Join Pete Zerger for an in-depth discussion in this video Work with the AIP client, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Instructor] Now we're going to open a Word document…and classify and protect it…using the Azure Information Protection client…and then share it with other users.…So, I'll start by logging into my Windows 10 desktop…where I'm working on an Office document…in Microsoft Word.…Now, you'll notice right now…that the document's not classified,…the sensitivity is showing as not set.…That's because the classification happens…when we hit the Save button,…so I'll type a sensitive piece of information in here,…I'll put John's social security number in,…and I'll hit the Save button…and you'll notice that the document is quickly classified,…recommended Social Security Numbers as the label…and I'll accept that since it's accurate…and now our document is classified and protected.…
We can actually see the protection status…by going over to the File menu…and looking at the Protect Document Properties.…So, now I'm going to make a couple of changes…before we share this document…with other users, so for example,…I'll manually change the classification.…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection