System glitches Malicious intentOops! 39% 24% 37% 97% avoidable! Online Trust Alliance: 2013 Data Protection and Breach Readiness Guide.

Slides:



Advertisements
Similar presentations

Advertisements

Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
2 DLP helps to identify monitor protect sensitive data through deep content analysis.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
As Never Seen Before Ronen Gabbay Microsoft Exchange Regional Director U-BTech & Hi-Tech CTO.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MEC /22/2017 5:53 AM © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

customer.
“Click and Run ” “Click once repeat often” Admins Service Operations “ Install and forget” Engineering Support Key considerations: Deterministic, fool.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
demo Demo.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Windows Vista Search Mathias Carlberg
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
ADatum Assets ADatum REST Web Svc ADatum REST Web Svc.

demo User Signs Up Temporary Account is Created with Verification Link Sent User Clicks Link Account is Activated Login.Register(userName,
Information explosion 1.4X 44X Protect communications.
Microsoft Virtual Academy Chris Oakman | Managing Partner Infrastructure Team | Eastridge Technology Curtis Sawin | Technical Solutions Professional |
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Data Loss Prevention (DLP) in Microsoft Office 365
ActiveSync & DLP management in Exchange Online
Data Loss Prevention in Office 365
Deployment Planning Services
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
Understanding Multi-Geo Capabilities in Office 365
Protect sensitive information with Office 365 DLP
Protect your data in Office 365 with Data Loss Prevention
The utility belt for managing security and compliance in Office 365
Rights Management Services (RMS)
Understanding best practices in classifying sensitive data
Microsoft Intune MAM without Device Enrollment
Microsoft 365 Education – Partner Quick Reference Card
Office Power Hour New developer APIs and features for Apps for Office
What’s new in Office 365 administration
Application Delivery & MAM Policy
Automate your Dynamics 365 day
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/19/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Customize and Tune Microsoft Office 365 Data Loss Prevention
Managing and Troubleshooting Exchange Server Delivery
SPC2012 – IT-Pro 11/30/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Office365 Exchange Online Risun Antony Technology Specialist
Title of Presentation 12/2/2018 3:48 PM
12/27/2018 4:59 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Data Loss Prevention in Office 365
SPC Developer 1/18/2019 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Data Loss Prevention in Office 365
Title of Presentation 5/24/2019 1:26 PM
Microsoft Data Insights Summit
Microsoft Data Insights Summit
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

System glitches Malicious intentOops! 39% 24% 37% 97% avoidable! Online Trust Alliance: 2013 Data Protection and Breach Readiness Guide

Data Loss Prevention in Exchange Helps to identify monitor protect sensitive data through deep content analysis Identify Protect Monitor End user education

Available in Exchange Online A3/A4 G3/G4 E3/E4 Available in Exchange Server 2013 Requires an Exchange Enterprise Client Access License (CAL) with services us/exchange/microsoft-exchange- server-licensing-licensing-overview- FX aspx Note: Can be used with Exchange 2010 with limited functionality

Policy distribution Contextual policy education DLP policy configuration Backend policy evaluation Audit & incident data generation Admin Information workers DLP system walkthrough

DLP Policy Enforcement Flexible tools for policy enforcement that provide the right level of control Transport Rules Rights Management Data Loss Prevention ALERT CLASSIFY ENCRYPT APPENDOVERRIDE REVIEW REDIRECT BLOCK

XML configuration that define policy objectives Built atop of Exchange transport rules Management and deployment Exchange standard interfaces – Web and PowerShell Content to monitor User action Mail flow actions contains Credit cards EU debit cards

Transport rule conditions DLP specific action – Policy Tip Exceptions DLP specific condition Transport rule actions

Countr y PIIFinancialHealth US US State Security Breach Laws, US State Social Security Laws, COPPA GLBA & PCI-DSS (Credit, Debit Card, Checking and Savings, ABA, Swift Code) Limited Investment: US HIPPA, UK Health Service, Canada Health Insurance card Rely on Partners and ISVs Germany EU data protection, Drivers License, Passport National Id EU Credit, Debit Card, IBAN, VAT, BIC, Swift Code UK Data Protection Act, UK National Insurance, Tax Id, UK Driver License, Passport EU Credit, Debit Card, IBAN, BIC, VAT, Swift Code Canada PIPED Act, Social Insurance, Drivers License Credit Card, Swift Code France EU data protection, Data Protection Act, National Id (INSEE), Drivers License, Passport EU Credit, Debit Card, IBAN, BIC, VAT, Swift Code Japan PIPA, Resident Registration, Social Insurance, Passport, Driving License Credit Card, Bank Account, Swift Code Australia Drivers License, Passport, Social InsuranceCredit Card, Bank Account, Swift Code

Integrated into Exchange Transport Rule (ETR) engine Runs in categorizer during OnResolvedMessage Integrated as a new ETR Predicate Performs text extraction for body & attachments followed by classification Can be combined with any existing Predicates & Actions Text extraction Transport rule agent Classification

Content analysis process Examples Joseph F. Foster Visa: Expires: 2/2012 Get Content  a 16 digit number is detected RegEx Analysis  matches checksum  does NOT match Function Analysis 1.Keyword Visa is near the number 2.A regular expression for date (2/2012) is near the number Additional Evidence 1.There is a regular expression that matches a check sum 2.Additional evidence increases confidence Verdict

Fabrikam Patent Form Tracking Number Author Date Invention Title Names of all authors... Get Template Content 1.Condensed representation of the hashed template content 2.Stored as a custom sensitive information type Create Fingerprint CONFIGURATIO N CLASSIFICATION RULE with FINGERPRINT 1.Add fingerprint to policy rules together with other conditions 2.Map to desired actions Refernce in Policy Rule

Fabrikam Patent Form Tracking Number Author Alex Date 1/28/2014 Invention Title Fabrikam Green Energy... Get Content 1.Temporary in memory representation 2.Used for comparson with source fingerprint created at config time Create Fingerprint 1.Compare the two fingerprints 2.Evaluate a ’containtment coefficient’ to declare a matcb Verdict RUNTIME POLICY RULES REFERENCES TO PREVIOUSLY GENEATED FINGERPRINTS FINGERPRINT GENERATION Evaluation + verdict

Fabrikam Patent Form Tracking Number Author Date Invention Title Names of all authors... Get Template Content 1.Condensed representation of the template content 2.Document is not stored 3.Stored as a sensitive information type Create Fingerprint Fabrikam Patent Form Tracking Number Author Alex Date 1/28/2014 Invention Title Fabrikam Green Energy... Get Content 1.Temporary in memory representation 2.Used for comparson with source fingerprint created at config time Create Fingerprint 1.Compare the two fingerprints 2.Evaluate a ’containtment coefficient’ to declare template contained in content Verdict CONFIGURATIO N RUNTIME CLASSIFICATION RULE with FINGERPRINT GENERATION Evaluation + verdict

b-Bit Minwise Hashing INPUT TEXTThis is a test. I love DLP and Fingerprinting. STEP 1 Break into Shingles of length 2 This isIs aa testtest II LoveLove DLPDLP andAnd Fingerprinting 64 bit hash value of the shingle (e.g., This is  ) Hash 1 (universal hash function) Hash 2 (hash function with random dispersion) STEP 2 Convert to a 64 bit value (hash it!) STEP 3 Map the 64 bit value randomly to 1024 other 64 bit values STEP 4 Reduce each 64 bit value to a 16 bit value (LSB Mask) Apply a 16 bit mask

Empower users to manage their compliance Contextual policy education Doesn’t disrupt user workflow Can work even when disconnected Admin customizable text and actions Outlook OWA User education

Deep content analysis engine 46 OOB sensitive information types 40 OOB DLP Templates Support for 3rd party defined DLP policy templates Policy Tips in OWA and Mobile OWA Advanced Document Fingerprinting in Exchange, Outlook, and OWA 5 new OOB sensitive information types Policy Tips in Outlook 2013 Contextual user education and empowerment Incident management Rich reporting

Classification integration with SharePoint through FAST index demoed at SPC keynote [Feb]

Q&A

Appendix

Audit data Classification Rule details

Comprehensive view of DLP policy performance Downloadable excel workbook Drill into specific departures from policy to gain business insights

Customizing Your DLP Deployments Identify Protect Monitor End user education Custom policy templates Tuning of built-in types Custom sensitive types Real-time incident reports Policy rule reports Policy audit mode Flexible policy authoring system Rich policy conditions and actions End-user false positive reporting Configurable end-user education content

Plan Start with built-in templates to assist meeting your business or regulatory requirements Customize policy rules, sensitive types and scope Target a pilot group of users Tune Set policies to test and notify modes Enable incident reports to assess impact of rules Tune based on false positive reports and hit rates Enable Switch policies to enforce mode Continue to tune based on report data trends

Customize Policy Tip messages Messages for notification, block and override can be customized. Customize link for user education Specify an internal URL with company policies around handling sensitive content. Custom classification rule names are displayed here.

Custom DLP content: Supplemental DLP policy templates Supplemental DLP classification rules Incident reports integration with custom workflows Custom agents for additional conditions and actions Custom reporting solutions E.g. MessageStats Business Insights from Dell

Exchange 2013 DLP introduction DLP policy templates Managing DLP policies OOB DLP policy templates Policy tips in Exchange Supported file types MessageStats Quick Guide

© 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.