So you’ve turned on Guest Access - now what should you do? This session covers the governance options available for these guest users. This includes confirming the guest's identity (via multi-factor), controlling access to and the movement of data (e.g., blocking download, copy/paste, etc. of sensitive data), data loss protection, and encrypting sensitive data when downloading is required. Because each customer has different governance requirements, this session will call out which controls are needed based on real-world customer scenarios.
Session is held in the immersive multi-screen Microsoft Technology Center Envisioning Center in The Hub.