Microsoft Cybersecurity Stack: Securing Enterprise Information

Microsoft Cybersecurity Stack: Securing Enterprise Information

English | MP4 | AVC 1280Ă—720 | AAC 48KHz 2ch | 2h 06m | 315 MB

Today’s users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization’s security posture.

In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.

Topics include:

  • Securing information on any device
  • What is Azure Information Protection (AIP)?
  • Configuring classification and labeling
  • Classifying and protecting data in bulk
  • Challenges of securing data on mobile devices
  • Data loss prevention (DLP) on mobile devices
  • Identifying and controlling shadow IT
  • Securing collaboration and DLP
  • Configuring dynamic data masking
  • Protecting Azure SQL with SQL Threat Detection
Table of Contents

1 Welcome
2 What you should know
3 Lab requirements
4 What is Azure Information Protection (AIP)
5 Configure classification and labeling
6 Create RMS templates
7 Work with the AIP client
8 Introducing the unified labeling experience
9 Classify and protect data in bulk
10 Challenges of securing data on mobile devices
11 Data loss prevention (DLP) on mobile devices
12 Secure sharing from mobile devices
13 Implement DLP for unmanaged mobile devices
14 What is Cloud App Security (CAS)
15 Deploy Cloud Discovery
16 Customize discovery and anonymize discovery data
17 Configure automatic log upload
18 Connect apps to CAS
19 Integration with other Microsoft cloud services
20 Information Rights Management (IRM) in SharePoint
21 Configure built-in IRM options
22 Using SharePoint security policies
23 Audit sharing activity in SharePoint
24 Secure email sharing with anyone, anywhere
25 Secure structured data at rest
26 What is SQL Always Encrypted
27 Using row-level security
28 Configure dynamic data masking
29 Protect Azure SQL with SQL Threat Detection
30 Next steps