M365 Compliance - Scenario Based Demos (SBD)
M365 Compliance - Scenario Based Demos (SBD)
  • 14
  • 36 533
SBD11 - Microsoft Endpoint Management (Intune) with MIP - Part02 - Microsoft 365 Compliance
In this episode, we will continue going through the Microsoft Endpoint Management (MEM) topic. specifically, when it is integrating with Microsoft Information Protection (MIP). Here, We will talk about auto-enrollment for Windows devices, iOS device enrollment, as well as device compliance policies. As usual, we will walk you through all the required prerequisites, configuration steps and testing.
This is part two of two. With that, we have completed the basic MEM section of the SBD.
00:00 Episode start
00:14 Previously on SBD
04:48 Auto-enroll windows devices via a Group Policy - configuration and testing
08:13 iOS devices enrollment - configuration and testing
16:46 Device compliance policies - configuration and testing
26:56 MEM close-out
27:18 SBD requirements update
zhlédnutí: 689

Video

SBD10 - Microsoft Endpoint Management (Intune) with MIP - Part01 - Microsoft 365 Compliance
zhlédnutí 1,1KPřed 2 lety
In this episode, we will change direction a bit and talk about Microsoft Endpoint Management (MEM). specifically, when it is integrating with Microsoft Information Protection (MIP). We will also introduce MEM, and we will talk about device compliance, conditional access and device enrollment. We will walk you through how to prepare your tenant for MEM, and more. This is part one of two, so stay...
SBD09 - Service-side Auto Labeling - Microsoft 365 Compliance
zhlédnutí 2,2KPřed 2 lety
In this episode, we will continue our discussion around Microsoft Information Protection (MIP) auto-labeling capability, and this one is all about the Service-side Auto Label features. we will learn about the new updates and improvements introduced recently, and how to effectively use the service-side auto label capability. 00:00 Episode start 00:15 Intro 00:38 Agenda 00:57 Previous episode rec...
SBD08 - Custom SITs and Client-side Auto Labeling - Microsoft 365 Compliance
zhlédnutí 2,3KPřed 2 lety
In this episode, we will go through Microsoft Information Protection (MIP) Custom Sensitive Information Types (SITs) and the Client-side Auto Label features. We will first go over Custom SITs overview, then we will show you how you should approach the custom SIT design and logic the will address your needs. Moreover, learn how to effectively use the client-side auto label capability (not to be ...
SBD06 - Sensitivity Labels for Content - Part02 - Microsoft 365 Compliance
zhlédnutí 2,4KPřed 2 lety
In this episode, we will continue with the Microsoft Information Protection (MIP) Sensitivity Labels for content classification and protection. We will go over a short flashback of part 1 episode and continue testing the behavior of various classifications and clients, as well as M365 Activity Explorer walk-through. This is the second part of two on this topic. 00:00 Intro 00:15 Previous episod...
SBD05 - Sensitivity Labels for Content - Part01 - Microsoft 365 Compliance
zhlédnutí 4,2KPřed 2 lety
In this episode, we will start with the Microsoft Information Protection (MIP) Sensitivity Labels for content classification and protection. We will go through our SBD classification taxonomy recap and configuration. This is the first part of two on this topic. We will learn the difference between a parent and sub labels, how to use and configure each of them. Also how to configure different pr...
Get started with Insider Risk Analytics
zhlédnutí 149Před 2 lety
How to get started with Insider Risk - without even configuring anything!
Configure DLP policy
zhlédnutí 848Před 2 lety
Short video on how to create a DLP policy
Why you should watch SBD?
zhlédnutí 140Před 2 lety
Here are top 5 reasons why you should watch our Scenario Based Demo video series!
SBD04 - AIP Scanner - Microsoft 365 Compliance
zhlédnutí 11KPřed 2 lety
In this episode, we will walk you through the Azure Information Protection (AIP) Scanner architecture, recommendation, installation and configuration. We will also go through the AIP logs in the Log Analytics workspace. This AIP Scanner End-to-End demo will help you understanding the requirements, prerequisites and the expected results, when you are carrying out the data discovery tasks within ...
Security vs Compliance - Explained!
zhlédnutí 2,7KPřed 2 lety
What is the difference between security and compliance? Watch this short video to understand!
SBD03 - Security vs. Compliance and Microsoft Compliance Manager - Microsoft 365 Compliance
zhlédnutí 1,9KPřed 2 lety
In this SBD episode, we will go through the main differences between the Security Practice and Compliance policies, what are they, and how they work together. We will also go through the main challenges that come with Compliance management, and how Microsoft Compliance Manager can help address those challenges. finally, we will go through a technical demo on Microsoft 365 Compliance Manager, an...
SBD02 - Data Discovery&Risk Analysis - Classification&Governance Taxonomy - Microsoft 365 Compliance
zhlédnutí 2,6KPřed 2 lety
In this episode, we will continue on the Information classification and governance introduction topic. We will also go through the Data Discovery and Risk Analysis concept and example. Followed by the classification taxonomy for the tenant and the data retention plan. 00:00 Intro 00:30 Agenda 01:02 Previous episode Recap 01:49 Data discovery and risk analysis 03:15 Content Explorer - Discovered...
SBD01 - Series Intro &Requirements - Classification & Governance Overview - Microsoft 365 Compliance
zhlédnutí 4,2KPřed 3 lety
In the episode, we will introduce the Scenario Based Demos (SBD) series, talk about Data Classification and Data Governance, and a few other things. Microsoft Information Protection (MIP) Microsoft Information Governance (MIG) Microsoft 365 Compliance. Timestamps: 00:00 Introduction 01:21 Agenda 01:31 SBD Overview 04:16 SBD Plot 06:18 SBD Requirements 11:21 Data Classification Overview 13:20 Da...

Komentáře

  • @user-ye6wu5rw6t
    @user-ye6wu5rw6t Před 5 měsíci

    what has happened to episode 7?

  • @darrendozier1168
    @darrendozier1168 Před 8 měsíci

    Almost irrelevant now that AIP is in Purview and no longer in Azure portal.

  • @user-im8db1yx4e
    @user-im8db1yx4e Před 11 měsíci

    When I get to the step at 22:54 to set the AIP authentication I get this message "Set-AIPAuthentication : Unable to authenticate and setup Microsoft Azure Information Protection". I've researched, gone over the steps several times, still get this error. Any ideas?

  • @digitalzomb
    @digitalzomb Před 11 měsíci

    Why doesn't anyone explain which permissions the delegated account needs?

  • @_e_z1601
    @_e_z1601 Před rokem

    Here's something that no one gives a clear description. The scanner agent MUST be installed on the server where you want to SCAN files. In other words, you must install the scanner agent on the on-premises file server(s) or the share point server(s). By installing the scanner agent on the file server, then it will be listed on the Azure portal as a Node.

  • @patrickgorman9138
    @patrickgorman9138 Před rokem

    Seems like a lot of duplication on #10 and #11. Great series overall though, really clarified a lot of things for me.

  • @patrickgorman9138
    @patrickgorman9138 Před rokem

    This is a great series! Love the actual context provided by this SDB approach. One question on this video - you jumped back the the AIP auto labeling and rescanned, which is fine. But I was hoping to see what it would look like as a user when the custom label was triggered by content in the client apps. Went back and re-watched - did I miss something?

  • @ershaknia4418
    @ershaknia4418 Před rokem

    I do all steps without any problem up until "Acquired access token on behalf of..." but I don't see any scanner under nodes. Can you help, please?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před rokem

      Thanks for the question. It will be hard to say without investigating. Maybe checking the logs and ensure the AIP service is running.

  • @gdr1174
    @gdr1174 Před rokem

    Am I correct in thinking the log analytics section of this demonstration now deprecated in favour of the Purview portal?

  • @manickbhat8784
    @manickbhat8784 Před rokem

    If any group of users need to have only one label published by default to all office apps, than shall we need to create new policy

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před rokem

      That is correct, and they have to be excluded from any other policies that may publish other labels to them. If a user is part of two different policies, they will get the labels included in both policies.

  • @amitmanolkar
    @amitmanolkar Před rokem

    This is a very helpful demo, I have a query. Can I apply a standard label to all the files in SharePoint and onedrive without checking the content of the files? Is MCAS better in performance for incremental scan or Is Auto Labelling better?

  • @sieffy91
    @sieffy91 Před 2 lety

    Wish they would bring this back with some new content. Lots of new things have been announced over the past year that could be covered.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      We will be back!. Due to lots of other priorities and resources constrains, we didn't want to release repeated material :).

    • @sieffy91
      @sieffy91 Před 2 lety

      @@m365compliance-scenariobas9 Awesome, thank you! Looking forward to it!

  • @darkiro
    @darkiro Před 2 lety

    however I look at this, I do not understand the difference (of labels) from confidential recipients only to highly confidential from a protective controls point of view. I understand the examples, but in a real case deployment I do not understand why I would deploy them both. Thank you!

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for the question. It is the level of data importance. You may need to have a different level of "confidential" based on your needs. "Recipient only" label - in our case - Does not include PII data that is shared with anyone (internal or external). The highly confidential does include PII.

    • @darkiro
      @darkiro Před 2 lety

      @@m365compliance-scenariobas9 ok. But in this case, the settings on the labels, are going to be the same, right? What I mean is that from an IT configuration, this is exactly the same. I am not looking at this from an end user perspective

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      No not really, they are not the same. the "Recipient Only" label is a UDP label (User Defined permission), where you set "Let users assign permissions" setting, with "Do not forward" under the Outlook setting. The "Highly confidential" has "admin permission" configured, where you set the internal M365 group members, as well as external domain members for custom access permissions. Also the "content marking" settings will be different, but this is obvious. Hope this clarifies the question?

  • @rahmuhammad8355
    @rahmuhammad8355 Před 2 lety

    I cannot believe I came across this valuable tutorial. This just provided clarity, thank you thank you!

  • @pavankumars8173
    @pavankumars8173 Před 2 lety

    Do we have any other automation opportunities around sensitivity lables and what are some of the limitations of sensitivity labels? Any information on the above lines would be highly helpful.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      There are no limitations per se, it is just how you designed and implemented (and what applications/clients you are using) to use MIP Sensitivity labels. on top of this series, please refer to (docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide) for a complete list of official articles around the sensitivity labels. I am not sure I understood your question around the automation part, could you please be more specific? Thanks for reaching out :)

  • @pavankumars8173
    @pavankumars8173 Před 2 lety

    one of the best video tutorials for sensitivity labels on CZcams....hats off!

  • @loutrainer4263
    @loutrainer4263 Před 2 lety

    In the discovery phase, can it detect information if the file is a scanned PDF and not a form? Example, If I scan a SS card, will it detect that it has a SS#?

  • @vidanaweer1662
    @vidanaweer1662 Před 2 lety

    Thank you very helpful. What will happen if a user copies confidential information to their personal iPad(enrolled) third-party applications? In this case, I think we have to set up MAM ? or are there any other best fit solution? For Windows devices, I think endpoint DLP is the best fit? Also, rather than blocking the entire O365 application from non-compliance devices can we target specific SharePoint sites and MS Teams? Thanks.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      In this case, yes, we would recommend App Protection Policies (aka MAM) to protect corporate data on both iOS and Android. Using App Protection Policies, you can restrict the cut/copy/paste of corporate data to other corporate applications. Check out the docs here: docs.microsoft.com/en-us/mem/intune/apps/app-protection-policies . Also have a look at the docs.microsoft.com/en-us/mem/intune/apps/app-protection-framework . And yes, you can specifically target Teams. In the Conditional Access policy, instead of targeting Office 365 like I did in the video, instead search for and target 'Microsoft Teams'. Hope this helps.

  • @vidanaweer1662
    @vidanaweer1662 Před 2 lety

    Thank you very much , really helpful. One question, if we define a mandatory label for a group ( in this example Confidential) that means the auto label ( client-side or server-side) won't work for that user group as the mandatory label always force the user to label the document or mail? Thanks.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks very much for this feedback. And that is correct, Mandatory label will always occur before any other auto-label mechanism taking action.

  • @Sergio-Here-In-Community

    Hello Team , It is missing the SBD09 in the playlist, it jump from 08 to 10.

  • @myfope
    @myfope Před 2 lety

    I'm with you, pineapple and pizza is nothing I want to have either Thanks for the great explanation about the AIP scanner configuration

  • @sergiocompliance1905
    @sergiocompliance1905 Před 2 lety

    Hello MIPcomp. the video was really good. I noticed that in the video you have the AIP button already present, however, for some versions of the office it is required to install the AIP UL client. Can you confirm in which versions of the office the AIP UL button is present without installation? based on it, I can assume that any other office app that is not on the list will need to install the AIP UL Client. thanks for your feedback.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for your comment and feedback. The “classification” button (in this case, the native client not AIP client) will appear once a classification label and a label policy are configured and published and the user is in its scope. Apart from AIP scanner in episode 4, the native client is used throughout the SBD series.

  • @sergiocompliance1905
    @sergiocompliance1905 Před 2 lety

    Hello Team, Great videos, AIP Scanner for on-premise Content Explorer Cloud quick question. Can I discover data on Mobile devices?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for your coolest and feedback!. Unfortunately this is not supported yet in the MIP solution.

  • @Sergio-Here-In-Community

    Hello Team, Sorry to bother you, but you are the best. For Service-side Auto-labeling. Scenario: 1. The admin has the license E5 or E3 with EMS Addon. 2. the end-users have E3. Question: If the End-user user has a document that matches the Service-side Auto-labeling in his OneDrive for Business, will it apply the auto-label or is the end-user required to have the license E5 to be able the tenant label the documents in his OneDrive? My understanding is that admins should have E5 and end-users have E3 and Service-Side Auto-labeling will work perfectly in the tenant, am I right?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for leaving a good question. E5 is required for the auto label policy to work. EMS is irrelevant to MIP (or compliance in general). You will always also need to ensure that you are license-compliant.

    • @Sergio-Here-In-Community
      @Sergio-Here-In-Community Před 2 lety

      @@m365compliance-scenariobas9 perfect, for auto-labeling E5 is required for admins and end-users that require it in onedrive data at rest, sharepoint data at rest and exchange data in transit. thanks.

  • @Sergio-Here-In-Community

    I noticed Brandon warning few times about Encryption and the risk that encryption will be for the data. 1. can you please confirm what are those risks and why we have to be very careful when applying encryption to the data? if the encrytion is executed by microsoft, in theory we should be able to access the data after encryption. 2. how can we know that we should not apply encryption to our data? when Brandon said: be cafefully with encrytion, 3. what should we take in consideration to decide if encrypt or not?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Generally speaking, you should not encrypt all your data, only the sensitive and confidential ones. For example, if a document was encrypted and it was not meant to, and the document is shared externally, access to content may not work for external parties. Moreover, you could have a 3rd party or an outdated system that may not know how to handle encrypted data, then you end up with usability and potentially compliance issue (think of an outdated system that needs access to user mailboxes or SPO site to scan or inspect data, or a DLP solution that inspects emails in the transport pipeline). In episodes 1 and 2 of this series, we went over data classification and how (potentially you may approach the categorization”

  • @Sergio-Here-In-Community

    Hello Team, Great video, best of the best training I ever saw. Question on the minute: 36:35 What is the inside view of the document attached in the email when Walid received it? if the email was labeled as "High Confidential", was he able to see the inside data or was he sent to OME portal to check the Information Right Management? the objective is that the recipient of the email can't see the sensitive data.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks very much for your feedback!. The document (given it is an office document) will be encrypted as the email is labeled with a label that applies encryption. If the user has permission to access encrypted data, they will be able to access the attachment from their outlook client. When you label an email message that has attachments, the attachments inherit the label only if the label that you apply to the email message applies encryption and the attachment is an Office document isn't already encrypted. Because the inherited label applies encryption, the attachment becomes newly encrypted. An attachment doesn't inherit the labels from the email message when the label applied to the email message doesn't apply encryption or the attachment is already encrypted.

    • @vidanaweer1662
      @vidanaweer1662 Před 2 lety

      @@m365compliance-scenariobas9 Reg "given it is an office document" so only office documents will be classified either by server-side or client-side auto-classification? if so I think SharePoint Syntex is a much better solution as it can classify PDF, img files?

  • @DanBrinkmann
    @DanBrinkmann Před 2 lety

    HIPPA :) ---- 6:00 you have a mispelling on the slide.

  • @s.m.3826
    @s.m.3826 Před 2 lety

    Nice work 👌 keep it up!

  • @blueteaming
    @blueteaming Před 2 lety

    Excellent Demo. This is the only video that covers everything. Thank you.

  • @dreeves14
    @dreeves14 Před 2 lety

    So what's the trick to getting this to work on a server other than the local one you built this demo on? Documentation from MSFT is lacking and every demo I've seen just shows it on 1 box which isn't that helpful for turning this PoC into an actual solution.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for your comment. What did you mean by "local"? as in on-prem server (physical) or a VM?. There was no real need to configure multiple boxes in the demo, however it is do-able for larger environments. Please elaborate on issues you are facing when configuring additional nodes in your case.

    • @dreeves14
      @dreeves14 Před 2 lety

      ​@@m365compliance-scenariobas9 so we did exactly as this video, the only difference is we put a SQLExpress instance on the demo box along with the scanner, not a separate SQL server or at least I assume that was a whole other SQL box in your demo. But I noticed out of my 3 repositories, (2 of which are on another server on prem, same network, can talk etc) the other is on the local machine that is the node withthe scanner, it never scans the other servers file location. But it never errors out. I can't figure out what I am missing there, I also have 0 SQL knowledge being as this SQLExpress instance was my first experience so the issue is likely in the chair at this point.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      There could be a file-share permission issue, have you checked event logs? AIP client logs on the AIP server?. how about SQL logs? is the DB accessible to the AIP service? can you see AIP token issued?. As you can see there are a lot of moving parts and place you can look at for further troubleshooting.

  • @stevenjenkinson6586
    @stevenjenkinson6586 Před 2 lety

    Hi, great video, thx. I’ve a few questions … It seems I can use M365 auto-labelling or MCAS file policies to achieve the same goal for data stored in M365 services. What’s the difference between these two solutions which seem to provide the same result? When M365 auto-labelling applies the label to Exchange, does it label both the email and any attachments so that the label stays with the attachment if it’s saved elsewhere? Does M365 auto-labelling push its simulation mode results (discovery) or labelling actions into the AIP Analytics dashboards/reports/logs?

    • @stevenjenkinson6586
      @stevenjenkinson6586 Před 2 lety

      Anyone help with my Q’s?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for your patience Steven. We will get to the questions as soon as we can. Apologies we are a little behind :(.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      @@stevenjenkinson6586 Apologies for the delay! To answer your questions: 1) There are some differences such as MCAS has some stricter limits on the number files that can be labeled per day per tenant, but generally MCAS is best used for data in third party locations/services. Sarahzin (in the video) previously wrote a blog outlining this question: techcommunity.microsoft.com/t5/security-compliance-and-identity/mcas-data-protection-blog-series-do-i-use-mcas-or-mip/ba-p/2011039 2) This is outlined in the documentation under "Specific to auto-labeling for Exchange": docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide 3) The label actions performed by service side auto labeling and simulation are visible in Activity Explorer: docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-activity-explorer?view=o365-worldwide#activity-types

    • @stevenjenkinson6586
      @stevenjenkinson6586 Před 2 lety

      @@m365compliance-scenariobas9 Thank you for taking the time to provide me the answers. Sorry its taken me so long to say.

  • @hobpoblin
    @hobpoblin Před 2 lety

    Brandon created the rule with a description of High Confidence but then left the SIT at the default of Medium Confidence. This seems to be an error.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Good catch, and yes it was a typo, It should have been "applies a highly confidential label....". thanks for that Paul!

  • @hobpoblin
    @hobpoblin Před 2 lety

    What if we have more than 100 sites? What happens if we have more than 1,000,000 files that are matched in an auto-labeling policy?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Sorry for the delay! You can create multiple service side auto-labeling policies to apply to more than 100 sites, or choose to apply to all sites (which excludes from the 100 site limit). As for the 1,00,000 limit - it applies to simulation mode. If a simulation exceeds 1m files, the admin will be forced to reconfigure the policy to match less than 1m files before being able to enable. The 1m limit does not apply to policies after being enabled/enforced. This is outlined here: docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide#learn-about-simulation-mode

  • @RabbitJnr
    @RabbitJnr Před 2 lety

    Can the AIP Scanner capability be extended to one drive, Teams and Sharepoint online ?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for the question. Content Explorer is the feature responsible for data discovery for cloud workload. we have a demo'ed that as well.

    • @RabbitJnr
      @RabbitJnr Před 2 lety

      @@m365compliance-scenariobas9 Thank you.

  • @Productivity365
    @Productivity365 Před 2 lety

    Thanks for producing such series to understand most confusing part of IT security. expecting such more content on Azure Active Directory Premium and Intune. Thanks again.....

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks for your feedback, appreciated. While my team doesn’t do everything, but the next 2 episodes will be about Intune, so stay “tuned” :)

  • @lmercuri159
    @lmercuri159 Před 2 lety

    Very timely Walid and an excellent presentation. This end-to-end approach is perfect.

  • @rovanidelima
    @rovanidelima Před 2 lety

    Congratulations by the video. I´d like to do a question : Is it possible to use custom SITs and the AIPScanner´s job to find and reclassify any documents (not only MSOffice documents) that is classified with a specific label ? For example, to replace an deprecated label with a newer one. Does not matter the file content information.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Currently only Microsoft office file types are supported. Also if the file was manually labeled, auto label won’t apply (at least for now). Thanks for your feedback :)

  • @alexanderkanakaris
    @alexanderkanakaris Před 2 lety

    Better and better! Please do some deep dives on Custom SITs! This is the most crucial aspect for any implementation and for most organizations.

  • @dlgross1
    @dlgross1 Před 2 lety

    This was good, it's great to see more advanced examples.

  • @sieffy91
    @sieffy91 Před 2 lety

    Great video, thank you! Keep doing these episodes!

  • @cgoldnet
    @cgoldnet Před 2 lety

    Agree with Dean - this was a incredibly thorough demo. Thanks

  • @dlgross1
    @dlgross1 Před 2 lety

    this was a very comprehensive demo. Thanks for being so thorough.

  • @dlgross1
    @dlgross1 Před 2 lety

    It would be helpful if the Compliance Center icon shown on a browser tab was not the same as the Security Center icon. I frequently click on the wrong one.

  • @dlgross1
    @dlgross1 Před 2 lety

    When creating a retention policy for mail, we get the option to have it triggered by Last Modified date, but the system is actually triggered by the creation date, the option to use Modified Date should not even be shown because it is irrelevant and just causes confusion

  • @dlgross1
    @dlgross1 Před 2 lety

    Is there any tool in the Compliance center for us to assign our own risk level values to items?

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      In “compliance manager”, you can create your own assessment template and assign the score to individuals items anyway you see fit according to your risk assessment exercise outcome. I hope this was the question?

  • @aarondarius2060
    @aarondarius2060 Před 2 lety

    Really helpful content. Great work. appreciate your efforts 👏👏

  • @georgf6756
    @georgf6756 Před 2 lety

    Great Tutorial! The missing part was the configuration settings of the High Confidential Label. In any case very beneficial.

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks very much for your feedback George! We thought of not repeating the steps as they are the same as the “Recipient only” label (and only scoped to a specific group), it was recorded but didn’t make the cut :). Please keep providing your valuable feedback, greatly appreciated!

    • @Sergio-Here-In-Community
      @Sergio-Here-In-Community Před 2 lety

      @@m365compliance-scenariobas9 Suggestion: For demo purposes, I suggest including all the possible steps, this will help the students to try to emulate and get the same results. If there is one missing step or assumend learned, it could be confusing. After the student repeats all the steps, he will be in the capacity to conclude that they are the same steps.

  • @hobpoblin
    @hobpoblin Před 2 lety

    You folks are funny! Brendon needs a haircut and Walid is still Walid. Good job adding some humor to a dry (to the unwashed masses, not me) topic!!

  • @hobpoblin
    @hobpoblin Před 2 lety

    I strongly recommend that you include, in your introduction to each in the series, a mention to click the "Subscribe" button to be made aware of new content as it is posted. I don't "subscribe" to much CZcams content and kind of accidentally noticed that option while watching the video. You're welcome. ;-)

    • @m365compliance-scenariobas9
      @m365compliance-scenariobas9 Před 2 lety

      Thanks Paul. We have considered it for sure, and we will try to add a reminder at the beginning of each episode for viewers to subscribe. Thanks once again!!

  • @kailasnathaanchery2462

    Very well made, precise, relevant and highly useful video - thank you!