%3CLINGO-SUB%20id%3D%22lingo-sub-1745253%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20your%20unscanned%20and%20overexposed%20shares%20on-premises%20with%20an%20on-premises%20scanner%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1745253%22%20slang%3D%22en-US%22%3E%3CP%3Eminor%20typo%2C%204th%20paragraph%2C%20nee%2C%20should%20be%20new.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1744783%22%20slang%3D%22en-US%22%3EFind%20your%20unscanned%20and%20overexposed%20shares%20on-premises%20with%20an%20on-premises%20scanner%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1744783%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Information%20Protection%20is%20a%20built-in%2C%20intelligent%2C%20unified%2C%20and%20extensible%20solution%20to%20protect%20sensitive%20data%20across%20your%20enterprise%20%E2%80%93%20in%20Microsoft%20365%20cloud%20services%2C%20on-premises%2C%20third-party%20SaaS%20applications%2C%20and%20more.%20Microsoft%20Information%20Protection%20provides%20a%20unified%20set%20of%20capabilities%20to%20know%20your%20data%2C%20protect%20your%20data%2C%20and%20prevent%20data%20loss%20across%20cloud%20services%2C%20devices%2C%20and%20on-premises%20file%20shares.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EFor%20data%20you%20have%20in%20file%20shares%20and%20SharePoint%20sites%20on-premises%2C%20scanner%20helps%20you%20discover%20the%20sensitive%20content%20and%20enables%20you%20to%20automatically%20label%20and%20protect%20it%20per%20policy%20you%20have%20configured%20in%20the%20Microsoft%20365%20compliance%20center.%20Every%20month%2C%20billions%20of%20files%20are%20scanned%20and%20protected%20on-premises%20using%20scanners%20by%20hundreds%20of%20different%20organizations%20to%20comply%20with%20internal%20policy%20and%20external%20regulations.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EBut%20customers%20looking%20to%20discover%20and%20protect%20sensitive%20data%20on%20premises%20are%20faced%20with%20two%20challenges.%20One%20is%20knowing%20where%20to%20start.%20This%20challenge%20is%20compounded%20by%20the%20fact%20that%20new%20content%20and%20new%20file%20shares%20are%20being%20constantly%20created%20by%20your%20end%20users.%20The%20second%20challenge%20is%20determining%20how%20to%20prioritize%20scanning%20among%20the%20thousands%20of%20repositories%20with%20petabytes%20of%20data.%20The%20new%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Finformation-protection%2Fdeploy-aip-scanner-configure-install%23create-a-network-scan-job-public-preview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Enetwork%20discovery%3C%2FA%3E%20feature%20within%20a%20scanner%2C%20that%20is%20part%20of%20the%20latest%20Q3%20preview%2C%20helps%20you%20tackle%20both%20these%20challenges.%20You%20can%20now%20use%20this%20as%20a%20step%20zero%20in%20your%20on-premises%20data%20discovery%20journey%20to%20map%20your%20file%20shares%20and%20identify%20the%20overexposed%20file%20shares%20to%20prioritize.%20The%20network%20discovery%20feature%20of%20the%20scanner%20enables%20you%20to%20target%20your%20IP%20ranges%2C%20or%20specific%20IPs%2C%20to%20find%20the%20shares%20hosted%20in%20these%20networks%20and%20use%20access%20information%20to%20identify%20overexposed%20file%20shares.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EWith%20this%20new%20network%20discovery%20feature%20of%20the%20scanner%20it%E2%80%99s%20a%20matter%20of%20few%20hours%20to%20scan%20class%20B%20subnets%20with%2065K%20IP%20addresses.%20Once%20the%20network%20discovery%20is%20finished%20the%20admins%20get%20a%20report%20of%20all%20shares%2C%20their%20share%20permissions%2C%20NTFS%20permissions%20and%20effective%20access%20to%20a%20standard%20user%20with%20access%20to%20the%20network.%20The%20report%20includes%20a%20hint%20on%20what%20shares%20are%20open%20to%20Everyone%20%2F%20Authenticated%20Users%20%2F%20Domain%20Users%2C%20which%20helps%20admins%20to%20identify%20assets%20that%20can%20be%20accessed%20by%20to%20anybody%20with%20physical%20access%20to%20your%20network.%20The%20next%20step%20will%20be%20triaging%20the%20discovered%20file%20repositories%20and%20adding%20them%20to%20a%20content%20scan%20job%20for%20deeper%20investigation.%3C%2FP%3E%0A%3CP%3EThe%20new%20methodology%20for%20on-premises%20scanner%20deployment%20includes%20four%20steps%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EFirst%20%E2%80%93%20define%20the%20target%20repositories%20that%20might%20contain%20sensitive%20information.%20With%20the%20new%20network%20discovery%20feature%20that%20was%20just%20released%20you%20can%20now%20map%20your%20file%20shares%20by%20scanning%20IP%20ranges%20and%20feeding%20the%20results%20into%20deep%20file%20content%20inspection%3C%2FLI%3E%0A%3CLI%3ESecond%20%E2%80%93%20inspection%20of%20files%20stored%20in%20the%20scanned%20file%20shares%20and%20SharePoint%20on-premises%20sites.%20The%20goal%20of%20this%20step%20is%20to%20discover%20what%20sensitive%20information%20is%20stored%20in%20these%20files.%3C%2FLI%3E%0A%3CLI%3EThird%20%E2%80%93%20apply%20MIP%20sensitivity%20labels%20on%20files.%20Labeling%20enables%20end%20users%20to%20be%20aware%20of%20file%20sensitivity%20and%20handle%20the%20files%20according%20to%20the%20organization%E2%80%99s%20policy%2C%20and%20allows%20other%20systems%2C%20for%20example%20DLP%2C%20to%20use%20sensitivity%20labels%20for%20data%20exposure%20mitigation.%3C%2FLI%3E%0A%3CLI%3ELast%20step%20%E2%80%93%20apply%20protection%20per%20MIP%20policy%20on%20most%20sensitive%20files%20that%20require%20right%20management%20enforcement.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CDIV%20id%3D%22tinyMceEditorDenis%20Mizetski_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20id%3D%22tinyMceEditorDenis%20Mizetski_2%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22f1.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224135i9ADDF73C946DDF2C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22f1.png%22%20alt%3D%22f1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CEM%20style%3D%22font-family%3A%20inherit%3B%22%3EFigure%201%3A%20Microsoft%20Information%20Protection%20methodology%20for%20implementation%20of%20on-premises%20scanner%20for%20data%20at%20%3C%2FEM%3E%3CEM%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3Erest%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3ESo%2C%20how%20can%20you%20start%3F%20Download%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Faipclient%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elatest%20preview%20release%3C%2FA%3E%20and%20upgrade%20your%20existing%20scanner%20deployment%20or%20install%20a%20fresh%20new%20deployment.%20Once%20the%20setup%20is%20completed%20you%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Fazureinformationprotection%2FInstall-MIPNetworkDiscovery%3Fview%3Dazureipps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPowerShell%20cmdlet%3C%2FA%3E%20to%20create%20the%20Network%20Discovery%20service%20and%20create%20a%20new%20Network%20scan%20job%20that%20contains%20a%20list%20of%20the%20IP%20ranges%20you%20would%20like%20to%20scan.%3C%2FP%3E%0A%3CP%3EAfter%20configuring%20the%20network%20scan%20job%20and%20allocating%20a%20scanner%20cluster%20to%20execute%20it%2C%20the%20scan%20will%20start%20according%20to%20the%20schedule.%20Once%20the%20scan%20is%20completed%20all%20the%20discovered%20file%20shares%20will%20be%20listed%20under%20Repositories%20blade.%20You%20can%20filter%20the%20discovered%20repositories%20by%20setting%20%E2%80%9CDiscovered%20By%E2%80%9D%20filter%20to%20%E2%80%9CNetwork%20scan%E2%80%9D.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorDenis%20Mizetski_1%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22f2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224136i05CDEA5F9C0B0F78%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22f2.png%22%20alt%3D%22f2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CEM%3EFigure%202%3A%20Network%20scan%20results%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EYou%20can%20now%20review%20the%20results%20and%20select%20the%20repositories%20you%20would%20like%20to%20add%20to%20the%20deep%20scan%20using%20the%20Content%20scan%20job.%3C%2FP%3E%0A%3CP%3ESimilar%20to%20the%20existing%20scanner%20deployments%20you%20can%20also%20use%20Network%20discovery%20with%20offline%20configuration%20or%20in%20air-gap%20scenarios.%20In%20this%20case%20your%20results%20will%20be%20available%20in%20the%20Report%20folder%20under%20scanner%20account%20profile%20at%20%25localappdata%25%5CMicrosoft%5CMSIP%5CScanner%5CReports.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%20encourage%20you%20to%20download%20the%20bits%2C%20deploy%20and%20share%20your%20feedback%20on%20%3CA%20href%3D%22https%3A%2F%2Fwww.yammer.com%2Faskipteam%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYammer%20community%3C%2FA%3E%20to%20help%20us%20to%20build%20the%20best%20product%20to%20meet%20your%20security%20needs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1744783%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20need%20to%20find%20your%20sensitive%20data%20on%20premises%20but%20do%20not%20know%20where%20to%20start%3F%20Where%20are%20your%20file%20shares%20and%20are%20you%20aware%20of%20all%20of%20them%3F%20Or%2C%20maybe%20you%20have%20so%20many%20of%20them%20that%20you%20do%20not%20know%20what%20should%20be%20scanned%20first%3F%20Let%20the%20Network%20discovery%20feature%20of%20scanner%20to%20help%20you%20to%20find%20your%20file%20shares%2C%20and%20prioritize%20them%20based%20on%20their%20exposure!%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1744783%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Microsoft Information Protection is a built-in, intelligent, unified, and extensible solution to protect sensitive data across your enterprise – in Microsoft 365 cloud services, on-premises, third-party SaaS applications, and more. Microsoft Information Protection provides a unified set of capabilities to know your data, protect your data, and prevent data loss across cloud services, devices, and on-premises file shares.

For data you have in file shares and SharePoint sites on-premises, scanner helps you discover the sensitive content and enables you to automatically label and protect it per policy you have configured in the Microsoft 365 compliance center. Every month, billions of files are scanned and protected on-premises using scanners by hundreds of different organizations to comply with internal policy and external regulations.

But customers looking to discover and protect sensitive data on premises are faced with two challenges. One is knowing where to start. This challenge is compounded by the fact that new content and new file shares are being constantly created by your end users. The second challenge is determining how to prioritize scanning among the thousands of repositories with petabytes of data. The new network discovery feature within a scanner, that is part of the latest Q3 preview, helps you tackle both these challenges. You can now use this as a step zero in your on-premises data discovery journey to map your file shares and identify the overexposed file shares to prioritize. The network discovery feature of the scanner enables you to target your IP ranges, or specific IPs, to find the shares hosted in these networks and use access information to identify overexposed file shares.

With this new network discovery feature of the scanner it’s a matter of few hours to scan class B subnets with 65K IP addresses. Once the network discovery is finished the admins get a report of all shares, their share permissions, NTFS permissions and effective access to a standard user with access to the network. The report includes a hint on what shares are open to Everyone / Authenticated Users / Domain Users, which helps admins to identify assets that can be accessed by to anybody with physical access to your network. The next step will be triaging the discovered file repositories and adding them to a content scan job for deeper investigation.

The new methodology for on-premises scanner deployment includes four steps:

  • First – define the target repositories that might contain sensitive information. With the new network discovery feature that was just released you can now map your file shares by scanning IP ranges and feeding the results into deep file content inspection
  • Second – inspection of files stored in the scanned file shares and SharePoint on-premises sites. The goal of this step is to discover what sensitive information is stored in these files.
  • Third – apply MIP sensitivity labels on files. Labeling enables end users to be aware of file sensitivity and handle the files according to the organization’s policy, and allows other systems, for example DLP, to use sensitivity labels for data exposure mitigation.
  • Last step – apply protection per MIP policy on most sensitive files that require right management enforcement.
 
 

f1.png

 Figure 1: Microsoft Information Protection methodology for implementation of on-premises scanner for data at rest

So, how can you start? Download the latest preview release and upgrade your existing scanner deployment or install a fresh new deployment. Once the setup is completed you use PowerShell cmdlet to create the Network Discovery service and create a new Network scan job that contains a list of the IP ranges you would like to scan.

After configuring the network scan job and allocating a scanner cluster to execute it, the scan will start according to the schedule. Once the scan is completed all the discovered file shares will be listed under Repositories blade. You can filter the discovered repositories by setting “Discovered By” filter to “Network scan”.

 

f2.png

Figure 2: Network scan results

You can now review the results and select the repositories you would like to add to the deep scan using the Content scan job.

Similar to the existing scanner deployments you can also use Network discovery with offline configuration or in air-gap scenarios. In this case your results will be available in the Report folder under scanner account profile at %localappdata%\Microsoft\MSIP\Scanner\Reports.

 

As always, we encourage you to download the bits, deploy and share your feedback on Yammer community to help us to build the best product to meet your security needs.

 

 

1 Comment
Respected Contributor

minor typo, 4th paragraph, nee, should be new.