Summary
In this chapter, we reviewed all the varying capabilities of the Security & Compliance
admin center (https://protection.office.com). We went over permissions, and how to set up the Security & Compliance
center so your security team can get the best use from it by using Service assurance
tools. We walked through Alerts
, including what's provided out of the box, adding new ones, and how to manage them. We looked at labels and other tools for document classification, and we discussed how these inturn feed into and empower data leak prevention policies. We explored research tools such a Content search
, Audit logs
, and the new-and-improved eDiscovery
center. We detailed some real-life use cases where these tools can be useful in day-to-day situations that come up in IT. Finally, we looked at reporting capabilities, including the SecurityScore card. With this information in hand, you should now have a well-rounded understanding of what's available and any additional work that may...