Download presentation
Presentation is loading. Please wait.
Published bySándor Kocsis Modified over 5 years ago
1
Security in SharePoint and Teams with DLP, IRM, and AIP
Tim Beamer, Senior Microsoft Solution Architect, Logicalis
2
Agenda Introduction Identify Setup Monitor Block End User Education
DLP vs IRM vs AIP Identify Engine Setup s Policies Monitor DLP Queries DLP Policies Block Permissions End User Education Policy Tips Limitations IRM AIP Q&A
3
The “good old days”…NOT
Files in file shares (NTFS permissions) Move the file? Lose the permissions! the file? Lose the permissions! SharePoint “Secure” the doc library with permissions No notification of sensitive information Policies “I didn’t know…” A policy with no enforcement mechanism is useless!
4
What’s in the toolbox? DLP IRM AIP Inspect – Detect – Act Tooltips
Define permissions Encrypt – regardless of destination AIP Define data classification Inspect content and act based on classification May include modifications of permissions
5
What is data loss prevention?
Introduction What is data loss prevention?
6
What is DLP? Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside your organization DLP software products use business rules to classify and protect confidential and critical information so that unauthorized end users cannot accidentally or maliciously share data whose disclosure could put the organization at risk
7
Data Loss Prevention in SharePoint Find that information before it’s too late!
Search for sensitive content in your existing eDiscovery Center, keeping content in place and enabling you to search in real time. Credit Card Numbers, SSN, Bank Account Numbers, Passports (100 total information types!) Define once and protect across Exchange, SharePoint, Teams and OneDrive! NOTE: If you have document libraries with Search disabled, DLP will NOT work in them
8
Data Loss Prevention in SharePoint
Identify Monitor Protect End User Education
9
How does SharePoint find this information?
Identify How does SharePoint find this information?
10
DLP Processing in SharePoint
Content Sources Crawler Content Processing Index Query Unified Policy Processing Tasks Policy Definitions
11
Sensitive Information Evaluation
16 digits dddd-dddd-dddd-dddd dddddddddddddddd CVN, CVV2, CID Visa, MasterCard, Amex Expiration Date Card Holder
12
Sensitive Information Evaluation (regex)
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300 characters: The functionFunc_credit_cardfinds content that matches the pattern. One of the following is true: A keyword fromKeyword_cc_verificationis found. A keyword fromKeyword_cc_nameis found. The functionFunc_expiration_datefinds a date in the right date format. A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300 characters:
13
Sensitive Information Evaluation (regex)
14
Requirements to make it work!
Setup Requirements to make it work!
15
Configure the search service application
Prerequisites Configure the search service application Crawl the location of the conflicting documents Configure outgoing Your users need to have an address in their profile
16
Compliance Policy Center:
Site Collections EDiscovery Center: A site to manage the preservation, search, and export of content for legal matters and investigations Compliance Policy Center: A site to manage compliance and retention policies
17
Monitor
18
EDiscovery Center
19
Found it!
20
EDiscovery Center - Excel Reports
21
DLP Policy Demo
22
End User Education
23
In Context Information
Blocked documents are visible directly in the document library (Demo)
24
Perfection doesn’t exist!
Limitations Perfection doesn’t exist!
25
Information Rights Management
IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled WHEN can they use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days WHERE can they use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
26
Configure RMS for Office 365
27
Configure RMS for Office 365
28
Configure RMS for Office 365
29
Enable in SharePoint Online
30
Enable in a Document Library
31
Secure a document
32
Azure Information Protection
33
AIP AIP – P1 USER is responsible for applying the correct label AIP – P2 Combine the capabilities of DLP and IRM Content inspection can apply the label automatically
34
DEMO
35
Schedule a Security Focused CIE
Call to action Schedule a Security Focused CIE Hands-on session We can deliver at our office or yours (need Wi-Fi and Power) Engage with Security Practice to define data classification, labels, risk, and required protections
36
Q&A Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.