o365con14 - information protection and control in office 365

50

Upload: nccomms

Post on 09-May-2015

442 views

Category:

Presentations & Public Speaking


0 download

DESCRIPTION

European Office 365 Connect 2014 Presentation

TRANSCRIPT

Page 1: O365con14 - information protection and control in office 365
Page 2: O365con14 - information protection and control in office 365
Page 3: O365con14 - information protection and control in office 365
Page 4: O365con14 - information protection and control in office 365
Page 5: O365con14 - information protection and control in office 365
Page 6: O365con14 - information protection and control in office 365
Page 7: O365con14 - information protection and control in office 365
Page 8: O365con14 - information protection and control in office 365
Page 9: O365con14 - information protection and control in office 365

LESS RESTRICTIVE MORE RESTRICTIVE

• Apply the right level of control based on the sensitivity of the data

• Maximize control and minimize unnecessary user disruptions

Alert

“Allow delivery

but add a

warning.”

Append

“Allow delivery

but add a

disclaimer.”

Protect

“Allow delivery

but prevent

forwarding.”

Redirect

“Block

delivery

and redirect.”

Review

“Block delivery

until

reviewed.”

Block

“Do not

deliver.”

Modify

“Allow delivery

but modify

message.”

Classify

“Allow delivery

but apply

classification.”

Page 10: O365con14 - information protection and control in office 365
Page 11: O365con14 - information protection and control in office 365

Transport rules

Data Loss Prevention

Rights Management

11

Page 12: O365con14 - information protection and control in office 365

Conditions

Actions

Exceptions

Conditions

Actions

Exceptions

12

New options

• Rules can be configured to run for a specific time

period

• Rules can be run in Test Mode

New filters

• Total message size

• Attachment extension keyword matching

• Sender IP address

New actions

• Criteria-based routing

• Forced TLS routing

• Halt processing of remaining rules on a message (“Stop

processing rules”)

Page 13: O365con14 - information protection and control in office 365
Page 14: O365con14 - information protection and control in office 365
Page 15: O365con14 - information protection and control in office 365

DLP helps to

identify

monitor

protect

sensitive data through deep content analysis

Page 16: O365con14 - information protection and control in office 365

16

Page 17: O365con14 - information protection and control in office 365

• Content to monitor

• User action

• Mail flow actions

contains

• Credit cards

• EU debit cards

Defines the policy objectivesto help meet regulatory requirementsfor identified content

Contains data type definitionsto help identify sensitive content

17

Page 18: O365con14 - information protection and control in office 365

Predefined rules targeted at sensitive data types

Advanced content detection

Combination of regular expressions, dictionaries, and internal functions (e.g., validate checksum on credit card numbers)

Extensibility for customer and ISV-defined data types

Page 19: O365con14 - information protection and control in office 365

Conditions

Actions

Exceptions

Page 20: O365con14 - information protection and control in office 365

Empower users to manage their compliance

Contextual policy education

Doesn’t disrupt user workflow

Can work even when disconnected

Admin-customizable text and actions

20

Page 21: O365con14 - information protection and control in office 365

21

Page 22: O365con14 - information protection and control in office 365

Comprehensive view of DLP policy performance

Downloadable Excel workbook

Drill into specific departures from policy to gain business insights

22

Page 23: O365con14 - information protection and control in office 365
Page 24: O365con14 - information protection and control in office 365
Page 25: O365con14 - information protection and control in office 365

Information Author Information Recipient

2

3

1

4 5

68

7

9

Database Server RMS Active Directory

Publishing Consuming

Page 26: O365con14 - information protection and control in office 365

Use Windows Azure AD Right Management Out-of the box

Integrate natively with Exchange online and SharePoint online

Integrate Office 365 with existing on-premises AD RMS infrastructure

Page 27: O365con14 - information protection and control in office 365
Page 28: O365con14 - information protection and control in office 365
Page 29: O365con14 - information protection and control in office 365
Page 30: O365con14 - information protection and control in office 365
Page 31: O365con14 - information protection and control in office 365
Page 32: O365con14 - information protection and control in office 365
Page 33: O365con14 - information protection and control in office 365
Page 34: O365con14 - information protection and control in office 365

NwTraders Contoso

1. NwTraders

exports private

key and SLC

2. Contoso

imports

private key

and SLC

4. Ilse sends PL

and RAC with

request for UL

from local

licensing server

5. Contoso

uses imported

private key to

decrypt PL and

issues UL

3. Robin send IRM-Protected

message to Ilse

Page 35: O365con14 - information protection and control in office 365
Page 36: O365con14 - information protection and control in office 365

BYOK and logging are

not compatible with

Exchange Online

Page 37: O365con14 - information protection and control in office 365
Page 38: O365con14 - information protection and control in office 365
Page 39: O365con14 - information protection and control in office 365
Page 40: O365con14 - information protection and control in office 365
Page 41: O365con14 - information protection and control in office 365
Page 42: O365con14 - information protection and control in office 365
Page 43: O365con14 - information protection and control in office 365
Page 44: O365con14 - information protection and control in office 365

emailtext

disclaimertext

image

Page 45: O365con14 - information protection and control in office 365

image

Page 46: O365con14 - information protection and control in office 365

image

portaltext

Page 47: O365con14 - information protection and control in office 365

Exchange Online

Policy detection and

Enforcement

Tenant

configuration

O365 User Internet User

Microsoft

account/Organization

Account

Mail Reading Portal

Page 48: O365con14 - information protection and control in office 365
Page 49: O365con14 - information protection and control in office 365
Page 50: O365con14 - information protection and control in office 365

Ilse Van Criekinge

Technology Advisor Business Productivity

@ivcrieki, [email protected]