https://store-images.s-microsoft.com/image/apps.17951.e8da852e-3b19-483b-95aa-8269095ebe65.db2f4efd-6efe-4892-845a-34bd59e0f530.b0d0c019-68d6-4059-9e36-1b8c005726ca

Microsoft Information Protection Quick Deploy: 8-10 Days Implementation

Core Technology Systems (UK) Limited

Microsoft Information Protection (MIP) Quick Deploy provides the necessary tools to help you understand and protect your users and your data.

Assess – 4 days An initial discovery and design workshop allows us to assess your environment to ensure the MIP tools can be deployed safely. We will use this opportunity to define business requirements for Sensitivity Labelling, Data Loss Prevention, and Classification through a series of discovery sessions involving the wider business functions. We will also explore the Compliance Manager dashboard, explore your current Compliance score and customise your improvement actions to reflect any compliance regulations you must adhere to. The results of the discovery session will then be used to develop a deployment plan.

Deploy – 3-5 days The following features are in scope of deployment for customers on Microsoft 365 E3 licensing, based on a POC/Pilot: • Core will help you protect data that is sensitive to you, by creating custom Sensitive Information Types. • Classify and label your sensitive data with Sensitivity labelling. Core will help create your key sensitivity labels and configure the protection policies to ensure your sensitive data is secure. • To discover the sensitive data you have in your Office 365 environment, Core will run content searches and provide reports showing where your sensitive data is being shared and stored. • Core will create custom Data Loss Prevention policies applied to custom and out-of-the-box sensitive information types.

Core will apply Data Loss Prevention policies to Teams chat and channel messages, which is a specific Microsoft 365 E5 feature.

• To ensure sensitive data is protected on end-user devices and in third-party apps, Core will also configure Data Loss Prevention policies for devices and Defender for Cloud Apps. Policies can include preventing data from being printed, downloaded to a USB, uploaded to a third-party app, and more.

• Core will use the Microsoft Information Protection Scanner to scan your cloud and on-premise infrastructure for sensitive data. There may be additional time required depending on the number of servers.

To ensure your sensitive data is automatically labelled with your defined classification, Core will implement the auto labelling functionality of Microsoft Information Protection. These are based on your custom sensitive information types.

Handover – 1 day During handover, we will provide an operations guide and handover training for internal IT Teams to manage the deployed features moving forward

Lühiülevaade

https://store-images.s-microsoft.com/image/apps.33308.e8da852e-3b19-483b-95aa-8269095ebe65.db2f4efd-6efe-4892-845a-34bd59e0f530.82df69e9-b7e2-428c-ac21-af9822b1c79a