%3CLINGO-SUB%20id%3D%22lingo-sub-1898638%22%20slang%3D%22en-US%22%3EProtecting%20your%20data%20-%20creating%20a%20secure%20and%20compliant%20Microsoft%20Teams%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1898638%22%20slang%3D%22en-US%22%3E%3CP%3EOrganizations%20are%20continuing%20to%20work%20in%20a%20remote%20or%20hybrid-remote%20environment%20which%20accentuates%20the%20need%20to%20protect%20people%2C%20devices%2C%20apps%2C%20and%20the%20data%20that%20spans%20across%20the%20entire%20landscape.%20An%20increase%20in%20online%20collaboration%20has%20caused%20an%20influx%20of%20data%20that%20is%20critical%20for%20organizations%20to%20ensure%20remains%20secure%2C%20wherever%20employees%20are%20collaborating%20from.%20This%20is%20supported%20by%20the%20115%20million%20daily%20active%20users%20on%20Microsoft%20Teams%2C%20reemphasizing%20the%20need%20to%20ensure%20we%20can%20protect%20all%20the%20information%20and%20data%20created%20from%20increased%20online%20collaboration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3EKey%20customer%20questions%20for%20data%20governance%20and%20protection%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20%2F%3EAs%20the%20world%20has%20shifted%20to%20remote%20work%20as%20the%20new%20normal%2C%20organizations%20are%20facing%20a%20variety%20of%20increasing%20regulations%20and%20challenges.%20We%20are%20often%20asked%20a%20common%20set%20of%20questions%20by%20business%20leaders%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EHow%20can%20we%20ensure%20sensitive%20data%20is%20not%20purposefully%20or%20accidentally%20shared%20with%20unintended%20recipients%3F%3C%2FLI%3E%0A%3CLI%3EWith%20the%20shift%20to%20online%20collaboration%20creating%20an%20increased%20volume%20of%20information%20and%20data%2C%20how%20do%20we%20remain%20complaint%20with%20regulations%20and%20privacy%20needs%3F%3C%2FLI%3E%0A%3CLI%3EWhen%20employees%20are%20communicating%20online%2C%20how%20can%20we%20ensure%20they%20follow%20company%20policies%20to%20foster%20a%20safe%20and%20inclusive%20culture%3F%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThese%20questions%20are%20supported%20by%20a%20%3CA%20href%3D%22https%3A%2F%2Fclouddamcdnprodep.azureedge.net%2Fgdc%2Fgdc7Dgmed%2Foriginal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHarvard%20Business%20Review%3C%2FA%3E%20study%20commissioned%20by%20Microsoft%20that%20reveals%20organizations%20are%20finding%20an%20increased%20difficulty%20in%20securing%20and%20governing%20their%20data.%20While%2077%25%20of%20organizations%20agree%20an%20effective%20security%2C%20risk%2C%20and%20compliance%20strategy%20is%20essential%20for%20business%20success%2C%20an%20alarming%2082%25%20acknowledge%20increased%20risks%20and%20complexities%20have%20made%20an%20effective%20data%20management%20strategy%20more%20challenging.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EUnderstanding%20the%20data%20landscape%3A%20structured%20versus%20unstructured%20data%3C%2FSTRONG%3E%3CBR%20%2F%3EOne%20of%20the%20first%20components%20of%20data%20protection%20involves%20understanding%20how%20much%20structured%20and%20unstructured%20data%20exists%20in%20your%20organization.%20Structured%20data%2C%20organized%20in%20a%20pattern%20such%20as%20account%20numbers%20or%20credit%20cards%2C%20can%20often%20be%20identified%20using%20tools%20focused%20on%20preventing%20data%20loss.%20But%20how%20can%20we%20also%20ensure%20that%20unstructured%20data%2C%20like%20an%20internal%20release%20plan%20or%20confidential%20product%20specifications%2C%20also%20remains%20protected%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECreating%20an%20effective%20data%20governance%20and%20protection%20strategy%3C%2FSTRONG%3E%3CBR%20%2F%3ETo%20help%20customers%20address%20complex%20data%20management%20needs%2C%20we%20can%20leverage%20built-in%20protections%20and%20AI%20capabilities%20to%20help%20safeguard%20both%20structured%20and%20unstructured%20data%20wherever%20it%20lives.%20By%20focusing%20on%20an%20approach%20of%20knowing%2C%20protecting%2C%20and%20governing%20data%20we%20can%20effectively%20build%20our%20organizational%20data%20governance%20and%20protection%20strategy.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIdentifying%20the%20volume%20of%20structured%20and%20unstructured%20data%20in%20our%20organization%20helps%20us%20understand%20what%20protection%20capabilities%20we%20need%20to%20implement%20to%20have%20protection%20across%20our%20landscape.%20Data%20Loss%20prevention%20capabilities%20can%20leverage%20both%20built-in%20and%20custom%20sensitive%20information%20types%20to%20help%20protect%20structured%20data.%20Using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fclassifier-learn-about%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etrainable%20classifiers%3C%2FA%3E%20helps%20us%20govern%20our%20unstructured%20data%20by%20being%20able%20to%20identify%20items%20that%20meet%20our%20organization-defined%20policies%20to%20apply%20protections%20such%20as%20sensitivity%20or%20retention%20polices.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22data.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234277iE7B11DDA8BD9C591%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22data.png%22%20alt%3D%22data.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHow%20does%20that%20apply%20to%20Microsoft%20Teams%3F%3C%2FSTRONG%3E%20%3CBR%20%2F%3EAs%20part%20of%20the%20Microsoft%20365%20services%2C%20Teams%20follows%20all%20the%20security%20best%20practices%20and%20procedures%20such%20as%20service-level%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fteams-security-guide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esecurity%20through%20defense-in-depth%20and%20rich%20controls%20within%20the%20service%3C%2FA%3E.%20This%20means%20we%20can%20apply%20these%20same%20principles%20to%20ensure%20our%20collaboration%20and%20communication%20landscape%20have%20consistent%20advanced%20security%20and%20compliance%20capabilities%20leveraged%20from%20Microsoft%20365.%20Teams%20enforces%20team%20and%20organization-wide%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fsecurity-compliance-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Emulti-factor%20authentication%20(MFA)%20and%20single%20single-on%20through%20Azure%20Active%20Directory%3C%2FA%3E.%20Teams%20integration%20with%20SharePoint%20ensures%20file%20storage%20is%20backed%20by%20SharePoint%20encryption%2C%20while%20items%20like%20notes%20stored%20in%20OneNote%20are%20backed%20by%20OneNote%20encryption%20and%20stored%20in%20the%20team%20SharePoint%20site.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EBecause%20of%20this%20integration%20with%20familiar%20services%20like%20SharePoint%20and%20Exchange%2C%20IT%20can%20take%20advantage%20of%20simplified%20manageability%20in%20the%20centralized%20Microsoft%20365%20admin%20center%20to%20protect%20the%20data%20landscape.%20Let%20us%20look%20at%20how%20information%20protection%20and%20data%20loss%20prevention%20are%20implemented%20in%20Teams.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EData%20Protection%20in%20Microsoft%20Teams%3C%2FSTRONG%3E%3CBR%20%2F%3EData%20Loss%20Prevention%20(DLP)%20capabilities%20allow%20IT%20to%20define%20policies%20that%20help%20prevent%20people%20from%20sharing%20sensitive%20information%2C%20extending%20into%20Teams%20chat%2C%20channel%2C%20and%20private%20channel%20messages.%20This%20also%20includes%20protection%20from%20OneDrive%20for%20Business%20for%20documents%20containing%20sensitive%20information%20shared%20in%20Teams%20messages%20to%20ensure%20unauthorized%20users%20cannot%20access%20the%20document.%20Similar%20to%20how%20DLP%20works%20across%20Microsoft%20365%20like%20in%20Outlook%20or%20OneDrive%2C%20when%20a%20DLP%20policy%20violation%20occurs%20in%20Teams%20the%20sensitive%20content%20is%20blocked%20for%20data%20protection.%20Additionally%2C%20a%20helpful%20end%20user%20tip%20appears%20to%20educate%20the%20end%20user%20on%20why%20the%20content%20was%20blocked.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThe%20sender%E2%80%99s%20view%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22message%20blocked.png%22%20style%3D%22width%3A%20361px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234278i7A6B6B6D8BD031A3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22message%20blocked.png%22%20alt%3D%22message%20blocked.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAn%20educational%20policy%20tip%20for%20the%20sender%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22policy%20tip.png%22%20style%3D%22width%3A%20595px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234279i7322C3F2F36A6F24%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22policy%20tip.png%22%20alt%3D%22policy%20tip.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20recipient%E2%80%99s%20view%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22recipients%20view.png%22%20style%3D%22width%3A%20542px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234280iCBBCB71FFCC0194F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22recipients%20view.png%22%20alt%3D%22recipients%20view.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20leveraging%20the%20strength%20of%20Microsoft%20365%20security%20across%20our%20data%20landscape%2C%20we%20can%20easily%20leverage%20existing%20DLP%20policies%20in%20other%20services%2C%20like%20Exchange%20or%20SharePoint%20Online%2C%20to%20extend%20their%20protection%20into%20Teams.%20IT%20can%20also%20create%20new%20policies%20across%20Microsoft%20365%20or%20specific%20to%20Teams%20depending%20on%20organizational%20needs%20or%20requirements.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22security%20and%20compliance.png%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234281iD46DB57326CD02D6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22security%20and%20compliance.png%22%20alt%3D%22security%20and%20compliance.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fsensitivity-labels%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESensitivity%20labels%3C%2FA%3E%20allow%20us%20to%20classify%20and%20protect%20unstructured%20organizational%20data%20that%20may%20not%20be%20identified%20through%20our%20DLP%20policies%20such%20as%20a%20confidential%20internal%20memo.%20Once%20a%20sensitivity%20label%20is%20applied%20to%20an%20email%20or%20document%2C%20the%20configured%20protection%20settings%20for%20that%20specific%20label%20are%20enforced%20wherever%20that%20content%20travels%20within%20the%20Microsoft%20ecosystem.%20This%20includes%20encrypting%20emails%20or%20documents%2C%20applying%20watermarks%2C%20automatic%20and%20recommended%20labeling%2C%20and%20the%20ability%20to%20protect%20content%20in%20site%20and%20group%20containers.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3ENow%20let%E2%80%99s%20cover%20how%20to%20take%20advantage%20of%20data%20protection%20and%20governance%20in%20Teams%20to%20address%20the%20security%20needs%20of%20your%20organization.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EApplying%20Data%20Protection%20and%20Governance%20in%20your%20Organization%3C%2FSTRONG%3E%3CBR%20%2F%3EData%20protection%20and%20governance%20is%20often%20not%20a%20one-size-fits-all%20model.%20While%20organization-wide%20baseline%20protections%20play%20a%20critical%20role%20in%20a%20data%20management%20strategy%2C%20different%20business%20groups%2C%20departments%2C%20or%20subsets%20of%20users%20may%20need%20heightened%20protections%20to%20ensure%20data%20security.%20Below%20are%20some%20of%20the%20most%20impactful%20capabilities%20and%20controls%20organizations%20can%20implement%20across%20their%20landscape%20to%20drive%20an%20effective%20data%20protection%20and%20governance%20strategy.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CBR%20%2F%3E%3CSTRONG%3EHow%20to%20secure%20data%20and%20prevent%20data%20loss%3C%2FSTRONG%3E%3CBR%20%2F%3EAs%20mentioned%20throughout%20this%20blog%2C%20effective%20data%20management%20requires%20IT%20to%20be%20able%20to%20identify%2C%20monitor%2C%20and%20automatically%20protect%20all%20sensitive%20information%20across%20Microsoft%20365.%20For%20structured%20data%2C%20this%20can%20be%20supported%20through%20creating%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fdata-loss-prevention-policies%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edata%20loss%20prevention%3C%2FA%3E%20policies%20to%20intelligently%20detect%20and%20prevent%20inadvertent%20disclosure.%20In%20order%20to%20protect%20unstructured%20data%2C%20IT%20can%20take%20advantage%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fsensitivity-labels%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esensitivity%20labels%3C%2FA%3E%20to%20have%20protection%20settings%2C%20such%20as%20content%20encryption%20or%20markings%2C%20applied%20to%20the%20content.%20The%20integration%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2FMicrosoftTeams%2Fsensitivity-labels%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esensitivity%20labels%20in%20Teams%3C%2FA%3E%20helps%20regulate%20access%20to%20sensitive%20organizational%20documents%20within%20teams%20by%20protecting%20content%20at%20the%20container%20level.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CBR%20%2F%3EFor%20groups%20or%20individuals%20that%20may%20need%20to%20be%20prevented%20from%20communicating%20with%20other%20groups%2C%20such%20as%20departments%20handling%20confidential%20information%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Finformation-barriers-policies%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInformation%20Barrier%20policies%3C%2FA%3E%20can%20help%20IT%20isolate%20segments%20to%20meet%20relevant%20industry%20standards%20or%20regulations.%20Additionally%2C%20with%20this%20major%20shift%20to%20online%20communications%20we%20can%20leverage%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fcommunication-compliance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECommunication%20Compliance%20in%20Teams%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fcommunication-compliance%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eacross%20Microsoft%20365%3C%2FA%3E%20to%20foster%20a%20safe%20and%20inclusive%20workplace.%20Communication%20Compliance%20helps%20organizations%20meet%20corporate%20policies%20such%20as%20ethical%20standards%20and%20risk%20management%20including%20identifying%20potential%20data%20leakage.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CBR%20%2F%3E%3CSTRONG%3EHow%20to%20govern%20data%20for%20compliance%20and%20regulatory%20requirements%3C%2FSTRONG%3E%3CBR%20%2F%3EWhile%20items%20like%20DLP%20and%20Communication%20Compliance%20enable%20organizations%20meet%20regulatory%20requirements%2C%20we%20also%20need%20to%20ensure%20we%20can%20retain%20and%20search%20data%20across%20our%20landscape.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fretention%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERetention%20policies%3C%2FA%3E%20enabled%20across%20Microsoft%20365%20services%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fretention-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eincluding%20Teams%3C%2FA%3E%2C%20help%20organizations%20meet%20both%20industry%20regulations%20and%20internal%20policies%20on%20data%20retention%20and%20deletion.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CBR%20%2F%3EOrganizations%20have%20many%20reasons%20to%20respond%20to%20a%20legal%20case%20that%20might%20require%20stakeholders%20to%20quickly%20find%20and%20retain%20relevant%20data%20across%20email%2C%20documents%2C%20instant%20messaging%20conversations%2C%20and%20other%20content%20locations.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fmanage-legal-investigations%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EeDiscovery%20case%20tools%3C%2FA%3E%20help%20relevant%20stakeholders%20perform%20tasks%20like%20managing%20holds%2C%20case%20management%2C%20content%20search%2C%20and%20many%20other%20similar%20activities%20all%20in%20the%20security%20and%20compliance%20center.%20Additionally%2C%20large%20organizations%20can%20be%20required%20to%20turn%20over%20all%20Electronically%20Stored%20Information%20(ESI)%20which%20can%20be%20assisted%20by%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fediscovery-investigation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EeDiscovery%20in%20Teams%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3ECreating%20a%20secure%20and%20compliant%20Microsoft%20Teams%20environment%3C%2FSTRONG%3E%3CBR%20%2F%3EWhile%20data%20protection%20and%20governance%20in%20Teams%20is%20foundational%20with%20the%20increase%20in%20online%20communications%2C%20it%E2%80%99s%20only%20one%20set%20of%20security%20capabilities.%20With%20Teams%20you%20have%20comprehensive%20security%20including%20items%20like%20multi-factor%20authentication%2C%20Conditional%20Access%20policies%2C%20Safe%20Attachments%2C%20Advanced%20Threat%20Protection%20capabilities%2C%20and%20more%20that%20builds%20on%20the%20Microsoft%20365%20security%20foundation.%20You%20can%20learn%20more%20about%20leveraging%20the%20Microsoft%20365%20security%20foundation%20to%20manage%20security%20and%20compliance%20in%20Teams%20in%20our%20latest%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F5ff8e7bd-8a8a-44dd-bc84-ce24ba04e04f%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Ignite%20session%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIn%20order%20to%20create%20a%20secure%20and%20complaint%20Teams%20environment%20for%20your%20organization%2C%20please%20review%20the%20below%20guidance%20to%20start%20enabling%20these%20capabilities%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fdlp-microsoft-teams%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnabling%20Data%20Loss%20Prevention%20for%20Teams%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Ftop-security-tasks-for-remote-work%3Fview%3Do365-worldwide%237-configure-mfa-and-conditional-access-for-guests-including-intune-mobile-app-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E12%20tasks%20to%20support%20secure%20remote%20work%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fsecurity-compliance-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20security%20and%20compliance%20in%20Microsoft%20Teams%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoftteams%2Fteams-security-guide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUnderstanding%20Security%20and%20Microsoft%20Teams%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EFor%20more%20depth%20learning%20and%20interactive%20training%20make%20sure%20to%20check%20out%20the%20latest%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fteams%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETeams%20training%20on%20Microsoft%20Learn%3C%2FA%3E%20including%20a%20specific%20learning%20path%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fm365-teams-security%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eenforcing%20security%2C%20privacy%2C%20and%20compliance%20in%20Microsoft%20Teams%3C%2FA%3E!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1898638%22%20slang%3D%22en-US%22%3E%3CP%3EOrganizations%20are%20continuing%20to%20work%20in%20a%20remote%20or%20hybrid-remote%20environment%20which%20accentuates%20the%20need%20to%20protect%20people%2C%20devices%2C%20apps%2C%20and%20the%20data%20that%20spans%20across%20the%20entire%20landscape.%20An%20increase%20in%20online%20collaboration%20has%20caused%20an%20influx%20of%20data%20that%20is%20critical%20for%20organizations%20to%20ensure%20remains%20secure%2C%20wherever%20employees%20are%20collaborating%20from.%20This%20is%20supported%20by%20the%20115%20million%20daily%20active%20users%20on%20Microsoft%20Teams%2C%20reemphasizing%20the%20need%20to%20ensure%20we%20can%20protect%20all%20the%20information%20and%20data%20created%20from%20increased%20online%20collaboration.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22data.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F234282i381E5657E54B73AF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22data.png%22%20alt%3D%22data.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1898638%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Teams%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1901460%22%20slang%3D%22en-US%22%3ERe%3A%20Protecting%20your%20data%20-%20creating%20a%20secure%20and%20compliant%20Microsoft%20Teams%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1901460%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20this%20somehow%20comprehensive%20overview%3C%2FP%3E%3CP%3ENevertheless%20there%20is%20one%20pain%20point%20for%20now%20is%20ho%20to%20prevent%20screen%20sharing%20of%20sensitive%20information%20...with%20Compliance%20at%20best%20you%20can%20be%20alerted%20after%20the%20fact%20but%20you%20can%20not%20prevent...%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1902654%22%20slang%3D%22en-US%22%3ERe%3A%20Protecting%20your%20data%20-%20creating%20a%20secure%20and%20compliant%20Microsoft%20Teams%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1902654%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F687369%22%20target%3D%22_blank%22%3E%40CHHumbert%3C%2FA%3E%26nbsp%3B-%20great%20feedback%20and%20it's%20a%20pain%20point%20that%20we've%20heard%20from%20organizations.%20We'll%20be%20publishing%20a%20blog%20series%20here%20on%20the%20Tech%20Community%20covering%20secure%20collaboration%20so%20thanks%20for%20sharing%20and%20we'll%20look%20to%20provide%20some%20insights%20around%20secure%20screen%20sharing%20in%20the%20coming%20months%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1905896%22%20slang%3D%22en-US%22%3ERe%3A%20Protecting%20your%20data%20-%20creating%20a%20secure%20and%20compliant%20Microsoft%20Teams%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1905896%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F6026%22%20target%3D%22_blank%22%3E%40John%20Gruszczyk%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E

Organizations are continuing to work in a remote or hybrid-remote environment which accentuates the need to protect people, devices, apps, and the data that spans across the entire landscape. An increase in online collaboration has caused an influx of data that is critical for organizations to ensure remains secure, wherever employees are collaborating from. This is supported by the 115 million daily active users on Microsoft Teams, reemphasizing the need to ensure we can protect all the information and data created from increased online collaboration.

 

Key customer questions for data governance and protection
As the world has shifted to remote work as the new normal, organizations are facing a variety of increasing regulations and challenges. We are often asked a common set of questions by business leaders:

  • How can we ensure sensitive data is not purposefully or accidentally shared with unintended recipients?
  • With the shift to online collaboration creating an increased volume of information and data, how do we remain complaint with regulations and privacy needs?
  • When employees are communicating online, how can we ensure they follow company policies to foster a safe and inclusive culture?

These questions are supported by a Harvard Business Review study commissioned by Microsoft that reveals organizations are finding an increased difficulty in securing and governing their data. While 77% of organizations agree an effective security, risk, and compliance strategy is essential for business success, an alarming 82% acknowledge increased risks and complexities have made an effective data management strategy more challenging.


Understanding the data landscape: structured versus unstructured data
One of the first components of data protection involves understanding how much structured and unstructured data exists in your organization. Structured data, organized in a pattern such as account numbers or credit cards, can often be identified using tools focused on preventing data loss. But how can we also ensure that unstructured data, like an internal release plan or confidential product specifications, also remains protected?

 

Creating an effective data governance and protection strategy
To help customers address complex data management needs, we can leverage built-in protections and AI capabilities to help safeguard both structured and unstructured data wherever it lives. By focusing on an approach of knowing, protecting, and governing data we can effectively build our organizational data governance and protection strategy.


Identifying the volume of structured and unstructured data in our organization helps us understand what protection capabilities we need to implement to have protection across our landscape. Data Loss prevention capabilities can leverage both built-in and custom sensitive information types to help protect structured data. Using trainable classifiers helps us govern our unstructured data by being able to identify items that meet our organization-defined policies to apply protections such as sensitivity or retention polices.

data.png

 

How does that apply to Microsoft Teams?
As part of the Microsoft 365 services, Teams follows all the security best practices and procedures such as service-level security through defense-in-depth and rich controls within the service. This means we can apply these same principles to ensure our collaboration and communication landscape have consistent advanced security and compliance capabilities leveraged from Microsoft 365. Teams enforces team and organization-wide multi-factor authentication (MFA) and single single-on through Azure Active Directory. Teams integration with SharePoint ensures file storage is backed by SharePoint encryption, while items like notes stored in OneNote are backed by OneNote encryption and stored in the team SharePoint site.


Because of this integration with familiar services like SharePoint and Exchange, IT can take advantage of simplified manageability in the centralized Microsoft 365 admin center to protect the data landscape. Let us look at how information protection and data loss prevention are implemented in Teams.


Data Protection in Microsoft Teams
Data Loss Prevention (DLP) capabilities allow IT to define policies that help prevent people from sharing sensitive information, extending into Teams chat, channel, and private channel messages. This also includes protection from OneDrive for Business for documents containing sensitive information shared in Teams messages to ensure unauthorized users cannot access the document. Similar to how DLP works across Microsoft 365 like in Outlook or OneDrive, when a DLP policy violation occurs in Teams the sensitive content is blocked for data protection. Additionally, a helpful end user tip appears to educate the end user on why the content was blocked.


The sender’s view:

message blocked.png

 

An educational policy tip for the sender:

policy tip.png

 

The recipient’s view:

recipients view.png

 

By leveraging the strength of Microsoft 365 security across our data landscape, we can easily leverage existing DLP policies in other services, like Exchange or SharePoint Online, to extend their protection into Teams. IT can also create new policies across Microsoft 365 or specific to Teams depending on organizational needs or requirements.

security and compliance.png

 

Sensitivity labels allow us to classify and protect unstructured organizational data that may not be identified through our DLP policies such as a confidential internal memo. Once a sensitivity label is applied to an email or document, the configured protection settings for that specific label are enforced wherever that content travels within the Microsoft ecosystem. This includes encrypting emails or documents, applying watermarks, automatic and recommended labeling, and the ability to protect content in site and group containers.


Now let’s cover how to take advantage of data protection and governance in Teams to address the security needs of your organization.


Applying Data Protection and Governance in your Organization
Data protection and governance is often not a one-size-fits-all model. While organization-wide baseline protections play a critical role in a data management strategy, different business groups, departments, or subsets of users may need heightened protections to ensure data security. Below are some of the most impactful capabilities and controls organizations can implement across their landscape to drive an effective data protection and governance strategy.


How to secure data and prevent data loss
As mentioned throughout this blog, effective data management requires IT to be able to identify, monitor, and automatically protect all sensitive information across Microsoft 365. For structured data, this can be supported through creating data loss prevention policies to intelligently detect and prevent inadvertent disclosure. In order to protect unstructured data, IT can take advantage of sensitivity labels to have protection settings, such as content encryption or markings, applied to the content. The integration of sensitivity labels in Teams helps regulate access to sensitive organizational documents within teams by protecting content at the container level.


For groups or individuals that may need to be prevented from communicating with other groups, such as departments handling confidential information, Information Barrier policies can help IT isolate segments to meet relevant industry standards or regulations. Additionally, with this major shift to online communications we can leverage Communication Compliance in Teams and across Microsoft 365 to foster a safe and inclusive workplace. Communication Compliance helps organizations meet corporate policies such as ethical standards and risk management including identifying potential data leakage.


How to govern data for compliance and regulatory requirements
While items like DLP and Communication Compliance enable organizations meet regulatory requirements, we also need to ensure we can retain and search data across our landscape. Retention policies enabled across Microsoft 365 services, including Teams, help organizations meet both industry regulations and internal policies on data retention and deletion.


Organizations have many reasons to respond to a legal case that might require stakeholders to quickly find and retain relevant data across email, documents, instant messaging conversations, and other content locations. eDiscovery case tools help relevant stakeholders perform tasks like managing holds, case management, content search, and many other similar activities all in the security and compliance center. Additionally, large organizations can be required to turn over all Electronically Stored Information (ESI) which can be assisted by eDiscovery in Teams.


Creating a secure and compliant Microsoft Teams environment
While data protection and governance in Teams is foundational with the increase in online communications, it’s only one set of security capabilities. With Teams you have comprehensive security including items like multi-factor authentication, Conditional Access policies, Safe Attachments, Advanced Threat Protection capabilities, and more that builds on the Microsoft 365 security foundation. You can learn more about leveraging the Microsoft 365 security foundation to manage security and compliance in Teams in our latest Microsoft Ignite session.


In order to create a secure and complaint Teams environment for your organization, please review the below guidance to start enabling these capabilities:

For more depth learning and interactive training make sure to check out the latest Teams training on Microsoft Learn including a specific learning path on enforcing security, privacy, and compliance in Microsoft Teams!

 

3 Comments
New Contributor

Thanks for this somehow comprehensive overview

Nevertheless there is one pain point for now is ho to prevent screen sharing of sensitive information ...with Compliance at best you can be alerted after the fact but you can not prevent...

Microsoft

Hi @CHHumbert - great feedback and it's a pain point that we've heard from organizations. We'll be publishing a blog series here on the Tech Community covering secure collaboration so thanks for sharing and we'll look to provide some insights around secure screen sharing in the coming months

New Contributor

Thanks @John Gruszczyk