Zero Trust for Data - Essentials Series - Episode 5

Published Aug 16 2021 09:08 AM 1,670 Views
Contributor

Protect data across your files and content, as well as structured and unstructured data wherever it resides, with the Zero Trust security model. As always, the approach applies the principles of verify explicitly, least privileged access, and assume breach. Jeremy Chapman, Director of Microsoft 365, highlights how you can apply Zero Trust security to keep your data protected.

 

Screen Shot 2021-08-16 at 11.48.23 AM.png

 

 

 

QUICK LINKS:

Link References:

Unfamiliar with Microsoft Mechanics?

 

Keep getting this insider knowledge, join us on social:


%3CLINGO-SUB%20id%3D%22lingo-sub-2652950%22%20slang%3D%22en-US%22%3EZero%20Trust%20for%20Data%20-%20Essentials%20Series%20-%20Episode%205%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2652950%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EProtect%20data%20across%20your%20files%20and%20content%2C%20as%20well%20as%20structured%20and%20unstructured%20data%20wherever%20it%20resides%2C%20with%20the%20Zero%20Trust%20security%20model.%20As%20always%2C%20the%20approach%20applies%20the%20principles%20of%20verify%20explicitly%2C%20least%20privileged%20access%2C%20and%20assume%20breach.%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Ftwitter.com%2Fdeployjeremy%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3EJeremy%20Chapman%3C%2FA%3E%3CSPAN%3E%2C%20Director%20of%20Microsoft%20365%2C%20highlights%20how%20you%20can%20apply%20Zero%20Trust%20security%20to%20keep%20your%20data%20protected.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screen%20Shot%202021-08-16%20at%2011.48.23%20AM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F303558i364C3A239FB1D2DC%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Screen%20Shot%202021-08-16%20at%2011.48.23%20AM.png%22%20alt%3D%22Screen%20Shot%202021-08-16%20at%2011.48.23%20AM.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3EWith%20Zero%20Trust%2C%20protections%20are%20designed%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Et%3C%2FSPAN%3Eo%20follow%20your%20data%20wherever%20it%20resides%2C%20whether%20that%E2%80%99s%20in%20your%20infrastructure%20or%20in%20the%20services%20that%20you%20manage.%20Protections%20continue%20as%20data%20flows%20and%20people%20work%20together%20with%20sensitive%20information.%20Information%20can%20also%20be%20protected%20from%20leaks%20by%20people%20inside%20of%20your%20organization%20or%20from%20people%20who%20should%20not%20have%20access.%20With%20the%20right%20protections%20in%20place%2C%20you%20can%20protect%20data%20if%20your%20devices%20are%20infected%20with%20malware%2C%20and%20you%20can%20also%20block%20and%20prevent%20data%20access%20in%20the%20case%20of%20a%20data%20breach.%20The%20good%20news%20is%20you%20can%20extend%20protections%20at%20a%20granular%20level%2C%20from%20your%20databases%20and%20individual%20data%20fields%2C%20to%20sensitive%20words%20within%20your%20databases%2C%20and%20trigger%20words%20while%20using%20apps.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CSTRONG%20class%3D%22ix%20da%22%3ESteps%20to%20protect%20your%20data%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%20class%3D%22%22%3E%0A%3CLI%20id%3D%22b1a6%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EIdentify%20top%20sensitive%20information%3C%2FLI%3E%0A%3CLI%20id%3D%222d23%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20lb%20ic%20ja%20jb%20lc%20ig%20jd%20je%20ld%20jg%20jh%20ji%20le%20jk%20jl%20jm%20lf%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EApply%20labels%20and%20classifiers%3C%2FLI%3E%0A%3CLI%20id%3D%2220d9%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20lb%20ic%20ja%20jb%20lc%20ig%20jd%20je%20ld%20jg%20jh%20ji%20le%20jk%20jl%20jm%20lf%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EApply%20principle%20of%20least%20privilege%20and%20assume%20breach%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FTqpLyFqtbLY%253Ffeature%253Doembed%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DTqpLyFqtbLY%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FTqpLyFqtbLY%252Fhqdefault.jpg%26amp%3Bkey%3Dfad07bfa4bd747d3bdea27e17b533c0e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22600%22%20height%3D%22337%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CSECTION%20class%3D%22dn%20fs%20ft%20di%20fu%22%3E%0A%3CDIV%20class%3D%22n%20p%22%3E%0A%3CDIV%20class%3D%22aq%20ar%20as%20at%20au%20fv%20aw%20w%22%3E%0A%3CH2%20id%3D%224a9d%22%20class%3D%22lh%20hy%20fx%20bb%20hz%20li%20lj%20lk%20id%20ll%20lm%20ln%20ih%20lo%20lp%20lq%20il%20lr%20ls%20lt%20ip%20lu%20lv%20lw%20it%20lx%20gt%22%20data-selectable-paragraph%3D%22%22%20id%3D%22toc-hId--381130957%22%20id%3D%22toc-hId--381109968%22%3EQUICK%20LINKS%3A%3C%2FH2%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20iz%20ic%20ja%20jb%20jc%20ig%20jd%20je%20jf%20jg%20jh%20ji%20jj%20jk%20jl%20jm%20jn%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D96s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E01%3A36%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20Identify%20your%20sensitive%20data%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D235s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E03%3A55%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20Data%20classification%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D411s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E06%3A51%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20Take%20action%3A%20Least%20privilege%20and%20assume%20breach%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D442s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E07%3A22%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20See%20an%20example%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D474s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E07%3A54%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20Insider%20risk%20management%20capabilities%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTqpLyFqtbLY%26amp%3Bt%3D560s%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3E09%3A20%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%94%20Wrap%20up%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%221188%22%20class%3D%22lh%20hy%20fx%20bb%20hz%20li%20lj%20lk%20id%20ll%20lm%20ln%20ih%20lo%20lp%20lq%20il%20lr%20ls%20lt%20ip%20lu%20lv%20lw%20it%20lx%20gt%22%20data-selectable-paragraph%3D%22%22%20id%3D%22toc-hId-2106381876%22%20id%3D%22toc-hId-2106402865%22%3ELink%20References%3A%3C%2FH2%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20iz%20ic%20ja%20jb%20jc%20ig%20jd%20je%20jf%20jg%20jh%20ji%20jj%20jk%20jl%20jm%20jn%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3EWatch%20our%20previous%20deep%20dive%20shows%20across%20the%20layers%20of%20Zero%20Trust%20at%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Faka.ms%2FZeroTrustMechanics%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Faka.ms%2FZeroTrustMechanics%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3EFor%20more%20on%20Zero%20Trust%2C%20go%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Faka.ms%2Fzerotrust%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Faka.ms%2Fzerotrust%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22ffa0%22%20class%3D%22lh%20hy%20fx%20bb%20hz%20li%20lj%20lk%20id%20ll%20lm%20ln%20ih%20lo%20lp%20lq%20il%20lr%20ls%20lt%20ip%20lu%20lv%20lw%20it%20lx%20gt%22%20data-selectable-paragraph%3D%22%22%20id%3D%22toc-hId-298927413%22%20id%3D%22toc-hId-298948402%22%3EUnfamiliar%20with%20Microsoft%20Mechanics%3F%3C%2FH2%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20iz%20ic%20ja%20jb%20jc%20ig%20jd%20je%20jf%20jg%20jh%20ji%20jj%20jk%20jl%20jm%20jn%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3EWe%20are%20Microsoft%E2%80%99s%20official%20video%20series%20for%20IT.%20You%20can%20watch%20and%20share%20valuable%20content%20and%20demos%20of%20current%20and%20upcoming%20tech%20from%20the%20people%20who%20build%20it%20at%20Microsoft.%3C%2FP%3E%0A%3CUL%20class%3D%22%22%3E%0A%3CLI%20id%3D%22720f%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3ESubscribe%20to%20our%20YouTube%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fc%2FMicrosoftMechanicsSeries%3Fsub_confirmation%3D1%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fwww.youtube.com%2Fc%2FMicrosoftMechanicsSeries%3Fsub_confirmation%3D1%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%20id%3D%222da0%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20lb%20ic%20ja%20jb%20lc%20ig%20jd%20je%20ld%20jg%20jh%20ji%20le%20jk%20jl%20jm%20lf%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EJoin%20us%20on%20the%20Microsoft%20Tech%20Community%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-mechanics-blog%2Fbg-p%2FMicrosoftMechanicsBlog%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-mechanics-blog%2Fbg-p%2FMicrosoftMechanicsBlog%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%20id%3D%221488%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20lb%20ic%20ja%20jb%20lc%20ig%20jd%20je%20ld%20jg%20jh%20ji%20le%20jk%20jl%20jm%20lf%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EWatch%20or%20listen%20via%20podcast%20here%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fmicrosoftmechanics.libsyn.com%2Fwebsite%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fmicrosoftmechanics.libsyn.com%2Fwebsite%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%2275f8%22%20class%3D%22lh%20hy%20fx%20bb%20hz%20li%20lj%20lk%20id%20ll%20lm%20ln%20ih%20lo%20lp%20lq%20il%20lr%20ls%20lt%20ip%20lu%20lv%20lw%20it%20lx%20gt%22%20data-selectable-paragraph%3D%22%22%20id%3D%22toc-hId--1508527050%22%20id%3D%22toc-hId--1508506061%22%3EKeep%20getting%20this%20insider%20knowledge%2C%20join%20us%20on%20social%3A%3C%2FH2%3E%0A%3CUL%20class%3D%22%22%3E%0A%3CLI%20id%3D%22c4bb%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20iz%20ic%20ja%20jb%20jc%20ig%20jd%20je%20jf%20jg%20jh%20ji%20jj%20jk%20jl%20jm%20jn%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EFollow%20us%20on%20Twitter%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Ftwitter.com%2FMSFTMechanics%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftwitter.com%2FMSFTMechanics%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%20id%3D%221545%22%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20lb%20ic%20ja%20jb%20lc%20ig%20jd%20je%20ld%20jg%20jh%20ji%20le%20jk%20jl%20jm%20lf%20jo%20jp%20jq%20ky%20kz%20la%20gt%22%20data-selectable-paragraph%3D%22%22%3EFollow%20us%20on%20LinkedIn%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20class%3D%22dt%20jr%22%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fmicrosoft-mechanics%2F%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fmicrosoft-mechanics%2F%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CHR%20%2F%3E%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FSECTION%3E%0A%3CDIV%20class%3D%22n%20p%20cx%20ly%20lz%20ma%22%20role%3D%22separator%22%3E%0A%3CH2%20id%3D%22f70f%22%20class%3D%22lh%20hy%20fx%20bb%20hz%20li%20lj%20lk%20id%20ll%20lm%20ln%20ih%20lo%20lp%20lq%20il%20lr%20ls%20lt%20ip%20lu%20lv%20lw%20it%20lx%20gt%22%20data-selectable-paragraph%3D%22%22%20id%3D%22toc-hId-978985783%22%20id%3D%22toc-hId-979006772%22%3EVideo%20Transcript%3A%3C%2FH2%3E%0A%3C%2FDIV%3E%0A%3CSECTION%20class%3D%22dn%20fs%20ft%20di%20fu%22%3E%0A%3CDIV%20class%3D%22n%20p%22%3E%0A%3CDIV%20class%3D%22aq%20ar%20as%20at%20au%20fv%20aw%20w%22%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20iz%20ic%20ja%20jb%20jc%20ig%20jd%20je%20jf%20jg%20jh%20ji%20jj%20jk%20jl%20jm%20jn%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Welcome%20back%20to%20our%20series%20on%20Zero%20Trust%20on%20Microsoft%20Mechanics.%20In%20our%20Essentials%20episode%2C%20we%20gave%20a%20high-level%20overview%20of%20the%20principles%20of%20the%20Zero%20Trust%20security%20model%2C%20spanning%20identity%2C%20endpoints%2C%20applications%2C%20networks%2C%20infrastructure%2C%20and%20data.%20Now%20in%20this%20episode%20we%E2%80%99ll%20take%20a%20look%20at%20how%20you%20can%20apply%20Zero%20Trust%20principles%20and%20policies%20to%20the%20data%20itself%20across%20your%20files%20and%20content%2C%20as%20well%20as%20structured%20and%20unstructured%20data%2C%20wherever%20it%20resides.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Now%20by%20the%20way%2C%20if%20you%E2%80%99ve%20missed%20our%20previous%20deep%20dive%20shows%20across%20all%20the%20layers%20of%20Zero%20Trust%2C%20you%20can%20check%20those%20out%20at%20aka.ms%2FZeroTrustMechanics.%20Ultimately%2C%20all%20layers%20in%20the%20Zero%20Trust%20security%20model%20lead%20to%20the%20protection%20of%20your%20data.%20As%20always%2C%20the%20approach%20applies%20the%20principles%20of%20verify%20explicitly%2C%20least-privileged%20access%2C%20along%20with%20assume%20breach.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Now%20with%20Zero%20Trust%2C%20protections%20are%20designed%20to%20follow%20your%20data%20wherever%20it%20resides%2C%20whether%20that%E2%80%99s%20in%20your%20infrastructure%20or%20in%20the%20services%20that%20you%20manage.%20Protections%20continue%20as%20data%20flows%20and%20as%20people%20work%20together%20with%20sensitive%20information.%20Information%20can%20also%20be%20protected%20from%20intentional%20or%20unintentional%20leaks%20by%20people%20inside%20of%20your%20organization%20to%20people%20who%20should%20not%20have%20access.%20Also%20with%20the%20right%20protections%20in%20place%2C%20you%20can%20protect%20the%20data%20if%20your%20devices%20are%20infected%20with%20malware.%20And%20you%20can%20also%20block%20and%20prevent%20data%20access%20in%20the%20case%20of%20a%20data%20breach%2C%20where%20your%20infrastructure%20and%20services%20are%20hacked.%20The%20good%20news%20is%20that%20we%20can%20extend%20protections%20at%20a%20granular%20level%20from%20your%20databases%2C%20through%20to%20where%20your%20files%20are%20managed%2C%20right%20down%20to%20the%20individual%20data%20fields%2C%20sensitive%20words%20within%20your%20databases%20and%20files%2C%20as%20well%20as%20trigger%20words%20and%20phrases%2C%20for%20example%2C%20in%20the%20context%20of%20using%20apps.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-That%20said%2C%20before%20you%20can%20protect%20your%20data%2C%20the%20first%20step%20to%20using%20the%20Zero%20Trust%20approach%2C%20is%20to%20know%20your%20data.%20Identifying%20and%20inventorying%20sensitive%20data%20is%20a%20critical%20step%20to%20successfully%20implement%20Zero%20Trust.%20Here%2C%20Microsoft%20Information%20Protection%20offers%20a%20flexible%20set%20of%20protection%20controls%2C%20based%20on%20data%20sensitivity%20and%20risk%2C%20for%20files%20across%20your%20Microsoft%20365%20estate%2C%20and%20across%20cloud-based%20services.%20Azure%20Purview%20then%20helps%20you%20manage%20and%20govern%20your%20on-premises%2C%20multi-cloud%20and%20software%20as%20a%20service%2C%20or%20SaaS%20stored%20data%2C%20to%20easily%20create%20a%20holistic%2C%20up-to-date%20map%20of%20your%20data%20landscape%20with%20automated%20data%20discovery%2C%20sensitive%20data%20classification%2C%20and%20end-to-end%20data%20lineage.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Additionally%2C%20insider%20risk%20management%20in%20Microsoft%20365%20enables%20you%20to%20quickly%20detect%2C%20investigate%2C%20and%20act%20on%20risk%20to%20your%20data%20originating%20from%20people%20inside%20your%20organization%2C%20such%20as%20data%20theft%20from%20a%20departed%20employee.%20And%20communication%20compliance%20in%20Microsoft%20365%20then%20allows%20you%20to%20more%20specifically%20detect%20inappropriate%20communications%20that%20can%20result%20in%20data%20leaks%20or%20policy%20violations.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-So%20let%E2%80%99s%20dig%20deeper%20into%20these%20capabilities%2C%20starting%20with%20Microsoft%20Information%20Protection%20in%20the%20Microsoft%20365%20Compliance%20Center.%20In%20the%20data%20classification%20tab%2C%20you%20can%20easily%20find%20the%20top%20sensitive%20information%20types%20across%20Microsoft%20365%20services%20like%20SharePoint%2C%20OneDrive%2C%20and%20Exchange.%20If%20I%20click%20into%20content%20explorer%2C%20I%20can%20even%20find%20the%20number%20of%20instances%20for%20each%20sensitive%20information%20type.%20And%20here%20we%20can%20see%20things%20like%20credit%20card%20and%20bank%20account%20numbers%2C%20personal%20IDs%2C%20and%20tax%20information%2C%20just%20to%20name%20a%20few.%20This%20even%20works%20for%20multi%20geo-enabled%20organizations.%20In%20fact%2C%20there%20are%20more%20than%20220%20built-in%20definitions%2C%20and%20you%20can%20create%20your%20own%20sensitive%20information%20types%20using%20patterns%20or%20keywords.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Next%2C%20moving%20on%20to%20knowing%20where%20your%20sensitive%20information%20is%20found%20in%20structured%20data%20and%20data%20sitting%20outside%20of%20Microsoft%20365%2C%20you%20can%20use%20Azure%20Purview%20to%20scan%20your%20connected%20data%20sources%20like%20Azure%20Blob%20Storage%2C%20Data%20Lake%2C%20SQL%2C%20Cosmos%20DB%2C%20and%20Synapse%20Analytics.%20Or%20you%20can%20connect%20Azure%20Purview%20to%20scan%20non-Microsoft%20or%20on-prem%20data%20stores%20like%20Amazon%20S3%2C%20Hive%20Metastore%2C%20Oracle%2C%20SAP%2C%20and%20more.%20As%20a%20result%20of%20the%20scan%20process%2C%20Azure%20Purview%20will%20discover%20sensitive%20data%20types%20like%20the%20ones%20that%20I%20mentioned%20before%2C%20using%20default%20or%20custom%20classifications.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-And%20once%20you%20know%20where%20your%20sensitive%20data%20resides%2C%20you%20can%20then%20move%20on%20to%20data%20classification.%20Applying%20the%20Zero%20Trust%20principle%20of%20least%20privileged%2C%20labels%20and%20classifiers%20can%20be%20applied%20to%20file%20content%20in%20order%20to%20enforce%20policies%20to%20protect%20your%20information.%20That%20way%20only%20the%20people%20and%20processes%20who%20should%20have%20access%2C%20do%20have%20access.%20In%20fact%2C%20if%20you%20caught%20our%20previous%20episode%2C%20showing%20capabilities%20like%20auth%20context%20in%20SharePoint%20to%20require%20a%20second%20factor%20of%20authentication%20for%20access%20to%20sensitive%20sites%2C%20or%20Microsoft%20Cloud%20App%20Security%20policies%20to%20block%20downloads%20on%20non-Microsoft%20services%20and%20cloud%20apps.%20All%20of%20those%20actions%20are%20predicated%20on%20having%20these%20labels%20and%20associated%20metadata%20in%20place.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Now%2C%20let%20me%20show%20you%20how%20these%20labels%20are%20applied.%20With%20Microsoft%20Information%20Protection%2C%20you%20can%20apply%20sensitivity%20labels%20to%20add%20a%20visual%20marking%2C%20and%20there%20are%20a%20number%20of%20controls%2C%20such%20as%20adding%20a%20confidential%20watermark%2C%20header%2C%20and%20footer%20controls%20that%20you%20can%20see%20here.%20Additionally%2C%20policies%20can%20apply%20file-level%20encryption%20and%20reduce%20sharing%20rights%20to%20limit%20access%20to%20the%20right%20people.%20Classification%20labels%20in%20Microsoft%20Information%20Protection%20can%20be%20applied%20in%20several%20ways.%20Users%20closest%20to%20sensitive%20topics%20can%20manually%20apply%20labels%20as%20you%20can%20see%20here%2C%20and%20you%20can%20use%20auto%20labeling%20to%20detect%2C%20label%2C%20and%20protect%20sensitive%20documents%20and%20emails%2C%20and%20this%20also%20works%20while%20authoring%20files%20or%20scanning%20them%20at%20rest%20in%20Microsoft%20365.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Also%2C%20data%20loss%20prevention%20policies%20can%20run%20in%20the%20background%2C%20in%20real-time%2C%20during%20the%20authoring%20of%20content%20to%20detect%20sensitive%20information.%20Policy%20tips%20then%20inform%20users%20of%20violations%20and%20specific%20actions%20can%20be%20enforced%2C%20such%20as%20blocking%20sharing.%20This%20works%20in%20Word%2C%20Excel%2C%20emails%2C%20even%20chat%20messages%20in%20Microsoft%20Teams%20and%20more.%20Additionally%2C%20you%20can%20also%20use%20reports%20in%20Microsoft%20365%20to%20identify%20SharePoint%20sites%20or%20Microsoft%20Teams%20locations%20with%20high%20numbers%20of%20sensitive%20files%2C%20then%20apply%20classifications%20to%20that%20entire%20site%20or%20team%20to%20ensure%20that%20files%20currently%20stored%20in%20those%20locations%2C%20as%20well%20as%20files%20created%20in%20the%20future%2C%20are%20just%20automatically%20protected.%20This%20can%20even%20retroactively%20apply%20to%20files%20that%20were%20previously%20shared%20from%20these%20locations%2C%20and%20to%20augment%20classifications%20applied%20by%20users%2C%20at%20the%20file%20or%20site%20and%20team%20level%2C%20you%20can%20use%20automation%20and%20AI%20to%20help%20apply%20labels.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-For%20example%2C%20here%20in%20information%20governance%2C%20you%20can%20see%2C%20I%20have%20policies%20to%20auto%20apply%20labels%20that%20trigger%20retention%20policies%20to%20personally%20identifiable%20information%20across%20email%2C%20SharePoint%20sites%2C%20OneDrive%20accounts%20and%20Microsoft%20365%20groups.%20Additionally%2C%20sensitivity%20and%20retention%20labels%20are%20integrated%20with%20SharePoint%20Syntex%20as%20part%20of%20its%20automated%20document%20scanning%20categorization%20process%2C%20for%20knowledge%20management.%20And%20once%20you%E2%80%99ve%20configured%20labeling%20in%20Microsoft%20365%2C%20you%20can%20extend%20your%20sensitivity%20labels%20to%20Azure%20Purview%2C%20as%20you%20can%20see%20here.%20As%20Azure%20Purview%20scans%20registered%20data%20sources%2C%20it%20uses%20the%20classification%20rules%20that%20you%20set%2C%20including%20the%20custom%20rules%20you%20defined%20to%20assign%20labels%20to%20your%20data.%20And%20once%20your%20data%20has%20been%20scanned%2C%20the%20results%20are%20visible%20in%20the%20data%20source%20and%20added%20as%20part%20of%20the%20classification%20insights%20report.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-From%20here%2C%20you%20can%20take%20action%2C%20using%20the%20Zero%20Trust%20principles%20of%20least%20privilege%20and%20assume%20breach%2C%20to%20lock%20down%20access%20to%20data%20with%20sensitive%20or%20confidential%20information.%20In%20fact%2C%20Microsoft%20Information%20Protection%20and%20Azure%20Purview%20can%20continually%20identify%20new%20sources%20of%20sensitive%20information%20so%20that%20you%20can%20keep%20track%20of%20it%20as%20it%E2%80%99s%20being%20generated%20and%20apply%20the%20right%20permissions%20to%20protect%20your%20data.%20Additionally%2C%20for%20your%20structured%20data%20in%20SQL%20Server%2C%20Azure%20SQL%20and%20Azure%20Synapse%2C%20you%20can%20implement%20the%20principle%20of%20least%20privilege%20and%20role-based%20access.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Now%20here%E2%80%99s%20a%20real%20example%20using%20built-in%20column%20and%20row-level%20security%20controls%20to%20allow%20different%20divisions%20in%20the%20same%20company%2C%20to%20query%20that%20same%20data%20set%20where%20each%20region%20only%20sees%20data%20specific%20to%20that%20region.%20Now%20also%20with%20dynamic%20data%20masking%2C%20you%20can%20anonymize%20text%20in%20data%20fields%20based%20on%20privilege%20and%20role%2C%20to%20mask%20sensitive%20information%2C%20as%20you%20can%20see%20here%20with%20this%20column%20of%20email%20addresses.%20Now%20the%20work%20you%20do%20to%20know%20your%20data%2C%20classify%20and%20protect%20it%2C%20is%20also%20foundational%20to%20ensuring%20that%20you%20understand%20and%20mitigate%20high-risk%20situations%20that%20can%20emerge%20internally.%20Insider%20risk%20management%20capabilities%20collect%20signals%20from%20activities%20in%20Microsoft%20365%2C%20and%20agentlessly%20from%20local%20device%20endpoints%20to%20quickly%20spot%20anomalous%20user%20activities%20that%20are%20common%20indicators%20of%20insider%20risk.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-For%20example%2C%20you%20can%20set%20a%20policy%20triggered%20from%20an%20event%2C%20like%20an%20employee%20resignation%2C%20that%20looks%20for%20patterns%20and%20sequences%20of%20activity%2C%20such%20as%20downloading%20sensitive%20information%2C%20renaming%20it%2C%20then%20printing%20it%20before%20their%20departure%20from%20the%20company.%20Equally%2C%20you%20can%20continually%20scan%20Microsoft%20365%20audit%20logs%20to%20quickly%20assess%20the%20risk%20of%20data%20exfiltration%20in%20your%20organization%2C%20based%20on%20activity%20patterns.%20And%20with%20communication%20compliance%20also%20in%20Microsoft%20365%2C%20built-in%20trained%20classifiers%20containing%20trigger%20words%2C%20including%20custom%20keywords%2C%20can%20help%20quickly%20detect%20inappropriate%20information%20sharing%2C%20such%20as%20financial%20information%20shared%20in%20Microsoft%20Teams%20to%20internal%20or%20external%20contacts.%20Communication%20compliance%20policies%20support%20eight%20languages%2C%20and%20it%20automatically%20translates%20message%20content%20to%20a%20policy%20reviewer%E2%80%99s%20preferred%20language.%20Additionally%2C%20using%20OCR%2C%20it%20extracts%20printed%20or%20handwritten%20texts%20and%20images%20or%20PDFs%2C%20to%20evaluate%20against%20policy%20violations%20such%20as%20threats%20or%20disclosing%20information.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-Keep%20in%20mind%20for%20both%20insider%20risk%20management%20and%20communication%20compliance%2C%20there%20are%20strong%20safeguards%20and%20controls.%20You%20can%20apply%20pseudo-anonymization%20or%20rules-based%20access%20controls%2C%20ensure%20admin%20explicit%20opt-in%20of%20users%2C%20and%20audit%20trails%20all%20with%20a%20view%20to%20protecting%20end-user%20privacy.%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22iv%20iw%20fx%20ix%20b%20iy%20kt%20ic%20ja%20jb%20ku%20ig%20jd%20je%20kv%20jg%20jh%20ji%20kw%20jk%20jl%20jm%20kx%20jo%20jp%20jq%20dn%20gt%22%20data-selectable-paragraph%3D%22%22%3E-So%20that%20was%20a%20tour%20of%20the%20highlights%20for%20how%20the%20Zero%20Trust%20security%20model%20applies%20to%20protecting%20your%20data%20wherever%20it%20resides.%20Now%2C%20if%20you%E2%80%99ve%20missed%20any%20of%20our%20previous%20shows%20in%20this%20series%2C%20be%20sure%20to%20check%20out%20aka.ms%2FZeroTrustMechanics%2C%20and%20you%20can%20learn%20more%20at%20aka.ms%2Fzerotrust.%20Thanks%20for%20watching.%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FSECTION%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2652950%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EProtect%20data%20across%20your%20files%20and%20content%2C%20as%20well%20as%20structured%20and%20unstructured%20data%20wherever%20it%20resides%2C%20with%20the%20Zero%20Trust%20security%20model.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2652950%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EZero%20Trust%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Aug 16 2021 09:08 AM
Updated by: