Enabling co-authoring for files protected with sensitivity labels– Implementing Microsoft Purview Information Protection and Data Lifecycle Management-2

I. If you selected Apply or remove encryption, you can choose from Remove encryption if the file or calendar event is encrypted or Configure encryption settings. Removing encryption ends the encryption portion of the wizard, but the latter configure option presents additional options: i. Assign permissions now or let users decide has two options for […]

Enabling co-authoring for files protected with sensitivity labels– Implementing Microsoft Purview Information Protection and Data Lifecycle Management-1

Co-authoring (the ability for multiple people to work on a file or document simultaneously) is a powerful feature of the M365 platform. When it comes to encrypted documents, it’s important to confirm that the environment meets a particular standard to ensure full compatibility and functionality when editing encrypted documents. After you have confirmed that all […]

Implementing retention policies– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

Retention policies are rule-driven configurations that allow you to manage the lifecycle of data in the organization. Retention policies are created with three core purposes in mind: • To protect and retain data for a minimum amount of time• To ensure data doesn’t continue to persist after a specific period of time• To govern the […]

Testing and editing sensitive information types– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

After you’ve created a sensitive information type, you can test its effectiveness against sample data and update it to improve its detection capability. NoteYou can test both built-in and custom sensitive information types, but you cannot edit the built-in types. To test one of the sensitive information types you’ve created, you can follow these steps: […]

Using document fingerprinting– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

Document fingerprinting is a classification method that’s used to detect data where the content matches a recognizable pattern. NoteDocument fingerprinting is not part of the MS-102 exam guide, though it’s important to be aware of the technology from a functional perspective. For more information on the document fingerprinting capabilities in Microsoft Purview, see https://learn.microsoft.com/ en […]

Using built-in functions– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

Microsoft currently supports 185 built-in functions that can be used as part of custom sensitive information types. Functions, as mentioned previously, are more complex computations that are used to detect the presence of certain data types, such as driver’s license numbers, social security or taxpayer identification numbers, and financial data. To create a sensitive information […]

Using regular expressions– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

You can use regular expressions (sometimes stylized as RegEx or regex) to detect and match content when simple keywords or strings will not suffice. Further Reading Neither this book nor the MS-102 exam focuses much on the construction of regular expressions. Regular expressions can become quite deep and complex with concepts such as look aheads, […]

Managing sensitive information types– Implementing Microsoft Purview Information Protection and Data Lifecycle Management

You can create and manage custom sensitive information types to detect a variety of data across your organization. In this section, we’ll look at creating these classifiers. Using keywordsThe simplest configuration for sensitive information types involves using keywords. Keywords are exactly that—simply words that are used to identify content as sensitive. When using keywords to […]

Summary– Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint

In this chapter, you learned about the Microsoft 365 Defender for Endpoint product, including how to deploy it to a variety of platforms, configure basic protection features, and use the Vulnerability management tools to investigate and remediate risks. These tools are critical for maintaining a secure operating environment and allow organizations to confidently support a […]

Tuning– Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint

You can tune the parameters for specific alerts (Alert details | Tune alert). Tuning alerts helps your security operations center ( SOC) team focus on alerts that are specifically important to your organization. While you can tune alerts at any time during an incident, you may wish to wait until after an incident has been […]