDefault BlockExternalSharing
SECURE & PROTECT DATA ENABLE PRODUCTIVITY
Manually apply sensitivity label consistently across
apps, applications, and endpoints
Show recommendations and tooltips for sensitivity
labels with auto-labeling and DLP
Visual markings to indicate sensitive documents
across apps/services: watermark, lock icon,
sensitivity column
Co-author and collaborate with sensitive
documents
Enable searching and eDiscovery of encrypted
files in SharePoint
Enforce conditional access to sensitive data
DLP actions to block sharing
Encrypt files and emails based on sensitivity label
Prevent data leakage through DLP policies based
on sensitivity label
Business data separation from personal data on
devices
STRIKING A PERFECT BALANCE
We auto-classify sensitivity labels to our content at rest, in
Office apps and require users to provide a reason for override
if necessary. We use DLP across all locations and block access
to SharePoint sites from all unmanaged devices.
SCENARIO: PROTECTING YOUR SENSITIVE CONTENT
We allow our users to collaborate freely with external users,
however, we are currently monitoring when sensitive
information is being shared before turning on our DLP policies
and auto-labeling policies. We allow web-only access to
confidential SharePoint sites.
We apply a default sensitivity label to all content and rely on
our users to adjust it as necessary. We allow external sharing
on all sites by default. We allow full access to SharePoint sites
even from unmanaged devices.
John
Kate
Cha
d
DELETE ONLY
“Delete all team
collaboration content 8
years after its last modified
date”
RETAIN ONLY
“Retain all Access Request
forms for 5 year”
RETAIN and DELETE
“Retain all customer
information for 10 years and
then delete it after review”
APPLYING RETENTION ACROSS YOUR TEAMWORK
Retaining content where you
work (“Built-in” compliance)
Collaboration
Workspace
Retention Policy Retention Label (Label
Policy)
Exchange mailbox Yes Yes
OneDrive for Business site Yes Yes
SharePoint site Yes Yes
Office 365 Group
Yes Yes
Chat and channel
messages
(1-day retention allowed)
Yes No
Meeting recordings No No
APPLYING RETENTION ACROSS YOUR TEAMWORK
End-user applies a retention label on a
specific document or email.
MANUALLY APPLIED
Automatically apply retention based on
condition(s).
AUTOMATICALLY APPLIED
Using machine learning to apply a retention
label based on a trainable classifier.
MACHINE-LEARNING APPLIED **
MANUAL
AUTOMATIC
MACHINE
LEARNING
APPLYING RETENTION ACROSS YOUR TEAMWORK
Applying retention
across your teamwork
… at scaleAUTOMATIC
MANUAL
MACHINE
LEARNING
WAYS TO AUTO-APPLY A RETENTION LABEL
#1 – Automatically apply at a document library level
#2 – Automatically apply at a folder or document set level
#3 – Auto-apply based on a sensitive information type
#4 – Auto-apply based on a keyword query
#5 – Auto-apply based on a content type
#6 – Auto-apply based on a metadata value
#7 – Automatically set using Microsoft Flow
#8 – Automatically set using custom code/PowerShell
#9 – Auto-apply based on a Trainable Classifier (Preview now)
SOURCE CODE
RESUMESPROFANITY
THREAT
TARGETED
HARASSMENT
TRAINABLE CLASSIFIERS (PUBLIC PREVIEW)
Powered by Machine Learning
5 built-in
classifiers
Build your own
custom Classifiers!
Contracts
Financial Agreements
Employee Forms
USE WHEN PUBLISHING A RETENTION LABEL…
TRAINABLE CLASSIFIERS WITH SENSITIVITY LABELS…
In Public Preview mode now
We have retention labels published aligning to our File
Plan to retain regulated content with disposition review.
We have retention policies on Teams chat to delete them
after 5 days.
SCENARIO: RETAINING YOUR TEAMWORK
We have retention policies published across
collaboration locations including Microsoft Teams. This is
transparent to our end-users but still allows it to be
discoverable. We delete Teams chats after 1 month.
We have a few retention labels defined for only our most
valuable content. We use auto-apply capabilities so end-
users don’t have to remember to do it. We don’t delete
Teams chats.
John
Kate
Cha
d
SECURITY GOVERNANCE
 Collaborating with external users securely
Broughtto youby
M365Conf.com| #M365CONF
Configured in the Teams admin center for org
External access users have no access to specific
Teams or Teams resources
Allows external users in other domains to find,
call, chat, and set up meetings with you
Default: allow all external domains, can add
allowed domains or blocked domains
Gives access permission to an entire domain
Enabled in the Teams admin center for org
Grant external user access to existing Teams and
Channels in Microsoft Teams
Teams administrator can control which features
guests can and can’t use in Microsoft Teams
Anyone not part of your organization can be
added as a guest in Teams
Gives access permission to an individual user
EXTERNAL ACCESS GUEST ACCESS
COLLABORATING WITH “EXTERNALS”
ALLOWING IT
Can be set at a Teams org-
wide level or a Teams/Group
level.
Can control who can allow
guests to be added (guest
inviter role).
RECOMMENDATIONS
Leverage the “Guest Inviter” role.
Audit what Guest users are doing
via Audit logs.
GUEST ACCESS
AVAILABLE NOW
Disable guest access at a
Teams/Site level based on
sensitivity of Team/Site.
ALLOWING IT
Allow all domains (default),
some domains, or block
some domains.
RECOMMENDATIONS
Use allow/deny lists for
your external partner
domains.
EXTERNAL ACCESS
AVAILABLE SOON
Automatic expiration of
external user access
COLLABORATING WITH EXTERNAL USERS SECURELY
COLLABORATION
Enable external
sharing by default.
Disable based on
classification.
DOMAINS
Limit domains as
required.
EDUCATE
Educate your users
on sharing.
SENSITIVITY
Use ‘Sensitive by
default’ DLP setting
for SharePoint/ODFB
documents.
AUDIT
Make security
audits part of your
governance
process.
01 02 03 04 05
EXTERNAL SHARING RECOMMENDATIONS
We need to be very selective on who we collaborate
with. We use “allow lists” for external access to limit
collaboration to specific domains.
SCENARIO: GUEST ACCESS AND EXTERNAL ACCESS
We allow our users to collaborate with external users,
however, we currently prevent guest users while we
establish our organizational collaboration culture in
Teams and define our classification scheme.
We allow communication with any external parties. We
do no want to impede our users’ ability to do more.
John
Kate
Cha
d
SUMMARY
Broughtto youby
M365Conf.com| #M365CONF
CLASSIFICATIONS 01
Document your organization’s data
classifications (keep it meaningful)
ENFORCEPOLICIES 03
Determine policies to enforce based on classification:
sensitivity/retention/privacy/guest access/conditional access
EXTERNALUSERSTRATEGY 02
Establish your external user strategy for collaboration
including guest access, external access and external sharing
EDUCATEUSERS 04
Educate/train information workers across your
organization on how to work securely with content
TAKEAWAYS FROM TODAY
Broughtto youby
M365Conf.com| #M365CONF
LICENSING
Feature discussed today Office 365 E3
Microsoft 365
E3
Office 365 E5
Microsoft 365
E5 Compliance
Office 365
Advanced
Compliance
AIP
Premium
P1
AIP
Premium
P2
Sensitivity labels Yes Yes Yes Yes Yes
Sensitivity label auto-apply (automatic or
recommended)
No Yes Yes No Yes
DLP protection for SPO, EXO, OneDrive
(incl. Microsoft Teams files)
Yes Yes Yes N/A N/A
DLP for Microsoft Teams chat/channel
messages
No Yes Yes N/A N/A
Retention Policies Yes Yes Yes N/A N/A
Retention Labels (Manual) Yes Yes Yes N/A N/A
Retention Labels auto-apply No Yes Yes N/A N/A
Trainable Classifiers TBD TBD TBD N/A N/A
https://joannecklein.com/M365ComplianceLicensing
CAPABILITIES MENTIONED TODAY
Coming soon or here…
 Sensitivity labels for Office Apps: GA
 Sensitivity labels for Teams/Site/Groups: GA in
June
 Auto-classification with Sensitivity labels in
M365: Public Preview
 Trainable Classifiers: Public Preview
 Data Classification: GA
Top of mind for rest of year…
 External sharing based on Sensitivity
 Separation of Sensitivity labels (Doc/Emails vs
Sites/Teams/Groups
 Inherit the label (w/encryption) on the site to
documents in that site
 Survey for your feedback
 Visit the Vendors Booth, Sessions and Watch the Videos
 Submit Your Answers to Enter the Raffle
 You need at least 5 correct answers then submit for a chance to win one of 3
(One in each Americas, APAC, EMEA)
ARE YOU READY FOR A RAFFLE?
WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE!
https://bit.ly/m365raffle
CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS:
UNITED WAY: HTTPS://GIVE.UWKC.ORG/M365VM
INTERNATIONAL MEDICAL CORPS: HTTPS://BIT.LY/MEDICALCORPSFUND
10% OF FUNDS FROM SPONSORS GO TO SUPPORT COMMUNITY RELIEF.
FOR MORE INFORMATION WRITE TO INFO@M365VIRTUALMARATHON.COM
MICROSOFT 365
Virtual MARATHON
May 27 & 28, 2020
36 hours / 2 days
THANK YOU FOR JOINING US!
DO YOU HAVE ANY QUESTIONS?
Speaker feedback
https://bit.ly/M365VMSpeakerFeedback
Event feedback
https://bit.ly/M365VMFeedback

Weitere ähnliche Inhalte

Was ist angesagt?

Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachJoanne Klein
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
 
Information management and data governance in Office 365
Information management and data governance in Office 365Information management and data governance in Office 365
Information management and data governance in Office 365Joanne Klein
 
Navigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointNavigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointJoanne Klein
 
Office 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information ProtectionOffice 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information ProtectionJoanne Klein
 
Information management in an Office 365 Collaboration World - SPS Toronto 2017
Information management in an Office 365 Collaboration World  - SPS Toronto 2017Information management in an Office 365 Collaboration World  - SPS Toronto 2017
Information management in an Office 365 Collaboration World - SPS Toronto 2017Joanne Klein
 
Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Joanne Klein
 
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...Vignesh Ganesan I Microsoft MVP
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Information Barriers in MS Teams
Information Barriers in MS TeamsInformation Barriers in MS Teams
Information Barriers in MS TeamsNanddeep Nachan
 
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance Albert Hoitingh
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newAlbert Hoitingh
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Office 365 - Practical Adoption Strategies - SP Unite @ Haarlem
Office 365 - Practical Adoption Strategies - SP Unite @ HaarlemOffice 365 - Practical Adoption Strategies - SP Unite @ Haarlem
Office 365 - Practical Adoption Strategies - SP Unite @ HaarlemJoanne Klein
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protectionAlbert Hoitingh
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionAlbert Hoitingh
 

Was ist angesagt? (20)

Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel Oleson
 
Information management and data governance in Office 365
Information management and data governance in Office 365Information management and data governance in Office 365
Information management and data governance in Office 365
 
Navigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointNavigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePoint
 
Office 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information ProtectionOffice 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information Protection
 
Information management in an Office 365 Collaboration World - SPS Toronto 2017
Information management in an Office 365 Collaboration World  - SPS Toronto 2017Information management in an Office 365 Collaboration World  - SPS Toronto 2017
Information management in an Office 365 Collaboration World - SPS Toronto 2017
 
Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112
 
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Information Barriers in MS Teams
Information Barriers in MS TeamsInformation Barriers in MS Teams
Information Barriers in MS Teams
 
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's new
 
Data governance in Office 365
Data governance in Office 365Data governance in Office 365
Data governance in Office 365
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Office 365 - Practical Adoption Strategies - SP Unite @ Haarlem
Office 365 - Practical Adoption Strategies - SP Unite @ HaarlemOffice 365 - Practical Adoption Strategies - SP Unite @ Haarlem
Office 365 - Practical Adoption Strategies - SP Unite @ Haarlem
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protection
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 

Ähnlich wie M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365

One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Webinar: Protect your teams work across office 365
Webinar: Protect your teams work across office 365Webinar: Protect your teams work across office 365
Webinar: Protect your teams work across office 365ShareGate
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdftest888649
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdftest888649
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfErikHof4
 
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewMicrosoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewDrew Madelung
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365NCCOMMS
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...Jasper Oosterveld
 
Administering power platform deployment planning
Administering power platform deployment planningAdministering power platform deployment planning
Administering power platform deployment planningDipti Chhatrapati
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 

Ähnlich wie M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365 (20)

One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Webinar: Protect your teams work across office 365
Webinar: Protect your teams work across office 365Webinar: Protect your teams work across office 365
Webinar: Protect your teams work across office 365
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewMicrosoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...Ensure your compliance in Microsoft Teams with Information Protection and Gov...
Ensure your compliance in Microsoft Teams with Information Protection and Gov...
 
Administering power platform deployment planning
Administering power platform deployment planningAdministering power platform deployment planning
Administering power platform deployment planning
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 

Mehr von Joanne Klein

Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Joanne Klein
 
Build a modern Office 365 Adoption Center with no code
Build a modern Office 365 Adoption Center with no codeBuild a modern Office 365 Adoption Center with no code
Build a modern Office 365 Adoption Center with no codeJoanne Klein
 
Let's build an adoption centre in office 365
Let's build an adoption centre in office 365Let's build an adoption centre in office 365
Let's build an adoption centre in office 365Joanne Klein
 
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?Joanne Klein
 
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...Joanne Klein
 
Office 365 Practical Adoption Strategies - SPSBelgium
Office 365 Practical Adoption Strategies - SPSBelgiumOffice 365 Practical Adoption Strategies - SPSBelgium
Office 365 Practical Adoption Strategies - SPSBelgiumJoanne Klein
 
O365 Practical Adoption Strategies - SPS Toronto 2017
O365 Practical Adoption Strategies - SPS Toronto 2017O365 Practical Adoption Strategies - SPS Toronto 2017
O365 Practical Adoption Strategies - SPS Toronto 2017Joanne Klein
 
If SharePoint had Warning Labels
If SharePoint had Warning LabelsIf SharePoint had Warning Labels
If SharePoint had Warning LabelsJoanne Klein
 
From 0 to 100 with Content types
From 0 to 100 with Content typesFrom 0 to 100 with Content types
From 0 to 100 with Content typesJoanne Klein
 

Mehr von Joanne Klein (9)

Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
 
Build a modern Office 365 Adoption Center with no code
Build a modern Office 365 Adoption Center with no codeBuild a modern Office 365 Adoption Center with no code
Build a modern Office 365 Adoption Center with no code
 
Let's build an adoption centre in office 365
Let's build an adoption centre in office 365Let's build an adoption centre in office 365
Let's build an adoption centre in office 365
 
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
 
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...
Navigating the mess of a Shared Network Drive Migration to SharePoint - SPS B...
 
Office 365 Practical Adoption Strategies - SPSBelgium
Office 365 Practical Adoption Strategies - SPSBelgiumOffice 365 Practical Adoption Strategies - SPSBelgium
Office 365 Practical Adoption Strategies - SPSBelgium
 
O365 Practical Adoption Strategies - SPS Toronto 2017
O365 Practical Adoption Strategies - SPS Toronto 2017O365 Practical Adoption Strategies - SPS Toronto 2017
O365 Practical Adoption Strategies - SPS Toronto 2017
 
If SharePoint had Warning Labels
If SharePoint had Warning LabelsIf SharePoint had Warning Labels
If SharePoint had Warning Labels
 
From 0 to 100 with Content types
From 0 to 100 with Content typesFrom 0 to 100 with Content types
From 0 to 100 with Content types
 

Kürzlich hochgeladen

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Kürzlich hochgeladen (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365

  • 1. MICROSOFT 365 Virtual MARATHON May 27 & 28, 2020 36 hours / 2 days MICROSOFT 365 VIRTUAL MARATHON Protecting your Teamwork across Microsoft 365 JOANNE KLEIN Sponsored by
  • 2. MICROSOFT 365 Virtual MARATHON May 27 & 28, 2020 36 hours / 2 days Mark Your Calendars: March 23-25, 2021, MGM Grand Resort Las Vegas, Nevada, USA M365Conf.com #M365CONF TheSharePoint Conferenceis nowTheMicrosoft 365 CollaborationConference #M365VM M365VirtualMarathon.com Broughtto youby: TheGlobalMicrosoft Community& M365Conf.com | #M365CONF
  • 3. THANK YOU TO ALL OUR GENEROUS SPONSORS
  • 4.  Joanne Klein, Canada  Independent Microsoft 365 Consultant  Microsoft MVP, Office Apps & Services  Data Protection, Data Retention, Data Governance, eDiscovery LET ME INTRODUCE MYSELF… Broughtto youby M365Conf.com| #M365CONF
  • 5. AGENDA THE ROOT CONCERN THE SHARED RESPONSIBILITY MODEL PROTECTING YOUR SENSITIVE INFORMATION RETAINING YOUR TEAMWORK COLLABORATING WITH EXTERNAL PARTIES SECURELY TAKEAWAYS
  • 6. DISCOVERING AND MANAGING DATA IS CHALLENGING of corporate data is “dark” – it’s not classified, protected nor governed2 >80% Protecting and governing sensitive data is the biggest concern in complying with regulations3 #1 of organizations no longer have confidence to detect and prevent loss of sensitive data1 88% 1. Forrester. Security Concerns, Approaches and Technology Adoption, December 2018 2. IBM. Future of Cognitive Computing, November 2015 3. Microsoft GDPR research, 2017
  • 7. THE IMPACT OF COVID-19 CXOs indicate that Information Security is a primary risk from COVID- 192 40% CXOs indicate that employee health and safety is a key consideration2 69% Global office workers are expected to be working from home1 300M 1.BCG remote work study 2.Gartner CXO survey
  • 8. NOT ALL TEAMS ARE CREATED EQUAL Company Department/Division Workgroups Authoritative curated content 1:many broad conversations Functional units Few:many specific conversations Transient groups Microsoft Teams, Yammer, SharePoint Cross-collaboration
  • 9. A Shared Responsibility Model 200+ updates per day from 750 regulatory bodies¹ Get your digital house in order! ¹ Thomson Reuters, "Cost of Compliance 2018 Report: Your biggest challenges revealed," 2018 • Leverage the shared responsibility model • Coordinated effort of 3 groups
  • 10. INFORMATION GOVERNANCE HAS 3 STAKEHOLDER GROUPS! Business information workers
  • 11. BE “CYBER-SECURITY” AWARE SHIFT FROM AN “IN-PERSON” TO AN “ONLINE” MINDSET EFFECTIVELY USE MODERN COLLABORATION TOOLS COLLABORATE SECURELY ACROSS ALL NETWORKS BUSINESS INFORMATION WORKERS A DIGITAL MIND-SHIFT IS REQUIRED #WFH
  • 12. COVID-19 TRAINING KIT (FREE) • 3 end user phish and privacy education courses • 2 videos about how attackers using pandemic to target victims • Blog posts, posters, newsletters, infographics • Download here: https://security.microsoft.com/attackSimulatorTrainings
  • 13. INFORMATION GOVERNANCE HAS 3 STAKEHOLDER GROUPS! Business information workers IT Teams Legal, Risk, Compliance Teams
  • 14. LEGAL, RISK, COMPLIANCE TEAMS… Legal constraints and obligations (eDiscovery) Regulatory obligations (Government/Industry regulation) Contractual obligations (Payment card industry requirements)
  • 16. SCENARIO-BASED GOVERNANCE AND CONTROLS John works in the IT department of Woodgrove bank. They usually use restrictive settings. Kate works in the IT department of Contoso. They always try to find the best balance between user freedom and IT control. Chad works in the IT department of Tailspin Toys. They want to drive productivity by removing as many barriers as possible. John Kate Chad
  • 17. We control site provisioning with a strict approval process and automation to control external access, naming conventions, and protection. EXAMPLE SCENARIO: SELF-SERVE SITE CREATION We leverage consistent site designs for our users and allow them to provision sites without approval. We follow-up after-the-fact for additional guidance and controls. We use out-of-the-box provisioning features in our tenant. End-users know what they want, and we don’t want to get in their way. John Kate Cha d
  • 18.  Protecting your (sensitive) teamwork  Retaining your teamwork CONTAINER AND CONTENT GOVERNANCE Broughtto youby M365Conf.com| #M365CONF
  • 19. CONTAINER AND CONTENT GOVERNANCE IDENTIFY VALUABLE CONTENT Require classification for containers Scan w/Data Loss Prevention (DLP) Sensitivity auto-labeling PROTECT ASSETS Retention/Deletion Use Conditional Access Use Rights Management ENSURE ACCOUNTABILITY Manage group/site ownership Review external membership EMPOWER EMPLOYEES Self-service site creation Life-cycle management Understand Sharing settings
  • 20. DATA LOSS PREVENTION (DLP) Use DLP to govern your sensitive data (team work) SENSITIVITY LABELS Use sensitivity labels to identify and protect your data (team work) KNOW YOUR DATA Understand where your sensitive data lives, what users are doing with it and why it may be at risk GET READY Define your classification scheme WHEREVER IT LIVES!PROTECT YOUR SENSITIVE TEAMWORK
  • 21. DEFINE YOUR OWN CLASSIFICATION SCHEME Highly confidential This is the most critical data for Microsoft. Share it only with named recipients. Confidential This content is key to achieving our goals. Limited distribution – on a need-to-know basis. General Product used and shared throughout Microsoft, like personal settings and zip codes. Share it throughout Microsoft internally. Public Non-restricted data meant for public consumption like publicly released source code and announced financials. Share it freely.
  • 22. DO YOU KNOW WHERE YOUR (SENSITIVE) DATA IS AND IF ITS BEING PROTECTED AND RETAINED? KNOW YOUR DATA
  • 24.
  • 25.
  • 26.
  • 27. SENSITIVITY LABELS • Content markings • Protection (encryption) • Rights management • Auto-apply/Recommend based on sensitive information type (and Trainable Classifiers*) on the Client • On the Service side, auto-apply SP/OD content at rest, EXO emails in-transit*
  • 28. Office apps: Outlook on the web: iOS Outlook app: Office for the web: END-USER EXPERIENCE WITH SENSITIVITY LABELS
  • 29. BASED ON SENSITIVE INFORMATION TYPES HELPS IF USER FORGETS TO SET A LABEL WILL SEE IN SENSITIVITY COLUMN IN SHAREPOINT LISTS AND LIBRARIES ENCRYPTED (PROTECTED) FILES OPEN AND EDIT IN OFFICE ONLINE CO-AUTHORING ALLOWED SEARCHABLE Allows for DLP and eDiscovery 2 NEW SENSITIVITY LABEL FEATURES AUTO-LABELING FILES AT RES IN SHAREPOINT/ODFB Now GA! Public Preview
  • 32.
  • 34. INCOMPATIBLE SENSITIVITY LABEL • Upload is not prevented • Sensitivity label events are audited, and notifications sent
  • 35. MOVING FROM AIP TO UNIFIED SENSITIVITY LABELS • AIP Classic client and Label Management in the Azure Portal will be deprecated on March 31, 2021 • Steps for migrating:  https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-migrate-labels • Compare the labeling clients:  AIP Classic client VERSUS Unified Labeling client VERSUS Office built-in labeling client  https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client#compare-the- labeling-clients-for-windows-computers
  • 36. DATA LOSS PREVENTION (DLP) TO GOVERN TEAMWORK • Detects when a user action conflicts with a DLP policy • They can:  Prevent sensitive content from being shared  Allow end-user to override  Use sensitive information types and retention labels as conditions  Soon…use a sensitivity label as a condition • DLP for Microsoft Teams blocks sensitive content when shared with Microsoft Teams users who have:  guest access in teams and channels; or  external access in meetings and chat sessions
  • 37. DLP ACROSS YOUR TEAMWORK Outlook client: Sharing from SP/ODFB:
  • 40. SECURE & PROTECT DATA ENABLE PRODUCTIVITY Manually apply sensitivity label consistently across apps, applications, and endpoints Show recommendations and tooltips for sensitivity labels with auto-labeling and DLP Visual markings to indicate sensitive documents across apps/services: watermark, lock icon, sensitivity column Co-author and collaborate with sensitive documents Enable searching and eDiscovery of encrypted files in SharePoint Enforce conditional access to sensitive data DLP actions to block sharing Encrypt files and emails based on sensitivity label Prevent data leakage through DLP policies based on sensitivity label Business data separation from personal data on devices STRIKING A PERFECT BALANCE
  • 41. We auto-classify sensitivity labels to our content at rest, in Office apps and require users to provide a reason for override if necessary. We use DLP across all locations and block access to SharePoint sites from all unmanaged devices. SCENARIO: PROTECTING YOUR SENSITIVE CONTENT We allow our users to collaborate freely with external users, however, we are currently monitoring when sensitive information is being shared before turning on our DLP policies and auto-labeling policies. We allow web-only access to confidential SharePoint sites. We apply a default sensitivity label to all content and rely on our users to adjust it as necessary. We allow external sharing on all sites by default. We allow full access to SharePoint sites even from unmanaged devices. John Kate Cha d
  • 42. DELETE ONLY “Delete all team collaboration content 8 years after its last modified date” RETAIN ONLY “Retain all Access Request forms for 5 year” RETAIN and DELETE “Retain all customer information for 10 years and then delete it after review” APPLYING RETENTION ACROSS YOUR TEAMWORK Retaining content where you work (“Built-in” compliance)
  • 43. Collaboration Workspace Retention Policy Retention Label (Label Policy) Exchange mailbox Yes Yes OneDrive for Business site Yes Yes SharePoint site Yes Yes Office 365 Group Yes Yes Chat and channel messages (1-day retention allowed) Yes No Meeting recordings No No APPLYING RETENTION ACROSS YOUR TEAMWORK
  • 44. End-user applies a retention label on a specific document or email. MANUALLY APPLIED Automatically apply retention based on condition(s). AUTOMATICALLY APPLIED Using machine learning to apply a retention label based on a trainable classifier. MACHINE-LEARNING APPLIED ** MANUAL AUTOMATIC MACHINE LEARNING APPLYING RETENTION ACROSS YOUR TEAMWORK
  • 45. Applying retention across your teamwork … at scaleAUTOMATIC MANUAL MACHINE LEARNING
  • 46. WAYS TO AUTO-APPLY A RETENTION LABEL #1 – Automatically apply at a document library level #2 – Automatically apply at a folder or document set level #3 – Auto-apply based on a sensitive information type #4 – Auto-apply based on a keyword query #5 – Auto-apply based on a content type #6 – Auto-apply based on a metadata value #7 – Automatically set using Microsoft Flow #8 – Automatically set using custom code/PowerShell #9 – Auto-apply based on a Trainable Classifier (Preview now)
  • 47. SOURCE CODE RESUMESPROFANITY THREAT TARGETED HARASSMENT TRAINABLE CLASSIFIERS (PUBLIC PREVIEW) Powered by Machine Learning 5 built-in classifiers Build your own custom Classifiers! Contracts Financial Agreements Employee Forms
  • 48. USE WHEN PUBLISHING A RETENTION LABEL…
  • 49. TRAINABLE CLASSIFIERS WITH SENSITIVITY LABELS… In Public Preview mode now
  • 50. We have retention labels published aligning to our File Plan to retain regulated content with disposition review. We have retention policies on Teams chat to delete them after 5 days. SCENARIO: RETAINING YOUR TEAMWORK We have retention policies published across collaboration locations including Microsoft Teams. This is transparent to our end-users but still allows it to be discoverable. We delete Teams chats after 1 month. We have a few retention labels defined for only our most valuable content. We use auto-apply capabilities so end- users don’t have to remember to do it. We don’t delete Teams chats. John Kate Cha d
  • 51. SECURITY GOVERNANCE  Collaborating with external users securely Broughtto youby M365Conf.com| #M365CONF
  • 52. Configured in the Teams admin center for org External access users have no access to specific Teams or Teams resources Allows external users in other domains to find, call, chat, and set up meetings with you Default: allow all external domains, can add allowed domains or blocked domains Gives access permission to an entire domain Enabled in the Teams admin center for org Grant external user access to existing Teams and Channels in Microsoft Teams Teams administrator can control which features guests can and can’t use in Microsoft Teams Anyone not part of your organization can be added as a guest in Teams Gives access permission to an individual user EXTERNAL ACCESS GUEST ACCESS COLLABORATING WITH “EXTERNALS”
  • 53. ALLOWING IT Can be set at a Teams org- wide level or a Teams/Group level. Can control who can allow guests to be added (guest inviter role). RECOMMENDATIONS Leverage the “Guest Inviter” role. Audit what Guest users are doing via Audit logs. GUEST ACCESS AVAILABLE NOW Disable guest access at a Teams/Site level based on sensitivity of Team/Site. ALLOWING IT Allow all domains (default), some domains, or block some domains. RECOMMENDATIONS Use allow/deny lists for your external partner domains. EXTERNAL ACCESS AVAILABLE SOON Automatic expiration of external user access COLLABORATING WITH EXTERNAL USERS SECURELY
  • 54. COLLABORATION Enable external sharing by default. Disable based on classification. DOMAINS Limit domains as required. EDUCATE Educate your users on sharing. SENSITIVITY Use ‘Sensitive by default’ DLP setting for SharePoint/ODFB documents. AUDIT Make security audits part of your governance process. 01 02 03 04 05 EXTERNAL SHARING RECOMMENDATIONS
  • 55. We need to be very selective on who we collaborate with. We use “allow lists” for external access to limit collaboration to specific domains. SCENARIO: GUEST ACCESS AND EXTERNAL ACCESS We allow our users to collaborate with external users, however, we currently prevent guest users while we establish our organizational collaboration culture in Teams and define our classification scheme. We allow communication with any external parties. We do no want to impede our users’ ability to do more. John Kate Cha d
  • 57. CLASSIFICATIONS 01 Document your organization’s data classifications (keep it meaningful) ENFORCEPOLICIES 03 Determine policies to enforce based on classification: sensitivity/retention/privacy/guest access/conditional access EXTERNALUSERSTRATEGY 02 Establish your external user strategy for collaboration including guest access, external access and external sharing EDUCATEUSERS 04 Educate/train information workers across your organization on how to work securely with content TAKEAWAYS FROM TODAY Broughtto youby M365Conf.com| #M365CONF
  • 58. LICENSING Feature discussed today Office 365 E3 Microsoft 365 E3 Office 365 E5 Microsoft 365 E5 Compliance Office 365 Advanced Compliance AIP Premium P1 AIP Premium P2 Sensitivity labels Yes Yes Yes Yes Yes Sensitivity label auto-apply (automatic or recommended) No Yes Yes No Yes DLP protection for SPO, EXO, OneDrive (incl. Microsoft Teams files) Yes Yes Yes N/A N/A DLP for Microsoft Teams chat/channel messages No Yes Yes N/A N/A Retention Policies Yes Yes Yes N/A N/A Retention Labels (Manual) Yes Yes Yes N/A N/A Retention Labels auto-apply No Yes Yes N/A N/A Trainable Classifiers TBD TBD TBD N/A N/A https://joannecklein.com/M365ComplianceLicensing
  • 59. CAPABILITIES MENTIONED TODAY Coming soon or here…  Sensitivity labels for Office Apps: GA  Sensitivity labels for Teams/Site/Groups: GA in June  Auto-classification with Sensitivity labels in M365: Public Preview  Trainable Classifiers: Public Preview  Data Classification: GA Top of mind for rest of year…  External sharing based on Sensitivity  Separation of Sensitivity labels (Doc/Emails vs Sites/Teams/Groups  Inherit the label (w/encryption) on the site to documents in that site  Survey for your feedback
  • 60.  Visit the Vendors Booth, Sessions and Watch the Videos  Submit Your Answers to Enter the Raffle  You need at least 5 correct answers then submit for a chance to win one of 3 (One in each Americas, APAC, EMEA) ARE YOU READY FOR A RAFFLE? WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE! https://bit.ly/m365raffle
  • 61. CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS: UNITED WAY: HTTPS://GIVE.UWKC.ORG/M365VM INTERNATIONAL MEDICAL CORPS: HTTPS://BIT.LY/MEDICALCORPSFUND 10% OF FUNDS FROM SPONSORS GO TO SUPPORT COMMUNITY RELIEF. FOR MORE INFORMATION WRITE TO INFO@M365VIRTUALMARATHON.COM
  • 62. MICROSOFT 365 Virtual MARATHON May 27 & 28, 2020 36 hours / 2 days THANK YOU FOR JOINING US! DO YOU HAVE ANY QUESTIONS? Speaker feedback https://bit.ly/M365VMSpeakerFeedback Event feedback https://bit.ly/M365VMFeedback

Hinweis der Redaktion

  1. Shared responsibility model: Managing security and compliance is a partnership. You are responsible for protecting your data, identities, and devices, while Microsoft vigorously protects Office 365 services. It takes a coordinated effort of 3 groups to defensibly dispose of a piece of information that has outlived its usefulness, and retain what IS useful in a way that enables accessibility and usability for the business user. ESI – electronically stored information
  2. Business information workers: https://pixabay.com/photos/workplace-team-business-meeting-1245776/ IT Teams: Photo by Mimi Thian on Unsplash Legal Teams: https://pixabay.com/photos/analyzing-brainstorming-business-3385076/ Business information workers: working with content on a daily basis, sharing with others, both inside and outside the organization, in some cases working with sensitive data and should have a fundamental understanding of e-safety while working with your corporate data. Sometimes described as the weakest link in the security chain of an organization. IT Teams: Strong “supporting” role, implement technical controls, Assign permissions, Import 3rd party data as required, eDiscovery training, support, and backup, bridge the gap between the tech and the business
  3. Microsoft has partnered with Terranova Security for this
  4. Business information workers: https://pixabay.com/photos/workplace-team-business-meeting-1245776/ IT Teams: Photo by Mimi Thian on Unsplash Legal Teams: https://pixabay.com/photos/analyzing-brainstorming-business-3385076/ Business information workers: working with content on a daily basis, sharing with others, both inside and outside the organization, in some cases working with sensitive data and should have a fundamental understanding of e-safety while working with your corporate data. Sometimes described as the weakest link in the security chain of an organization. IT Teams: Strong “supporting” role, implement technical controls, Assign permissions, Import 3rd party data as required, eDiscovery training, support, and backup, bridge the gap between the tech and the business
  5. Understand organization’s duty to preserve information beyond its immediate business value.
  6. - Can Block download when sharing (just announced not only Office files, but also PDFs, images, and audio files. Must be set thru PowerShell (Set-SPOTenant or Set-SPOSite and the BlockDownloadLinksFileType setting)
  7. Video link: https://www.microsoft.com/videoplayer/embed/RE4vx8x
  8. Auto-classification of Sensitivity Labels across M365
  9. Auto-labeling files: https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide
  10. Doesn’t mean all documents within the site will inherit the same label Includes where a site/team/group is provisioned from: SPO, Teams, Outlook on the web, SP Admin Ctr, AAD Admin Ctr
  11. Link: https://docs.microsoft.com/en-us/sharepoint/sensitive-by-default