Created by @Greg Wiselka and @Sarahzin
Short link: https://aka.ms/MIPNinja
The Microsoft Information Protection (MIP) Ninja Training is Here!
Have you been wanting to figure out the best way to protect data? How about figuring out what is in your environment? Struggling to let others know you’ve completed your training? Well, wait no longer! Our MIP Ninja Training is here!
We are very excited and pleased to announce this rendition of the Ninja Training Series. With all the other training out there, our team has been working diligently to get this content out there. There are several videos and resources out there and the overall purpose of the MIP+ Compliance Ninja training is to help you master this realm. We aim to get you up-to-date links to the community blogs, training videos, Interactive Guides, learning paths, and any other relevant documentation.
To make it easier for you to start and advance your knowledge gradually without throwing you in deep waters, we split content in each offering into three levels: beginner, intermediate, and advanced.
In addition, after each section, there will be a knowledge check based on the training material you’d have just finished! Since there’s a lot of content, the goal of these knowledge checks is to help you determine if you were able to get a few of the major key takeaways.
*UPCOMING* There’ll be a fun certificate issued at the end of the training: Disclaimer: This is NOT an official Microsoft certification and only acts as a way of recognizing your participation in this training content.
Lastly, this training will be updated on a quarterly basis to ensure you all have the latest and greatest material!
Let us know what you think below in the comments!
Legend/Acronyms |
|
(D) |
Microsoft Documentation |
(V) |
Video |
(B) |
Blog |
(SBD) |
Scenario Based Demo (Video) |
MIP |
Microsoft Information Protection |
AIP |
Azure Information Protection |
ULC |
Unified Labeling Client |
SIT |
Sensitive Information Type |
RBAC |
Role-based access control |
eDLP |
Endpoint DLP |
OME |
Office 365 Message Encryption |
EDM |
Exact Data Match |
DLP |
Data Loss Prevention |
SPO |
SharePoint Online |
AE |
Activity Explorer |
OCR |
Optical character recognition |
CE |
Content Explorer |
IRM |
Information Rights Management |
MCAS |
Microsoft Cloud App Security |
AAD |
Azure Active Directory |
CASB |
Cloud Access Security Broker |
GCC |
Government Community Cloud |
GCC-H |
Government Community Cloud High |
TC |
Trainable Classifiers |
MCC |
Microsoft 365 Compliance Center |
ODSP |
OneDrive SharePoint |
EXO |
Exchange Online |
DAG |
Deployment Acceleration Guide |
MCCA |
Microsoft Compliance Configuration Analyzer |
OSS |
One Stop Shop |
DKE |
Double Key Encryption |
Microsoft Information Protection
MIP is not a product - it's not the next generation of Azure Information Protection. It is a framework, a suite of products, that work together to provide visualization of sensitive data… lifecycle protection for data and data loss prevention.
The foundation of MIP is the ability to classify data by our Data Classification Service, please see the below MIP constellation and how other MIP functionalities all work together.
Now that you've seen an overview of all the integrations, let's go ahead and jump into the training!
Beginner Level Training
- Deployment Acceleration Guide (DAG)
- This guide will help you accelerate MIP deployment and follow the crawl-walk-run methodology.
- Microsoft Compliance Configuration Analyzer (MCCA) (D)
- Have you heard of our new MCCA tool that can help you get started with compliance? MCCA is a PowerShell-based utility that will fetch your organization’s current configurations and validate them against Microsoft 365 recommended best practices.
- MIP Webinars (V)
- Visit the above link to check out our amazing webinars which give you a closer look at what is upcoming and some of the best practices we push to our customers.
- MIP Overview (D)
- Check out our above documentation to get an overview of what MIP is and the different components intertwined.
- The client side of Azure Information Protection (D)
- Haven’t decided yet if you are going to use Unified or Office built-in labeling client? Here you can learn key differences and find out why it’s important to choose the right client for your environment.
- Sensitivity Information Types (D)
- The above documentation goes into details regarding the different types of information you can find in your environment using our suite.
- Microsoft Unified DLP Story (V)
- Please view the above video to see an overview of our unified Microsoft DLP solution.
- Learn about data loss prevention (D)
- Learn about DLP basics and Microsoft Unified DLP and why it’s uniquely positioned to protect your data in the cloud.
- Know and protect your sensitive data (V)
- Check out the video above to understand how Microsoft Information Protection provides you with a comprehensive, unified, intelligent, and built-in solution to protect your sensitive data and prevent its loss.
- Data Discovery Concept (V)
- Check out the above SBD to go through the Data Discovery and Risk Analysis concept using a demo environment.
- Understanding and maximizing the value of Microsoft's DLP Approach (V)
- The above video walks you through how to learn about the challenges with preventing data leakage and how to balance security with user productivity.
- Endpoint Data Loss Prevention (DLP) | What it is and how to set it up in Microsoft 365 (V)
- The video above helps you learn how Endpoint DLP completes our unified DLP story.
Intermediate Level Training
- Apply a sensitivity label to content automatically (D)
- Here you will learn the difference between client-side and service-side auto labeling and how to deploy them
- Custom Sensitive Information Types (D)
- Check out the latest/greatest on creating custom SITs in your environment.
- Create custom sensitive information types with Exact Data Match based classification (D)
- Learn how EDM-based classification enables you to create custom sensitive information types that refer to exact values in a database of sensitive information.
- Get started with trainable classifiers (D)
- Learn how to take data classification to another level if custom Sensitive Information Types and EDM can’t meet your requirements.
- Advanced Classification and Auto Labeling (V)
- The video above goes into a deep dive regarding data classification and how to use in auto-labeling.
- Custom SITs and Client-side Auto Labeling (V)
- The above SBD goes through MIP custom SITs and the client-side auto-label features.
- Service-side Auto Labeling (V)
- The above SBD goes through MIP custom SITs and the service-side auto-label features
- Migrate Legacy DLP Policies (ETR) to DLP (Playbook)
- Please use this guide as a starting point for migrating Exchange Transport Rules.
- Extending Microsoft DLP Deployment to Endpoints (V)
- The above video demonstrate how Endpoint DLP protects organizations from unapproved actions/sharing of project Obsidian on Endpoints (copy/paste, save locally/cloud, USB, upload to unapproved cloud apps, Edge).
- Microsoft Endpoint DLP: Sensitive Info Types as a Condition (Policy Trigger) (V)
- Check out how to create and use your custom created SIT with Endpoint DLP.
- Sensitivity Labels for Containers (V)
- Check out the above SBD for more information on container classification and protection.
- Teams DLP (D)
- The above documentation walks through how to define policies that prevent people from sharing sensitive information in a Microsoft Teams channel or chat session.
Advanced Level Training
- MIP with 3rd parties (V)
- This video goes through our SDK offerings and the ability to apply MIP in third parties.
- Continuing Microsoft Information Protection integration momentum (B)
- Learn how integrations help customers adopt and derive the benefits of Microsoft Information Protection to meet their security and compliance requirements.
- Microsoft Information Protection (MIP) SDK setup and configuration (B)
- The QuickStart and Tutorial articles are centered around building applications that use the MIP SDK libraries and APIs.
- Get started with Office 365 Management APIs (B)
- Learn how to use Management API to pull MIP events.
- Office 365 Management Activity API and Power BI (B)
- Check out the blog above to learn how to leverage Management API for data visualization in Power BI.
- Leverage M365 sensitivity labels to improve your Power BI deployment compliance and protect sensitive business data (V)
- Check out the video above to get a deep dive into our MIP and Power BI integration.
- Protection for on-premises data (V)
- Check out the video on how to protect data on premises with MIP and how to deploy the AIP Scanner.
- AIP Scanner (V)
- Check out the SBD above to see the AIP Scanner architecture, recommendation, installation and configuration.
- Microsoft Endpoint Management (Intune) with MIP part 1 (V)
- Check out the above SBD to see a discussion on the MEM and MIP integration part 1.
- Microsoft Endpoint Management (Intune) with MIP part 2 (V)
- Check out the above SBD to see a discussion on the MEM and MIP integration part 2.
- Preview Channels (OSS)
- A private Teams channel is the main communication for all preview programs. Request access to this channel to get involved.
- Double Key Encryption (D)
- Please check out the above documentation to see our offering on DKE.
-----------
Once you’ve finished the training and the knowledge checks, please go to our attestation portal to generate your certificate; you'll see it in your inbox within 3-5 business days (*UPCOMING*).
We have a great lineup of updates coming for the next rendition (next quarter). If you'd like anything covered, please comment below! In addition, please reach out to us if you have any content you'd like to include as well.
We hope you all enjoy this training!
Learn more:
MIP & Compliance One Stop Shop Resource Page: https://aka.ms/mipc/OSS
Read all the latest MIP updates and blogs at: https://aka.ms/MIPblog
Join MIP & Compliance preview programs at: https://aka.ms/MIPC/Previews
Migrate to Unified Labeling today to leverage sensitivity labels across multiple platforms: https://aka.ms/ul-explained
Posted at https://sl.advdat.com/3mlSOzA