Summary
In this chapter, we introduced you to the principles of managing insider risk in your Microsoft 365 environment. We learned that by implementing Customer Lockbox, we can control and monitor the access that Microsoft has to our data during a support request. We also learned that with Communication Compliance policies, we can be alerted when inappropriate or abusive communications take place between users in our organizations. Additionally, we showed you how implementing and managing Insider Risk Management policies can help prevent data from being leaked outside our organization by unwitting or malicious insiders and how with Information Barriers policies, we can create segments of users who are blocked from communicating with each other for regulatory reasons. Finally, we saw that implementing and managing PAM provides granular levels of control to Exchange Online tasks, roles, and role groups and provides just enough access instead of vulnerable standing permissions.
We...