Last time, we examined the end users perspective of working in our secure collaboration environment, ensuring team members both internal and external could work together seamlessly and securely during Contoso’s acquisition efforts through “Project BASOS”. This time round, we look at less savory issues. What happens when someone attempts to leak information in a malicious fashion? We will examine how M365 Security and Compliance helps to defeat leaks in the first instance and then examine how Activity Explorer in the Data Classification dashboard can be used to detect anomalous activity to be referred to Security for further investigation. We then see how Insider Risk Management can be used to correlate this activity with other related activity and package all this data up for referral to investigators.
This is the third in a series of videos that we are releasing in order to help our customers understand how they can protect their sensitive information using Microsoft 365 tools.
Feedback and comments are welcome!
Also, make sure you follow us on Twitter - @mipnews
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.