Exact Data Match (EDM) Webinar

Exact Data Match (EDM) Webinar

Custom sensitive information types are used to help prevent inadvertent or inappropriate sharing of sensitive information. As an administrator, you can use the Security & Compliance Center or PowerShell to define a custom sensitive information type based on patterns, evidence (keywords such as employee, badge, ID, and so on), character proximity (how close evidence is to characters in a particular pattern), and confidence levels. Such custom sensitive information types meet business needs for many organizations

 

EDM Teaser.PNG

 

References:

This webinar was presented on Wed Apr 22nd, 2020, and the recording can be found here.

 

Attached to this post are:

  1. The FAQ document that summarizes the questions and answers that came up over the course of both Webinars; and
  2. A PDF copy of the presentation.

Thanks to those of you who participated during the two sessions and if you haven’t already, don’t forget to check out our resources available on the Tech Community.

 

Thanks!

@Adam Bell  on behalf of the MIP and Compliance CXE team

Upgrading a content DB from Sharepoint 2016 to Sharepoint 2019 Fails.

When upgrading a Content DB from Sharepoint 2016 to Sharepoint 2019 fails with following error message

Microsoft.SharePoint.Upgrade.SPUpgradeException: An extension defined in the database is not registered with the farm.   

 

at Microsoft.SharePoint.Administration.SPContentDatabaseExtensionValidator.LogAndThrowIfNotSubset(IEnumerable`1 farmExtensionTypes, SPContentDatabaseExtensionCollection databaseExtensions)   

 

at Microsoft.SharePoint.Administration.SPContentDatabaseExtensionValidator.VerifyDatabaseCompatibility(SPContentDatabase database)   

 

at Microsoft.SharePoint.Administration.SPContentDatabaseCollection.Add(SPContentDatabase database, Boolean provision, Guid webApplicationLockId, Int32 addFlags)   

 

at Microsoft.SharePoint.Administration.SPContentDatabaseCollection.Add(Guid newDatabaseId, String strDatabaseServer, String strDatabaseName, String strDatabaseUsername, String strDatabasePassword, String strDatabaseFailOverServer, Int32 warningSiteCount, Int32 maximumSiteCount, Int32 status, Boolean provision, Guid lockId, Int32 addFlags)   

 

at Microsoft.SharePoint.Administration.SPWebApplication.AddContentDatabase(SPWebApplication application, String strDatabaseServer, String strDatabase, String strDatabaseUser, String strDatabasePassword, String strDatabaseFailOverServer, Int32 cSiteWarning, Int32 cSiteLimit, Boolean bAssignDatabaseId, Int32 iAddFlags)   

 

at Microsoft.SharePoint.PowerShell.SPCmdletNewContentDatabase.InternalProcessRecord()   

 

at Microsoft.SharePoint.PowerShell.SPCmdlet.ProcessRecord()

 

The ULS Log clearly shows 

 

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbd

Medium

Ensuring farm m_extensions.

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbe

Medium

Ensuring database m_extensions.

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopa1

Verbose

m_extensions is already initialized

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopa1

Verbose

m_extensions is already initialized

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbi

High

The m_extensions of the database were not a subset of the m_extensions of the farm.

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbk

High

farm extension: System.RuntimeType

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopa1

Verbose

m_extensions is already initialized

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbl

High

database extension: Microsoft.SharePoint.Administration.SPGlobalExtension, value 16.0.6.0, latestVersion 16.0.8.0

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopbl

High

database extension: Microsoft.Office.Project.Server.Database.Extension.ProjectDatabaseExtension, value 16.1.310.0, latestVersion 17.0.288.0

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aopa1

Verbose

m_extensions is already initialized

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aq4ea

Medium

Calling extension method for SPGlobalExtension on object SPContentDatabase Name=SP19_Content.

PowerShell.exe (0x2478)

0x2EFC

SharePoint Foundation

Database Extensions

aq4ea

Medium

Calling extension method for ProjectDatabaseExtension on object SPContentDatabase Name=SP19_Content.

 

Compare the extensions registered and we can see project extension is missing.  here is how you can compare. 

$contentservice=[Microsoft.sharepoint.Administration.SPwebservice]::ContentService

$contentservice.RegisteredDatabaseExtensionTypes >>SP2016Farm_registered_Extn.txt

 

$contentservice=[Microsoft.sharepoint.Administration.SPwebservice]::ContentService

$contentservice.RegisteredDatabaseExtensionTypes >>SP2019Farm_registered_Extn.txt

 

 

Resolution:

Execute the following to register the missing extension

$svc = [Microsoft.SharePoint.Administration.SPWebService]::ContentService

[System.Reflection.Assembly]::LoadWithPartialName(“Microsoft.Office.Project.Server.Database.Extension”) | FL

$svc.RegisteredDatabaseExtensionTypes.EnsureAdded([Microsoft.Office.Project.Server.Database.Extension.ProjectDatabaseExtension])

$svc.Update($true)

Upcoming Webinar – eDiscovery for Teams – May 14th

 

While eDiscovery provides a range of search, hold, and export functionality, advanced eDiscovery gives compliance administrators more tools to identify data sources and analyze their contents.

Need to conduct an internal investigation of Teams content? We’ve got you covered. Join us to learn how to complete common eDiscovery processes on Teams content.

 

May 14, 2020: 16:00 GMT

Download Outlook Calendar Invite  https://aka.ms/GetInvite-eDiscoveryForTeamsWebinarEMEA

May 14, 2020: 12:00 PST

Download Outlook Calendar Invite https://aka.ms/GetInvite-eDiscoveryForTeamsWebinarUS

 

Join live

May 14, 2020: 16:00 GMT

Attendee URL: https://aka.ms/Join-eDiscoveryForTeamsWebinarEMEA

May 14, 2020: 12:00 PST

Attendee URL: https://aka.ms/Join-eDiscoveryForTeamsWebinarUS

 

 

 

Exact Data Match (EDM) Webinar

Announcing general availability of sensitivity labels with protection in SharePoint and OneDrive

Microsoft runs on trust. With the growing digital data in your organizations and sophistication of online threats, it’s increasingly important to have intelligent security and simplified governance tools to safeguard your corporate data.

 

At Microsoft, our goal is to provide a built-in, intelligent, unified, and extensible solution to protect sensitive data across your digital estate – in Microsoft 365 cloud services, on-premises, third-party SaaS applications, and more. With Microsoft Information Protection (MIP), we are building a unified set of capabilities for classification, labeling, and protection not only in Office apps, but also in Microsoft 365 productivity services like OneDrive, SharePoint, Teams, and Exchange Online.

 

Sensitivity labels are central to how your business-critical data is protected using Microsoft Information Protection (MIP). You create a sensitivity label and associate protection policies like encryption and visual marking, then your end users simply label their important documents and emails. You can also be assured that the protection will persist with the file throughout its life cycle.

 

Today, we are excited to announce general availability of sensitivity labels with protection for Office files in SharePoint and OneDrive. This is one more step to providing you comprehensive protection across documents and emails in Microsoft 365 services.

 

Now your users can apply sensitivity labels, with protection policies, not just in Office apps on Windows, Mac, iOS and Android but also in Office on the web. Users will see sensitivity as an option on the ribbon of the Office on the web, and as the applied label name on the status bar.

 

PowerPointFileWithSensitivityLabelConfidentialApplied.png

 

Figure 1. Manual classification using sensitivity labels shown in PowerPoint web app when used in a browser

 

In addition, for files labeled and protected with encryption and stored in SharePoint and OneDrive, the following capabilities will empower your end users:

  • Coauthoring using Office web apps
  • Searching for content within these documents
  • Protection using encryption will persist even after the file is downloaded

 

For security and compliance administrators, Office 365 Data Loss Prevention (DLP) and eDiscovery will also work. Office 365 eDiscovery now supports full-text search for these label encrypted files. Office 365 Data Loss Prevention (DLP) policies cover content in these label encrypted files.

 

Getting Started

 

ComplianceCenterEnableFeature.png

 

Figure 2. The compliance center has new option to turn on this feature

 

As a Microsoft 365 customer, you can turn on this feature in the Microsoft 365 compliance center as shown above. To learn more about this feature, please read our feature documentation.

 

Let us know what you think, we are always open to feedback via UserVoice and continued dialog in the Security & Compliance community and SharePoint community in the Microsoft Tech Community.

 

If you are new to Microsoft 365, learn how to try or buy a Microsoft 365 subscription.

 

Lastly, as you navigate this challenging time, we have additional resources to help. For more information about securing your organization in this time of crisis, visit our Remote Work site. We’re here to help in any way we can.

 

FAQs

 

  1. What is the license requirement for using this feature?

Refer to the Information Protection section in Microsoft 365 security & compliance licensing guidance.

 

  1. I use AIP/RMS today, how can I take advantage of this new feature in SharePoint and OneDrive services?

Migrate to unified labeling solution using instructions here, then you can advantage of this feature. Learn more in our feature documentation.

 

  1. Is this feature supported in Files tab experience in Teams?

Yes, it is. Learn more in our feature documentation.

 

Thank you!

 

Sesha Mani, Principal Group Product Manager, Microsoft

 

 

 

 

 

 

 

 

 

 

Get the most out of Office 365 ATP in the shift to remote work

It’s never been more critical that employees and the partners they collaborate with can work remotely and stay more secure. In the months leading up to this monumental shift, phishing and malware attacks were at the top of the list of cybersecurity threats. Now, attackers are capitalizing on fear, leveraging this time of uncertainty and change as an opportunity. Phishing and malware attacks are on the rise, many of which now include COVID-19 related lures. In the circumstances we are living through, these threats continue to be some of the most considerable risks to organizations. 

 

What’s available to you today

Office 365 Advanced Threat Protection provides industry-leading protection for all of Office 365. This includes protection against phishing and malware for Exchange, SharePoint, Teams, OneDrive, and Office applications.  O365 ATP is built-in to Office 365, so you won’t need multiple solutions to maintain a threat protection solution for email and collaboration.

If you’ve got our P2 license, you have access to our post-breach capabilities, which include hunting, automated investigation, and response capabilities, as well as Attack Simulator which provides end-user training simulations.

 

Guidance for rapid onboarding

Office 365 ATP provides a variety of threat protection features for your organization. Many of these can be enabled quickly with little impact to your users. Remember that you can extend phishing and malware protection beyond the mailbox, to SharePoint, OneDrive, Teams, and Office, with a single click. For guidance on configuring these policies, such as Safe Links and Safe Attachments, visit our Protect against threats documentation.  If you need additional help, our FastTrack service is free for all Office 365 ATP customers, and is extending coverage in support of COVID-19 response efforts. Visit the FastTrack site to request assistance.

 

Our recommendations

Across the Office 365 service we see that misconfigurations cause 20% of phishing emails to be delivered to users’ inboxes. In this critical time, review your configurations to ensure that your organization is protected. If a portion of your users have transitioned to remote work, ensure that your existing configurations support this change safely, and that you haven’t broadened your attack surface more than is necessary. The O365 ATP Recommended Configuration Analyzer (ORCA) can help you review your configurations and ensure that you are maintaining a secure posture.

We’ve also published recommended settings in both a standard and strict variant. Each customer’s environment and needs are different, but we believe that these levels of mail filtering configurations will help prevent unwanted mail from reaching your employees’ inbox in most situations.

Visualize the threats to your organization with Campaign Views and view the full story of how attackers targeted your users and how your defenses handled the threats. Armed with this information, security teams can more rapidly remediate compromised users, improve security posture, and hunt and track threats. Learn more about Campaign Views here.

 

Microsoft is here to help

In case of a security incident, Microsoft incident response (IR) services are available through the Microsoft Detection and Response Team (DART). DART provides both reactive incident response and pro-active cyber-resilient services, some delivered remotely and some on-site. The team responds to security incidents and helps customers and partners around the world. You can reach out to your Microsoft Account Manager, Technical Account Manager, or Premier Support contact if you need help from DART.

To learn more about what Microsoft is doing to address the current threat landscape, view our recent blog post on threat intelligence here.

 

At Microsoft, we understand that securing a remote workforce poses unique challenges. We’re committed to helping customers protect their users and resources, empower their security teams, and focus on what’s most important during this unprecedented time.