6 hours 59 minutes
Welcome back. Enthusiastic, eager cybersecurity. Microsoft Security Administration murders Welcome back.
I once was told I could be a hype man.
So just just be lucky. I don't bring out a bullhorn or megaphone at this point.
I'm your instructor. Jim Dangles were on Model five Industry 65 Security Administration Course Investor 65. Compliance with lesson to governance
and we're gonna go over ethical longs
in this lesson. We're gonna go over what ethical wall is and how to create ethical wall in exchange
ethical walls. If you have done any of your Sistine or any I sack, of course, is you know what this is said Common cybersecurity term.
So you're some famous Walls.
Painful Is the Wall. Fantastic Album.
Wally World, Chevy Chase Classic.
Great Wall of China,
The Berlin Wall,
These Air Famous Walls,
John Wall. It's another one for you guys around D. C. Re basketball fans,
but I digress.
Let's look at an ethical wall.
Ethical wall is a process for avoiding conflicts. Adventures by limiting disclosure of information to certain attorneys or individuals within a farmer corporation
There by building a metaphorical wall.
any time I can use quote, air quotes. I'm going to use a metaphorical wall. Between the holders of information and the colleagues who
represent interests or hold opinions was conflict.
It is also known as a Chinese wall.
The brewer and mass model
was constructed to provide information security access controls that can change dynamically.
The security model
take a Chinese wall,
was designed to provide controls, mitigate conflicts of interest
and commercial organizations and is built upon an information flow model.
Ethical laws and exchange online. I'll give you the key to right now
That's how you do the wall.
There's the bricks and mortar
masonry knowledge, transport rules.
Simple is that
you came here thinking some profound explanation. Transport rules.
It's kind of anticlimatic. If you ask me,
you create an ethical wall Using distribution groups.
Transport rules can reject messages sent between members of two groups.
you can have annual design memberships or dynamic memberships for groups.
Let's say you have to departments that never talk. Make sure you have a half old department and I'm Accord informant.
You want to set up a dynamic membership group.
If somebody's department value changes, the Hatfill
they go in this room.
Semis department value changes to be coy. They're going this group
that way by using dynamic membership. Once you said
your exchange roll, you don't have to maintain management off the groups
an employee transfers in that exchange. Mail Floyd rule automatically applies
Automatic Membership. Trump's manual.
You don't want to have to go through and do 1000 visual steps every time something changes in your organization.
Automatic dynamic That is the goal that is, the key
information barriers and teams.
This is included within Officer 65 85
War The Chemistry 65. If I suite of licensing,
it's available for users within the M s. 3. 65 e five. Compliance
or office 3. 60 baht Advanced compliance. Adolescents.
So you have your core officer 65 35 Industry 65. If I sweet or
you have a low card Adam,
it prevents lookups and discovery as well as communication
scope Directory. Search teams must be enabled.
Remember that scope Direct research in teams has to be enable for information barriers
to function on teams.
When you define policies for information barriers, you're gonna work with user account attributes,
block a royal policies and policy application
user account as reviews or define an azure A D,
which could come from your one premise a. D
if you use
as her 80 connect.
If you don't know what I'm talking about, you've obviously skipped around or falling asleep during one of my lessons. Please go back.
These attributes can include things like departments, John Title Location, Team name.
He told earlier about department
segments or sets of uses. Their defined in the Securities Compliant Centre using a selected user account. Attribute
Prevent one segment from communicating with another.
Allow policies. Allow one segment to communicate with only certain other segments.
Let's say, for instance, you have 10 segments.
Segment one only needs to communicate with Segment eight.
You're going to do a block policy you and doing a lot of policy. Allow segment warrant between UK with second eight
because they allow policy
allows it only to communicate with that other segment. That automatic blocks segment two through seven and nine in 10. From communicating with one
policy application is done after all information barrier policies with fine
in your ready to apply them in your organization.
You need to segment user time and what policies are needed.
Make a list of segments to define this spot department, even if it's within departments sub department if it's by a certain geographical location, ZIP code, a office location, a building name.
Whatever IT ISS.
Make a list of those second sections that you need.
Identify which attributes make up their segments.
Defined segments in the terms of policy filters. Defined information. Bearer of policies to find your policies.
Don't apply them to find them.
Choose what kind they are. Is it a block, or is it in the wild policy?
Applying the policy
Send policies too active.
Run the policy application and view the status
currently information. Bear policies or define and manage
within office. 3 65 Security Compliance Center
Using Power Shell Command Let's.
Here's an information barrier triggers
if you have a new team. Member
policies are evaluated against policies of other members.
If a person comes into that one boarded
yes, they transfer
the new Champ requests
policies. Make sure the chat isn't in violation. If I want to talk to somebody in a department where a segment that I'm not allowed to
the new chat request is gonna trigger
that information bear policy
user invited to a meeting.
Policies evaluated against policies of other maintenance. Indy's
policies evaluated against policies of other members.
If I'm not supposed to communicate with you,
I'm not research from ice cream with you either.
So all of these initiate information. Barrier policy triggers
point teams call.
If I can't do a team shot with you, I'm not gonna be able to call you on teams. Er,
it's another sugar guess. Users
information. Bear policies can apply to guests
so you can actually have a information bear. A policy that this this segment cannot communicate with guests.
Here's an example
of when a information bear policy triggers
says your company policy prevents you from joining in this call.
Sorry, sad trombone. Uh, or have you tried to add
He says, Hey, we can't find any matches.
Even though the person exists,
I'm not allowed to add them to my team because of information barrier policies.
information. Bear policies do not apply to guess users within the teams environment.
True or false,
you're a 50 50 shot.
Come on, what do you think?
Guess users, teams guess users. Information barrier.
The answer is
the answer is false.
Of course, we just went over.
We just went over. You can't apply information. Bear policies to guests in teams.
So the answer is as false
as those Nike salons there.
To recap the lesson. An ethical wall also knows the Chinese Wall security model was designed to provide control. Was that mitigate conflict of interest?
Ethical laws are created in exchange, utilizing distribution groups and now transport rules.
Information barriers are policies that an admin can configure to prevent individuals or groups from communicating with each other in teams.
Thank you for joining me on this lesson. You see, for the next one, take care.
Microsoft 365 Fundamentals [MS-900]
Microsoft 365 Fundamentals is a course designed to help both those looking for more information ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
AZ-500: Microsoft Azure Security Technologies
In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are ...
9 CEU/CPE Hours Available
Certificate of Completion Offered