This document provides an overview of Azure Information Protection (AIP) which helps organizations classify and optionally protect documents and emails. It discusses how AIP uses labels to automatically or manually classify documents based on policies and content. Labels persist with documents as they move and are used to apply protection or governance. The document also outlines how administrators can monitor information protection events, document sharing and access, and get visibility into policy violations and access patterns for greater control over sensitive data.
This document provides an overview of Azure Information Protection (AIP) which helps organizations classify and optionally protect documents and emails. It discusses how AIP uses labels to automatically or manually classify documents based on policies and content. Labels persist with documents as they move and are used to apply protection or governance. The document also outlines how administrators can monitor information protection events, document sharing and access, and get visibility into policy violations and access patterns for greater control over sensitive data.
This document provides an overview of Azure Information Protection (AIP) which helps organizations classify and optionally protect documents and emails. It discusses how AIP uses labels to automatically or manually classify documents based on policies and content. Labels persist with documents as they move and are used to apply protection or governance. The document also outlines how administrators can monitor information protection events, document sharing and access, and get visibility into policy violations and access patterns for greater control over sensitive data.
INFORMATION PROTECTION • CURRENT DATA COMPLEXITY • WHAT IS AIP • CLASSIFICATIONS IN AIP
Agenda • HOW LABELS PERSIST WITH THE DOCUMENT
• ADMINISTRATION OF LABELS • LABEL IN ACTION • CHANGING LABEL • MONITOR INFORMATION PROTECTION EVENTS • MONITOR DOCUMENT SHARING & ACCESS • FULL DATA LIFECYCLE • QUESTIONS Azure Information Protection (AIP) is a cloud-based solution that helps an organization to classify and optionally, protect its documents and emails by applying labels. CLASSIFICATIONS IN AIP Automatic classification • Policies can be set by IT Admins for automatically applying classification and protection to data Recommended classification • Based on the content you’re working on, you can be prompted with suggested classification Manual reclassification • You can override a classification and optionally be required to provide a justification User-specified classification • Users can choose to apply a sensitivity label to the email or file they are working on with a single click HOW LABELS PERSIST WITH THE DOCUMENT •Document labeling – what is it? • Metadata written into document files • Travels with the document as it moves • In clear text so that other systems such as a DLP engine can read it • Used for the purpose of apply a protection action or data governance action – determined by policy • Can be customized per the organization’s needs Administration of labels Label in action Changing label Visibility • Policy violations MONITOR • Document access & INFORMATION sharing PROTECTION • App usage • Anomalous activity EVENTS FOR • End-user overrides GREATER • False positive CONTROL Take Action • Tune & revise policies • Revoke access • Quarantine file • Quarantine user • Integrate into workflows & SIEM Know when policy is MONITOR violated • Incident report emails alert DLP AND you in real time when content violates policy DATA See the effectiveness of
GOVERNAN your policies
• in reports help you see CE EVENTS historical information and tune policies Integrates with other systems • Leverage the Activity Management API to pull information into SIEM and workflow tools MONITOR DOCUMENT SHARING & ACCESS Distribution visibility • Analyze the flow of personal and sensitive data and detect risky behaviors. Access logging • Track who is accessing documents and from where. Access revocation • Prevent data leakage or misuse by changing or revoking document access remotely. Full data lifecycle Subscription Questions Thank you