6 hours 59 minutes
Welcome back submarines.
That's right. Welcome back
to the one only
told about me, at least.
And that's for a 65 Security Administration course.
I'm here. Starter Jim Daniels.
We're a model for in this free 65 information protection,
and we're gonna look at Windows Information protection.
In this lesson. We're gonna go over how we're news information protection with
helps protect against data leakage
requirements and considerations for whip
and the user experience with a whip.
it's the last time. I will say Well,
when those information protections previously known as enterprise data protection GDP
hell is protected against potential data leakage without interfering with the employee experience
as a rice management works with whipped to extend out of protection,
which is an extension to the Windows 10 operating system
whip settings are delivered through policies to use their devices, which need a NDM, or man solution that supports whip
with differentiates between personal and corporate data,
an app so they can exist. SAB Assad in harmony
one. The same device
some of the pre recs or whipped
windows 10 16 07 and beyond.
India more man,
we just went over that
Windows client has to be enrolled in the NDM
The terminal, which encryption key to use
was policy protection mode to use
and configure intelligent network boundaries
you can implement with creating what policies
in Microsoft Incident and point manager or systems center configuration manager Screenshot here is actually an S e c M.
If you configure your wit policy with and soon
you can select a deployment for Indian
and for mam,
this gives you an enrolled versus not enrolled in kind of like a B Y o d. Differentiation.
Here we're looking at the endpoint manager
policy creation for Whip
Great Policy, either with without enrollment,
but this a b y o d.
Where you're not requiring them to register in Hinton
you without enrollment as soon in this example,
a nd an or ma'am solution is needed to deliver whip policies to use their devices. True,
Why you guys moral and that awesome amazing question mark graphics.
I'll give you a few more seconds to think
it's true. Yeah, all of it. All of it's true.
You have tohave indium or ma'am
to deliver with to the devices
it's a requirement.
Working with wit and Windows desktop,
you have two terms enlighten and non enlightened or unenlightened.
It describes applications. Will full support of separation between corporate and personal data and applications that can only recognize all of their data as corporate work data.
Here we have save as
and you can see the final time
when I shall have work or personal.
So this is enlightened
where that gives the user
the ability for both
in light. Naps can process personal and corporate done
depending on used rejoice. Been saving a document
to recap today's lesson
when there's information protection. Will previously known as enterprise Data protection
helps protect against potential data leakage
without interfering with the employee experience. That's the key to whip.
It's minimally invasive to the employees.
It's perfect for a B Y D environment
where you can still protect your data
and the employees doesn't feel like you're slowly taken over their own device. In their own phone,
which is an extension to the Windows 10 operating system,
Web settings are delivered through policies to use their devices,
which need a Indiana or man.
That's the Force Luke,
which can be implemented through incident
or S E C M Systems Center configuration manager.
Thank you for joining me in this lesson about whip.
Ever see you for the next one. Take care.
Microsoft 365 Fundamentals [MS-900]
Microsoft 365 Fundamentals is a course designed to help both those looking for more information ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
AZ-500: Microsoft Azure Security Technologies
In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are ...
9 CEU/CPE Hours Available
Certificate of Completion Offered