![Page 1: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/1.jpg)
![Page 2: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/2.jpg)
![Page 3: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/3.jpg)
![Page 4: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/4.jpg)
![Page 5: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/5.jpg)
![Page 6: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/6.jpg)
![Page 7: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/7.jpg)
![Page 8: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/8.jpg)
![Page 9: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/9.jpg)
LESS RESTRICTIVE MORE RESTRICTIVE
• Apply the right level of control based on the sensitivity of the data
• Maximize control and minimize unnecessary user disruptions
Alert
“Allow delivery
but add a
warning.”
Append
“Allow delivery
but add a
disclaimer.”
Protect
“Allow delivery
but prevent
forwarding.”
Redirect
“Block
delivery
and redirect.”
Review
“Block delivery
until
reviewed.”
Block
“Do not
deliver.”
Modify
“Allow delivery
but modify
message.”
Classify
“Allow delivery
but apply
classification.”
![Page 10: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/10.jpg)
![Page 11: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/11.jpg)
Transport rules
Data Loss Prevention
Rights Management
11
![Page 12: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/12.jpg)
Conditions
Actions
Exceptions
Conditions
Actions
Exceptions
12
New options
• Rules can be configured to run for a specific time
period
• Rules can be run in Test Mode
New filters
• Total message size
• Attachment extension keyword matching
• Sender IP address
New actions
• Criteria-based routing
• Forced TLS routing
• Halt processing of remaining rules on a message (“Stop
processing rules”)
![Page 13: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/13.jpg)
![Page 14: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/14.jpg)
![Page 15: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/15.jpg)
DLP helps to
identify
monitor
protect
sensitive data through deep content analysis
![Page 16: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/16.jpg)
16
![Page 17: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/17.jpg)
• Content to monitor
• User action
• Mail flow actions
contains
• Credit cards
• EU debit cards
Defines the policy objectivesto help meet regulatory requirementsfor identified content
Contains data type definitionsto help identify sensitive content
17
![Page 18: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/18.jpg)
Predefined rules targeted at sensitive data types
Advanced content detection
Combination of regular expressions, dictionaries, and internal functions (e.g., validate checksum on credit card numbers)
Extensibility for customer and ISV-defined data types
![Page 19: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/19.jpg)
Conditions
Actions
Exceptions
![Page 20: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/20.jpg)
Empower users to manage their compliance
Contextual policy education
Doesn’t disrupt user workflow
Can work even when disconnected
Admin-customizable text and actions
20
![Page 21: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/21.jpg)
21
![Page 22: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/22.jpg)
Comprehensive view of DLP policy performance
Downloadable Excel workbook
Drill into specific departures from policy to gain business insights
22
![Page 23: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/23.jpg)
![Page 24: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/24.jpg)
![Page 25: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/25.jpg)
Information Author Information Recipient
2
3
1
4 5
68
7
9
Database Server RMS Active Directory
Publishing Consuming
![Page 26: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/26.jpg)
Use Windows Azure AD Right Management Out-of the box
Integrate natively with Exchange online and SharePoint online
Integrate Office 365 with existing on-premises AD RMS infrastructure
![Page 27: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/27.jpg)
![Page 28: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/28.jpg)
![Page 29: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/29.jpg)
![Page 30: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/30.jpg)
![Page 31: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/31.jpg)
![Page 32: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/32.jpg)
![Page 33: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/33.jpg)
![Page 34: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/34.jpg)
NwTraders Contoso
1. NwTraders
exports private
key and SLC
2. Contoso
imports
private key
and SLC
4. Ilse sends PL
and RAC with
request for UL
from local
licensing server
5. Contoso
uses imported
private key to
decrypt PL and
issues UL
3. Robin send IRM-Protected
message to Ilse
![Page 35: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/35.jpg)
![Page 36: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/36.jpg)
BYOK and logging are
not compatible with
Exchange Online
![Page 37: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/37.jpg)
![Page 38: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/38.jpg)
![Page 39: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/39.jpg)
![Page 40: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/40.jpg)
![Page 41: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/41.jpg)
![Page 42: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/42.jpg)
![Page 43: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/43.jpg)
![Page 44: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/44.jpg)
emailtext
disclaimertext
image
![Page 45: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/45.jpg)
image
![Page 46: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/46.jpg)
image
portaltext
![Page 47: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/47.jpg)
Exchange Online
Policy detection and
Enforcement
Tenant
configuration
O365 User Internet User
Microsoft
account/Organization
Account
Mail Reading Portal
![Page 48: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/48.jpg)
![Page 49: O365con14 - information protection and control in office 365](https://reader034.vdocuments.net/reader034/viewer/2022052618/554de2eab4c905d10e8b57e9/html5/thumbnails/49.jpg)