from master

This commit is contained in:
Joey Caparas 2018-06-19 10:23:28 -07:00
commit 691b329ea2
2 changed files with 3 additions and 4 deletions

View File

@ -8,7 +8,7 @@ ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
ms.author: justinha ms.author: justinha
ms.date: 05/30/2018 ms.date: 06/18/2018
ms.localizationpriority: medium ms.localizationpriority: medium
--- ---
@ -39,7 +39,7 @@ As an admin, you can address the question of who gets access to your data by usi
In the end, all of these security measures have one thing in common: employees will tolerate only so much inconvenience before looking for ways around the security restrictions. For example, if you dont allow employees to share files through a protected system, employees will turn to an outside app that more than likely lacks security controls. In the end, all of these security measures have one thing in common: employees will tolerate only so much inconvenience before looking for ways around the security restrictions. For example, if you dont allow employees to share files through a protected system, employees will turn to an outside app that more than likely lacks security controls.
### Using data loss prevention systems ### Using data loss prevention systems
To help address this security insufficiency, companys developed data loss prevention (also known as DLP) systems. Data loss prevention systems require: To help address this security insufficiency, companies developed data loss prevention (also known as DLP) systems. Data loss prevention systems require:
- **A set of rules about how the system can identify and categorize the data that needs to be protected.** For example, a rule set might contain a rule that identifies credit card numbers and another rule that identifies Social Security numbers. - **A set of rules about how the system can identify and categorize the data that needs to be protected.** For example, a rule set might contain a rule that identifies credit card numbers and another rule that identifies Social Security numbers.
- **A way to scan company data to see whether it matches any of your defined rules.** Currently, Microsoft Exchange Server and Exchange Online provide this service for email in transit, while Microsoft SharePoint and SharePoint Online provide this service for content stored in document libraries. - **A way to scan company data to see whether it matches any of your defined rules.** Currently, Microsoft Exchange Server and Exchange Online provide this service for email in transit, while Microsoft SharePoint and SharePoint Online provide this service for content stored in document libraries.

View File

@ -42,8 +42,7 @@ You can define the conditions for when entities are identified as malicious or s
- File hash - File hash
- Certificate - Certificate
- IP address - IP address
- DNS
3. Click **Add system exclusion**. 3. Click **Add system exclusion**.
4. For each attribute specify the exclusion type, details, and their corresponding required values. 4. For each attribute specify the exclusion type, details, and their corresponding required values.