eDiscovery
137 TopicsSocial Media Connections: Let's Network!
I love the Microsoft Tech Community and find it to be an incredible source of information, discussion, feedback, and comradery. I also use LinkedIn and Twitter to keep in touch with my professional network. Do you? Share your usernames in the comments and let's connect! I'll start 🙂 Twitter: Brian_Levenson LinkedIn: https://www.linkedin.com/in/brianlevenson4.1KViews7likes17CommentsAnnouncing support for custom sensitive information types in the Security & Compliance Center
Wesley Holley is a program manager on the Office 365 team. Core to protecting your organization’s data is identifying which data is sensitive and creating policies to govern its use. We include over 80 sensitive information types out of the box to detect commonly used data types in regions around the globe; however, some information is proprietary in nature and is specific to your organization. For example, your organization may need to protect employee ID numbers or other data with unique characteristics. To better help you meet your data protection needs, we’re pleased to announce that you can now create your own custom sensitive information types for use in your Security & Compliance Center policies. Where can I use custom sensitive types? Previously only available for Exchange Online, this capability is now available across Exchange Online, SharePoint Online, OneDrive for Business, Outlook (2013+), OWA, Office Clients (ProPlus/2016), and supported mobile apps. Now you can define the kinds of data you want to detect by creating your own sensitive types or modifying any of our out-of-box definitions. Once defined in XML and uploaded to the Security & Compliance Center, your custom sensitive information types can be used in any of your DLP or Retention policies or eDiscovery queries, where we’ll automatically identify and protect your data across Office 365. While managed in the Security & Compliance Center, custom sensitive types will still be available for use in Exchange Transport rules (ETRs) which are created in the Exchange Admin Center (EAC). What kinds of data can I protect? We provide a rich set of capabilities for you to detect your sensitive information including regular expressions, keyword lists, and built-in functions, along with a robust framework in which define your detection requirements. To help you balance user productivity and risk of data exposure, we also allow you to create different versions of your sensitive types, varying in strictness, and trigger off them separately in your policy rules. For example, a pattern alone might be a false positive, but if you’re risk averse, you may want to at least log the match or get a report when detected; however, if the pattern is found with other evidence like keywords or other patterns, you may want to take a more strict action such as encrypting the content. We’ve designed this feature to give you the maximum flexibility possible. What about my existing custom sensitive types in Exchange? Any custom sensitive information types you’ve created in Exchange Online have been automatically migrated to the Security & Compliance Center. Your existing policies or Exchange Transport Rules that use those custom sensitive types will continue to function normally. Going forward you can manage all custom sensitive types in the Security & Compliance Center. We’re excited to bring this powerful capability to the Security & Compliance Center and can’t wait for you to try it out! For more information, check out this article.14KViews7likes15CommentsNew Office Labs posted to TechNet Virtual Labs
Great news, we've added all of the Office and Windows labs used for our Tech Summit globabl event series to TechNet Virtual Labs! Previously, these labs were only available to Tech Summit attendees. Now anyone can take them! Check out the post here.1.2KViews7likes0CommentsNew White Paper - Office 365 empowers Microsoft employees and enables Microsoft IT
As Microsoft has moved users, teams, and documents to the cloud with Office 365, the company's IT department has been transforming from server and systems management to organization empowerment. Formerly MSIT and now called Core Services Engineering (CSE), the teams are focused on delivering technology based services that enhance the company's ability to achieve our mission: to empower every person and every organization on the planet to achieve more. Software-as-a-service solutions like Office 365 delivered from the cloud are always up to date and constantly improving. Rather than spend time racking and stacking servers, deploying patches, and planning costly upgrade projects, CSE resources are freed to develop solutions to business problems and enable a productive and collaborative - yet secure and protected - workforce. To learn more about MSIT's transformation aided by Office 365, check out the new white paper: http://aka.ms/MSITservers2services3.8KViews5likes0CommentsFurther Streamlining the eDiscovery Review Process
In our new world of hybrid work, organizations continue to empower people to work effectively by being flexible in where and how work gets done. This flexibility has further accelerated digital transformation, resulting in an explosion of new types of data. These new data types are more dynamic than email and more complex to discover.3.3KViews4likes0CommentsOffice 365 Compliance Control
A look at the compliance side of the Office 365 Security and Compliance Center. In this video, they review how the experience is improved by centralized security controls, the ability to view and manage security and compliance for all your cloud services, insights and intelligence that offer recommendations based on your Office 365 environment. Also, the experience for security and compliance based on your role.1.1KViews4likes0Comments