Welcome, Welcome. Welcome back, Cyber Into the M s 3 65 Security Administration course
I'm your structure, Jim Daniels.
And in this video, we're going to start module four in this 3 cc five information protection.
As you can see, the lesson and this particular part is all about the information protection.
In this lesson, we're going to learn how Microsoft Technologies can help protect sensitive data.
And we're gonna learn about the mess for 65 information protection lifecycle,
as well as labeling persistence,
the information protection life cycle. And then Mr 65 goes as follows.
it's collaborated on,
maybe just open up on a mobile device
and it gets sent to other sharing services.
So we want to protect the information throughout all of these.
We want to protect it when it's created.
other people come in even when it leaves our environment or ethically is our environment.
We want to apply intelligent protection
for all of those scenarios.
We've kind of seeing this little overlapping circle graph before when we talk about network security and
how it evolves out in the ire t well, this is the same thing. However, this is about content and data.
You have ultimate protection of your own data,
you know, so you can actually go and touch the server touched on as unit that resides on could figure out what directory you have. Total control. That is the equivalent of you having a moat.
it expands into the manage mobile environment.
So maybe we or using into policies conditional access.
We have various identity and the vice minister more present protection applied
after that is unregulated. It's unknown. It's the new normal
shadow. I t. There's new APS.
Yeah, being created on a daily basis.
We have to have protection
toe where it extends out past
are managed level environment.
Enter data classification.
When you classifying data,
it makes it easy to apply policies to, based on those classifications,
a general rule with, um, for planning data classification
to start with the most sensitive data.
That's what these protected.
And that's what needs to be labeled first and foremost.
You can create automatic rules,
and you should associate visual markings and protection actions.
So if you have something rolled out, organization wide,
see How below red is confidential blues public.
You've seen this before, smoky that there.
Fire danger, U. S. Homeland Security.
As the colors get warmer, it's more confidential, more restricted as it gets cooler.
Their internal war is public.
are key for your in users,
so that user experience for data classification is you have automatic toe where the policies were sent by T.
If a user types in something that triggers an automatic protection policy
is labeled that way.
users can override the classification
and be required for justification
so you can have automatic.
But you also can have
toward. Users can manually override that automatic classification and provide justification
This is where it intelligently looks a loss in the document,
and it will recommend one that complies with your policies
or user. Set user has to apply to sensitivity and classifications labels themselves.
There is no right or wrong answer. My organization is a combination of all of them really depends when your user set
how sensitive and valuable the information is. You're trying to classify and protect
your culture again. We thought about
each organization's culture, especially and security and what they expect their in users to do is totally different. It varies across the board
by using metadata. Labels are clear text that can you read by other DLP engines?
Labels stay with a document regardless of location.
Where before we kind of mention toe where you had your one premise, you had your manners. But then you had unregulated of known.
The label stays with the content. It stays with the document. No matter whether that document goes with G drove, it goes,
Yeah, thumb drive. It goes wherever it stays with it.
Bob was super persistent.
The whole premise of the movie want about Bob Waas. It was just a major
in the persistence that Bob had
Regardless of word out or more than went, Bob was there.
The same applies to labels within M s 3 65 their persistent. They travel with the document
inclining for data classification
watches. You start with
automatic rules and enforcement.
Public data sensitive data
told tips and override justification methods.
Which of those four areas should you first start with when planning
that a classification
survey says. See sensitive data.
Remember, start with sense of the data when you plan.
So that way you start with the most restrictive
to recap. Today's lesson planning for data classifications always start with the most sensitive data.
Persistent labels utilized metadata, which is clear text.
It could be read by other deal P engines for a unified, inconsistent experience.
Thank you for joining me for this lesson. I could just see for next one take care.