Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

You're reading from   Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Arrow left icon
Product type Paperback
Published in May 2022
Last Updated in May 2022
Publisher Packt
ISBN-13 9781801815994
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1: Exam Overview
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Section 2: The Key Concepts of Security, Compliance, and Identity
4. Chapter 2: Describing Security Methodologies 5. Chapter 3: Understanding Key Security Concepts 6. Chapter 4: Key Microsoft Security and Compliance Principles 7. Section 3: The Microsoft Identity Management Solutions
8. Chapter 5: Defining Identity Principles/Concepts and the Identity Services within Azure AD 9. Chapter 6: Describing the Authentication and Access Management Capabilities of Azure AD 10. Chapter 7: Describing the Identity Protection and Governance Capabilities of Azure AD 11. Section 4: The Microsoft Security Solutions for Microsoft 365 and Azure
12. Chapter 8: Describing Basic Security Services and Management Capabilities in Azure 13. Chapter 9: Describing Security Management and Capabilities of Azure 14. Chapter 10: Describing Threat Protection with Microsoft 365 Defender 15. Chapter 11: Describing the Security Capabilities of Microsoft Sentinel 16. Chapter 12: Describing Security Management and the Endpoint Security Capabilities of Microsoft 365 17. Section 5: The Microsoft Compliance Monitoring Capabilities within Microsoft 365 and Azure
18. Chapter 13: Compliance Management Capabilities in Microsoft 19. Chapter 14: Describing Information Protection and Governance Capabilities of Microsoft 365 20. Chapter 15: Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365 21. Chapter 16: Describing Resource Governance Capabilities in Azure 22. Chapter 17: Final Assessment/ Mock Exam 23. Other Books You May Enjoy

Describe data loss prevention

As discussed in the previous section, sensitivity labels and sensitivity policies are used to identify sensitive data within files, emails, sites, and collaboration groups. The policies then determine an action that can take place to label or encrypt that data, as identified by an administrator or the user. The activity on this sensitive information is then monitored to identify misuse of this information. A key feature that is missing from sensitivity labels and sensitivity policies is the ability to block this information from being shared. For this, a data loss prevention policy must be in place.

Data loss prevention policies are used to prevent data loss and avoid sensitive data from being leaked to unauthorized users inside or outside of a company. The ability to avoid this data loss relies on a policy to be put in place against the types of sensitive data, using either a sensitivity label that has been created or built-in data types that are...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime