Join Pete Zerger for an in-depth discussion in this video Classify and protect data in bulk, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Instructor] The Azure Information Protection PowerShell…module and cmdlets can be used…with the Azure Information Protection service,…Azure Rights Management Services,…and Active Directory Rights Management Services.…You can access the code samples I show you in this talk…in the exercise files that come with this course.…The Azure Information Protection cmdlets…are automatically installed with the AIP client,…and include all the Rights Management cmdlets…from the RMS Protection tool.…The module name is AzureInformationProtection.…
Now these cmdlets provide two core functions,…labeling and protection.…And what I would argue…is a third distinct function, inventory.…For example, we can get a label and protection status…of a single file using the Get-AIPFileStatus cmdlet.…And we can extend that to retrieve status…from multiple files in a folder.…And we can extend that further still…to get label and protection status for multiple files…in a folder with a particular label…using a where clause that you're likely familiar with…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection