This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as needed. Links to the docs.microsoft.com data will be referenced both in the document steps as well as in the appendix.
All of the following steps should be done with test data, and where possible, testing should be performed in a test environment. Testing should never be performed against production data.
The Information Life Cycle Management section of this blog series is aimed at Security and Compliance and Modern Work officers who need to properly label data, encrypt it where needed.
This blog and document are meant to help an IT administrator who is looking to secure their data throughout the lifecycle of the data.
It is presumed that you already have a basic understanding of the Purview tools and the Modern Work tools (including Exchange, Teams, SharePoint and OneDrive).
This document does not cover configuring any of the below, ie. Holding your hand through the process of configuration”, as that is covered via other blogs, official Microsoft documents, or through the aid of Microsoft implementation teams or Microsoft partners:
Data Classification (Sensitive Information Types)
Data Classification (Exact Data Matching)
Data Classification (Trainable Classifiers)
Data Lifecycle Management (retention and disposal)
Data Protection Loss (DLP) for Exchange, OneDrive, Devices, etc
Information Protection (labeling, encrypting, watermarking, etc of files)
Insider Risk Management
Microsoft Defender for Cloud Apps (MDCA)
Privacy Management (Priva)
Records Management (retention and disposal)
Standard or Premium eDiscovery
This blog entry is only addressing Communication (creation, usage, sharing of emails andTeams chats), not Collaboration (creation, usage, sharing of files and SharePoint/Teams Sites).
After each section of this blog, I will make a note of which of the 3 parts of the CIA Triad that Microsoft tool will help you meet. Here are a few examples.
Example #1 –
CIA component – Integrity & Availability
Example #2 –
CIA component – Confidentiality & Availability
Example #3 –
CIA component – Integrity
Mapping Purview to Communications
Here we will map the Lifecycle of the data (Create -> Use -> Retain -> Delete) of data in Exchange and Teams.
When looking at the Information Lifecycle, it is important to understand which Purview tools map to which Communication activities within that Information Lifecycle. Here is a high-level map.
As this is a bit of an eye chart, we will look at each stage of the Information Lifecycle individually.
Please note that Use & Retain are placed together as these tend to be interchangeable.
In the Create phase of ILM, here are the recommended Purview Tools.