Book Image

Microsoft Information Protection Administrator SC-400 Certification Guide

By : Shabaz Darr, Viktor Hedberg
2 (1)
Book Image

Microsoft Information Protection Administrator SC-400 Certification Guide

2 (1)
By: Shabaz Darr, Viktor Hedberg

Overview of this book

Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance. Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam. By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
Table of Contents (19 chapters)
1
Section 1: Exam Overview and Introduction to Information Protection
4
Section 2: Implementing Information Protection
9
Section 3: Implementing Data Loss Prevention
13
Section 4: Implementing Information Governance

Managing and responding to DLP policy violations

In the case where a DLP policy alerts an admin that a DLP policy violation has occurred, it can have multiple meanings. It does not always mean that data loss has occurred or has been stopped. You will get alerted if a policy violation has been observed; however, the policy will not take any action based on the reason for trying to share the data that is protected. Escalating any violation to the organization's security team is a reactive action you can take, and you would work with them and key stakeholders to investigate the issue.

A good example is if you are working for an organization that protects highly sensitive information (financial data is a common example) to stop any sharing of client data with third parties. You get several alerts at the end of the month that there have been violations of the specific policy in place for this. When you look at the reports, you see a high level of emails from a department within...