Your sensitive information in the wrong hands can be disastrous and as the perimeter disappears, it’s more important than ever to secure your documents, files, and emails. Microsoft Information Protection can help you classify, label, and protect your sensitive files against unauthorized access and misuse. From easy classification to embedded labels and permissions, enhance data protection at all times with Microsoft Information Protection—no matter where the data is stored or who it’s shared with. Synergy Advisors expert consultants will also talk about best practices from their years of experience working with Fortune 500 companies around this topic. In addition, there will be conversations around better together scenarios with other Microsoft products and services as well as possible areas for integration. After the workshop is completed Synergy Advisors can provide further information around Architecture Design Sessions or Proof of Concepts.
|Microsoft Information Protection Introduction|
Overview of the session agenda and introduction to Microsoft Information Protection
|Microsoft Information Protection Architecture|
Understand the required and extended components in a Microsoft Information Protection deployment. Learn about the processes to bootstrap and create and consume classified content
|End User Experience Lab |
Explore your own environment in ASC, set your level of coverage for your subscription, set up your management groups, configure your security policies, and then review recommendations for your environment.
Learn how to use technical controls to help enforce your information protection strategy with Microsoft Information Protection. Understand the available enforcement options. Share best practices for staged deployments
|Protecting Data in Motion|
Examine Microsoft Information Protection integration with Exchange to protect sensitive information shared via email. Understand how integration enhances the end user and admin experience
|Protecting Data at Rest|
Learn how Microsoft Information Protection integrates with different technologies and services to automatically classify and encrypt sensitive content at rest in cloud applications and file repositories.
|Data in Motion and at Rest Lab|
As an administrator, review configurations to automate the classification of content at rest and in motion. As an end user, see how the policies work in real time.
|Close Out/Review Learnings/Q&A|
Recap of Microsoft Information Protection and any outstanding questions.