Your focus should be on the end user result and the security controls you achieve with each implemented stage. The objective is to create a deployment plan that follows the progression of crawl-walk-run methodology while highlighting the user and administrator experience at each stage. With this in mind, let’s get started with understanding the capabilities which are available as part of Microsoft Information Protection (MIP), how you discover sensitive information and protect it using the various provided tools provided by MIP and Data Loss Prevention (DLP) Your Deployment Plan ⚓︎
With information protection and sensitivity labels, you can intelligently classify and help protect your sensitive content, while making sure that your organization's productivity and ability to collaborate is not hindered.Ĭombined with data loss prevention you can help prevent the accidental oversharing of the sensitive information in your organization. Microsoft DLP User Education & User Experience Legacy DLP Policies (ETR) to DLP PlaybookĬommunication Compliance - Financial Services Industry Playbook Microsoft Information Protection and Data Loss Prevention Microsoft Information Governance and Records Management Insider Risk Management and Communication Compliance Microsoft Compliance Configuration Analyzer (MCCA) Microsoft Information Governance (MIG/RM)ĭeep Dive into the Exchange Recoverable Items Folder