Developers: | Microsoft |
Date of the premiere of the system: | November, 2020. |
Last Release Date: | 2020/11/13 |
Technology: | Cybersecurity - Information loss preventions |
Content |
Main article: DLP - Data Loss/Leak Prevention - Technologies of privileged information loss prevention
2020
Availability to corporate clients
On November 13, 2020 the Microsoft company announced that the solution for protection against date leaks on the end devices Microsoft Endpoint Data Loss Prevention (DLP) became available to corporate clients. The policy of Endpoint DLP is based on marking and classification of Microsoft Information Protection and expands the existing possibilities of DLP in Microsoft 365, helping to provide compliance to regulatory requirements and to protect confidential information on end devices.
The solution is built in Windows 10, Microsoft applications 365, Microsoft Edge and does not require deployment of the additional software (agent) on the device that considerably simplifies integration of technology and allows to ensure safety of users without prejudice to performance. A system is also integrated with Microsoft Defender for Endpoint thanks to what it is possible to configure priorities of response to incidents taking into account additional parameters of a status of protection of the end device.
Relying on responses of participants of the program of preliminary testing of Microsoft Endpoint DLP, functions were also added:
- The signature stamp of confidentiality is added as a condition for the politician of Microsoft Data Loss Prevention. It allows to define methods for security taking into account the level of importance of information.
- The updated panel of monitoring helps to react to warnings of a DLP system. Notifications provide detailed information on the incidents connected with date leak including types of the confidential information detected in leak, the rating of trust and calculation of events thanks to what security experts can quickly reveal events with a high risk, sort and react to them.
- Flexible configuration the DLP politician for e-mail allows to switch on and off specific filters in order that security policy was applied only to those e-mail messages which correspond to certain conditions.
Запуск Microsoft Endpoint Data Loss Prevention (DLP)
In November, 2020 Microsoft put on the market the first in the product line solution for protection against date leaks. The Microsoft Endpoint Data Loss Prevention (DLP) system is available to corporate clients.
The solution is built in Windows 10, Microsoft applications 365, Microsoft Edge and does not require deployment of the additional software (agent) on the device. A system is also integrated with Microsoft Defender for Endpoint thanks to what as note in the company, it is possible to configure priorities of response to incidents taking into account additional parameters of a status of protection of the end device.
Microsoft emphasizes that the policy of Endpoint DLP is based on marking and classification of Microsoft Information Protection and expands the existing possibilities of DLP in Microsoft 365, helping to provide compliance to regulatory requirements and to protect confidential information on end devices.
After testing of Microsoft Endpoint DLP and collecting of responses the company added a number of new features to a system:
- the signature stamp of confidentiality is added as a condition for the politician of Microsoft Data Loss Prevention. It allows to define new methods for security taking into account the level of importance of information;
- the new panel of monitoring helps to react to warnings of a DLP system more effectively. Notifications provide detailed information on the incidents connected with date leak including types of the confidential information detected in leak, the rating of trust and calculation of events thanks to what security experts can quickly reveal events with a high risk, sort and react to them;
- flexible configuration the DLP politician for e-mail allows to switch on and off specific filters in order that security policy was applied only to those e-mail messages which correspond to certain conditions.[1]