By applying the\u00a0Confidential \\ Microsoft Executive and Staff<\/i>\u00a0label, only members of the executive and executive staff user groups can view, forward, reply, print, and save the content. Document owners can view tracking and logging of their confidential documents using the Azure Information Protection app or console.<\/li>\n<\/ul>\nMonitor and respond<\/h3>\n When Azure Information Protection has been applied, employees can securely collaborate with people inside or outside the company, track use, and even revoke access remotely. With the Azure Information Protection app, they can see who has access to their content and where it\u2019s located, even when it leaves the organization\u2019s traditional boundaries.<\/p>\n
Company-wide adoption<\/h2>\n We implemented a company-wide awareness campaign, which included digital displays in company offices, targeted communication, presentations at company events, and new-hire orientation. We included data protection information in mandatory employee and vendor training to raise awareness without additional training.<\/p>\n
Our adoption program involved representatives from each business organization that helped shape the program. They helped develop a company-wide standard and provided feedback. We established company and organizational baselines, methods to measure classification label adoption, and key indicators that help us target more training and to drive awareness improvements and adoption.<\/p>\n
Reporting and metrics<\/h3>\n Measuring the amount of classified and protected data in our systems is a key requirement for reporting our GDPR compliance. Azure Information Protection audits and logs compliance data that we can analyze for business insights or monitor for abuse through a consolidated information protection console. We have delegated super users that can set policies and recover protected documents\u2014for example, from an employee who has left the company.<\/p>\n
We have recently deployed a new Azure service in Operations Management Suite that uses the same policies as our Azure Information Protection data at-rest scans.<\/p>\n
The information protection journey<\/h2>\n Azure Information Protection has been broadly deployed at Microsoft, and we have been working to educate users and promote adoption. A key benefit in deploying the Azure Information Protection button on the Office ribbon is that we can focus on teaching people how to use the toolbar, rather than the complexities of information protection. We don\u2019t need them to remember which levels of sensitivity require encryption or how long the retention policy is for Highly Confidential information\u2014we simply need to teach them how to use the tool.<\/p>\n
We are working toward a unified data protection program that features native integration with Office 365 and seamless interoperability across all Microsoft cloud platforms. We are coordinating with teams from other areas of Microsoft including Azure Information Protection, Office Information Protection, and Windows Information Protection. We are working with Microsoft security and compliance teams on a unified console, where all data and documents are labeled and protected during their entire lifecycle, across all important endpoints, applications, and services.<\/p>\n
If you are ready to begin your information protection journey, you can start by reading\u00a0What is Azure Information Protection?<\/a>, then visit\u00a0 Azure Information Protection<\/a>\u00a0to download. \n<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. A mobile workforce means that company information is no longer secured within a corporate network or on corporate devices. At Microsoft, we\u2019re using Azure Information Protection to classify […]<\/p>\n","protected":false},"author":146,"featured_media":11017,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"coauthors":[674],"class_list":["post-11012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","m-blog-post"],"jetpack_publicize_connections":[],"yoast_head":"\n
Using Azure Information Protection to classify and label corporate data - Inside Track Blog<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n\t \n\t \n\t \n