From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Enable and configure insider risk levels for Adaptive Protection - Microsoft 365 Tutorial
From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Enable and configure insider risk levels for Adaptive Protection
Insider Risk Management has an optional feature called Forensic Evidence Collection, which can be extremely useful in deep investigations. It basically lets the IRM solution reach out to an endpoint through the Defender for Endpoint client and grab a copy of a file or screenshot of whatever a user was doing. However, because this is potentially quite invasive, it's disabled by default and wrapped with extra controls, namely the approval workflow with the approval role, which we've discussed earlier in this lesson. So why do we need forensic evidence? Suppose an employee likely stole a document by copying to USB or emailing it to themselves. The IRM alert tells you the file name and maybe some metadata, but you might want to see the actual contents of that file to assess damage. So was it a client list or source code or something benign? With forensic evidence collection, an investigator can request, please retrieve this file from the user's device. If approved, the system will pull…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Module introduction1m 30s
-
(Locked)
Learning objectives1m 23s
-
(Locked)
Implement roles and permissions for Insider Risk Management4m 49s
-
(Locked)
Plan and implement Insider Risk Management connectors9m 4s
-
(Locked)
Plan and implement integration with Microsoft Defender for Endpoint3m 3s
-
(Locked)
Configure and manage Insider Risk Management settings4m 4s
-
(Locked)
Configure policy indicators5m 55s
-
(Locked)
Select an appropriate policy template4m 13s
-
(Locked)
Create and manage Insider Risk Management policies6m 4s
-
(Locked)
Manage forensic evidence settings5m 17s
-
(Locked)
Enable and configure insider risk levels for Adaptive Protection4m 4s
-
(Locked)
Manage insider risk alerts and cases8m 52s
-
(Locked)
Manage Insider Risk Management workflow, including notice templates10m 1s
-
(Locked)
-
-
-