From 6c954f96b86dac859d4bee61c68d87964c8cd377 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 25 Mar 2019 17:39:17 -0700 Subject: [PATCH 1/4] info prot --- ...ormation-protection-in-windows-overview.md | 23 +++++++++++++++---- 1 file changed, 18 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md index 976dfff7e4..870dab0be9 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md @@ -14,7 +14,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 12/05/2018 --- # Information protection in Windows overview @@ -38,14 +37,28 @@ Windows Defender ATP applies two methods to discover and protect data: ## Data discovery -Windows Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Windows Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). +Windows Defender ATP automatically discovers files with sensitivity labels and files that contain sensitive information types. +Sensitivity labels classify and help protect sensitive content. + + +Sensitive information types in the Office 365 data loss prevention (DLP) implementation fall under two categories: +- Default +- Custom + +Default sensitive information types include information such as bank account numbers, social security numbers, or national IDs. For more information, see [What the sensitive information type look for](https://docs.microsoft.com/office365/securitycompliance/what-the-sensitive-information-types-look-for). + +Custom types are ones that you define and is designed to protect a different type of sensitive information (for example, employee IDs or project numbers). For more information see, [Create a custom sensitive information type](https://docs.microsoft.com/en-us/office365/securitycompliance/create-a-custom-sensitive-information-type). + + + +When a file is created or edited on a Windows device, Windows Defender ATP scans the content to evaluate if it contains sensitive information. + +Turn on the Azure Information Protection integration so that when a file that contains sensitive information is discovered by Windows Defender ATP though labels or information types, it is automatically forwarded to Azure Information Protection from the device. ![Image of settings page with Azure Information Protection](images/atp-settings-aip.png) -After enabling the Azure Information Protection integration, data discovery signals are immediately forwarded to Azure Information Protection from the device. When a labeled file is created or modified on a Windows device, Windows Defender ATP automatically reports the signal to Azure Information Protection. - -The reported signals can be viewed on the Azure Information Protection - Data discovery dashboard. +The reported signals can be viewed on the Azure Information Protection – Data discovery dashboard. ### Azure Information Protection - Data discovery dashboard This dashboard presents a summarized discovery information of data discovered by both Windows Defender ATP and Azure Information Protection. Data from Windows Defender ATP is marked with Location Type - Endpoint. From 6afaaaaebf60a2e857cdc57239ffc3270212f4c2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 1 May 2019 17:51:58 -0700 Subject: [PATCH 2/4] add auto labeling content --- ...nformation-protection-in-windows-config.md | 20 ++++++++++++-- ...ormation-protection-in-windows-overview.md | 26 +++++++++++++++---- 2 files changed, 39 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md index a8696ec1d9..092c8798c9 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md @@ -14,7 +14,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 12/05/2018 --- # Configure information protection in Windows @@ -32,7 +31,7 @@ Learn how you can use Windows Defender ATP to expand the coverage of Windows Inf - Your tenant needs to be onboarded to Azure Information Protection analytics, for more information see, [Configure a Log Analytics workspace for the reports](https://docs.microsoft.comazure/information-protection/reports-aip#configure-a-log-analytics-workspace-for-the-reports) -## Configuration steps +## Configure endpoint data loss prevention 1. Define a WIP policy and assign it to the relevant devices. For more information, see [Protect your enterprise data using Windows Information Protection (WIP)](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip). If WIP is already configured on the relevant devices, skip this step. 2. Define which labels need to get WIP protection in Office 365 Security and Compliance. @@ -50,5 +49,22 @@ After completing these steps Windows Defender ATP will automatically identify la >- The Windows Defender ATP configuration is pulled every 15 minutes. Allow up to 30 minutes for the new policy to take effect and ensure that the endpoint is online. Otherwise, it will not receive the policy. >- Data forwarded to Azure Information Protection is stored in the same location as your other Azure Information Protection data. + +## Configure auto labeling +1. In Office 365 Security & Compliance, go to **Classifications > Labels**. + +2. Create a new label or edit an existing one. + + +3. Set a policy for Data classification: + + 1. Go through the label creation wizard. + 2. When you reach the Auto labeling page, turn on auto labeling toggle on. + 3. Add a new auto-labeling rule with the conditions that you require. + 4. Validate that ‘When content matches these conditions’ setting is set to ‘Automatically apply the label’. + + + + ## Related topic - [Information protection in Windows overview](information-protection-in-windows-overview.md) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md index 870dab0be9..8c87317f15 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md @@ -31,12 +31,13 @@ Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to > Read our blog post about how [Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/). -Windows Defender ATP applies two methods to discover and protect data: +Windows Defender ATP applies the following methods to discover, classify, and protect data: - **Data discovery** - Identify sensitive data on Windows devices at risk +- **Data classification** - Automatically classify data based on common Microsoft Information Protection (MIP) policies managed in Office 365 Security & Compliance Center. Auto-classification allows you to protect sensitive data even if the end user hasn’t manually classified it. - **Data protection** - Windows Information Protection (WIP) as outcome of Azure Information Protection label -## Data discovery +## Data discovery and data classification Windows Defender ATP automatically discovers files with sensitivity labels and files that contain sensitive information types. Sensitivity labels classify and help protect sensitive content. @@ -51,7 +52,6 @@ Default sensitive information types include information such as bank account num Custom types are ones that you define and is designed to protect a different type of sensitive information (for example, employee IDs or project numbers). For more information see, [Create a custom sensitive information type](https://docs.microsoft.com/en-us/office365/securitycompliance/create-a-custom-sensitive-information-type). - When a file is created or edited on a Windows device, Windows Defender ATP scans the content to evaluate if it contains sensitive information. Turn on the Azure Information Protection integration so that when a file that contains sensitive information is discovered by Windows Defender ATP though labels or information types, it is automatically forwarded to Azure Information Protection from the device. @@ -96,10 +96,15 @@ InformationProtectionLogs_CL ## Data protection -For data to be protected, they must first be identified through labels. Sensitivity labels are created in Office Security and Compliance (SCC). Windows Defender ATP then uses the labels to identify endpoints that need Windows Information Protection (WIP) applied on them. +### Endpoint data loss prevention +For data to be protected, they must first be identified through labels. -When you create sensitivity labels, you can set the information protection functionalities that will be applied on the file. The setting that applies to Windows Defender ATP is the Data loss prevention. You'll need to turn on the Data loss prevention and select Enable Windows end point protection (DLP for devices). +Sensitivity labels are created in Office 365 Security & Compliance Center. Windows Defender ATP then uses the labels to identify endpoints that need Windows Information Protection (WIP) applied on them. + +When you create sensitivity labels, you can set the information protection functionalities that will be applied on the file. The setting that applies to Windows Defender ATP is the Endpoint data loss prevention. + +For the endpoint data loss prevention, you'll need to turn on the Endpoint Data loss prevention and select Enable Windows end point protection (DLP for devices). ![Image of Office 365 Security and Compliance sensitivity label](images/office-scc-label.png) @@ -108,6 +113,17 @@ Once, the policy is set and published, Windows Defender ATP automatically enable This functionality expands the coverage of WIP to protect files based on their label, regardless of their origin. +For more information, see [Configure information protection in Windows](information-protection-in-windows-config.md). + +## Auto labeling + +Auto labeling is another way to protect data and can also be configured in Office 365 Security & Compliance Center. When Windows Defender ATP scans the content of a file in a Windows device and finds that it contains sensitive information, it will automatically apply a label to it even if the user hasn't manually classified it. + +> [!NOTE] +> Auto-labeling is supported in Office apps only when the Azure Information Protection unified labeling client is installed. When sensitive content is detected in email or documents matching the conditions you choose, a label can automatically be applied or a message can be shown to users recommending they apply it themselves. + + + For more information, see [Configure information protection in Windows](information-protection-in-windows-config.md). From 87a472e9d90efad9c2e61a21fafba545decb4e2e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 1 May 2019 18:01:45 -0700 Subject: [PATCH 3/4] Update information-protection-in-windows-overview.md --- .../information-protection-in-windows-overview.md | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md index 8c87317f15..9d98ef9db0 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md @@ -60,7 +60,7 @@ Turn on the Azure Information Protection integration so that when a file that co The reported signals can be viewed on the Azure Information Protection – Data discovery dashboard. -### Azure Information Protection - Data discovery dashboard +## Azure Information Protection - Data discovery dashboard This dashboard presents a summarized discovery information of data discovered by both Windows Defender ATP and Azure Information Protection. Data from Windows Defender ATP is marked with Location Type - Endpoint. ![Image of Azure Information Protection - Data discovery](images/azure-data-discovery.png) @@ -68,13 +68,15 @@ This dashboard presents a summarized discovery information of data discovered by Notice the Device Risk column on the right, this device risk is derived directly from Windows Defender ATP, indicating the risk level of the security device where the file was discovered, based on the active security threats detected by Windows Defender ATP. -Clicking the device risk level will redirect you to the device page in Windows Defender ATP, where you can get a comprehensive view of the device security status and its active alerts. - +Click on a device to view a list of files observed on this device, with their sensitivity labels and information types. >[!NOTE] ->Windows Defender ATP does not currently report the Information Types. +>Please allow approximately 15-20 minutes for the Azure Information Protection Dashboard Discovery to reflect discovered files. -### Log Analytics + + + +## Log Analytics Data discovery based on Windows Defender ATP is also available in [Azure Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-overview), where you can perform complex queries over the raw data. For more information on Azure Information Protection analytics, see [Central reporting for Azure Information Protection](https://docs.microsoft.com/azure/information-protection/reports-aip). From 629e5413e04f63ca6f37b8ef1d325c5d649b0368 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 1 May 2019 18:05:55 -0700 Subject: [PATCH 4/4] Update information-protection-in-windows-config.md space --- .../information-protection-in-windows-config.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md index 092c8798c9..4be3024686 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md @@ -66,5 +66,6 @@ After completing these steps Windows Defender ATP will automatically identify la + ## Related topic - [Information protection in Windows overview](information-protection-in-windows-overview.md) \ No newline at end of file