Information Protection Part 3: Windows

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
Welcome back submarines.
00:04
That's right. Welcome back
00:05
to the one only
00:08
well
00:09
told about me, at least.
00:10
And that's for a 65 Security Administration course.
00:13
I'm here. Starter Jim Daniels.
00:15
We're a model for in this free 65 information protection,
00:20
and we're gonna look at Windows Information protection.
00:24
In this lesson. We're gonna go over how we're news information protection with
00:29
helps protect against data leakage
00:31
requirements and considerations for whip
00:35
and the user experience with a whip.
00:38
Okay,
00:39
it's the last time. I will say Well,
00:41
right now,
00:42
when those information protections previously known as enterprise data protection GDP
00:47
hell is protected against potential data leakage without interfering with the employee experience
00:54
as a rice management works with whipped to extend out of protection,
00:59
which is an extension to the Windows 10 operating system
01:03
whip settings are delivered through policies to use their devices, which need a NDM, or man solution that supports whip
01:11
with differentiates between personal and corporate data,
01:14
an app so they can exist. SAB Assad in harmony
01:18
one. The same device
01:19
some of the pre recs or whipped
01:23
windows 10 16 07 and beyond.
01:26
India more man,
01:26
we just went over that
01:29
Windows client has to be enrolled in the NDM
01:33
or registered
01:34
in ma'am.
01:36
Some considerations.
01:37
The terminal, which encryption key to use
01:40
was policy protection mode to use
01:42
and configure intelligent network boundaries
01:46
you can implement with creating what policies
01:49
in Microsoft Incident and point manager or systems center configuration manager Screenshot here is actually an S e c M.
01:57
If you configure your wit policy with and soon
02:01
you can select a deployment for Indian
02:04
and for mam,
02:06
this gives you an enrolled versus not enrolled in kind of like a B Y o d. Differentiation.
02:15
Here we're looking at the endpoint manager
02:17
policy creation for Whip
02:22
Great Policy, either with without enrollment,
02:24
but this a b y o d.
02:27
Where you're not requiring them to register in Hinton
02:30
you without enrollment as soon in this example,
02:35
Quiz
02:36
a nd an or ma'am solution is needed to deliver whip policies to use their devices. True,
02:42
your thoughts.
02:45
Why you guys moral and that awesome amazing question mark graphics.
02:50
I'll give you a few more seconds to think
02:53
it's true. Yeah, all of it. All of it's true.
02:55
You have tohave indium or ma'am
02:59
to deliver with to the devices
03:02
it's a requirement.
03:05
Working with wit and Windows desktop,
03:07
you have two terms enlighten and non enlightened or unenlightened.
03:13
It describes applications. Will full support of separation between corporate and personal data and applications that can only recognize all of their data as corporate work data.
03:23
Here we have save as
03:24
and you can see the final time
03:27
when I shall have work or personal.
03:30
So this is enlightened
03:31
where that gives the user
03:34
the ability for both
03:37
in light. Naps can process personal and corporate done
03:39
depending on used rejoice. Been saving a document
03:45
to recap today's lesson
03:47
when there's information protection. Will previously known as enterprise Data protection
03:53
helps protect against potential data leakage
03:54
without interfering with the employee experience. That's the key to whip.
04:00
It's minimally invasive to the employees.
04:01
It's perfect for a B Y D environment
04:04
where you can still protect your data
04:08
and the employees doesn't feel like you're slowly taken over their own device. In their own phone,
04:14
which is an extension to the Windows 10 operating system,
04:16
Web settings are delivered through policies to use their devices,
04:20
which need a Indiana or man.
04:23
That's the Force Luke,
04:25
which can be implemented through incident
04:27
Important manager
04:29
or S E C M Systems Center configuration manager.
04:32
Thank you for joining me in this lesson about whip.
04:35
Ever see you for the next one. Take care.
Up Next
Rights Management and Encryption Part 1: Information Rights Management
Rights Management and Encryption Part 2: Secure Multipurpose Internet Mail Extension
Rights Management and Encryption Part 3: Office 365 Message Encryption
Data Loss Prevention Part 1
Data Loss Prevention Part 2: Working with DLP