MEC 2014 4/22/2017 5:53 AM © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.

Slides:



Advertisements
Similar presentations
2 DLP helps to identify monitor protect sensitive data through deep content analysis.
Advertisements

Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of servers Across dozens of.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
System glitches Malicious intentOops! 39% 24% 37% 97% avoidable! Online Trust Alliance: 2013 Data Protection and Breach Readiness Guide.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
Microsoft Ignite /17/2017 2:11 PM
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Security challenges Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Protect communications Multi-engine anti-malware and enhanced spam filtering to help protect your environment from threats Enforce policy Flexible.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
Service Life CycleScenarioEXOLYOSPOOffice365 (suite wide) BuyProvisioning Licenses Storage ConsumeDevice – Software Device – Connections User.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
ArcGIS Workflow Manager An Introduction
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Module 9 Configuring Messaging Policy and Compliance.
Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 9 Configuring Messaging Policy and Compliance.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
Nov The cloud on your terms Antispam protection Mission-critical, high availability Voic in your inbox on a phone on a browser.
Module 7 Planning and Deploying Messaging Compliance.
Altman IM Ltd | | process | verify | convert | route | connect Prism Software’s solutions provide advanced workflow.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
Information explosion 1.4X 44X Protect communications.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Data Loss Prevention and Information Rights Management in SharePoint Tim Beamer, Plus Consulting
Data Loss Prevention (DLP) in Microsoft Office 365
ActiveSync & DLP management in Exchange Online
Intro to Data Loss Prevention In SharePoint 2016\Office 365
Data Loss Prevention in Office 365
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
Protect sensitive information with Office 365 DLP
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Protect your data in Office 365 with Data Loss Prevention
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Understanding best practices in classifying sensitive data
Data Loss Prevention in O365:The Basics
Azure Information Protection
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/19/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Customize and Tune Microsoft Office 365 Data Loss Prevention
Security in SharePoint and Teams with DLP, IRM, and AIP
Top 10 Tips for GDPR Compliance in Office 365
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Discover what’s new and what’s coming to SharePoint Modern Team sites
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Data Loss Prevention in Office 365
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Make it real: Help your customers comply with the GDPR
Comodo Dome Data Protection
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

MEC 2014 4/22/2017 5:53 AM © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Advanced Data Loss Prevention (DLP) in Exchange 4/22/2017 5:53 AM EDC302 Advanced Data Loss Prevention (DLP) in Exchange Jack Kabat Lead Program Manager Microsoft © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Data Loss Prevention in Exchange TechReady 17 4/22/2017 Data Loss Prevention in Exchange Identify Protect Monitor End user education Helps to identify monitor protect sensitive data through deep content analysis © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Demo Out of the box DLP policies TechReady 17 4/22/2017 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Customizing Your DLP Deployments TechReady 17 4/22/2017 Customizing Your DLP Deployments Identify Protect Monitor End user education Custom policy templates Tuning of built-in types Custom sensitive types Real-time incident reports Policy rule reports Policy audit mode End-user false positive reporting Configurable end-user education content Flexible policy authoring system Rich policy conditions and actions © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

DLP Deployment Phases Plan Start with built-in templates to assist meeting your business or regulatory requirements Customize policy rules, sensitive types and scope Target a pilot group of users Tune Set policies to test and notify modes Enable incident reports to assess impact of rules Tune based on false positive reports and hit rates Enable Switch policies to enforce mode Continue to tune based on report data trends

DLP policy templates Built-in templates based on common regulations TechReady 17 4/22/2017 DLP policy templates Built-in templates based on common regulations Import DLP policy templates from partners Build your own © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

What are DLP policy templates? TechReady 17 4/22/2017 What are DLP policy templates? XML configuration that define policy objectives Built atop of Exchange transport rules Management and deployment Exchange standard interfaces – Web and PowerShell XML Name Policies Conditions Content to monitor User action Mail flow actions contains Classification rules Credit cards EU debit cards © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

DLP policy rules Built on transport rules TechReady 17 4/22/2017 DLP policy rules Built on transport rules Rules applied in sequential order Set of conditions and resulting actions that describe the policy objective Take action to enforce policy Range of actions including: Hold, block, audit & provide notification for email that contains sensitive business data Conditions Actions Exceptions © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Demo Customizing DLP policies TechReady 17 4/22/2017 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Incident Reports Match details Rule details Classification Audit data

Content analysis process Microsoft Exchange 4/22/2017 Content analysis process Examples: Get Content Joseph F. Foster Visa: 4485 3647 3952 7352 Expires: 2/2015 RegEx Analysis 4485 3647 3952 7352  a 16 digit number is detected Function Analysis 4485 3647 3952 7352  matches checksum 1234 1234 1234 1234  does NOT match Additional Evidence Keyword Visa is near the number A regular expression for date (2/2015) is near the number Verdict There is a regular expression that matches a check sum Additional evidence increases confidence © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Sensitive content type customizations TechReady 17 4/22/2017 Sensitive content type customizations Policy level configuration based on counts Tune existing built-in types to add corroborative evidences and exclusions (keywords, regular expressions) Add different patterns with different confidence scores for difference policy actions Define custom sensitive types that can leverage internally defined functions (dates, keywords, Credit Cards, Passport Numbers) XML Patterns Confidence score Proximity specification Identifier Match Conditions contains Functions / regular expressions Corroborative evidence Keywords / functions Entities Name © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Demo Customizing sensitive content types TechReady 17 4/22/2017 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Document Fingerprinting – New in SP1 Matching derivative document from a previously configured template A tax firm needs to detect and encrypt standard tax forms, like the 1040 EZ, W2, etc. A Law firm can fingerprint legal forms, and have them detected automatically for policy application Integrates with the existing DLP infrastructure as a custom sensitive information type Surfaced in Exchange, Outlook and OWA Contoso Pharma Confidential PATENT TITLE: INVENTORS List the names of the inventors DESCRIPTION Describe your invention Contoso Pharma Confidential PATENT TITLE: Foo Bar INVENTORS List the names of the inventors Shobhit, Alex DESCRIPTION Describe your invention Foo Bar helps in curing diseases. Matches Filled in Template

Document Fingerprinting - Configuration Microsoft Exchange 4/22/2017 Document Fingerprinting - Configuration Fingerprint generation from template documents Fingerprint stored as custom sensitive type Configured in policy rules as any other custom sensitive type Get Template Content Fabrikam Patent Form Tracking Number Author Date Invention Title Names of all authors... CLASSIFICATION RULE with FINGERPRINT Create Fingerprint Condensed representation of the hashed template content Stored as a custom sensitive information type CONFIGURATION Refernce in Policy Rule Add fingerprint to policy rules together with other conditions Map to desired actions © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Document Fingerprinting - Runtime Microsoft Exchange 4/22/2017 Document Fingerprinting - Runtime Fingerprint generated at run-time for target attachment Fingerprint evaluated against configured fingerprints for template documents Match declared based on ‘containment coefficient’ POLICY RULES REFERENCES TO PREVIOUSLY GENEATED FINGERPRINTS Get Email Content Fabrikam Patent Form Tracking Number 12345 Author Alex Date 1/28/2014 Invention Title Fabrikam Green Energy... Evaluation + verdict Create Fingerprint Temporary in memory representation Used for comparson with source fingerprint created at config time RUNTIME FINGERPRINT GENERATION Verdict Compare the two fingerprints Evaluate a ’containtment coefficient’ to declare a matcb © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

This is a test. I love DLP and Fingerprinting. b-Bit Minwise Hashing INPUT TEXT This is a test. I love DLP and Fingerprinting. STEP 1 Break into Shingles of length 2 This is Is a a test test I I Love Love DLP DLP and And Fingerprinting Hash 1 (universal hash function) STEP 2 Convert to a 64 bit value (hash it!) 64 bit hash value of the shingle (e.g., This is  1010101010101110100111000111) Hash 2 (hash function with random dispersion) STEP 3 Map the 64 bit value randomly to 1024 other 64 bit values Apply a 16 bit mask STEP 4 Reduce each 64 bit value to a 16 bit value (LSB Mask)

Demo Document Fingerprinting TechReady 17 4/22/2017 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

User education Outlook OWA Empower users to manage their compliance Contextual policy education Doesn’t disrupt user workflow Can work even when disconnected Admin customizable text and actions Outlook OWA

Customizing End User Policy Tips Microsoft Exchange 4/22/2017 Customizing End User Policy Tips Customize Policy Tip messages Messages for notification, block and override can be customized. Customize link for user education Specify an internal URL with company policies around handling sensitive content. Custom classification rule names are displayed here. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Demo Customizing end user Policy Tips TechReady 17 4/22/2017 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

DLP extensibility points Custom DLP content: Supplemental DLP policy templates Supplemental DLP classification rules Incident reports integration with custom workflows Custom agents for additional conditions and actions Custom reporting solutions E.g. MessageStats Business Insights from Dell

Exchange DLP Feature Set TechReady 18 4/22/2017 Exchange DLP Feature Set EXCHANGE and OUTLOOK 2013 NEW in SP1 – EXCHANGE and OUTLOOK 2013 Deep content analysis engine 46 OOB sensitive information types 40 OOB DLP Templates Support for 3rd party defined DLP policy templates Policy Tips in Outlook 2013 Contextual user education and empowerment Incident management Rich reporting Policy Tips in OWA and Mobile OWA Advanced Document Fingerprinting in Exchange, Outlook, and OWA 5 new OOB sensitive information types © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Resources DLP in Exchange 2013 SP1 DLP policy templates TechReady 17 4/22/2017 Resources DLP in Exchange 2013 SP1 http://blogs.technet.com/b/exchange/archive/2014/02/25/data-loss-prevention-in-exchange-just-got-better.aspx DLP policy templates http://technet.microsoft.com/en-us/library/jj657730 Managing DLP policies http://technet.microsoft.com/en-us/library/jj673559 OOB DLP policy templates http://technet.microsoft.com/en-us/library/jj150530 Policy tips in Exchange 2013 http://technet.microsoft.com/en-us/library/jj150512 Supported file types http://technet.microsoft.com/en-us/library/jj674307 MessageStats Quick Guide http://mbidemo.quest.com/Insights/#page/home © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Related Sessions Session Title Timing Room SPR.202 Encryption in Exchange Tue 10:45 AM - 12:00 PM Ballroom E SPR.201 Eliminate the Regulatory Compliance Nightmare Tue 9:00 AM-10:15 AM MR 19ab SPR.UN.305 Exchange Online Protection: Notes from the field Wed 10:15 AM – 11:30 AM Ballroom G SPR.UN.304 Experts Unplugged: EOP & Encryption Wed 8:30-9:45 AM Wed 1:00-2:15 PM MR 18d MR 17b USX.206 What's New in Outlook Web App 9:00 AM - 10:15 AM SPR.401 Extending Data Loss Prevention For Your Business Wed 4:45 PM- 6:00 PM MR 18bc SPR.203 Protect your Organization with Exchange Online Protection (EOP) Mon 4:30 PM - 5:45 PM SPR.301 So how does Microsoft handle my spam? Tue 4:45 PM – 6:00 PM Using Connectors & Mail Routing Wed 2:45 PM - 4:00 PM ARC.304 Exchange Server 2013 Transport Architecture Tues 9:00 AM - 10:15 AM Ballroom F EDC.302 Advanced Data Loss Prevention in Exchange Tues 1:30 PM-2:45 PM EDC.UN.301 Experts Unplugged: Data Loss Prevention Tue 3:00 PM-4:15 PM Wed 10:15 AM-11:30 AM MR 13ab EDC.204 Data Loss Prevention in Exchange, Outlook, OWA Mon 2:45 Pm-4:00PM MNG.304 Reporting On O365 Mail flow and Mailbox Data Wed 1:00 PM-2:15 PM MR 17a

4/22/2017 5:53 AM © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.