mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
updates to info protection
This commit is contained in:
@ -22,12 +22,12 @@ ms.topic: article
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
Learn how you can use Microsoft Defender ATP to expand the coverage of Microsoft Information Protection (WIP) to protect files based on their label, regardless of their origin.
|
||||
Learn how you can use Microsoft Defender ATP to expand the coverage of Windows Information Protection (WIP) to protect files based on their label, regardless of their origin.
|
||||
|
||||
>[!TIP]
|
||||
> Read our blog post about how [Microsoft Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/).
|
||||
|
||||
If a file meets the criteria set in the policy settings is and endpoint data loss prevention setting is also configured, WIP will be enabled for that file.
|
||||
If a file meets the criteria set in the policy settings and endpoint data loss prevention setting is also configured, WIP will be enabled for that file.
|
||||
|
||||
|
||||
|
||||
@ -57,6 +57,15 @@ After completing these steps Microsoft Defender ATP will automatically identify
|
||||
|
||||
|
||||
## Configure auto labeling
|
||||
|
||||
Windows automatically detects when an Office file, PDF, CSV or TXT files are being created on a device and inspects it based on context to identify sensitive information types.
|
||||
|
||||
Those information types are evaluated against the auto-labeling policy. If a match is found, it is processed in the same way as if the file was labeled; the file is protected with Endpoint data loss prevention.
|
||||
|
||||
>[!NOTE]
|
||||
> Auto-labeling requires Windows 10, version 1903.
|
||||
|
||||
|
||||
1. In Office 365 Security & Compliance, go to **Classifications > Labels**.
|
||||
|
||||
2. Create a new label or edit an existing one.
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Use sensitivity labels to prioriize incident response
|
||||
title: Use sensitivity labels to prioritize incident response
|
||||
description: Learn how to use sensitivity labels to prioritize and investigate incidents
|
||||
keywords: information, protection, data, loss, prevention,labels, dlp, incident, investigate, investigation
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -24,11 +24,14 @@ ms.topic: article
|
||||
|
||||
A typical advanced persistent threat lifecycle involves data exfiltration. In a security incident, it's important to have the ability to prioritize investigations where sensitive files may be jeopardy so that corporate data and information are protected.
|
||||
|
||||
Microsoft Defender ATP helps to make the prioritization of security incidents much simplier with the use of sensitivity labels. Sensitivity labels quickly identify incidents that may involve machines with sensitive information such as confidential information.
|
||||
Microsoft Defender ATP helps to make the prioritization of security incidents much simpler with the use of sensitivity labels. Sensitivity labels quickly identify incidents that may involve machines with sensitive information such as confidential information.
|
||||
|
||||
## Investigate incidents that involve sensitive data
|
||||
Learn how to use data sensitivity labels to prioritize incident investigation.
|
||||
|
||||
>[!NOTE]
|
||||
>Labels are detected for Windows 10, version 1809 or later.
|
||||
|
||||
1. In Microsoft Defender Security Center, select **Incidents**.
|
||||
|
||||
2. Scroll to the right to see the **Data sensitivity** column. This column reflects sensitivity labels that have been observed on machines related to the incidents providing an indication of whether sensitive files may be impacted by the incident.
|
||||
|
Reference in New Issue
Block a user