Войти
  • 40957Просмотров
  • 4 месяца назадОпубликованоJonathan Edwards

How to Stop Employees Stealing Company Data in Microsoft 365

🚨 How do you stop employees from stealing company data? In this video, I’ll show you how to use Insider Risk Management in Microsoft 365 to detect and prevent risky behaviour—before your sensitive information walks out the door (USB stick optional). Join me—and a slightly dramatic cameo from Charles Bell, Managing Partner at Hawthorne Bell LLP—as we explore: ✅ What Insider Risk Management actually is ✅ Real-world examples of data exfiltration ✅ The difference between triggers and indicators (finally, it makes sense!) ✅ How to build 3 simple but powerful policies:  • Departing employee policy ("The Leaver")  • External file sharing to free domains ("The Oversharer")  • Unusual access behaviour ("The Curious Colleague") I’ll also show you how to spot activity like: - Sending attachments to Gmail or Yahoo - Mass downloads from SharePoint - Sneaky after-hours access - All demoed live in Microsoft 365, step-by-step. #microsoftpurview #microsoft365 #datalossprevention 🧑‍🏫 My Online Courses ► Weekly Cyber Awareness Training - ► Discover Microsoft 365 and Get More Done - 🆓 FREE Facebook Group From security to productivity apps to getting the best value from your Microsoft 365 investment, join our Microsoft 365 Mastery Group 🆓 FREE Microsoft 365 Guide Our FREE Guide - How to Build a 5-Star Business Using Microsoft 365 ► Download our guide here today: 💻 Want to Work Together? Drop me an email: jonathan@ 😁 Follow on Socials TikTok @bearded365guy Instagram @bearded365guy 📽️ Video Chapters 00:00 Introduction 02:05 What is Insider Risk Management? 03:49 Licensing 04:32 Pre-Requisites 06:10 Chrome Microsoft Purview Extension 07:15 Insider Risk Management Settings 08:56 Detection Groups 11:54 Policy Indicators 13:50 Policy Timeframes 14:25 Priority User Groups 16:28 Create Insider Risk Policies 17:02 Data Leak Policy 19:31 Prioritise Content 20:05 Triggering Events 20:27 Thresholds 21:39 Indicators 22:57 Detection Options 25:22 Create Custom Policy