

Scanning increasing numbers of communication channels More details on third-party connectors can be found here.Ĭommunication compliance policies in Microsoft 365 help you overcome many modern challenges associated with compliance and internal and external communications, including: Communication compliance supports several company communications channels including those part of the Microsoft 365 solution such as Exchange email, Microsoft Teams, Yammer or Skype for Business, as well as a large number of third-party communication platforms integrated through available connectors such as Twitter, Facebook, and Bloomberg instant messages. Reviewers can investigate communications in your organization that do not meet your standards, as identified through configurable rules, and take appropriate remediation actions to make sure that they are compliant with your organization's message standards. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Communication Compliance ⚓︎Ĭommunication compliance is part of the new insider risk solution in Microsoft 365 that helps minimize communication risks by helping you detect, capture, and take remediation actions for inappropriate messages in your organization. In this phase you will set up an automated scalable approach for each solution.įollowing the above approach will lead to successful adoption and deployment of each solution while protecting your intellectual property, stopping fraud or insider trading, plugging the sensitive data leaks, along with making the workplace safe. Run Stage - The last stage is about optimizing the solution for Microsoft 365. You may also run a pilot or a proof of concept with a selected group of users or locations.

In this phase, you plan the details of your implementation and to build the solution. Walk Stage - The second stage builds the foundation for a successful, scalable, and sustainable deployment. It includes steps for product education, defining requirements, and evaluation or testing. The crawl phase describes steps you should do at the beginning of any deployment, whether your requirements are basic or advanced. Using this strategy to foster adoption of a solution by gathering the requirements of supporting systems, impact on end users, and skillset needed for each role owner. See Microsoft 365 productivity illustrations for guidance on implementation of all M365 capabilities with focus on cross technologies.Ĭrawl Stage - The first stage is about starting to evaluate where your organization is today regarding the information security and compliance with your goal of defining a strategic direction for your organization. The DAG is not inclusive of all requirements or architectures needed for successful implementation of Microsoft 365’ but rather a focus on security and compliance as it relates to solutions included as part of Microsoft information Protection & Compliance licenses. Microsoft Compliance Configuration Analyzer (MCCA).Solutions or tools covered in this guide for deployment consideration are: Your focus should be on the end user result and the security controls you achieve with each implemented stage. The objective is to create a deployment plan that follows the progression of crawl-walk-run methodology while highlighting the user and administrator experience at each stage. With this in mind, let’s get started with Microsoft 365 Insider Risk Management (IRM) and Communication Compliance (CC) solutions. Studies point to insider risk from specific user events and activities protecting your organization may seem impossible if one does not have insight or a way to identify the risk but worse if you cannot mitigate the risk you do not know about. In today’s climate one of the top concerns for security and compliance are the data leakage from insider risks. Legacy DLP Policies (ETR) to DLP Playbook Information Protection and Data Loss Prevention Insider Risk Management and Communication Complianceĭata Lifecycle Management and Records Management Microsoft Compliance Configuration Analyzer (MCCA) Microsoft Purview Audit (Premium) Log Activities via the O365 Management API Preventing external sharing with DLP policyīlocking upload of files with higher sensitivity label to SPO Data Lifecycle Management/Records Managementīest Practices for Creating IP and DLP Policies
