Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Security and Compliance for Administrators

You're reading from   Microsoft 365 Security and Compliance for Administrators A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Arrow left icon
Product type Paperback
Published in Mar 2024
Publisher Packt
ISBN-13 9781837638376
Length 432 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Sasha Kranjac Sasha Kranjac
Author Profile Icon Sasha Kranjac
Sasha Kranjac
Omar Kudović Omar Kudović
Author Profile Icon Omar Kudović
Omar Kudović
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1:Introduction to Microsoft 365 FREE CHAPTER
2. Chapter 1: Getting Started with Microsoft 365 Security and Compliance 3. Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security 4. Part 2: Microsoft 365 Security
5. Chapter 3: Microsoft Defender for Office 365 6. Chapter 4: Microsoft Defender for Endpoint 7. Chapter 5: Getting Started with Microsoft Purview 8. Chapter 6: Microsoft Defender for Cloud Apps 9. Chapter 7: Microsoft Defender Vulnerability Management 10. Chapter 8: Microsoft Defender for Identity 11. Part 3: Microsoft 365 Governance and Compliance
12. Chapter 9: Microsoft Purview Insider Risk Management 13. Chapter 10: Microsoft Purview Information Protection 14. Chapter 11: Understanding the Lifecycle of Auditing and Records 15. Index 16. Other Books You May Enjoy

Communication Compliance

Microsoft Purview Communication Compliance is an insider risk solution designed to identify, capture, and respond to inappropriate messages that may pose a risk to data security or compliance within your organization. It assesses both text- and image-based messages across various platforms such as Microsoft Teams, Viva Engage, Outlook, and more. This includes monitoring for policy breaches such as improper sharing of sensitive information, the use of threatening or harassing language, and potential violations of regulatory standards. Communication Compliance employs machine learning models and keyword matching to flag messages that may contain potential breaches of business conduct or regulatory policies. These flagged messages are then subsequently reviewed by a Communication Compliance investigator.

Some examples of Communication Compliance uses are to serve the purpose of enabling organizations to identify, assess, and address communications that may...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at AU $24.99/month. Cancel anytime