Your sensitive information in the wrong hands can be disastrous and as the perimeter disappears, it’s more important than ever to secure your documents, files, and emails. Microsoft Information Protection can help you classify, label, and protect your sensitive files against unauthorized access and misuse. From easy classification to embedded labels and permissions, enhance data protection at all times with Microsoft Information Protection—no matter where the data is stored or who it’s shared with. Synergy Advisors expert consultants will also talk about best practices from their years of experience working with Fortune 500 companies around this topic. In addition, there will be conversations around better together scenarios with other Microsoft products and services as well as possible areas for integration. After the workshop is completed Synergy Advisors can provide further information around Architecture Design Sessions or Proof of Concepts.
Microsoft Information Protection Introduction
Overview of the session agenda and introduction to Microsoft Information Protection
Microsoft Information Protection Architecture
Understand the required and extended components in a Microsoft Information Protection deployment. Learn about the processes to bootstrap and create and consume classified content
End-User Experience Lab
Explore your own environment in ASC, set your level of coverage for your subscription, set up your management groups, configure your security policies, and then review recommendations for your environment.
Learn how to use technical controls to help enforce your information protection strategy with Microsoft Information Protection. Understand the available enforcement options. Share best practices for staged deployments
Protecting Data in Motion
Examine Microsoft Information Protection integration with Exchange to protect sensitive information shared via email. Understand how integration enhances the end-user and admin experience
Protecting Data at Rest
Learn how Microsoft Information Protection integrates with different technologies and services to automatically classify and encrypt sensitive content at rest in cloud applications and file repositories.
Data in Motion and at Rest Lab
As an administrator, review configurations to automate the classification of content at rest and in motion. As an end-user, see how the policies work in real-time.
Close Out/Review Learnings/Q&A
Recap of Microsoft Information Protection and any outstanding questions.