New Blog Posts | Security and Compliance pt. 2

%3CLINGO-SUB%20id%3D%22lingo-sub-2194444%22%20slang%3D%22en-US%22%3ENew%20Blog%20Posts%20%7C%20Security%20and%20Compliance%20pt.%202%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2194444%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1615239398264.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F261807i769DEC07E878FFD0%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1615239398264.png%22%20alt%3D%22JasonCohen1892_0-1615239398264.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fprotect-your-power-bi-instance-using-microsoft-cloud-app%2Fba-p%2F2166872%22%20target%3D%22_blank%22%3EProtect%20your%20Power%20BI%20instance%20using%20Microsoft%20Cloud%20App%20Security%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20the%20Microsoft%20Cloud%20App%20Security%20and%20Power%20BI%20teams%20(two%20of%20the%20named%20leaders%20in%20the%20Cloud%20Access%20Security%20Broker%20(CASB)%2C%20and%20Analytics%20and%20BI%20markets%2C%20respectively)%2C%20we%20have%20identified%20an%20opportunity%20to%20provide%20an%20even%20more%20comprehensive%20solution.%20By%20bringing%20these%20two%20technologies%20together%2C%20we%20provide%20security%20administrators%20the%20tools%20they%20need%20to%20safely%20onboard%20business%20users%20to%20a%20large%20cloud%20workload%20such%20as%20Power%20BI%20(which%20has%20become%20an%20even%20greater%20key%20service%20for%20businesses%20in%20%E2%80%9Cwork-from-home%E2%80%9D%20mode%20during%20the%20COVID-19%20crisis)%2C%20while%20enjoying%20peace%20of%20mind%20with%20respect%20to%20the%20threats%20and%20risks%20inherent%20in%20using%20cloud%20services.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-data-protection-blog-series-mcas-dlp-walk-through%2Fba-p%2F2169900%22%20target%3D%22_blank%22%3EMCAS%20Data%20Protection%20Blog%20Series%3A%20MCAS%20DLP%20Walk-Through%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%20will%20be%20focusing%20on%20the%20new%20capability%20of%20extending%20Microsoft%20data%20loss%20prevention%20to%20MCAS%20(announced%20in%20September%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fa-unified-approach-to-data-loss-prevention-from-microsoft%2Fba-p%2F1694492%22%20target%3D%22_blank%22%3Ehere%3C%2FA%3E)%20in%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmicrosoft-my.sharepoint-df.com%2Fpersonal%2Fsachow_microsoft_com%2FDocuments%2FAll%2520my%2520folders%2FPM%2520Role%2FInitiatives%2FDLP%2520Blog%2520Series%2Fcompliance.microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ECompliance%20Center%3C%2FA%3E.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-ninja-training-has-been-updated%2Fba-p%2F2167577%22%20target%3D%22_blank%22%3EMCAS%20Ninja%20Training%20has%20been%20updated!%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ECheck%20it%20out%20at%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fmcasninja%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2Fmcasninja%3C%2FA%3E!%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fcheck-out-our-new-videos-focused-on-insider-risk-management%2Fba-p%2F2185285%22%20target%3D%22_blank%22%3ECheck%20out%20our%20new%20videos%20focused%20on%20Insider%20Risk%20Management%20!!!%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%20figured%20out%20that%20watching%20short%20videos%20is%20sometimes%20the%20best%20way%20and%20use%20of%20our%20customers%20time%20to%20learn%20about%20our%20products%20and%20innovations...%20So...%20we%20created%20a%20video%20series!%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Finsider-risks-aren-t-just-a-security-problem-uncovering-hidden%2Fba-p%2F2160069%22%20target%3D%22_blank%22%3EInsider%20risks%20aren%E2%80%99t%20just%20a%20security%20problem%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20podcast%20we%20explore%20how%20partnering%20with%20Human%20Resources%20can%20create%20a%20strong%20insider%20risk%20management%20program%2C%20a%20better%20workplace%20and%20more%20secure%20organization.%26nbsp%3B%20We%20uncover%20the%20types%20of%20HR%20data%20that%20can%20be%20added%20to%20an%20insider%20risk%20management%20system%2C%20using%20artificial%20intelligence%20to%20contextualize%20the%20data%2C%20all%20while%20respecting%20privacy%20and%20keeping%20in%20line%20with%20applicable%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fenhancing-microsoft-defender-for-identity-data-using-microsoft%2Fba-p%2F2178286%22%20target%3D%22_blank%22%3EEnhancing%26nbsp%3BMicrosoft%26nbsp%3BDefender%20for%20Identity%26nbsp%3BData%20Using%20Microsoft%26nbsp%3B365%20Defender%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAfter%20a%20customer%20has%20connected%20Microsoft%20Defender%20for%20Identity%26nbsp%3Bto%20Microsoft%20365%20Defender%26nbsp%3Bone%20of%20the%20benefits%20is%20the%20ability%20to%20query%20the%20Defender%20for%20Identity%26nbsp%3Bactivities.%26nbsp%3BIn%20this%20blog%20we%26nbsp%3Bshowcase%20two%20customer%26nbsp%3Buse%20cases%26nbsp%3Bthat%20took%20advantage%20of%26nbsp%3Bthe%26nbsp%3BAdvanced%20Hunting%26nbsp%3Bfunctionality%20available%20today.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fm365-presents-interactive-user-guides-for-teams-dlp-endpoint-dlp%2Fba-p%2F2185956%22%20target%3D%22_blank%22%3EM365%20presents%3A%20interactive%20user%20guides%20for%20Teams%20DLP%2C%20Endpoint%20DLP%20and%20Insider%20Risk!%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3EFollow%20these%20step%20by%20step%20guides%20to%20help%20you%20get%20started%20in%20configuring%20Teams%20DLP%2C%20Endpoint%20DLP%20and%20Insider%20Risk%20in%20your%20organization!%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fannouncement-mcas-3rd-party-idp-documentation%2Fba-p%2F2185929%22%20target%3D%22_blank%22%3EANNOUNCEMENT%3A%20MCAS%203rd%20Party%20IdP%20Documentation%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWe%20have%20some%20exciting%20news%20to%20share%20about%20our%20Microsoft%20Cloud%20App%20Security%20documentation%20updates.%20Last%20year%2C%20we%20released%20the%20ability%20to%20deploy%20Real%20Time%20Controls%20using%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-deployment-any-app%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eany%20identity%20provider%20(IdP)%3C%2FA%3E.%20After%20receiving%20initial%20feedback%20from%20our%20customers%20and%20the%20field%2C%20the%20top%20three%20most%20requested%20IdPs%20were%20PingOne%2C%20Okta%2C%20and%20AD%20FS.%20The%20configuration%20can%20be%20tricky.%20We%20thought%20publishing%20an%20example%20for%20each%20IdP%20would%20be%20useful%20for%20our%20users.%20We%20are%20happy%20to%20announce%20that%20all%20three%20guides%20are%20now%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3ELIVE%3C%2FSTRONG%3E!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fazure-aip-portal-label-amp-policy-management-admin-experience%2Fba-p%2F2182678%22%20target%3D%22_blank%22%3EAzure%20AIP%20Portal%20Label%20%26amp%3B%20Policy%20Management%20Admin%20Experience%20-%20Post%20March%2031st%20Deprecation%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20blog%20lists%20key%20admin%20components%20that%20will%20be%20deprecated%20and%20describes%20how%20this%20impacts%20the%20admin.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fgcc-h-aip-manual-migration%2Fba-p%2F2185328%22%20target%3D%22_blank%22%3EGCC-H%20AIP%20Manual%20Migration%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20blog%20gives%20an%20end-to-end%26nbsp%3B%3CU%3Euse%20case%20example%3C%2FU%3E%26nbsp%3Bon%20how%20a%20GCC-H%20admin%20can%20migrate%20their%20parent%20label%20and%20sublabel%20with%20its%20corresponding%20protection%20template%20from%20the%20AIP%20Portal%20to%20the%20Security%20and%20Compliance%20Center.%20Additional%20information%20about%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fenterprise-mobility-security%2Fsolutions%2Fems-aip-premium-govt-service-description%23label-migration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elabel%20migration%3C%2FA%3E%26nbsp%3Bcan%20be%20found%20in%20our%20official%20documentation.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Flaw-firms-we-hear-you-introducing-microsoft-365-solution-for%2Fba-p%2F2188940%22%20target%3D%22_blank%22%3ELaw%20Firms%20We%20Hear%20You!%20Introducing%20Microsoft%20365%20Solution%20for%20Legal%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%20have%20developed%20a%204-phased%20approach%20to%201)%20Enable%2C%202)%20Empower%2C%203)%20Differentiate%2C%20and%204)%20Transform%20your%20journey%20to%20Microsoft%20Teams%20leveraging%20Microsoft%20365%20security%20and%20compliance%20tools.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2194444%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Security%20Center%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECompliance%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20%26amp%3B%20Compliance%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1615239398264.png

Protect your Power BI instance using Microsoft Cloud App Security - Microsoft Tech Community

In the Microsoft Cloud App Security and Power BI teams (two of the named leaders in the Cloud Access Security Broker (CASB), and Analytics and BI markets, respectively), we have identified an opportunity to provide an even more comprehensive solution. By bringing these two technologies together, we provide security administrators the tools they need to safely onboard business users to a large cloud workload such as Power BI (which has become an even greater key service for businesses in “work-from-home” mode during the COVID-19 crisis), while enjoying peace of mind with respect to the threats and risks inherent in using cloud services.

 

MCAS Data Protection Blog Series: MCAS DLP Walk-Through - Microsoft Tech Community

We will be focusing on the new capability of extending Microsoft data loss prevention to MCAS (announced in September here) in the Compliance Center

 

MCAS Ninja Training has been updated! - Microsoft Tech Community

Check it out at http://aka.ms/mcasninja!

 

Check out our new videos focused on Insider Risk Management !!! - Microsoft Tech Community

We figured out that watching short videos is sometimes the best way and use of our customers time to learn about our products and innovations... So... we created a video series!

 

Insider risks aren’t just a security problem

In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization.  We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.

 

Enhancing Microsoft Defender for Identity Data Using Microsoft 365 Defender - Microsoft Tech Communi...

After a customer has connected Microsoft Defender for Identity to Microsoft 365 Defender one of the benefits is the ability to query the Defender for Identity activities. In this blog we showcase two customer use cases that took advantage of the Advanced Hunting functionality available today.  

 

M365 presents: interactive user guides for Teams DLP, Endpoint DLP and Insider Risk! - Microsoft Tec...

Follow these step by step guides to help you get started in configuring Teams DLP, Endpoint DLP and Insider Risk in your organization! 

 

ANNOUNCEMENT: MCAS 3rd Party IdP Documentation - Microsoft Tech Community

We have some exciting news to share about our Microsoft Cloud App Security documentation updates. Last year, we released the ability to deploy Real Time Controls using any identity provider (IdP). After receiving initial feedback from our customers and the field, the top three most requested IdPs were PingOne, Okta, and AD FS. The configuration can be tricky. We thought publishing an example for each IdP would be useful for our users. We are happy to announce that all three guides are now LIVE!

 

Azure AIP Portal Label & Policy Management Admin Experience - Post March 31st Deprecation - Microsof...

This blog lists key admin components that will be deprecated and describes how this impacts the admin. 

 

GCC-H AIP Manual Migration - Microsoft Tech Community

This blog gives an end-to-end use case example on how a GCC-H admin can migrate their parent label and sublabel with its corresponding protection template from the AIP Portal to the Security and Compliance Center. Additional information about label migration can be found in our official documentation.

 

Law Firms We Hear You! Introducing Microsoft 365 Solution for Legal - Microsoft Tech Community

We have developed a 4-phased approach to 1) Enable, 2) Empower, 3) Differentiate, and 4) Transform your journey to Microsoft Teams leveraging Microsoft 365 security and compliance tools.

0 Replies