The objective is to create a deployment plan that follows the progression of crawl-walk-run methodology while highlighting the user and administrator experience at each stage. With this in mind, let’s get started with understanding the capabilities which are available as part of Microsoft Information Protection (MIP), how you discover sensitive information and protect it using the various provided tools provided by MIP and Data Loss Prevention (DLP) Your Deployment Plan ⚓︎ With information protection and sensitivity labels, you can intelligently classify and help protect your sensitive content, while making sure that your organization's productivity and ability to collaborate is not hindered.Ĭombined with data loss prevention you can help prevent the accidental oversharing of the sensitive information in your organization. Legacy DLP Policies (ETR) to DLP Playbook Information Protection and Data Loss Prevention Insider Risk Management and Communication Complianceĭata Lifecycle Management and Records Management Migration Assistant for Microsoft Purview DLP Microsoft Compliance Configuration Analyzer (MCCA) Microsoft Purview Audit (Premium) Log Activities via the O365 Management API Preventing external sharing with DLP policyīlocking upload of files with higher sensitivity label to SPO Data Lifecycle Management/Records Managementīest Practices for Creating IP and DLP Policies
0 Comments
Leave a Reply. |