Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Information Protection Administrator SC-400 Certification Guide

You're reading from   Microsoft Information Protection Administrator SC-400 Certification Guide Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Arrow left icon
Product type Paperback
Published in Feb 2022
Publisher Packt
ISBN-13 9781801811491
Length 326 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Shabaz Darr Shabaz Darr
Author Profile Icon Shabaz Darr
Shabaz Darr
Viktor Hedberg Viktor Hedberg
Author Profile Icon Viktor Hedberg
Viktor Hedberg
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1: Exam Overview and Introduction to Information Protection
2. Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives FREE CHAPTER 3. Chapter 2: Introduction to Information Protection 4. Section 2: Implementing Information Protection
5. Chapter 3: Creating and Managing Sensitive Information Types 6. Chapter 4: Creating and Managing Trainable Classifiers 7. Chapter 5: Implementing and Managing Sensitivity Labels 8. Chapter 6: Planning and Implementing Encryption for Email Messages 9. Section 3: Implementing Data Loss Prevention
10. Chapter 7: Creating and Configuring Data Loss Prevention Policies 11. Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention 12. Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities 13. Section 4: Implementing Information Governance
14. Chapter 10: Configuring Retention Policies and Labels 15. Chapter 11: Managing Data Retention in Microsoft 365 16. Chapter 12: Implementing Microsoft Purview Records Management 17. Practice Exam 18. Other Books You May Enjoy

Understanding the scope of Information Protection

For information stored on-premises, we rely on the features designed to help us govern access and protect information stored there, such as the following:

  • Sensitive information types
  • Trainable classifiers
  • Sensitivity labels
  • The Azure Information Protection unified labeling client
  • Double Key Encryption
  • The Rights Management connector
  • The Azure Information Protection unified labeling scanner
  • Data loss prevention
  • Endpoint data loss prevention

The same goes for the cloud environment, where we rely on the features in the cloud to help us achieve the same result, such as the following:

  • Sensitive information types
  • Trainable classifiers
  • The data classification dashboard
  • Sensitivity labels
  • The Azure Information Protection unified labeling client
  • Double Key Encryption
  • Office 365 Message Encryption (OME)
  • Service encryption with Customer Key
  • SharePoint Information...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime