Azure Information Protection

Slides:



Advertisements
Similar presentations
Introduction to Microsoft Word 2007 Access to Microsoft Word 2007 differs greatly from versions that preceded it, mostly in the way functions across the.
Advertisements

Microsoft Office Illustrated Fundamentals Unit C: Getting Started with Unit C: Getting Started with Microsoft Office 2010 Microsoft Office 2010.
Spotlight on Presentations
How can Microsoft PowerPoint 2007 help you share information?
Microsoft Word 2013 An Overview. Your Environment Quick Access Toolbar Customizable toolbar for one-click shortcuts Tabs Backstage View Tools located.
Microsoft Word 2010 Lesson 1: Introduction to Word.
Menus When you begin to explore Word 2007 you will notice a new look to the menu bar. There are three features that you should remember as you work within.
Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
What kinds of documents can you create with Word 2007?
XP Modifying the Slide Master Click the View tab on the Ribbon, and then, in the Master Views group, click the Slide Master button Click the Slide Master.
Spreadsheet Introduction and Terminology Fill in the Listening Guide as you view this presentation.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Microsoft Word The Help function. Under the “File” menu, click “Help”
Pasewark & Pasewark 1 Access Lesson 5 Creating and Modifying Reports Microsoft Office 2007: Introductory.
By: Michael K. Pa’ekukui Grand Canyon University TEC 539.
What kinds of documents can you create with Word 2007? Newsletter Business Report Lesson 1: Create a Document.
 The ribbon is the primary form of navigation in the Microsoft Office 2007 system.  There are seven Tabs on the Ribbon, more (contextual) tabs will.
The Problem:  When troubleshooting an IT person needs to reference the user guide that matches the version of hardware or software  A large number of.
Pasewark & Pasewark 1 Access Lesson 5 Creating and Modifying Reports Microsoft Office 2007: Introductory.
The References Tab contains tools that help users to easily create references, table of contents, indexes, captions, citations, footnotes, endnotes and.
Word 2007 ® Business and Personal Communication What kinds of documents can you create with Word 2007? 1.____________ _ Business Report.
The Word Window Fill out your Word Window Worksheet as you view this PowerPoint.
Microsoft Word 2007 In the Library at York College, all Windows computers have Microsoft Word 2007.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Bim Fall Final Exam Review.
Secure your complete data lifecycle using Azure Information Protection
Jeopardy Word-1 Word-2 Word-3 Word-4 Word-5 Q $100 Q $100 Q $100
Azure Information Protection
Objectives Create a folder in Google Drive.
International Computer Driving Licence Syllabus version 5.0
Understand Charts and SmartArt Graphics
Getting Started with Windows 10
Azure Information Protection Strategy and Roadmap
Deployment Planning Services
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
CompareDocs cloud Makes it Immediately Clear What has Changed Between Document Versions, on any Windows 10-Compatible PC or Device WINDOWS APP BUILDER.
Information Protection
Secure your complete data lifecycle using Azure Information Protection
Understanding best practices in classifying sensitive data
Microsoft Word 2003 Illustrated Complete
Microsoft Intune MAM without Device Enrollment
Azure Information Protection
Azure Information Protection
From home to business, from desktop to web and the devices in between, Office 2016 delivers the tools you need to get the work done, and you can get it.
Ochrana (nejen) poštovních zpráv pomocí AIP (Azure Information Protection) Miroslav Knotek MVP: Cloud and Datacenter Management, MCSE: Productivity IT.
Cloud Connect Seamlessly
Excel Spreadsheet Introduction and Terminology.
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Azure Information Protection
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Azure Information Protection
Azure Information Protection
Azure Information Protection
Azure Information Protection
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Office 365 when and where you need it. [Add your logo here]
Managing Content: You Need To Think About More Than Office 365
Word 2007 Basics TCC July 2011.
“Hello” slide Hello. Here’s what you need to know about your new Office: Access your files and personal settings from virtually anywhere Save your documents.
“Hello” slide Hello. Here’s what you need to know about your new Office: Access your files and personal settings from virtually anywhere Save your documents.
Exploring the Windows Section Part 1
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Microsoft Word 2013 Part I.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Azure Information Protection
Microsoft Office Illustrated Fundamentals
Chapter 8 Using Document Collaboration and Integration Tools
Presentation transcript:

Azure Information Protection Content Based Recommended Classification Organizations no longer operate within their own perimeter. Data is traveling between users, devices, apps and services more than ever before. So how can you identify and secure your data when it’s being stored in disparate locations and shared across boundaries? Microsoft Azure Information Protection allows users to: Manually/Automatically classify data based on sensitivity. Protect sensitive data by encrypting it and allowing authorized users access to the data. Track activities on shared files and revoke access if unexpected activities are encountered. Classification labels and protection travel with the data making it identifiable and protected at all times, regardless of where it is stored or whom it is shared. CLICK STEP(S) Click anywhere on the slide to begin

The Information Protection bar displays a document’s current classification. Currently, this document contains credit card information but has yet to be classified. Point Out: Sensitivity: Not Set (left side of Information Protection bar) Now let’s move on and save this document. CLICK STEP(S) On the Quick Access Toolbar, click Save.

Point Out: Tool Tip Bar and it’s recommendation. CLICK STEP(S) Click Change now.

By clicking Change now, Garth will apply the credit card data policy to the document. This policy applies classification to the document, sets a footer and a watermark. Point Out: Sensitivity label on Information Protection bar and watermark. CLICK STEP(S) Click the scroll bar to scroll down the page.

Point Out: Footer sensitivity label CLICK STEP(S) On the Ribbon, click File.

Point Out: Protected Document label Closing Statement: Azure Information Protection lets you classify, label, and protect your documents and emails. When you classify this data, persistent labels are added to the data, so that the classification is identifiable at all times, regardless of where the data is stored or with whom it’s shared. The persistent labels include visual markings such as a header, footer, or watermark. For your most sensitive data, you can also use Azure Rights Management encryption, identity, and authorization policies, to help prevent data loss. For end users, Azure Information Protection easily integrates with their existing workflows by adding an Information Protection bar to their Office applications. Azure Information Protection = Encryption + Authentication + Use Rights + Tracking