<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloud app security Archives - Erjen Rijnders</title>
	<atom:link href="https://erjenrijnders.nl/tag/cloud-app-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://erjenrijnders.nl/tag/cloud-app-security/</link>
	<description>Microsoft Azure/EMS blog</description>
	<lastBuildDate>Tue, 23 Oct 2018 14:33:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>Microsoft Ignite day 3</title>
		<link>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/</link>
					<comments>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/#respond</comments>
		
		<dc:creator><![CDATA[Erjen]]></dc:creator>
		<pubDate>Thu, 27 Sep 2018 02:18:03 +0000</pubDate>
				<category><![CDATA[Ignite 2018]]></category>
		<category><![CDATA[identity protection]]></category>
		<category><![CDATA[cloud app security]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[intune]]></category>
		<category><![CDATA[conditional access]]></category>
		<category><![CDATA[microsoft secure score]]></category>
		<guid isPermaLink="false">http://erjenrijnders.nl/?p=75777</guid>

					<description><![CDATA[<p>Azure AD Conditional Access We have some great new features in Azure AD Conditional Access, they are really taking it [&#8230;]</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/">Microsoft Ignite day 3</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><a id="azure-ad-conditional-access"></a>Azure AD Conditional Access</h1>
<p>We have some great new features in Azure AD Conditional Access, they are really taking it to a next level. Conditional Access has now tight integration with Cloud App Security. It’s now possible to fully control and secure our data and information when you collaborate with a partner (B2B) or within your own tenant.</p>
<h1>Index:</h1>
<ol>
<li><a href="#azure-ad-conditional-access" rel="noopener">Azure AD Conditional Access</a></li>
<li><a href="#cloud-app-security-defender-atp" rel="noopener">Cloud App Security integration with Windows Defender ATP</a></li>
<li><a href="#microsoft-secure-score" rel="noopener">Microsoft Secure Score</a></li>
<li><a href="#identity-protection">Identity Protection</a></li>
<li><a href="#intune-updates">Intune Updates</a></li>
</ol>
<p>As you might probably now, Cloud App Security has tight integration with SharePoint already but now we can control on file level if a download for example is allowed or not. Check this screenshot below from the Ignite presentation:</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-75780" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked.png" alt="cloud-app-security-download-blocked" width="627" height="335" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked.png 1996w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-300x160.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-768x410.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-1024x546.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-600x320.png 600w" sizes="(max-width: 627px) 100vw, 627px" /></p>
<p>Another great update is that we can now enable Conditional Access App Control for Office applications. Before this was only possible with SAML-based apps. Based on the risk level of a user’s session, information can be accessed or blocked. Also risky OAuth applications can now be blocked with Cloud App Security. These updates make Cloud App Security even more powerful. If you aren’t using it right now, you should! It makes your organization a lot more secure.</p>
<p>Well, enough updates around Conditional Access right? It goes even further. We can not only control Exchange, but specific mailboxes within an account. The command runs as follows to enable this feature:</p>
<div class="codecolorer-container text twitlight" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><table cellspacing="0" cellpadding="0"><tbody><tr><td style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;text-align:center;color:#888888;background-color:#EEEEEE;border-right: 1px solid #9F9F9F;"><div>1<br /></div></td><td><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">Set-OwaMailboxPolicy –Identity user –ConditionalAccessPolicy $true</div></td></tr></tbody></table></div>
<p>This command does not work yet and to be honest, I am not sure what it will actually do as I cannot test it yet. But I expect we will have some sub-commands in the near future to further control this.</p>
<h1><a id="cloud-app-security-defender-atp"></a>Cloud App Security integration with Windows Defender ATP</h1>
<p>Cloud App Security is now integrated with Windows Defender ATP! At first, we needed to install a Cloud App Security client which was too much because we had already so many clients installed. So they came up with the Cloud App Security broker which was an improvement on the client side, but then we needed to proxy all our traffic through it. We now we have the best solution, integration with Windows Defender ATP! I personally love this because configuring a separate gateway is no longer necessary. All traffic can be routed through Defender ATP (and the Defender client is installed by default with Windows 10). This is a great way of securing your information and it makes controlling your devices very easy. Here you can see information is being fed from Windows Defender ATP.</p>
<p><img decoding="async" class="alignnone wp-image-75781" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp.png" alt="cloud-app-security-defender-atp" width="656" height="307" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp.png 2563w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-300x140.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-768x359.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-1024x479.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-600x281.png 600w" sizes="(max-width: 656px) 100vw, 656px" /></p>
<p>In Windows Defender ATP, you only have to enable this.</p>
<p><img decoding="async" class="alignnone wp-image-75782" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings.png" alt="cloud-app-security-defender-atp-settings" width="581" height="362" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings.png 1407w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-300x187.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-768x478.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-1024x637.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-600x373.png 600w" sizes="(max-width: 581px) 100vw, 581px" /></p>
<p>After enabling this setting, it will Cloud App Security feed traffic and device information from Windows Defender ATP.</p>
<h1><a id="microsoft-secure-score"></a>Microsoft Secure Score</h1>
<p>We have heard in almost every session that we should enable Microsoft Secure Score. I do agree that we should enable it on all our tenants (so I am telling you again now :)) and it is also enabled now through Azure Active Directory (you can go to <a href="https://securescore.microsoft.com/">https://securescore.microsoft.com/</a> as well). It looks like this:</p>
<p><img decoding="async" class="alignnone wp-image-75783" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score.png" alt="laborie-secure-score" width="619" height="408" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score.png 2219w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-300x198.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-768x506.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-1024x675.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-600x395.png 600w" sizes="(max-width: 619px) 100vw, 619px" /></p>
<p>It looks good and it will only show the score that you have access too. Like if you don’t have EM+S E5, you won’t see identity protection related security scores.</p>
<h1><a id="identity-protection"></a>Identity Protection</h1>
<p>Identity Protection does now have integration with Azure ATP. Azure ATP is a security service based on DNS checks. Risky sign-ins from these two products can now be viewed from a single panel. And of course, we can apply conditional access on this. If Azure ATP feeds Identity Protection with a risky sign-on, it can be blocked, based on your Conditional Access settings. Combining these two sources, you have a very powerful solution. You see all high risk devices and users and all items that needs attention are presented through one combined interface.</p>
<p><img decoding="async" class="alignnone wp-image-75802" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/Identity-protection-azure-atp.png" alt="Identity-protection-azure-atp" width="582" height="423" /></p>
<h1><a id="intune-updates"></a>Intune updates</h1>
<p>As you might know by now is that my main focus is within the &#8220;Information Protection&#8221; field which includes parts of Cloud App Security and Intune as well. So I wanted to post some updates around Intune, Windows Information Protection (which is part of Intune) and device management. That&#8217;s why I visited the session &#8220;What’s new in Windows 10 mobile device management (MDM)&#8221; . But right from the start I thought: Are we really going to do this for 75 minutes? I barely heard anything new and I love to share new stuff to the world. For example the presenter said that we should focus on co-management, 1 of 3 points she gave as a call-to-action. Isn&#8217;t this already possible for years now?</p>
<p>Also, we were presented slides like this:</p>
<p><img decoding="async" class="alignnone wp-image-75778" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1.png" alt="intune-slide1" width="573" height="314" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1.png 1644w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-300x164.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-768x421.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-1024x561.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-600x329.png 600w" sizes="(max-width: 573px) 100vw, 573px" /></p>
<p>Really? I want to see what’s NEW. Anyway, a little good news however, Kiosk mode control is now generally available and we will get better security baselines for Microsoft Intune. Maybe you have another opinion about this session, I would love to hear from you through comments below.</p>
<p>So this is basically it. We saw a lot of sessions but a lot of sessions presented content already covered in day 1 and 2. I don’t expect much more announcements in day 4 and 5. Maybe I will wrap them together in one blogpost, depending on the content of tomorrow.</p>
<p>But still, Ignite brought me definitely the sessions above expectations!</p>
<p>&nbsp;</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/">Microsoft Ignite day 3</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GDPR: how to automatically delete sensitive content</title>
		<link>https://erjenrijnders.nl/2018/08/21/gdpr-how-to-automatically-delete-sensitive-content/</link>
					<comments>https://erjenrijnders.nl/2018/08/21/gdpr-how-to-automatically-delete-sensitive-content/#comments</comments>
		
		<dc:creator><![CDATA[Erjen]]></dc:creator>
		<pubDate>Tue, 21 Aug 2018 17:41:31 +0000</pubDate>
				<category><![CDATA[Cloud App Security]]></category>
		<category><![CDATA[Azure Information Protection]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[office 365]]></category>
		<category><![CDATA[cloud app security]]></category>
		<category><![CDATA[Azure-information-protection]]></category>
		<category><![CDATA[aip]]></category>
		<guid isPermaLink="false">http://erjenrijnders.nl/?p=73835</guid>

					<description><![CDATA[<p>These days, I get a lot of questions from customers how to make sure that for example a resumé is [&#8230;]</p>
<p>The post <a href="https://erjenrijnders.nl/2018/08/21/gdpr-how-to-automatically-delete-sensitive-content/">GDPR: how to automatically delete sensitive content</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days, I get a lot of questions from customers how to make sure that for example a resumé is automatically deleted after a predefined timeframe. I receive this question a lot because of the GDPR legislation. To accomplish this, you have multiple options. Keep in mind that this blog is not covering in-depth knowledge of the products itself, nor how to configure regex (let me know if you’re interested how to do this in these scenario’s, I might make a blogpost about it), but rather giving you a good idea which tool you should use in which scenario.</p>
<p>So, in case when you have an applicant on a job offer, the person sends you its resumé somehow (by e-mail, sharing through OneDrive etc.) and you download it to the company share (SharePoint Online or locally). In all scenario’s you need to make sure that, whatever way the resumé is received, you catch it and set an expiration date.</p>
<p>Note: Every product to accomplish this have its caveats. You need to make sure that you align the job applications with the way you handle your sensitive data.</p>
<p>Depending on the license you have, you can use these products for achieving above:</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li><a href="#azure-information-protection"><strong>Azure Information Protection;</strong></a></li>
<li><a href="#cloud-app-security"><strong>Cloud App Security;</strong></a></li>
<li><a href="#aip-scanner"><strong>AIP Scanner;</strong></a></li>
<li><a href="#data-loss-prevention"><strong>Data Loss Prevention;</strong></a></li>
<li><a href="#exchange-online-retention-policies"><strong>Exchange Online Retention Policies</strong></a></li>
<li><a href="#conclusion"><strong>Conclusion</strong></a></li>
</ol>
</li>
</ol>
<p>Let’s see how these products can achieve this.</p>
<h2><a id="azure-information-protection"></a>1. Azure Information Protection</h2>
<p>First you need to configure a label with content expiration. Go to the “Azure Portal &gt; Azure Information Protection &gt; Labels &gt; Protect”. Under “Content expiration”, set the content to expire “By days” or “By date”. When the content expires, you can no longer decrypt the content which makes it unreadable:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/azure-information-protection-content-expiration.png" alt="" width="903" height="510" /></h2>
<p>Now classify the document You can easily do this by right clicking a PDF or Word document and click “Classify and protect”:</p>
<p><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/08/azure-information-protection-classify-and-protect.png" alt="" width="274" height="93" /></p>
<p>Click the label you configured with “Content expiration”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/azure-information-protection-sensititvy.png" alt="" width="905" height="169" /></h2>
<p>If you view the custom properties of the document, you can see it’s now classified as “Confidential”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/azure-information-protection-advanced-properties.png" alt="" width="1012" height="495" /></h2>
<p>In my opinion, the problem with this approach is the chance on forgetting classifying a document. So, if you choose Azure Information Protection for achieving this, make sure no documents get through without classification and give your users clear instructions.</p>
<p>Another way with Azure Information Protection is the automatic labeling function. You can do this, based on document content. With PDF-files however (and any filetype other than docx, pptx, xlsx), you can only achieve this with the AIP scanner (check point 3). To configure automatic labeling, take the same steps as before but also configure a condition and create a regex policy or fill in predefined keywords:</p>
<p><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/08/azure-information-protection-conditions-300x120.png" alt="" width="300" height="120" /></p>
<h2><a id="cloud-app-security">2. Cloud App Security</a></h2>
<p>Using Cloud App Security, you can automatically classify documents when they reside in a specific folder or when the document contains sensitive information. Personally, I would love the last one, but it’s currently not possible to scan PDF files with Cloud App Security so the first option is the only working option at the moment.</p>
<p>We will discuss both options however. First let’s see how it works when sensitive files are stored in a specific folder. Go to <a href="https://portal.cloudappsecurity.com/" target="_blank" rel="noopener">https://portal.cloudappsecurity.com/</a>, click “Control &gt; Policies &gt; Create policy &gt; File policy”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/cloud-app-security-create-policy.png" alt="" width="1324" height="501" /></h2>
<p>Select as condition “Parent folder” and select the folder:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/cloud-app-security-conditions.png" alt="" width="816" height="161" /></h2>
<p>Apply a classification label beneath “Microsoft OneDrive for Business” and “Microsoft SharePoint Online”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/cloud-app-security-rule.png" alt="" width="448" height="398" /></h2>
<p>Create the policy, now all content in that folder will have automatically the content expiration activated. Of course, you need to configure content expiration for the label set. See step 1 for more details.</p>
<p>Let’s see how automatic labeling with Cloud App Security works. Create a File policy again and scroll down till the “Inspection method” part. We skip the conditions for now since we did that just before and it’s straight forward as well.</p>
<p>Select “Data Classification Service &gt; Match if Any of the following occur &gt; Choose inspection type… &gt; Select a sensitive information type”:</p>
<p><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/08/cloud-app-security-apply-classification-label-300x300.png" alt="" width="300" height="300" /></p>
<p>Here you can select a sensitive information type, or you can add a custom information type. You need to know regular expressions, but it’s not too hard.</p>
<p>For adding a custom information type, click the + button on the right:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/cloud-app-security-custom-rule.png" alt="" width="1832" height="512" /></h2>
<p>Once added, click “Done” and navigate to the bottom. Now again select the classification label you want to apply for “Microsoft OneDrive for Business” and “Microsoft SharePoint Online”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/cloud-app-security-rule.png" alt="" width="431" height="383" /></h2>
<p>All matched files are now automatically classified with “Confidential” (make sure you configure the content expiration again in Azure Information Protection).</p>
<p>Remember, it’s not working yet with PDF-files but will be available in future versions.</p>
<h2><a id="aip-scanner">3. AIP Scanner</a></h2>
<p>This is more or less the same as step 2, only the tool is different and it’s possible to scan PDF files. You still need to know regular expressions (or you need to choose predefined templates like “Credit Card Number”). the scanner uses the Office 365 data loss prevention (DLP) service. For configuration of the filetypes in DLP, see point 4.</p>
<p>The actual configuration of the AIP scanner is not covered in this post, since there are already many great posts how to do this.</p>
<h2><a id="data-loss-prevention">4. Data Loss Prevention</a></h2>
<p>DLP has great potential for achieving this task, especially because you can connect with Exchange Online which means you can scan e-mail attachments and restrict or encrypt the content when a condition matches.</p>
<p>However, one big flaw is that DLP cannot scan PDF files (yet), same goes for Cloud App Security. They both use the same core functionality, but I expect this possibility the coming months. Till then, we cannot use this functionality for scanning PDF files.</p>
<p>To create a custom classification type to use within a DLP policy, go to “<a href="https://protection.office.com" target="_blank" rel="noopener">https://protection.office.com</a> &gt; Classifications &gt; Custom sensitive information types”:</p>
<p><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/08/data-loss-prevention-custom-policies-157x300.png" alt="" width="157" height="300" /></p>
<p>Now click “Create” and add a Regular expression:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/data-loss-prevention-regular-expressions.png" alt="" width="1237" height="758" /></h2>
<p>At this point, click “Finish” and add a DLP policy. Click on “Data loss prevention &gt; Policy &gt; Create a policy”. Walk through the steps, at the “Policy settings” tab click “Use advanced settings”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/data-loss-prevention-advanced-settings.png" alt="" width="1204" height="539" /></h2>
<p>Click “New rule” and within the “Conditions” tab, click “Content contains &gt; Sensitive info types”:</p>
<p><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/08/data-loss-prevention-conditions-300x264.png" alt="" width="300" height="264" /></p>
<p>Now select your just created custom policy. On the “Actions” tab, select “Block people from sharing and restrict access to shared content” and “Everyone. Only the content owner, the last modifier, and the site admin will continue to have access”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/data-loss-prevention-actions.png" alt="" width="964" height="332" /></h2>
<p>Fill in the other desired settings and save the policy.</p>
<h2><a id="exchange-online-retention-policies">5. Exchange Online retention policies</a></h2>
<p>With Exchange Online retention policies, you can achieve best of all worlds. You can just delete content matching a custom information type that you created with regex. So, it’s possible to apply this to Exchange, SharePoint and OneDrive!</p>
<p>Go to “<a href="https://protection.office.com" target="_blank" rel="noopener">https://protection.office.com</a> &gt; Data governance &gt; Retention &gt; Create”. Create a custom retention policy and add a “Sensitive info types”:</p>
<h2><img decoding="async" src="http://erjenrijnders.nl/wp-content/uploads/2018/04/exchange-online-retention-policy.png" alt="" width="900" height="815" /></h2>
<p>Make sure you delete the content after the period you define, from the data when it was labeled.</p>
<p>One caveat with this option is that you don’t have much conditions. You can only choose to which location you want to apply it (SharePoint Online, OneDrive or Exchange Online).</p>
<p><strong> </strong></p>
<p><strong><a id="conclusion">Conclusion</a></strong></p>
<p>As you figured out by now, it’s impossible to use one tool for scanning your complete environment (if you both use on-premises file server and cloud-based file servers). Also, scanning PDF-files is apparently hard and even impossible to scan Exchange Online PDF files with a tool like Azure Information Protection, Data Loss Prevention or Cloud App Security. Fortunately, it’s possible with retention policies.</p>
<p>In the scenario where you only use SharePoint, OneDrive and Exchange Online and you also want to scan PDF-files, the best option would be using retention policies. Keep in mind that you do not have much options in conditions. In case you need more freedom in conditions and still need to scan PDF-files, you have to wait for this functionality to become available in AIP, DLP and MCAS.</p>
<p>You might have an on-premises file server as well, where you want to apply labels automatically, you need the AIP-scanner since it can scan PDF files.</p>
<p>If you have any questions, feel free to contact me or place a comment below.</p>
<p>The post <a href="https://erjenrijnders.nl/2018/08/21/gdpr-how-to-automatically-delete-sensitive-content/">GDPR: how to automatically delete sensitive content</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://erjenrijnders.nl/2018/08/21/gdpr-how-to-automatically-delete-sensitive-content/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
