Task 2
You discover that all users can apply the Confidential - Finance label.
You need to ensure that the Confidential - Finance label is available only to the members of the Finance Team group.
To restrict theConfidential - Financelabel to only the members of theFinance Teamgroup, follow these steps:
Create a Sensitivity Label:
Log in to theMicrosoft Purview portalor theMicrosoft Purview compliance portalas an admin.
Navigate toSensitivity labelsand create a new label called''Confidential - Finance''.
Configure Encryption Settings:
When creating the label, ensure that you configure the encryption settings.
Assign the Label to the Finance Team Group:
In theMicrosoft Purview portal, go to theGroupssection.
Select theFinance Teamgroup.
UnderSettings, chooseSensitivity labels.
Add the''Confidential - Finance''label to this group.
Only members of theFinance Teamwill now have access to this label3.
Test the Configuration:
Task 3
You plan to automatically apply a watermark to the document1 of a project named Falcon.
You need to create a label that will add a watermark of "Project falcon' in red. size-12 font diagonally across the documents.
To create a label that adds a watermark of ''Project Falcon'' in red, size-12 font diagonally across the documents, follow these steps:
Create a Sensitivity Label:
Log in to theMicrosoft Purview portalor theMicrosoft Purview compliance portalas an admin.
Navigate toSensitivity labelsand create a new label called''Project Falcon''.
Specify the appropriate settings for this label, including encryption, content markings, and permissions.
Configure Content Markings (Watermark):
When creating the label, configure the content markings section.
Choose''Watermark''and set the text to''Project Falcon''.
Select the color asredand font size as12.
Set the watermark position todiagonalacross the document.
Assign the Label:
Assign the''Project Falcon''label to the relevant documents within theFalcon project.
Users who apply this label will automatically add the specified watermark to their documents.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to Microsoft Purview.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From Microsoft Defender for Cloud Apps, you create an app discovery policy.
Does this meet the goal?
Task 9
You are investigating a data breach.
You need to retain all Microsoft Exchange items in the mailbox of Alex Wilber that contain the word Falcon and were created in the year 2021.
To retain all Microsoft Exchange items in Alex Wilber's mailbox that contain the word ''Falcon'' and were created in the year 2021, follow these steps:
Create a Retention Policy:
Sign in to theMicrosoft 365 compliance center.
Navigate toPoliciesand click onRetention.
Create a new retention policy (e.g., ''Falcon Retention 2021'').
Specify the retention period (e.g.,2 yearsfrom the creation date).
Set the condition to include items containing the word ''Falcon.''
Apply the Retention Policy to Alex Wilber's Mailbox:
Assign the retention policy to Alex Wilber's mailbox.
Ensure that the policy targets items created in the year 2021.
Validate the Policy:
Test the policy thoroughly to ensure it correctly retains the specified items.
Monitor the mailbox to verify that the retention actions are enforced.
Task 4
You need to block users from sending emails containing information that is subject to Payment Card Industry Data Security Standard (PCI OSS). The solution must affect only emails.
To block users from sending emails containing information subject to thePayment Card Industry Data Security Standard (PCI DSS), you can create aData Loss Prevention (DLP) policyinMicrosoft Exchange Online. Here's how:
Create a Custom DLP Policy:
Log in to theMicrosoft Exchange Online admin center.
Navigate toData loss prevention>Policy.
Create a new custom policy specifically for PCI DSS compliance.
Define Conditions:
In the policy settings, define conditions that identify sensitive data related to PCI DSS. For example:
Keywords: Include terms like ''credit card,'' ''debit card,'' or specific card number formats.
Regular Expressions (Regex): Craft expressions to match credit card patterns (e.g.,\b\d{4}-\d{4}-\d{4}-\d{4}\bfor Visa/Mastercard).
Sensitive Information Types: Use built-in or custom sensitive information types related to payment cards.
Choose Actions:
Specify the actions to take when sensitive data is detected in emails:
Block: Prevent the email from being sent.
Notify Sender: Inform the sender that sensitive data is not allowed via email.
Add Disclaimer/Watermark: Optionally add a disclaimer or watermark to the email.
Apply the Policy to Emails Only:
Ensure that the policy is configured to apply only toemails(not other communication channels).
Exclude internal communication if necessary.
Test and Monitor:
Enable the policy intest modeinitially to validate its effectiveness.
Monitor logs and adjust the policy as needed.
Reyes
23 days agoVernell
24 days agoAntione
27 days ago