Data Discovery & Encryption With Microsoft's AIP Scanner

Data Discovery & Encryption With Microsoft's AIP Scanner

.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 309 MB

Duration: 32 mins | Genre: eLearning Video | Language: English

How to use and set up this handy tool for data discovery and encryption of on-prem data

What you'll learn

How to classify and encrypt your existing and archived on-prem data using Microsoft's Azure Information Protection Scanner
How to set up a Virtual Machine on Azure and AWS
How to test the AIP scanner before setting it to enforce
How to install the AIP scanner
How the AIP scanner fits into your data protection
Using the AIP Dashboard
Choosing the best AIP Scanner mode for you
How to discover your data locations

Requirements

Microsoft Azure Information Protection (AIP) P2
Have Azure Information Protection Installed and Set up
Spare Cloud or Physical Server (we'll show you how to set up a dedicated virtual machine to run it on)

Description

Quickly and efficiently encrypt your existing data, even if you have thousands of documents!

I'll teach you how to:

Set up Virtual Machines in AWS and Azure

Install SQL

Use the scanner for data discovery

Setup, install, and test the AIP Scanner

Understand what the AIP Scanner does

Figure out the best settings for you

Plus I offer free support and help if you get stuck!

*NOTE: THE AIP SCANNER DOES NOT WORK ON CLOUD SERVICES (e.g. Dropbox/OneDrive) ONLY ON-PREM DATA*

Who this course is for:

Those interested in encryption and data security
Businesses with large amounts of existing data they need to protect fast!
Tech guys who want to learn how to implement the AIP scanner for themselves or others
Those wanting to know where their sensitive data is

Download:

http://longfiles.com/zyxg0c1tr3hc/Data_Discovery_&_Encryption_With_Microsoft's_AIP_Scanner.rar.html

[Fast Download] Data Discovery & Encryption With Microsoft's AIP Scanner


Related eBooks:
U.S. Marine Close Combat Fighting Handbook
Decrypted Secrets: Methods and Maxims of Cryptology
Computer Information Systems and Industrial Management
Social Engineering: Hacking Systems, Nations, and Societies
The Complete WiFi Ethical Hacking Course for Beginners
Machine Learning for Cyber Security
CBT Nuggets - Cisco VoIP CCNP Voice CIPT2 v8.0 642-457 [repost]
Comparative Histories of Crime by Martin Wiener
Privacy and Identity Management. The Smart Revolution
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Encyclopedia of American Foreign Policy
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.