RDCMan v2.8, AccessChk v6.14, Process Monitor v3.83, Strings v2.54, Sysmon v13.22 and TCPView v4.13

This article is contributed. See the original author and article here.


RDCMan v2.8


RDCMan, a utility for managing multiple remote desktop connections, is now part of the Sysinternals family of tools!

 

AccessChk v6.14


This AccessChk version adds support for NULL DACL reporting.

 

Process Monitor v3.83


ProcMon v3.83 fixes some rendering bugs in event properties and brings Ctrl+A and Ctrl+C support for edit boxes in the event properties dialog.

 

Strings v2.54


This Strings update improves handling of files containing long strings.

 

Sysmon v13.22


This Sysmon update improves performance for rule processing and fixes a bug that may truncate large sub-rule expressions.

 

TCPView v4.13


This TCPView update fixes a bug with connection state filtering.

 

Enabling automation with Microsoft 365 Apps for enterprise

Enabling automation with Microsoft 365 Apps for enterprise

This article is contributed. See the original author and article here.

Organizations use a wide array of tools to connect apps and processes together, including frameworks that automate other apps. To support these kinds of scenarios, we are pleased to announce the availability of the Microsoft 365 E3: Unattended License! This is a new license option for Office apps, which allows usage of Office client apps with service accounts or other non-user accounts, which is common for when executing automation processes. These processes may be unattended during their operation; whereas, leveraging traditional user accounts when running automation processes while unattended is not recommended.  IT admins deploying new or existing solutions that leverage this new license can choose to use update Office apps via the Semi-Annual Enterprise Channel or Monthly Enterprise Channel updates. For pricing and availability information, contact a Microsoft sales representative or your reseller. 


 


It is important to note that this license for unattended use does not change the behavior or functionality of Office apps. They are generally designed to operate as end-user apps and will have known limitations in unattended use cases.  For example, the Office user experience may occasionally feature new updates to its user interface that can change the behavior of broader automation processes.  As we work to improve overall accessibility of the products, the ordering and behavior of accessibility capabilities may change in ways that impact broader usage in automation workflows. These various updates and changes are part of improving the product for a broad audience, but may at times, inhibit fully predictable unattended automation of Office apps. 


 


Additionally, Office apps are not specifically designed for unattended usage at scale. For more details, check out this helpful support article about unattended automation of Office. If you are considering building new unattended processes, consider these factors and guidelines for Office products outlined in the article. 


 


Where possible, we recommend that automation processes leverage product Application Programming Interfaces (API), such as Microsoft Graph to drive products wherever possible. Microsoft Graph features hundreds of APIs for accessing relevant organizational data, including files, mail, calendars, and much more.  For example, extensive APIs with Microsoft Excel allow for the use of workbook models and calculations with custom cell inputs in broader apps. 


 


The new Microsoft 365 E3: Unattended License provides new flexibility for a growing number of scenarios involving automation processes. As you consider new scenarios for unattended automation, this license can provide a new option for working with productivity data and tools, and we hope you explore the broader capabilities that Office within this scenario can provide. 


 


Requirements for using Microsoft 365 Apps for enterprise with unattended RPA


 


These are the requirements for using Microsoft 365 Apps for enterprise with unattended RPA:



  • The account running an RPA unattended task must have a license for Microsoft 365 Apps for enterprise (unattended). The account can be a regular user account, a system/service account, or a robot account.

  • It’s only available for Office Apps for Windows.

  • It requires Microsoft 365 Apps for enterprise version 2009 or later.


 


Enabling robotic process automation (RPA) scenarios 


 
For steps on how to enable RPA, check out this helpful Microsoft Docs article.  


 


What does it look like? 


  


Once you’ve activated the license, you can verify this directly from any Microsoft 365 Apps for enterprise app by going to File > Account. Here’s a screenshot of an example:


 


M365 Apps for enterprise Subscription Product.png


 


Or, you can you find it under, “%LocalAppData%MicrosoftOfficeLicenses5Unattended.” 


 


Assigning licenses to devices in the Microsoft 365 admin center


  


To deploy the Microsoft 365 E3: Unattended License to devices, you simply purchase the required number of Microsoft 365 licenses and assign a license to a user in the Microsoft 365 admin center. To enable this functionality on a device, use the group policy


for currently installed devices or the applicable command in the command prompt window.


 


If user is signed in, but there is no RPA entitlement (license) associated with an account, the user will see the following message in the Office app: 


 


RPA license required screenshot.png


 


To learn more about unattended RPA with Microsoft 365 Apps for enterprise, click here.


 


Continue the conversation by joining us in the Microsoft 365 Tech Community! Whether you have product questions or just want to stay informed with the latest updates on new releases, tools, and blogs, Microsoft 365 Tech Community is your go-to resource to stay connected!

How Azure FX VM Makes Ansys RedHawk-SC™ Run Faster the Less You Spend

How Azure FX VM Makes Ansys RedHawk-SC™ Run Faster the Less You Spend

This article is contributed. See the original author and article here.

By: Marc Swinnen, Dir. Product Marketing, Semiconductors, Ansys and Andy Chan, Director, Azure Global Solutions, Semiconductor/EDA/CAE


 


What is  Ansys RedHawk-SC?


Modern semiconductor integrated circuits (IC), or chips, can contain over 50 billion transistors and would be impossible to design without the help of software tools grouped under the Electronic Design Automation (EDA) category that support, automate, and verify every step of the chip design process.


 


RedHawk-SC is an EDA tool developed by Ansys that is the market leader for power integrity and reliability sign-off. This is a vital verification step in the design process for all semiconductor designs. Sign-off algorithms are extremely resource-intensive requiring hundreds of CPU cores running over many hours, making it an ideal application for cloud computing.


 


Designed for the Cloud


RedHawk-SC was architected on a cloud-friendly analysis platform called Ansys SeaScape™. RedHawk-SC’s SeaScape database is fully distributed and thrives on distributed disk access across a network. RedHawk-SC distributes the computational workload across many “workers”, that have low memory requirements – less than 32GB per worker. Each CPU can host one or more workers. This elastic compute architecture allows for instant start as soon as just a few workers become available.


 


The distribution of the computational workload is extremely memory efficient, allowing the optimal utilization of over 2,500 CPUs. There is also no need for a heavy head node because the distribution is orchestrated by an ultra-light scheduler using less than 2GB for even the largest chips. The same is true for loading, viewing, or debugging results.


 


RedHawk-SC Workloads on Azure


EDA applications like RedHawk-SC have specific requirements for optimal cloud deployment. We can summarize these considerations with the following points:



  • Sign-off generates very large workloads requiring thousands of CPUs and hundreds of gigabytes of disk

  • Large design sizes necessitate persistent or distributed storage for data and results in the cloud

  • Worker communication calls for a high-bandwidth network (10Gbps or more)


Ansys and Microsoft have worked together to evaluate the performance of realistic RedHawk-SC workloads on the Intel-based Azure cloud instances and how to optimally configure the hardware setup.


KevinRaines_0-1624299472540.png


Table-1: RedHawk-SC resource requirements for representative small “Block” workloads, medium “Cluster/Partition” workloads, and large “Full Chip” workloads


 


Table-1 list the resources required to run RedHawk-SC on a variety of workload sizes. They range from verifying just a small section, or ‘block’, of a chip to full chip analysis.


 


Cloud Compute Models for EDA


Microsoft worked closely with Ansys to develop finely tuned solutions for RedHawk-SC running on Azure’s high-performance computing (HPC) infrastructure. These targeted reference architectures help ease the transition to Azure and allow design teams to run faster at a much lower cost.


 


IC design companies may choose to contract with cloud providers like Azure under an “all-in” model where the entire design project is conducted in the cloud or may look for a “hybrid” use model where cloud resources complement their existing in-house capacity (Figure-1).


 


KevinRaines_8-1624299770367.png


Figure-1. Hybrid versus all-in model with both the head and compute nodes in the cloud.


 


Ansys and Microsoft Azure have verified that RedHawk-SC successfully accommodates both “all-in” and “hybrid” use models and licensing.


 


Azure infrastructure optimized for EDA


To achieve the fastest possible runtimes, companies typically start by investing in processors that support the highest clock speed available. Additionally, the cloud poses other efficiency considerations such as datacenter efficiency and workflow architecture. Benchmarks show that storage in the cloud is a high-impact architectural component, as are scale technologies.


 


Azure’s new Intel processor-based FXv1 Virtual Machine instances were designed specifically for compute intensive workloads with high memory footprints and looked to be an ideal fit for the demand of RedHawk-SC. Not only does FXv1 offer high clock speeds up to 4.1GHz, but it also has low-latency cache and up to 2TB of NVMe local disk that has the high IOPS throughput desired by RedHawk-SC. RedHawk-SC also takes advantage of Intel’s Math Kernel Library when running on Intel processors.


 


Through extensive testing with these realistic workloads, Microsoft and Ansys have recommended an optimized hardware configuration for running RedHawk-SC on Azure in Figure-2 (below)   The Azure Silicon team selected the following infrastructure to power this test:



  • FX VM family powered by 2nd Generation Intel® Xeon® Scalable Processors

  • Azure 50GbE Accelerated Networking

  • CycleCloud Operations Orchestration


Azure’s Accelerated Networking provides high bandwidth 50GbE ethernet connectivity between the workers with Smart NICs to offload networking tasks from the CPUs, thus increasing computational throughput. CycleCloud cloud-scaling was used to support RedHawk-SC in orchestrating dynamic VM deployment.


 

KevinRaines_9-1624299830129.png


Figure-2: Reference architecture for running Ansys RedHawk-SC on an Azure hybrid cloud


 


Testing of FXv1 running RedHawk-SC with a large, full chip workload (Graph-1) shows near-linear runtime scaling as the number of CPUs is increased. The favorable scaling reflects the efficient distribution technology underlying RedHawk-SC’s SeaScape architecture as well as the optimized high memory per core offered by FXv1


 

KevinRaines_10-1624299859879.png


Graph-1: Runtime required to run various RedHawk-SC workloads on Microsoft Azure’s FXv1 VM as a function of the number of workers


 


In a surprising finding from Graph-1, the total cost of running a RedHawk-SC job on Azure actually decreases as you increase the number of workers (up to the optimum threshold).  This contradicts the commonly held assumption that the total cost will increase as you enlist more CPUs.  The reason for this is the very high CPU utilization RedHawk-SC can achieve. The optimal number of workers is equal to the number of power partitions automatically calculated by RedHawk-SC.


 


This result is not intuitively obvious and indicates that customers should not try to reduce the CPU count to save money. In fact, they should actually increase their CPU count to the optimal value to achieve lower cost and a faster runtime.


 


Conclusion


Extensive testing of RedHawk-SC on Azure has allowed Microsoft to optimize the FXv1 VM configuration powered by Intel processors for cloud-based EDA work. This configuration has demonstrated excellent scalability to over 240 CPUs running on a range of realistic and very large EDA workloads. The testing further identified the optimal number of CPUs to minimize the total cost for running RedHawk-SC on Azure.  The result is that customers can easily set up their power integrity signoff analysis jobs on Azure with optimal configurations for both throughput and cost.


 


For further information contact your local sales representative or visit www.ansys.com

Yammer Customer Best Practice and Brainstorm – Episode one

This article is contributed. See the original author and article here.

In case you missed it….. we had a vibrant conversation with Microsoft Yammer MVPs, Amy Dolzine and Melanie Hohertz, and other customers on ways to build engagement in your Yammer networks. This was an interactive discussion with over 45 folks from across the globe.  


 


Here’s the recording.  


 



 


We’ve pulled together some highlights and best practices that’s shared below.  


 


 


Leadership engagement  
 


We’ve shared previously how important leaders are to the community and the Yammer network. We started by discussing the merits of  the upcoming Post on Behalf of (POBO) feature, authenticity, and how to use it to get your leaders involved.  


 



  • How to think about using “Post on Behalf of” (POBO) with leaders  

    • Find their passion – maybe its less about the business and more about their personality, like post what they are watching on Netflix with their kids, or what music they are playing/listening to, what they are baking, whatever they are passionate about  

      • Can’t fake passion 

      • Build authenticity 

      • Push vs pull communications 



    • Use POBO as training wheels or a starting point for getting leaders involved in Yammer. You won’t be able to “react” on behalf of others at this time.  



  • Leaders are creating a digital footprint on inside the community 

    • A few customers shared how they get leaders on board when the org has a “protect the quarterback” mentality – meaning they protect the Executives from anyone besides their own leadership teams  

    • Work with their support systems, like exec admins, internal comms teams 

      • Executive assistants hold time and space in the execs calendar and can help give reminders  



    • Find a willing member of the herd and have them set the example to win over the herd  




Related resources for Leadership Engagement 



 


Can you use products like TikTok for user generated content and inspiration for campaigns in your Yammer network? 


Use other social media platforms to harvest new ideas! There’s something about how and why things are viral, how can you adapt it to your community and culture. It’s easier to contribute to the familiar, so take cues from the social networks around you and see what resonates with you. 



  • An example would be “Tell me you’re ______ without telling me you’re a ______” 

  • You can do this for specific communities or the organization as a whole.  


 


Related Resource:  



 


How can you use All Company more strategically?  


You can set up All Company to be a strategic tool for your organization! Make a stand. Either restrict it or don’t but come up with some governance.  



  • Doesn’t have to be complicated, just communicate the expectations of All Company 

    • Decide who can post, who can reply,  

    • How many posts a day/week/month  

    • What are the boundaries for what gets posted, announced  



  • Partner with Internal Comms as an offer of reach 

    • Can offer reach, exclusivity,  

    • Conversation insights provide first level analytics to use as leverage 




 


Related resources:  



 


What are the Success Metrics in your organization?  


 



  • Measure trends for your org over time – its hard to compare apples to oranges 

  • Try to find stories and build a library of success stories that you can pull out for different parts of the business 

    • Tracking unknown expertise throughout your org 

    • Giving numbers beyond reach to stories, vs something you’d see in other tools  



  • Tracking praise, recognition, the word thank you  

    • How can you show people are coming back 

    • Best answer compared to questions asked 

    • People are coming back to the community, sustained visits, posts 




Related resource: 



 


How can we use system of records and Yammer better together?  



  • Use Yammer to compliment the service of record – like Service Now 

    • Yammer provides context and conversation and searchable around a topic 

    • Creating topics around Frequently asked questions 

    • Helps to create knowledge for future content/support needed from the System of Record/processes/support teams 



  • If someone is willing to go out of their way to ask a question about a topic, help them find the answer, even if its “not the right place” 

    • Don’t leave a question unanswered in community 

    • If it’s a question that already been answered, link back to that one!  

    • Someone shared that Yammer is the place to go for answers and find experts because the SLA has become faster!  

    • If users aren’t finding information, there may be a bigger reason why!  

    • Helping others helps bring additional talent and expertise to the surface  



  • Communities admins should build out info box, cover photos to use for the purpose of the community, hyperlink to common topics in the info box, and tag the experts in the info box  

    • Make this space count, beyond just beautiful!  

    • Use emoji’s in the info box to create a visual distinction  




Related Resources: 



 


Some of your fun campaigns and favored communities! 



  • Strategic Selfie campaigns – everyone know how to do a selfie!  

    • You can send around a cut out of historical figure or product – encourage people to take pictures and post 

    • An idea would be “Healthy – Selfie Campaign” 

    • Mug Shot Mondays – sharing a picture of the coffee cup on Monday morning 

    • “Zoom out” campaign – photo one is what everyone sees, photo two the same picture zoomed out — the reality 
       



  • Our customers shared that they have a community for… 

    • Birth announcements 

    • Marketplace –  buy/sell/trade 

    • Stock trading 

    • Question of the day 

    • Working apart, together  

    • Book clubs 

    • Inspirational quote 

    • Jokes  

    • O365, Microsoft Teams, other software products  

    • Your organization’s product/service in the “wild” 

    • Pandemic potluck – cooking ideas!  




 


Thanks for joining us! 


 


Stay tuned for more customer conversations in the upcoming months.  

How Microsoft 365 encryption helps safeguard data and maintain compliance

How Microsoft 365 encryption helps safeguard data and maintain compliance

This article is contributed. See the original author and article here.

Meeting the demands of a hybrid workplace 


 


While the increase in work-from-anywhere capabilities have been crucial to enabling productivity, they can be met with concerns from Security Operations (SecOps) teams around data protection and governance. Employees need to have frictionless collaboration, both inside and outside the company, as well as being empowered to access internal resources from endpoints outside organization boundaries. With organizational data and files roaming across devices, apps, and services, IT admins and SecOps teams must ensure it remains protected and meets the organization’s security and compliance requirements. An effective security and compliance strategy protects people, data, and endpoints across the organization without restricting end user productivity. 


 


The importance of a robust data protection and governance strategy 


 


Data protection and governance is critical for organizations – it helps keep sensitive business information from being improperly shared while also ensuring external compliance obligations are met. To formulate a robust data protection and governance strategy, business stakeholders need to adequately assess both internal and external data requirements. For many organizations, this means involving IT, SecOps, legal, human resources, apps and tooling, and various other teams to ensure all stakeholders have shared any data handling requirements they operate under. This effort can be complex and challenging to understand how to create strong internal security standards, while meeting external compliance obligations without impacting end user productivity. In this blog, we’ll discuss some helpful tips on how to take advantage of data protection and governance across Microsoft 365 to meet your business needs. 


 


Encryption and how it works in Microsoft 365 


 


Encryption is a key component to protecting files and organizational information, but it’s important to understand the details of how encryption works. Encryption by itself doesn’t prevent content interception. Organizations need to have a larger data protection strategy to ensure only authorized parties can use the encrypted data. Encryption can, and more importantly should, co-exist in multiple layers operating at the same time – such as encrypting both the email message and the channel it flows through. Different layers of encryption can help achieve different business goals, such as safeguarding sensitive content or helping meet regulatory obligations. A robust business strategy uses multiple layers of encryption together enabling the business to meet both internal and external data protection requirements. 


 


Microsoft uses industry standard technologies such as Transport Layer Security (TLS) and Secure Real-Time Transport Protocol (SRTP) to encrypt all data in transit between users’ devices and Microsoft datacenters, and between Microsoft datacenters. Data in transit includes, mail messages in the process of being delivered, files shared and in transit between users, and conversations in online meetings. Microsoft also helps keep data safe by encrypting it while at rest in Microsoft datacenters, starting with volume-level encryption enabled through BitLocker while service encryption ensures that content at rest is encrypted at the application layer. In order to help organizations meet security and compliance obligations, data encrypted at rest in Microsoft datacenters is done in a way that enables organizations to decrypt the content if needed. On top of our standard encryption in transit and at rest, Microsoft also provides additional encryption solutions and layers that customers can manage and control to ensure security and compliance requirements are met.  


 


Meeting security and compliance requirements with Microsoft 365 


 


One of the top questions we hear from organizations is – what type of encryption does my organization need? The answer depends on many factors, such as the type of business information being handled, sensitivity of the data, industry or regional requirements, and even internal standards. While the answer may seem complex, Microsoft provides a portfolio of encryption and compliance solutions that help businesses meet their data protection and governance needs while being in full control. Let’s dive into how Microsoft supports customers with additional security and compliance needs. 


 


Microsoft 365 Customer Key – including Microsoft Teams! 


 


Customer Key is built on service encryption, providing a layer of encryption at the application level for data-at-rest and allows the organization to provide and control the encryption keys used to encrypt customer data in Microsoft’s datacenters. Customer Key assists customers in meeting regulatory or compliance obligations for controlling root keys. After providing the keys, the organization can create a data encryption policy (DEP) and assign it to encrypt the following data for all tenant users: 



  • Teams chat messages (1:1 chats, group chats, meeting chats and channel conversations) 

  • Teams media messages (images, code snippets, video messages, audio messages, wiki images) 

  • Teams call and meeting recordings stored in Teams storage 

  • Teams chat notifications, Teams chat suggestions by Cortana, Teams status messages 

  • User and signal information for Exchange Online 

  • Exchange Online mailboxes that aren’t already encrypted using mailbox-level DEPs 

  • Microsoft Information Protection exact data match (EDM) data – (data file schemas, rule packages, and the salts used to hash the sensitive data)


For customers currently using Customer Key for Exchange Online and SharePoint, data encryption policies add broader control and now includes support for Microsoft Teams! You can create multiple DEPs per tenant, but only one DEP can be assigned at a time. When a DEP is assigned, encryption begins automatically, but will take some time to complete depending on size of the tenant.  


 


For more details on using Customer Key for tenant-level encryption, please see the following articles: 



 


Customer Lockbox 


 


Customer Lockbox is a solution that provides an extra layer of control to customers by offering the ability to give explicit access authorization for service operations. This additional control can help customers meet certain compliance obligations, such as Health Insurance Portability and Accountability Act (HIPAA) and Federal Risk and Authorization Management Program (FedRAMP), and supports requests to access data in Exchange Online, SharePoint, and OneDrive. A foundational principle of Microsoft 365 is that the service operates without Microsoft access to customer content. However, a Microsoft engineer may need access to customer content when the customer makes a support request. While issues are usually fixed through extensive telemetry and debugging tools, some cases may require a Microsoft engineer to access customer content to determine the root cause and fix the issue. Customer Lockbox requires the engineer to request access from the customer as a final step in the approval workflow, giving organizations the option to approve or deny these requests and providing direct-access control to the customer. Customer Lockbox is included with Microsoft 365 E5 subscriptions and can be added to other plans.  


 


Communication Compliance 


 


Organizations need to be able to manage risk in communications to protect company assets and identify concerning content that may violate internal code of conduct standards. Communication Compliance is an insider risk solution in Microsoft 365 that helps minimize communication risks by helping detect, capture, and act on inappropriate messages within the organization. Communication Compliance helps organizations remain compliant with regulatory requirements and detect internal violations without disrupting the business. 


Communication Compliance policies can assist with detecting policy matches in several important compliance areas, such as corporate policies, risk management, and regulatory compliance. IT admins can take advantage of pre-defined policies or build custom policies to detect violations in both internal and external communications covering email, Microsoft Teams, Yammer, or even third-party communications. Since there may be a separation of duties between IT admins and the team that manages organizational compliance, Communication Compliance supports the separation between configuration of policies and the investigation of messages through rules based access controls.


 


Microsoft recently announced some exciting new Communication Compliance capabilities, including a deeper integration with Microsoft Teams. In accordance with helping customers meet privacy and compliance obligations, strong safeguards and controls are built into the solution by default on all the new features highlighted in the article above. This includes items like, pseudonymization, rules-based access control, admin explicit opt-in of users, and audit trails. 


 


Selection of optical character recognition to extract printed or handwritten text from imagesSelection of optical character recognition to extract printed or handwritten text from images


 


Compliance Manager 


 


Available in the Microsoft 365 Compliance Center for all Microsoft enterprise customers, Compliance Manager helps simplify compliance and reduce risks. Compliance Manager translates complex regulatory requirements to specific controls, and through compliance score, provides a quantifiable measure of compliance. It offers intuitive compliance management, a vast library of scalable assessments, and built-in automation. Customers can see step-by-step implementation guidance, recommended solutions to implement controls, and the controls with most impact – empowering them to act quickly to improve their organization compliance. Customers can select from 300+ out-of-box assessments for common industry, regional, and global standards and regulations, or create custom assessments to meet specific organizational needs. Compliance Manager is available for all Microsoft 365 customers – get started today!  


 


Compliance Manager dashboardCompliance Manager dashboard


 


Using content encryption for sensitive data protection 


 


As previously mentioned, encryption is a component of a larger data protection strategy that should include using multiple encryption layers working in parallel. Part of an effective data protection and governance strategy includes safeguarding sensitive business information by classifying and protecting content itself. Office 365 Message Encryption (OME) and sensitivity labels are a core part of Microsoft Information Protection, enabling organizations to protect organizational data without interrupting end user productivity. 


Sensitivity labels help protect content in Microsoft 365 apps across platforms and devices, third-party apps and services, and even common collaboration containers, like Teams and SharePoint. When a sensitivity label is assigned to content, it acts as a stamp enforcing the conditions of the label wherever the content goes. While a document or email can only have a single sensitivity label applied, they can have both a sensitivity label and a retention label applied to support compliance obligations. Sensitivity labels can be configured to apply watermarks to content, encrypt the content restricting access to specific groups, and protect content in site and group containers. As organizations continue to push the boundaries of external collaboration, another great capability sensitivity labels provide is the ability to restrict access for external members in Teams and SharePoint containers. For instance, the finance department may have a team for internal employees only that has a sensitivity label applied restricting guest access to the team.  


 


Sensitivity labels and message encryption are important tools to help protect sensitive business data and are designed to not disrupt the way end users work. Documents encrypted with sensitivity labels fully support co-authoring across devices and platforms, making it easy to collaborate in encrypted documents in real time. For even greater proactive data protection and governance, organizations with a Microsoft 365 E5 subscription can take advantage of automatic labeling with sensitivity labels to automatically assign a label to content that matches specified conditions. 


 


Example of a Highly Confidential sensitivity label applied to an Excel fileExample of a Highly Confidential sensitivity label applied to an Excel file


 


Additional considerations for data protection and governance 


 


Microsoft’s encryption in transit and at rest is the service-layer protection needed for most organizations who don’t face key arrangement requirements. Organizations should develop and put in place a content encryption strategy leveraging Microsoft Information Protection to safeguard content. Some additional data protection and governance capabilities customers should consider in their strategy are:  



  • Microsoft 365 Multi-Geo assists customers in meeting data residency requirements by enabling IT admins to provision and store data at rest in the geo location of their choice. 

  • Data loss prevention works across Microsoft 365 workloads to detect sensitive information using deep content analysis, helping organizations meet regulatory and compliance obligations. 

  • Conditional Access and multi-factor authentication (MFA) are access and authorization control capabilities to help keep corporate data secure while enabling end users to work on any device in any location.


 


Next Steps: 



  1. Assess security and compliance obligations with business stakeholders, including both internal and external requirements to form an organizational data protection and governance strategy. 

  2. Leverage Compliance Manager for insights and guidance on managing your organization’s compliance with regulations, policies, and standards. 

  3. Start protecting and governing data across Microsoft 365 with Message Encryptionsensitivity labels, and data loss prevention (DLP).  

  4. Set-up and enable advanced compliance features to help minimize insider risk such as, content retentioneDiscoveryauditing, and communication compliance


Continue the conversation by joining us in the Microsoft 365 Tech Community! Whether you have product questions or just want to stay informed with the latest updates on new releases, tools, and blogs, Microsoft 365 Tech Community is your go-to resource to stay connected!