Join Pete Zerger for an in-depth discussion in this video What is Azure Information Protection (AIP)?, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Instructor] Azure information protection…is a cloud-based solution that helps organizations…to classify, label and protect their documents and emails.…This can be automatically by administrators…who define rules and conditions.…Manually classified or even reclassified by users…or a combination where users are given recommendations.…Classification does not require protection.…You can classify and label documents…without applying protection.…After your content is classified…and optionally protected you can then track…and control how it's used.…
You can analyze data flows to detect risky behaviors…and take corrective measures,…track access to document and even revoke access.…You use Azure Information Protection labels…to apply classification to documents and emails.…Classification is identifiable at all times…regardless of where the data is stored…or with whom it's shared.…The labels can include visual markings…such as a header or footer or a watermark.…Metadata is added to the files…and email headers in clear text.…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection