Search and Investigation Part 1: Content Search
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Welcome back submarines to the MST 3 65 Security Administration course.
00:06
I'm your instructor, Jim Daniels. Hopefully, you have not gotten tired of my voice by now, and you're still sticking around.
00:13
We're a module five, and that's very 65. Compliance
00:16
Lesson three. Search and Investigation
00:20
In this lesson, we're gonna cover constant search with then invest 3 65
00:25
starting in third party data
00:27
and GPR Data subject request. Searchers.
00:32
Constant search is found in the Emissary 65 Security Component Center.
00:37
There's no one that's on a number of mailboxes and sites that you can search.
00:42
Constant search has enhanced performance capabilities that are useful when running very large discovery searches,
00:50
constant search displays and number of sources, and estimated results after each search.
00:57
There a few things that you should think about Put in your idea light bulb.
01:02
When you design a content search,
01:06
who should crate and Ron searches?
01:08
Is it some poor soul within 90?
01:11
Is that a legal team?
01:12
Is it a
01:15
dedicated department?
01:17
It is a compliance department. Who is it who needs to create and Ron searches?
01:22
What's that? The contents search needs to be created.
01:26
Key words are the keywords for the search.
01:29
Or is it just a blanket search? One somebody's mailbox or a site?
01:34
Conditions. What conditions should be used?
01:38
Location,
01:40
all locations. Where is it searched or their specific ones? Is this specific to exchange?
01:44
Is this specific to a particular SharePoint site is a specific to
01:49
one drop site.
01:51
What specific locations are needed
01:53
Any time you narrow the scope. How on search? You're gonna get better results.
01:57
Otherwise you're gonna have massive
02:00
massive returns.
02:04
Configuring starts, permissions. Filtering
02:07
filters allow a subset of mailboxes and size to be searched.
02:10
Starts. Permission. Filtering is configured by creating the filter that uses a supported recipient filter that limits
02:19
what could be searched.
02:21
Starks Permission Filtering is configured and manage
02:23
by using power shovel
02:27
and the security compliance center.
02:30
New dash compliant security filter. Get
02:32
said
02:34
remove
02:36
again. No. Your valves.
02:38
No. Your command
02:40
verb dash complying. Security filter.
02:45
You can even start four third party data
02:46
Items that were imported into mailboxes from a third party data source can be searched
02:52
because they're in a mailbox.
02:53
The part of the part of exchange. At that point, it's pretty self explanatory. You put something in exchange mailbox
03:00
you can start when you start to exchange mailbox.
03:02
It's not big revelation.
03:05
Queries could be created to search all third party items or target specific third party atoms, usually kind
03:12
external data message property value pair when targeting third party items
03:17
that specific kind colon external data
03:23
We talked earlier about GDP are and data subject requests
03:28
a little bit more details on it
03:29
because it really does go along with the discovery and search because you're searching. That's far of a subject. Requests.
03:37
If you go into the compliance center, go to data subject requests.
03:40
Here it is. You create a case,
03:43
give the case and details.
03:45
Define your data subject. This is the person who filed the request
03:50
and then you create a case
03:52
quiz
03:53
in this 3 65 compliant center. Includes a case wizard
03:58
specifically for GPR data subject request.
04:10
So if you've ever seen those shows Black Mirror, that I kind of like to scifi technology kind of take someone a twisted roll. This comment really illustrates that.
04:21
Do you have kids? You probably haven't l from the shelf.
04:24
Um, ours was named mistletoe. May am
04:27
if they had to tell for myself with a reporting and recording device. Oh, my gosh.
04:32
Talking about just spying everywhere.
04:36
Answer is
04:39
true. Yeah, includes it. We just went over.
04:44
He was a good dad joke because I hadn't really
04:46
giving you guys won in a while.
04:49
Do you know a good GDP or consultant?
04:53
Why, yes. Yes, I do.
04:55
Can you get dizzy? Nauseous?
04:57
No, I can get it.
05:02
Okay. All right.
05:03
If you didn't get please look out. GDP are
05:06
if you got it.
05:10
Good for you
05:12
to recap the lesson. The Constant starts feature is found in industry 65 security compliance center
05:18
and has no limits on the number of mailboxes and sites that are searched.
05:24
Constant starts filters allow a subset of mailboxes and a subset of size specifically targeted to be searched.
05:30
M s 3 65 compliance center includes a case wizard
05:34
specifically for GDP. Are
05:36
that a subject request?
05:39
So when you have that elevated license, not only do you have all of the features, but you also pay for a wizard. How cool is that?
05:46
You always GDP arseholes or compliance Souls and wizard
05:51
my cells really stepping up their game.
05:54
Anyway,
05:55
thank you for joining me on this lesson.
05:58
Hopefully you've learned something.
06:00
If not, wash it again.
06:02
And I hope you will join me for the next time. Take care.
Up Next
Instructed By
Similar Content