Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back submarines.
00:04
That's right. Welcome back
00:05
to the one only
00:08
well
00:09
told about me, at least.
00:10
And that's for a 65 Security Administration course.
00:13
I'm here. Starter Jim Daniels.
00:15
We're a model for in this free 65 information protection,
00:20
and we're gonna look at Windows Information protection.
00:24
In this lesson. We're gonna go over how we're news information protection with
00:29
helps protect against data leakage
00:31
requirements and considerations for whip
00:35
and the user experience with a whip.
00:38
Okay,
00:39
it's the last time. I will say Well,
00:41
right now,
00:42
when those information protections previously known as enterprise data protection GDP
00:47
hell is protected against potential data leakage without interfering with the employee experience
00:54
as a rice management works with whipped to extend out of protection,
00:59
which is an extension to the Windows 10 operating system
01:03
whip settings are delivered through policies to use their devices, which need a NDM, or man solution that supports whip
01:11
with differentiates between personal and corporate data,
01:14
an app so they can exist. SAB Assad in harmony
01:18
one. The same device
01:19
some of the pre recs or whipped
01:23
windows 10 16 07 and beyond.
01:26
India more man,
01:26
we just went over that
01:29
Windows client has to be enrolled in the NDM
01:33
or registered
01:34
in ma'am.
01:36
Some considerations.
01:37
The terminal, which encryption key to use
01:40
was policy protection mode to use
01:42
and configure intelligent network boundaries
01:46
you can implement with creating what policies
01:49
in Microsoft Incident and point manager or systems center configuration manager Screenshot here is actually an S e c M.
01:57
If you configure your wit policy with and soon
02:01
you can select a deployment for Indian
02:04
and for mam,
02:06
this gives you an enrolled versus not enrolled in kind of like a B Y o d. Differentiation.
02:15
Here we're looking at the endpoint manager
02:17
policy creation for Whip
02:22
Great Policy, either with without enrollment,
02:24
but this a b y o d.
02:27
Where you're not requiring them to register in Hinton
02:30
you without enrollment as soon in this example,
02:35
Quiz
02:36
a nd an or ma'am solution is needed to deliver whip policies to use their devices. True,
02:42
your thoughts.
02:45
Why you guys moral and that awesome amazing question mark graphics.
02:50
I'll give you a few more seconds to think
02:53
it's true. Yeah, all of it. All of it's true.
02:55
You have tohave indium or ma'am
02:59
to deliver with to the devices
03:02
it's a requirement.
03:05
Working with wit and Windows desktop,
03:07
you have two terms enlighten and non enlightened or unenlightened.
03:13
It describes applications. Will full support of separation between corporate and personal data and applications that can only recognize all of their data as corporate work data.
03:23
Here we have save as
03:24
and you can see the final time
03:27
when I shall have work or personal.
03:30
So this is enlightened
03:31
where that gives the user
03:34
the ability for both
03:37
in light. Naps can process personal and corporate done
03:39
depending on used rejoice. Been saving a document
03:45
to recap today's lesson
03:47
when there's information protection. Will previously known as enterprise Data protection
03:53
helps protect against potential data leakage
03:54
without interfering with the employee experience. That's the key to whip.
04:00
It's minimally invasive to the employees.
04:01
It's perfect for a B Y D environment
04:04
where you can still protect your data
04:08
and the employees doesn't feel like you're slowly taken over their own device. In their own phone,
04:14
which is an extension to the Windows 10 operating system,
04:16
Web settings are delivered through policies to use their devices,
04:20
which need a Indiana or man.
04:23
That's the Force Luke,
04:25
which can be implemented through incident
04:27
Important manager
04:29
or S E C M Systems Center configuration manager.
04:32
Thank you for joining me in this lesson about whip.
04:35
Ever see you for the next one. Take care.

Up Next

MS-500: Microsoft 365 Security Administration

The Microsoft 365 Security Administration course is designed to prepare students to take and pass the MS-500 certification exam. The course covers the four domains of the exam, providing students with the knowledge and skills they need to earn their credential.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor