Skip to content

Commit b3fe669

Browse files
committed
intro module for sc-401
1 parent 05e960e commit b3fe669

16 files changed

+167
-26
lines changed

learn-pr/wwl-sci/purview-protect-sensitive-data/data-protection-need.yml

Whitespace-only changes.
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
Security teams need visibility and control to respond to threats effectively. Without proper monitoring and investigative tools, organizations risk missing critical security incidents that could lead to data breaches, compliance violations, or operational disruptions. A proactive security approach ensures that risks are addressed before they become serious threats.
2+
3+
## Security monitoring and response tools
4+
5+
Organizations can strengthen their security posture by using **Microsoft Purview** and **Microsoft Defender** tools to detect, investigate, and respond to security risks.
6+
7+
### Microsoft Purview Audit
8+
9+
Organizations must be able to track and investigate user activities across their environment to identify security incidents. **Microsoft Purview Audit** provides detailed visibility into user actions, helping security teams detect unusual behavior, unauthorized access, and policy violations.
10+
11+
With Microsoft Purview Audit, security teams can:
12+
13+
- Review user activity logs to investigate security incidents.
14+
- Identify unauthorized access attempts and detect unusual behavior.
15+
- Use Audit (Premium) capabilities to retain logs for long-term forensic analysis.
16+
17+
### Alerts in Microsoft Purview
18+
19+
Microsoft Purview provides alerting capabilities across multiple security and compliance solutions, helping organizations detect and respond to data loss, insider threats, and policy violations. Alerts are managed within specific Purview solutions, such as Insider Risk Management and Data Loss Prevention (DLP), allowing security teams to address risks in their relevant contexts.
20+
21+
With Alerts in Microsoft Purview, security teams can:
22+
23+
- Monitor security and compliance alerts directly within Insider Risk Management, DLP, and other Microsoft Purview solutions.
24+
- Take immediate action on alerts within Microsoft Purview tools to prevent security incidents.
25+
- Prioritize alerts based on severity and risk to focus on the most critical incidents.
26+
27+
By integrating alerting capabilities within specific security and compliance tools, Microsoft Purview ensures that security teams can effectively track and mitigate risks where they occur.
28+
29+
### Activity and content explorer
30+
31+
Security teams need to understand how data is accessed, shared, and classified within an organization. **activity explorer** and **content explorer** provides real-time insights into user activities and content classification, helping security teams monitor security events.
32+
33+
With **activity explorer** and **content explorer**, organizations can gain insights into data access and classification:
34+
35+
- **Activity explorer**: Provides insights into user activity, tracking data access, movement, and security events.
36+
- **Content explorer**: Helps security teams view and classify sensitive data across Microsoft 365 applications, identifying potential risks.
37+
- Identify anomalies in file sharing, downloads, and access attempts to detect potential security risks.
38+
39+
### Microsoft Defender XDR
40+
41+
**Microsoft Defender XDR (Extended Detection and Response)** provides a unified threat detection and response capability by correlating security signals from multiple sources.
42+
43+
With Microsoft Defender XDR, security teams can:
44+
45+
- Correlate security signals across Microsoft Purview tools, endpoints, and cloud services to provide a comprehensive view of threats.
46+
- Identify suspicious activity by analyzing security events across multiple sources.
47+
- Automate responses to detected threats and reduce investigation time.
48+
49+
## A proactive approach to security
50+
51+
By integrating security monitoring, alerting, and response tools, organizations can proactively detect and mitigate threats before they escalate.
52+
53+
This approach ensures that security teams can:
54+
55+
- Analyze data access and usage patterns to identify potential security risks.
56+
- Investigate security incidents before they lead to breaches.
57+
- Respond to alerts in real-time to mitigate threats.
58+
59+
A well-defined security monitoring strategy ensures that organizations stay ahead of potential risks while protecting sensitive data and maintaining compliance.
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
Organizations need tools to prevent sensitive data from being exposed, whether through accidental sharing, poor security practices, or intentional misuse. Without strong protections, organizations face compliance risks, financial losses, and reputational damage.
2+
3+
## Common risks
4+
5+
Sensitive data can be leaked or exposed in various ways. Organizations must identify these risks to implement effective security measures.
6+
7+
- **Unauthorized sharing**: Employees might unintentionally send sensitive documents outside the organization, leading to potential data exposure.
8+
- **Data stored in unprotected locations**: Files saved to personal devices, unmanaged cloud apps, or external storage increase security risks.
9+
- **Malicious insiders**: Employees with access to sensitive data might misuse their privileges for financial gain, competitive advantage, or other malicious purposes.
10+
11+
## Mitigation strategies
12+
13+
Organizations need tools to prevent data from being exposed, both accidentally and intentionally. Whether caused by human error, compromised accounts, or malicious actions, data leaks pose significant security and compliance risks. A structured approach to risk detection and policy enforcement helps reduce these risks while maintaining business productivity.
14+
15+
### Apply Insider Risk Management tools
16+
17+
Not all data threats come from external attackers. Insider risks, whether accidental or intentional, pose a serious security challenge. Organizations need tools to monitor activity, detect risks, and respond before data is compromised.
18+
19+
Microsoft Purview Insider Risk Management helps organizations:
20+
21+
- Detect unusual file access, data transfers, and security violations.
22+
- Identify risky behavior while maintaining user privacy.
23+
- Automate risk alerts and investigations to reduce response times.
24+
25+
By detecting potentially risky behavior early, organizations can take action before it results in data exposure.
26+
27+
### Implement DLP policies
28+
29+
Data loss prevention (DLP) policies help prevent sensitive data from being shared inappropriately. Organizations can define policies that automatically block or restrict sharing based on data sensitivity.
30+
31+
With Microsoft Purview DLP, organizations can:
32+
33+
- Prevent data leaks across email, cloud services, and endpoints.
34+
- Enforce restrictions on copying, pasting, or transferring sensitive files.
35+
- Apply policies dynamically to protect regulated data and intellectual property.
36+
37+
DLP ensures that sensitive data isn't accidentally or deliberately exposed, while still allowing secure collaboration.
38+
39+
### Use Adaptive Protection
40+
41+
Static security policies might not be enough to address evolving threats. Adaptive protection adjusts security controls based on real-time risk insights from insider risk management, ensuring that sensitive data is only accessible under safe conditions.
42+
43+
Microsoft Purview uses Adaptive Protection to:
44+
45+
- Assess user activity and apply security policies dynamically.
46+
- Restrict data access for users exhibiting risky behavior based on Insider Risk Management signals.
47+
- Reduce unnecessary security friction for trusted users.
48+
49+
By integrating insider risk insights with DLP enforcement, adaptive protection ensures that security adapts to user behavior, strengthening protection for high-risk users while minimizing disruptions for low-risk users.
50+
51+
By proactively identifying risks and applying the right mitigation strategies, organizations can protect sensitive data while enabling secure collaboration.

learn-pr/wwl-sci/purview-protect-sensitive-data/includes/protect-ai-data.md

Whitespace-only changes.
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
Traditional security models assume that users and devices inside an organization's network are trusted. However, modern threats require a different approach. Zero Trust operates under the principle that every access request could be a potential risk, requiring continuous verification and least-privilege access to minimize security threats.
2+
3+
## Principles of Zero Trust for data security
4+
5+
Zero Trust is built on three core principles that help organizations reduce security risks and maintain control over sensitive data:
6+
7+
- **Verify explicitly**: Every user, device, and access request must be authenticated and authorized before gaining access to data. This includes enforcing strong identity and access management (IAM) controls, such as **multifactor authentication (MFA)** and **conditional access** policies in **Microsoft Entra ID**.
8+
9+
- **Apply least privilege**: Users should only have the minimum level of access required to perform their tasks. **Microsoft Purview Privileged Access Management** helps enforce granular access controls, ensuring that data is only accessible to those who need it.
10+
11+
- **Assume breach**: Organizations must continuously monitor for threats and respond proactively. **Microsoft Defender for Cloud** and **Microsoft Sentinel** provide real-time monitoring, helping detect suspicious activity and mitigate risks before they escalate.
12+
13+
## How Zero Trust enhances data security
14+
15+
By following Zero Trust principles, organizations can strengthen their security posture and reduce data exposure risks. This approach ensures that:
16+
17+
- Only verified users and devices can access sensitive data.
18+
- Access is granted based on risk, not assumed trust.
19+
- Security teams can detect and respond to threats in real time.
20+
21+
These principles guide how organizations should **classify**, **label**, and **control access to data**, integrating Microsoft Purview's data protection tools to safeguard information across cloud and hybrid environments.

learn-pr/wwl-sci/purview-protect-sensitive-data/includes/summary.md

Whitespace-only changes.
Lines changed: 36 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,52 +1,62 @@
1-
Organizations must first understand what data they have and how sensitive it is before they can effectively protect it. A structured approach to data classification and protection helps reduce security risks, prevent data loss, and ensure compliance with regulatory requirements.
1+
Before organizations can effectively protect their data, they need to identify what data they have and assess its sensitivity. A structured approach to data classification and protection helps reduce security risks, prevent data loss, and ensure compliance with regulatory requirements.
22

33
## Why data classification and protection matter
44

5-
As data volumes grow, organizations face increased risks of accidental exposure, unauthorized access, and regulatory non-compliance. Without clear policies for identifying, labeling, and securing sensitive data, it becomes difficult to apply consistent security controls.
5+
As data volumes grow, organizations face increased risks of accidental exposure, unauthorized access, and regulatory noncompliance. Without clear policies for identifying, labeling, and securing sensitive data, it becomes difficult to apply consistent security controls.
66

77
A strong data protection strategy includes:
88

99
- **Data classification** to categorize information based on sensitivity.
10-
Sensitivity labels to define and enforce handling rules.
11-
Encryption to protect data from unauthorized access.
12-
Data loss prevention (DLP) and retention policies to ensure compliance and prevent accidental leaks.
10+
- **Sensitivity labels** to define and enforce handling rules.
11+
- **Encryption** to protect data from unauthorized access.
12+
- **Data loss prevention (DLP) and retention policies** to ensure compliance and prevent accidental leaks.
13+
1314
These capabilities help organizations secure sensitive data while ensuring users can work efficiently.
1415

15-
Key components of data classification and protection
16-
Data classification
16+
## Components of data classification and protection
17+
18+
### Data classification
19+
1720
Data classification helps organizations identify and categorize sensitive information. By labeling data based on content, context, and usage, organizations can apply security controls more effectively.
1821

1922
Microsoft Purview provides built-in classification capabilities, including sensitive information types and trainable classifiers, to help automate classification across cloud, endpoint, and collaboration environments.
2023

21-
Sensitivity labels
22-
Sensitivity labels define how data should be handled, enforcing policies for encryption, access control, and visual markings. These labels ensure that data remains protected across emails, files, and cloud services, regardless of where it is shared.
24+
### Sensitivity labels
25+
26+
Sensitivity labels define how data should be handled, enforcing policies for encryption, access control, and visual markings. These labels ensure that data remains protected across emails, files, and cloud services, regardless of where it's shared.
2327

2428
Microsoft Purview Sensitivity Labels allow organizations to:
2529

26-
Apply automatic or manual labels based on content and policies.
27-
Restrict file sharing and enforce access controls.
28-
Add visual markings such as headers, footers, and watermarks.
29-
Encryption
30+
- Apply **automatic** or **manual** labels based on content and policies.
31+
- Restrict file sharing and enforce **access controls**.
32+
- Add **visual markings** such as headers, footers, and watermarks.
33+
34+
### Encryption
35+
3036
Encryption secures data by converting it into an unreadable format, ensuring that only authorized users can access it. It protects information at rest, in transit, and in use to prevent unauthorized exposure.
3137

3238
Microsoft Purview encryption policies support:
3339

34-
Microsoft 365 apps, ensuring emails and files are protected.
35-
Automatic encryption for highly sensitive content.
36-
Integration with Azure Information Protection for broader security coverage.
37-
Data loss prevention (DLP) and retention policies
40+
- **Microsoft 365 apps**, enabling encryption for emails and files..
41+
- **Automatic encryption** for highly sensitive content.
42+
- **Microsoft Purview Information Protection scanner** for discovering and classifying sensitive data across on-premises locations.
43+
44+
### Data loss prevention (DLP) and retention policies
45+
3846
DLP policies help organizations prevent accidental data leaks by monitoring and restricting data movement based on sensitivity. Retention policies ensure that critical business information is preserved for compliance purposes.
3947

4048
With Microsoft Purview DLP and retention policies, organizations can:
4149

42-
Detect and block unauthorized data sharing across cloud and endpoint environments.
43-
Enforce automatic retention or deletion of data based on compliance requirements.
44-
Monitor and analyze policy violations to improve security strategies.
45-
Balancing security and productivity
46-
Effective data protection shouldn't hinder productivity. Security measures must be seamlessly integrated into daily workflows to ensure adoption without disrupting collaboration.
50+
- Detect and block unauthorized data sharing across cloud and endpoint environments.
51+
- Enforce automatic retention or deletion of data based on compliance requirements.
52+
- Monitor and analyze policy violations to improve security strategies.
4753

48-
Automated labeling reduces the burden on users.
49-
Policy-based protection ensures security without requiring manual intervention.
50-
User-friendly security prompts help guide employees in handling sensitive data responsibly.
51-
By implementing a structured approach to data classification and protection, organizations can reduce security risks while enabling secure and efficient collaboration.
54+
## Balancing security and productivity
5255

56+
Data protection should support, not disrupt, daily operations. Security measures must be seamlessly integrated into daily workflows to ensure adoption without disrupting collaboration.
57+
58+
- **Automated labeling** reduces the burden on users.
59+
- **Policy-based protection** ensures security without requiring manual intervention.
60+
- **User-friendly security prompts** help guide employees in handling sensitive data responsibly.
61+
62+
By implementing a structured approach to data classification and protection, organizations can reduce security risks while enabling secure and efficient collaboration.

learn-pr/wwl-sci/purview-protect-sensitive-data/introduction.yml

Whitespace-only changes.

learn-pr/wwl-sci/purview-protect-sensitive-data/knoweldge-check.yml

Whitespace-only changes.

learn-pr/wwl-sci/purview-protect-sensitive-data/manage-respond-alerts-threats.yml

Whitespace-only changes.

0 commit comments

Comments
 (0)