Download presentation
Presentation is loading. Please wait.
Published byKathlyn James Modified over 8 years ago
3
Protect communications
8
Conditions Actions Exceptions Conditions Actions Exceptions
12
Content to monitor User action Mail flow actions contains Credit cards EU debit cards Defines the policy objectives to help meet regulatory requirements for identified content Contains data type definitions to help identify sensitive content
13
Transport rule conditions DLP specific action – Policy Tip Exceptions DLP specific condition Transport rule actions
15
Windows Azure Active Directory Rights Management Default Templates Company Confidential Company Confidential Read Only Do not forward (Works across tenants)
16
Predefined rules targeted at sensitive data types Advanced content detection Combination of regular expressions, dictionaries, and internal functions (e.g. validate checksum on credit card numbers) Extensibility for customer and ISV defined data types
17
Confidence score Proximity specification Identifier contains Functions / regular expressions Corroborative evidence Keywords / functions Use internally specified functions (Credit Cards, Passport Numbers) Add corroborative evidence and exclusions (keywords, regular expressions) Add different patterns with different confidence scores
18
Empower users to manage their compliance Contextual policy education Doesn’t disrupt user workflow Scans email subject, body and attachments Can work even when disconnected Admin customizable text and actions
19
DLP policy configuration Outlook policy distribution Contextual policy education in Outlook Mailbox Server policy evaluation Audit & incident data generation Administrator Outlook
20
Audit data Classification Rule details
24
Education experience in Outlook 2013 Available in Exchange Server and Office 365 Out of the box DLP policy templates Predefined sensitive content types Support for 3 rd party defined DLP policy templates DLP administration in Exchange Admin Center Rich reporting
26
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
27
All statements in this report attributable to Gartner represent Microsoft interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.