背景:
阅读新闻

Azure Links

  作者: 今日评论: [字体: ]

1)
Azure Portal

https://portal.azure.com/

2)
Azure DeviceManagement

https://devicemanagement.microsoft.com

3)
O365 Admin

https://admin.microsoft.com/

4)
GoogleEn

https://www.google.com/?hl=en

5)
GoogleCn

https://www.google.com/?hl=zh

6)
GoogleJp

https://www.google.co.jp


7)defender ATP
https://securitycenter.windows.com/


8)MCAS Microsoft cloud app security
https://XXXXX.portal.cloudappsecurity.com/


9)exchange admin
https://outlook.office365.com/ecp/


10)businessstore
https://businessstore.microsoft.com/ja-jp/store?signin=
https://www.windows-noob.com/forums/topic/15670-how-can-i-integrate-microsoft-store-for-business-with-intune-in-azure/


11)AIP ADD Label 
https://docs.microsoft.com/en-us/azure/information-protection/quickstart-label-specificusers


12)Microsoft 365 コンプライアンス
https://compliance.microsoft.com/homepage


13)How to modify the reports and create custom queries
Central reporting for Azure Information Protection
https://docs.microsoft.com/en-us/azure/information-protection/reports-aip


14)the difference between Data Loss Prevention (DLP), Azure Information Protection, Information Rights Permission (IMP), and Azure Rights Management (Azure RMS) 
https://social.technet.microsoft.com/Forums/en-US/2410f357-8c85-4253-b526-f8d78aa2f680/need-help-understanding-the-difference-between-data-loss-prevention-dlp-azure-information?forum=onlineservicessharepoint

  • Data Loss Prevention (DLP) can be used to create Policies that identify sensitive information, like Social Security Numbers, credit card numbers, etc, included in documents stored in SharePoint online or sent as text in Exchange.  The Policies can also be setup to notify the user that the content is there and potentially block access to the file or decline to send the email.
  • Azure Information Protection (AIP) can be used to create Tags that are embedded into documents specifying the sensitivity of the information in the document.  Tags can be applied manually or automatically.  Embedded Tags can then be queried by other systems to control how documents are retained, stored, or shared.
  • Information Rights Management (IRM) is a way to encrypt documents that are downloaded or sent as email attachments outside of Office 365.  Since the documents need to be decrypted to be read IRM can also specify what the decrypting program, like Word, can do with the documents.  You can specify that documents can't be printed, edited, etc.  Since the file is decrypted only authorized recipients can decrypt the document so it can't be shared without your permission.

15)GDPR
General Data Protection Regulation (GDPR) 

16)WIP and endpoint dlp
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels


17)custom Azure Log Analytics
https://zimmergren.net/log-custom-application-security-events-log-analytics-ingested-in-azure-sentinel





来源:
录入日期:[2019/11/25 12:20:00]
收藏 推荐 打印 | 录入:mikebai | 阅读:
文章评论      
正在加载评论列表...
评论关闭