This is the first of a three-part series by J. Peter Bruzzese on Azure Information Protection. He provides quick tips and tricks to accomplish every day administrative tasks or this is information you could pass on to your end-users.
In this lesson, we’ll learn what Azure information Protection is and how it helps an organization improve security and compliance. To be sure, all email is not equal there are some emails that we would consider sensitive information worthy of additional protection.
Perhaps you want to encrypt the email or place a restriction on forwarding that email or printing it out or, label it as confidential. All of this is done through Azure Information Protection or AIP, a cloud-based solution that helps an organization to classify and protect documents and emails.
As an end-user, you won’t see anything that says Azure Information Protection or AIP attached to it. AIP is the overall solution that Administrators enable. In doing so, you the end user are given new features to work with.
So, what does AIP give you the user? Does it give your Office 365 email encryption? Yes, it does? What about rights management? Like the ability to prevent someone from forwarding or printing an email you send them. Both internal and external to your organization. Yes, it does, that, too. What about the ability to label emails and or documents through a feature called sensitivity labels that can be applied by you, but used by your administrators within their data loss prevention plans?
Well. Yes, actually it does, that, too, and can you establish custom permissions on documents through AIP? You can. Oh, and can you track who accesses your documents and even revoke access to those documents no matter who has them? Absolutely.
OK, so perhaps you can see. Now Azure Information Protection does a lot more than you might have expected and by the time you watch this series it may have a few more bells and whistles that we need to add into the next iteration of this course. But for now, let’s dive into the world of AIP and see how you can use it to classify and protect your emails and documents.
So, we hope you found this informative and we’ll see you in the next lesson.