%3CLINGO-SUB%20id%3D%22lingo-sub-1492098%22%20slang%3D%22en-US%22%3ERe%3A%20MIP%20and%20Compliance%20V-blog%20%232%3A%20Setting%20up%20a%20secure%20collaboration%20environment%20-%20End%20user%20point%20of%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1492098%22%20slang%3D%22en-US%22%3E%3CP%3EAnother%20nice%20one!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1455091%22%20slang%3D%22en-US%22%3EMIP%20and%20Compliance%20V-blog%20%232%3A%20Setting%20up%20a%20secure%20collaboration%20environment%20-%20End%20user%20point%20of%20view%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1455091%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmip-and-compliance-v-blog-part-1-setting-up-a-secure%2Fba-p%2F1441759%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ELast%20week%20we%20showed%20you%20how%3C%2FA%3E%20to%20set%20up%20a%20secure%20collaboration%20environment%20to%20ensure%20that%20communications%20within%20and%20external%20to%20your%20environment%20are%20secured.%26nbsp%3B%26nbsp%3B%20This%20week%2C%20we%20change%20course%20and%20look%20at%20this%20environment%20from%20the%20%3CSTRONG%3Eend%20users%20point%20of%20view%3C%2FSTRONG%3E.%26nbsp%3B%26nbsp%3B%20Two%20users%20on%20the%20acquisitions%20team%20for%20project%20BASOS%20need%20to%20work%20with%20each%20other%2C%20and%20also%20collaborate%20with%20the%20CEO%20of%20the%20%E2%80%9Cto%20be%20acquired%E2%80%9D%20company.%26nbsp%3B%26nbsp%3B%20We%20take%20you%20through%20the%20concepts%20of%20manual%20vs%20automatic%20labeling%20within%20the%20Microsoft%20Office%20environment%20and%20show%20how%20automatic%20policies%20in%20Microsoft%20365%20can%20ensure%20that%20information%20when%20sent%20to%20recipients%20is%20properly%20labelled%20and%20protected%2C%20even%20in%20instances%20of%20accidental%20oversharing.%26nbsp%3B%26nbsp%3B%20We%20also%20look%20at%20how%20Microsoft%20365%20can%20use%20Data%20Loss%20Prevention%20Policy%20Tips%20to%20educate%20users%20on%20the%20correct%20course%20of%20action%2C%20and%20be%20flexible%20enough%20to%20allow%20sharing%20outside%20the%20policy%20boundary%20when%20required.%20%26nbsp%3B%26nbsp%3B%26nbsp%3BAttached%20to%20this%20post%20is%20the%20video.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20the%20second%20in%20a%20series%20of%20videos%20that%20we%20are%20releasing%20in%20order%20to%20help%20our%20customers%20understand%20how%20they%20can%20protect%20their%20sensitive%20information%20using%20Microsoft%20365%20tools.%3C%2FP%3E%0A%3CP%3EFeedback%20and%20comments%20are%20welcome!%3C%2FP%3E%0A%3CP%3EAlso%2C%20make%20sure%20you%20follow%20us%20on%20Twitter%20-%26nbsp%3B%40mipnews%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1455091%22%20slang%3D%22en-US%22%3E%3CP%3EContinuing%20our%20V-blog%20series%2C%20This%20time%20we%20are%20going%20to%20demonstrate%20the%20end%20user%20point%20of%20view%20when%20a%20secure%20collaboration%20environment%20is%20set%20up%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1455091%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInformation%20Protection%20%26amp%3B%20Governance%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Last week we showed you how to set up a secure collaboration environment to ensure that communications within and external to your environment are secured.   This week, we change course and look at this environment from the end users point of view.   Two users on the acquisitions team for project BASOS need to work with each other, and also collaborate with the CEO of the “to be acquired” company.   We take you through the concepts of manual vs automatic labeling within the Microsoft Office environment and show how automatic policies in Microsoft 365 can ensure that information when sent to recipients is properly labelled and protected, even in instances of accidental oversharing.   We also look at how Microsoft 365 can use Data Loss Prevention Policy Tips to educate users on the correct course of action, and be flexible enough to allow sharing outside the policy boundary when required.    Attached to this post is the video.

 

This is the second in a series of videos that we are releasing in order to help our customers understand how they can protect their sensitive information using Microsoft 365 tools.

Feedback and comments are welcome!

Also, make sure you follow us on Twitter - @mipnews

1 Comment
Senior Member

Another nice one!