Reader small image

You're reading from  Microsoft 365 Security and Compliance for Administrators

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781837638376
Edition1st Edition
Right arrow
Authors (2):
Sasha Kranjac
Sasha Kranjac
author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

Omar Kudović
Omar Kudović
author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović

View More author details
Right arrow

Microsoft Purview Insider Risk Management

In a conversation about computer security, cloud security, cyber threats, cyber-attacks, attacks on computer systems, the ways companies and individuals become victims of attacks and lose their data, and how the data is stolen, people usually immediately think about hackers and how external attacks are the reason for data breaches and data loss.

Undoubtedly, hackers and external attacks still pose a threat to company data but as companies and their computer and cloud infrastructure get progressively better protection, attackers increasingly turn to the ones with direct contact with valuable company data.

People with direct contact with the data – employees – are becoming the major threat and concern among businesses of all sizes. Insider threat statistics are scary, and the numbers have been rising constantly. According to various statistics, around 65% of data breaches are caused by insider threats, while more than 70%...

Technical requirements

To be able to use Microsoft 365 Purview Insider risk management, you must have one of the Microsoft 365 E5, A5, F5, or G5 subscriptions. Alternatively, Microsoft 365 E3, A3, F3, and G3 subscriptions will work too, together with either compliance or insider risk management add-ons.

Ultimately, an Office 365 E3 subscription paired with Enterprise Mobility and Security E3 paired with a compliance add-on will provide you with sufficient rights to work with Insider Risk Management.

Insider Risk Management

Microsoft Purview Insider Risk Management (IRM) is just one product in the palette of risk and compliance solutions available in Microsoft Purview that works together with communication compliance, information barriers, and privileged access management to help organizations successfully mitigate insider threats.

The potential dangers posed by insider threats, emerging from activities that are illegal, inappropriate, unauthorized, or unethical, constitute a significant concern for all companies. These risks can often remain unnoticed until it’s too late. Whether it involves intellectual property theft, data breaches, or other potential scenarios, safeguarding an organization’s data from both unintentional and malicious actions is of utmost importance. While it is harder to stop an intentional data exfiltration action than an unintentional action, IRM provides an additional layer of protection against data leakage and exfiltration. Microsoft provides...

Information barriers and access management

Microsoft 365 streamlines communication and collaboration across teams and organizations, offering tools to set boundaries when needed. This could mean limiting interactions between specific groups to prevent conflicts of interest or safeguard sensitive information.

Microsoft Purview Information Barriers (IB) is seamlessly integrated into Microsoft Teams, SharePoint Online, and OneDrive for Business. Administrators have the power to establish policies regulating communication between defined boundaries within an organization. This feature comes in handy for scenarios such as restricting finance personnel handling confidential company data from communicating or sharing files with specific groups within their organization or securing internal teams with sensitive trade secrets, preventing them from calling or chatting online with users in specific groups.

Microsoft Purview IB is a two-way communication and collaboration compliance tool...

Communication Compliance

Microsoft Purview Communication Compliance is an insider risk solution designed to identify, capture, and respond to inappropriate messages that may pose a risk to data security or compliance within your organization. It assesses both text- and image-based messages across various platforms such as Microsoft Teams, Viva Engage, Outlook, and more. This includes monitoring for policy breaches such as improper sharing of sensitive information, the use of threatening or harassing language, and potential violations of regulatory standards. Communication Compliance employs machine learning models and keyword matching to flag messages that may contain potential breaches of business conduct or regulatory policies. These flagged messages are then subsequently reviewed by a Communication Compliance investigator.

Some examples of Communication Compliance uses are to serve the purpose of enabling organizations to identify, assess, and address communications that may...

Summary

An important part of any organization is to stay compliant with standards, regulations, and laws, whether small, medium, or enterprise-sized. In today’s digital landscape, safeguarding sensitive information and ensuring compliance with internal policies is paramount for any organization. Microsoft 365 offers a comprehensive suite of tools designed to address these concerns: Insider Risk Management, Information Barriers, and Communication Compliance capabilities. Together, they form a robust defense against potential risks and compliance breaches.

These capabilities collectively empower an organization to fortify its security and compliance efforts. By utilizing advanced technology and machine learning, these tools offer a proactive defense against potential threats and breaches. As organizations navigate an increasingly digital landscape, having a comprehensive suite of compliance solutions is not just an advantage – it’s a necessity. Microsoft 365 provides...

Further readings

There are many reports and research that show various cybersecurity-related statistics and, while there are numerous important publishers and institutions, here are some links to help you get started.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Microsoft 365 Security and Compliance for Administrators
Published in: Mar 2024Publisher: PacktISBN-13: 9781837638376
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović