Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Information Protection Administrator SC-400 Certification Guide

You're reading from   Microsoft Information Protection Administrator SC-400 Certification Guide Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Arrow left icon
Product type Paperback
Published in Feb 2022
Publisher Packt
ISBN-13 9781801811491
Length 326 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Shabaz Darr Shabaz Darr
Author Profile Icon Shabaz Darr
Shabaz Darr
Viktor Hedberg Viktor Hedberg
Author Profile Icon Viktor Hedberg
Viktor Hedberg
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1: Exam Overview and Introduction to Information Protection
2. Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives FREE CHAPTER 3. Chapter 2: Introduction to Information Protection 4. Section 2: Implementing Information Protection
5. Chapter 3: Creating and Managing Sensitive Information Types 6. Chapter 4: Creating and Managing Trainable Classifiers 7. Chapter 5: Implementing and Managing Sensitivity Labels 8. Chapter 6: Planning and Implementing Encryption for Email Messages 9. Section 3: Implementing Data Loss Prevention
10. Chapter 7: Creating and Configuring Data Loss Prevention Policies 11. Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention 12. Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities 13. Section 4: Implementing Information Governance
14. Chapter 10: Configuring Retention Policies and Labels 15. Chapter 11: Managing Data Retention in Microsoft 365 16. Chapter 12: Implementing Microsoft Purview Records Management 17. Practice Exam 18. Other Books You May Enjoy

Information protection use cases

Microsoft Purview Information Protection is commonly used to identify your data, supply protection for your data, and govern your data to minimize the risk of data leakage or oversharing. The features listed in the previous section provide you and your organization with the tools to achieve all of this.

The following diagram depicts the features of Information Protection that can be applied to sensitive data, and how they interact with each other:

Figure 2.1 – Safeguarding mechanisms that can be applied to protect sensitive information

We will present Example A. Let's say that we have produced a document containing sensitive information regarding one of the employees in your organization. It could range from HR-related information to specific information that could cause harm to the individual if said information wound up in the wrong person's mailbox.

This is a perfect example of where Information Protection...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime