From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Manage Insider Risk Management workflow, including notice templates - Microsoft 365 Tutorial
From the course: Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press
Manage Insider Risk Management workflow, including notice templates
Managing insider risk isn't purely a technical implementation, it requires an established workflow and cooperation amongst various departments. Let's talk about how to structure the program and workflow beyond the tool implementation. To start with, define your stakeholders and roles up front. Typically, an insider risk management program has stakeholders from security and IT, HR, legal, and sometimes also from compliance or specific business units. It's important to form an insider risk committee or at least identify key contacts in each domain. For example, have a named HR representative for insider risk cases and a named legal counsel. We already set roles in the tool, analyst, investigator, approver, et cetera, to ensure those map to the right people and from these departments. For instance, HR might hold the investigator role for misconduct cases. IT security might hold it for data theft technical cases. Agree on these divisions of responsibility. It's also really important that…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Module introduction1m 30s
-
(Locked)
Learning objectives1m 23s
-
(Locked)
Implement roles and permissions for Insider Risk Management4m 49s
-
(Locked)
Plan and implement Insider Risk Management connectors9m 4s
-
(Locked)
Plan and implement integration with Microsoft Defender for Endpoint3m 3s
-
(Locked)
Configure and manage Insider Risk Management settings4m 4s
-
(Locked)
Configure policy indicators5m 55s
-
(Locked)
Select an appropriate policy template4m 13s
-
(Locked)
Create and manage Insider Risk Management policies6m 4s
-
(Locked)
Manage forensic evidence settings5m 17s
-
(Locked)
Enable and configure insider risk levels for Adaptive Protection4m 4s
-
(Locked)
Manage insider risk alerts and cases8m 52s
-
(Locked)
Manage Insider Risk Management workflow, including notice templates10m 1s
-
(Locked)
-
-
-