From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Configure and manage Insider Risk Management settings - Microsoft 365 Tutorial
From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Configure and manage Insider Risk Management settings
Before creating policies, there are some global Insider Risk Management settings to configure. These define how the system behaves across all policies, focusing on privacy, scope, and initial analytics. Let's break down the key settings. Probably the first one that everybody thinks about is user privacy slash anonymization. By default, Insider Risk Management keeps user identity pseudo-anonymized at the alert stage. This means that when an analyst reviews an issue, they see User 5, or similar, instead of the actual name. This privacy-by-design feature reduces bias and protects employees until a potential issue is serious enough – in other words, it's escalated to a real investigation or a case – to reveal the identity of the employee involved. In IRM settings, this is usually a toggle called Anonymize User Identities, which we'll show in a second, and that is on by default. Microsoft strongly recommends leaving this on. You can turn it off if your org's policy is to show real names to…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Module introduction1m 30s
-
(Locked)
Learning objectives1m 23s
-
(Locked)
Implement roles and permissions for Insider Risk Management4m 49s
-
(Locked)
Plan and implement Insider Risk Management connectors9m 4s
-
(Locked)
Plan and implement integration with Microsoft Defender for Endpoint3m 3s
-
(Locked)
Configure and manage Insider Risk Management settings4m 4s
-
(Locked)
Configure policy indicators5m 55s
-
(Locked)
Select an appropriate policy template4m 13s
-
(Locked)
Create and manage Insider Risk Management policies6m 4s
-
(Locked)
Manage forensic evidence settings5m 17s
-
(Locked)
Enable and configure insider risk levels for Adaptive Protection4m 4s
-
(Locked)
Manage insider risk alerts and cases8m 52s
-
(Locked)
Manage Insider Risk Management workflow, including notice templates10m 1s
-
(Locked)
-
-
-