Home
%3CLINGO-SUB%20id%3D%22lingo-sub-862552%22%20slang%3D%22en-US%22%3EUnified%20labeling%20AIP%20scanner%20preview%20brings%20scaling%20out%20and%20more!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-862552%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22text-align%3A%20left%3B%22%3ESince%20its%20release%2C%20the%20Azure%20Information%20Protection%20scanner%20has%20been%20adopted%20by%20many%20different%20types%20of%20customers.%20For%20example%2C%20some%20small%20businesses%20have%20deployed%20single%20scanners%20to%20address%20all%20their%20data%20at%20rest%2C%20others%20deployed%20a%20few%20machines%20in%20different%20locations%20or%20a%20few%20machines%20for%20the%20purpose%20of%20redundancy%2C%20while%20companies%20that%20needed%20to%20deal%20with%20petabytes%20of%20data%20may%20have%20deployed%20dozens%20of%20scanner%20instances%2C%20%E2%80%93%20such%20as%20internally%20at%20Microsoft%2C%20in%20which%20we%20deployed%20more%20than%2040%20scanners.%20Large%20enterprise%20customers%20faced%20increasing%20TCO%2C%20mainly%20driven%20by%20administration%20overhead%20and%20attempts%20to%20distribute%20the%20load%20between%20scanners.%3CBR%20%2F%3EConsistent%20feedback%20also%20came%20from%20customers%20adopting%20our%20unified%20labeling%20platform%20and%20moving%20to%20the%20Azure%20Information%20Protection%20Unified%20Labeling%20client.%20The%20Unified%20Labeling%20client%20allowed%20customers%20to%20use%20more%20flexible%20automatic%20rules%20on%20their%20endpoints%20but%20they%20could%20not%20leverage%20this%20flexibility%20on%20the%20scanner%20that%20its%20core%20functionality%20is%20discovery%20and%20labeling%20based%20on%20automatic%20rules.%20Customers%20also%20needed%20to%20maintain%20their%20labels%20and%20conditions%20in%20both%20Office%20365Security%20and%20Compliance%20Center%20and%20in%20the%20Azure%20portal%20(in%20order%20to%20manage%20conditions%20used%20by%20Azure%20Information%20Protection%20scanner).%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3EUnified%20labeling%20scanner%20is%20here%20to%20address%20scale%20out%20needs!%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20%2F%3EFinally%2C%20AIP%20scanner%20for%20unified%20labeling%20is%20here!%20Now%20you%20can%20completely%20move%20your%20label%20and%20policy%20management%20to%20O365%20Security%20and%20Compliance%20Center%20and%20complete%20the%20migration%20to%20unified%20labeling%20platform.%20This%20allows%20you%20to%20use%20custom%20info%20types%20and%20dictionaries%20on%20the%20AIP%20scanner%2C%20tweak%20built-in%20info%20types%2C%20define%20confidence%20levels%20etc.%3CBR%20%2F%3EThe%20Azure%20Information%20Protection%20scanner%20architecture%20was%20redesigned%20and%20in%20addition%20to%20adoption%20of%20MIP%20SDK%20that%20improves%20the%20performance%20of%20single%20nodes%20you%20can%20now%20group%20your%20scanners%20in%20clusters%20that%20service%20the%20same%20scanner%20profile.%20You%20no%20longer%20need%20to%20try%20to%20distribute%20repositories%20between%20different%20scanner%20nodes%20in%20order%20to%20achieve%20equal%20volumes%20scanned%20by%20every%20node.%20Now%20you%20can%20just%20set%20one%20profile%20and%20put%20all%20the%20repositories%20in%20the%20same%20profile%20(we%20still%20recommend%20separate%20profiles%20per%20geo%20location%20%2F%20data%20center)%20and%20add%20all%20the%20nodes%20to%20this%20profile.%20SQL%20DB%2C%20now%20holds%20core%20role%20as%20the%20orchestrator%20of%20the%20cluster%2C%20will%20take%20care%20of%20equal%20distribution%20of%20load%2C%20detect%20deactivated%20nodes%2C%20taken%2C%20for%20example%20due%20to%20maintenance%20or%20patching%2C%20and%20reallocate%20incomplete%20jobs%20to%20active%20scanner%20nodes.%20Added%20nodes%20to%20the%20profile%20will%20join%20current%20scan%20effort%20and%20get%20instructions%20to%20scan%20the%20next%20bunch%20of%20files.%20This%20provides%20simplified%20management%20and%20elastic%20growth%20and%20can%20help%20you%20reduce%20the%20number%20nodes%20based%20on%20volume%20that%20is%20needed%20to%20scan.%20For%20example%20you%20can%20start%20with%2050%20scanners%20to%20complete%20the%20initial%20scan%20of%20petabytes%20of%20data%20and%20then%20reduce%20the%20cluster%20to%205%20nodes%20to%20scan%20subsequent%20newly%20created%20files%20in%20the%20repository.%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20614px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F132533iDB353598D52284DD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22scanner%20diagram%20v4.jpg%22%20title%3D%22scanner%20diagram%20v4.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CBR%20%2F%3E%3CEM%3EFigure%201%3A%20Distributed%20scanner%20architecture%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3EWe%20also%20incorporated%20a%20few%20more%20new%20features%20and%20fixes%20to%20the%20new%20scanner%20to%20improve%20overall%20management%20and%20administration.%20You%20can%20now%20decide%20that%20all%2C%20new%20unlabeled%20and%20already%20labeled%20files%20in%20a%20specific%20repository%20are%20labeled%20with%20specific%20label.%20For%20example%2C%20you%20can%20decide%20that%20all%20files%20in%20a%20repository%20be%20labeled%20as%20%E2%80%9CConfidential%E2%80%9D%2C%20and%20scanner%20will%20apply%20this%20label%20on%20all%20files%20that%20have%20no%20label%20or%20have%20a%20lower%20label.%20You%20can%20also%20allow%20scanner%20to%20downgrade%20a%20label%20if%20you%20want.%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F132534i82A3941124C5217B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22f2.png%22%20title%3D%22f2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CBR%20%2F%3E%3CEM%3EFigure%202%3A%20Enforce%20Confidential%5CProject%20Samos%20on%20all%20files%20in%20the%20repository%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3EWe%20have%20added%20an%20option%20to%20use%20the%20scanner%20to%20remove%20labels%20from%20files%20in%20specific%20repository.%20You%20should%20just%20set%20the%20scanner%20to%20enforce%20default%20label%20%E2%80%9CNone%E2%80%9D%20on%20the%20repository.%3CBR%20%2F%3EAdditionally%2C%20the%20Azure%20Information%20Protection%20scanner%20can%20now%20identify%20if%20the%20current%20protection%20state%20of%20a%20file%20does%20not%20reflect%20the%20current%20protection%20policy%20for%20the%20label%20on%20the%20file%2C%20and%20adjust%20the%20protection%20state.%20For%20example%20if%20you%20started%20with%20classification%20only%20approach%20and%20labeled%20all%20your%20files%20as%20Confidential%20using%20scanner%20and%20later%20enabled%20protection%20on%20the%20file%2C%20now%20the%20scanner%20will%20identify%20this%20change%20and%20reapply%20the%20protection%20on%20already%20labeled%20files.%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3EWe%20have%20also%20improved%20the%20installation%20procedure.%20For%20the%20unified%20labeling%20scanner%20you%20should%20only%20create%20one%20Azure%20AD%20registered%20app%20and%20grant%20admin%20consent.%20You%20no%20longer%20need%20to%20login%20with%20the%20scanner%20account%20in%20order%20to%20complete%20the%20deployment.%20You%20can%20use%20%E2%80%9C-onbehalf%E2%80%9D%20switch%20of%20the%20Set-AIPAuthentication%20cmdlet%20which%20allows%20you%20to%20use%20service%20accounts%20that%20no%20longer%20need%20%E2%80%9Clogon%20locally%E2%80%9D%20rights%20in%20any%20step%20of%20the%20deployment.%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3EI%20encourage%20you%20to%20download%20the%20new%20preview%20version%20of%20the%20scanner%2C%20review%20it%20and%20share%20your%20feedback.%20You%20can%20find%20detailed%20instructions%20to%20deploy%20this%20new%20scanner%20version%20or%20upgrade%20from%20previous%20version%20in%20the%20updated%20Azure%20Information%20Protection%20unified%20labeling%20client%20administrator%20guide.%20See%20the%20new%20section%2C%20Installing%20the%20Azure%20Information%20Protection%20scanner.%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20left%3B%22%3E%3CBR%20%2F%3ENote%20that%20there%20are%20a%20few%20constraints%20in%20this%20version%3A%20no%20support%20for%20HYOK%2C%20in%20no%20support%20for%20offline%20policy%20and%20if%20you%20upgrade%20from%20your%20existing%20scanner%20the%20new%20scanner%20will%20initiate%20full%20scan%20of%20all%20repositories.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Since its release, the Azure Information Protection scanner has been adopted by many different types of customers. For example, some small businesses have deployed single scanners to address all their data at rest, others deployed a few machines in different locations or a few machines for the purpose of redundancy, while companies that needed to deal with petabytes of data may have deployed dozens of scanner instances, – such as internally at Microsoft, in which we deployed more than 40 scanners. Large enterprise customers faced increasing TCO, mainly driven by administration overhead and attempts to distribute the load between scanners.
Consistent feedback also came from customers adopting our unified labeling platform and moving to the Azure Information Protection Unified Labeling client. The Unified Labeling client allowed customers to use more flexible automatic rules on their endpoints but they could not leverage this flexibility on the scanner that its core functionality is discovery and labeling based on automatic rules. Customers also needed to maintain their labels and conditions in both Office 365Security and Compliance Center and in the Azure portal (in order to manage conditions used by Azure Information Protection scanner).


Unified labeling scanner is here to address scale out needs!
Finally, AIP scanner for unified labeling is here! Now you can completely move your label and policy management to O365 Security and Compliance Center and complete the migration to unified labeling platform. This allows you to use custom info types and dictionaries on the AIP scanner, tweak built-in info types, define confidence levels etc.
The Azure Information Protection scanner architecture was redesigned and in addition to adoption of MIP SDK that improves the performance of single nodes you can now group your scanners in clusters that service the same scanner profile. You no longer need to try to distribute repositories between different scanner nodes in order to achieve equal volumes scanned by every node. Now you can just set one profile and put all the repositories in the same profile (we still recommend separate profiles per geo location / data center) and add all the nodes to this profile. SQL DB, now holds core role as the orchestrator of the cluster, will take care of equal distribution of load, detect deactivated nodes, taken, for example due to maintenance or patching, and reallocate incomplete jobs to active scanner nodes. Added nodes to the profile will join current scan effort and get instructions to scan the next bunch of files. This provides simplified management and elastic growth and can help you reduce the number nodes based on volume that is needed to scan. For example you can start with 50 scanners to complete the initial scan of petabytes of data and then reduce the cluster to 5 nodes to scan subsequent newly created files in the repository.


scanner diagram v4.jpg
Figure 1: Distributed scanner architecture


We also incorporated a few more new features and fixes to the new scanner to improve overall management and administration. You can now decide that all, new unlabeled and already labeled files in a specific repository are labeled with specific label. For example, you can decide that all files in a repository be labeled as “Confidential”, and scanner will apply this label on all files that have no label or have a lower label. You can also allow scanner to downgrade a label if you want.

 

f2.png

 


Figure 2: Enforce Confidential\Project Samos on all files in the repository


We have added an option to use the scanner to remove labels from files in specific repository. You should just set the scanner to enforce default label “None” on the repository.
Additionally, the Azure Information Protection scanner can now identify if the current protection state of a file does not reflect the current protection policy for the label on the file, and adjust the protection state. For example if you started with classification only approach and labeled all your files as Confidential using scanner and later enabled protection on the file, now the scanner will identify this change and reapply the protection on already labeled files.


We have also improved the installation procedure. For the unified labeling scanner you should only create one Azure AD registered app and grant admin consent. You no longer need to login with the scanner account in order to complete the deployment. You can use “-onbehalf” switch of the Set-AIPAuthentication cmdlet which allows you to use service accounts that no longer need “logon locally” rights in any step of the deployment.


I encourage you to download the new preview version of the scanner, review it and share your feedback. You can find detailed instructions to deploy this new scanner version or upgrade from previous version in the updated Azure Information Protection unified labeling client administrator guide. See the new section, Installing the Azure Information Protection scanner.


Note that there are a few constraints in this version: no support for HYOK, in no support for offline policy and if you upgrade from your existing scanner the new scanner will initiate full scan of all repositories.

1 Comment
Frequent Contributor
"You can find detailed instructions to deploy this new scanner version or upgrade from previous version in the updated Azure Information Protection unified labeling client administrator guide. See the new section, Installing the Azure Information Protection scanner." As of 10/14/2019, the client admin guide does *not* include the new section "Installing the Azure Information Protection scanner" https://docs.microsoft.com/en-us/azure/information-protection/rms-client/clientv2-admin-guide-instal... Whereas I did find updated AIP Scanner documentation in this page instead: https://docs.microsoft.com/en-us/azure/information-protection/deploy-aip-scanner