440 likes | 455 Views
Tim Beamer, Plus Consulting tim.beamer@plusconsulting.com. Security in SharePoint and Teams with DLP, IRM, and AIP. Thanks to our Sponsors!. Platinum: Silver:. More Fun Stuff.
E N D
Tim Beamer, Plus Consulting tim.beamer@plusconsulting.com Security in SharePoint and Teams with DLP, IRM, and AIP
Thanks to our Sponsors! • Platinum: • Silver:
More Fun Stuff • Raffle: Please join us in the Atrium at 5:15 PM for the raffle. We are raffling some exciting prizes (need to be present to win)!!! • SharePint will be held at Beerhead Bar (110 Federal St, Pittsburgh, PA 15212). While it starts at 5:45 PM, there’s no end time!!!! • Pittsburgh Area SharePoint User Group • Meets at the Microsoft office on the North Shore • More Info: https://www.linkedin.com/groups/Pittsburgh-Area-SharePoint-User-Group-3769745/about
We do Request that… • You fill out the Session Evals. These will also be your Raffle tickets. Print your name clearly if you intend to participate in the Raffle and drop the forms at the registration desk after the last session. • You visit the sponsors. The event is possible due to their generous support and we request that you visit them and inquire about their products & services. • Cell phones be kept on silent as a courtesy to other attendees and speakers
Agenda • Introduction • DLP vs IRM vs AIP • Identify • Engine • Setup • Emails • Policies • Monitor • DLP Queries • DLP Policies • Block • Permissions • End User Education • Policy Tips • Limitations • IRM • AIP • Q&A
The “good old days”…NOT • Files in file shares (NTFS permissions) • Move the file? Lose the permissions! • E-mail the file? Lose the permissions! • SharePoint • “Secure” the doc library with permissions • No notification of sensitive information • Policies • “I didn’t know…” • A policy with no enforcement mechanism is useless!
What’s in the toolbox? • DLP • Inspect – Detect – Act • Tooltips • IRM • Define permissions • Encrypt – regardless of destination • AIP • Define data classification • Inspect content and act based on classification • May include modifications of permissions
What is data loss prevention? Introduction
What is DLP? • Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside your organization • DLP software products use business rules to classify and protect confidential and critical information so that unauthorized end users cannot accidentally or maliciously share data whose disclosure could put the organization at risk
Data Loss Prevention in SharePointFind that information before it’s too late! • Search for sensitive content in your existing eDiscovery Center, keeping content in place and enabling you to search in real time. • Credit Card Numbers, SSN, Bank Account Numbers, Passports (Over 80 total information types!) • Define once and protect across Exchange, SharePoint and OneDrive! • NOTE: If you have document libraries with Search disabled, DLP will NOT work in them
Data Loss Prevention in SharePoint • Identify • Monitor • Protect • End User Education
Identify How does SharePoint find this information?
DLP Processing in Sharepoint 2016 • Content Sources Content Processing Index Crawler Query Unified Policy Processing Tasks Policy Definitions
Sensitive Information Evaluation • 16 digits • dddd-dddd-dddd-dddd • dddddddddddddddd • CVN, CVV2, CID • Visa, MasterCard, Amex • Expiration Date • Card Holder
Sensitive Information Evaluation • A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300 characters: • The functionFunc_credit_cardfinds content that matches the pattern. • One of the following is true: • A keyword fromKeyword_cc_verificationis found. • A keyword fromKeyword_cc_nameis found. • The functionFunc_expiration_datefinds a date in the right date format. • A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300 characters: • The functionFunc_credit_cardfinds content that matches the pattern.
Prerequisites • Configure the search service application • Crawl the location of the conflicting documents • Configure outgoing email • Your users need to have an email address in their profile
Site Collections • EDiscovery Center: • A site to manage the preservation, search, and export of content for legal matters and investigations • Compliance Policy Center: • A site to manage compliance and deletion policies
Minimize the Damage Block
Block Sensitive Information • Create policy in policy center • Assign policy to site collection • Repeat for every site collection
Select the template of the information you want to find! Description of the template Select the number of occurrences before an alert is triggered. Also select who the alert gets sent to! Do they want to notify the user that they did something wrong? Do you want to block that document?
In Context Information • Blocked documents are visible directly in the document library
Policy Information • Policy tips appear directly in the document library informing the users what they did wrong
Email Notification • Users receive emails to know what they did wrong
Perfection doesn’t exist! Limitations
InformationRights Management IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : • WHO can use the information • People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do • Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can they use it • Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can they use it from • Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
AIP • AIP – P1 • USER is responsible for applying the correct label • AIP – P2 • Combine the capabilities of DLP and IRM • Content inspection can apply the label automatically
Call to action • Schedule a Security Focused CIE • Hands-on session • We can deliver at our house or yours (need Wi-Fi and Power) • Engage with Security to define data classification, labels, risk, and required protections • Come see more at Workplace Wednesday!