Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
Use the information presented in this book to implement an end-to-end compliance program in your organization using Microsoft 365 tools. You will learn about the solutions available in the Microsoft 365 Compliance Center, including best practices and common pitfalls. IT professionals will benefit from the author’s approach of introducing each topic within a practical business context and scenarios behind the “whys” of compliance. Compliance managers will understand how to implement their requirements in Microsoft 365.
Compliance and risk management is often a board- or CEO-level issue. The risks of hefty fines and bad PR from non-compliance are severe. IT is usually responsible for implementing compliance controls and for working with compliance and legal officers to manage the day-to-day risk in an organization.After reading Microsoft 365 Compliance, you will be prepared to have a well-informed conversation with your compliance and legal officers to determine how to work together to identify specific compliance requirements for your organization. You will be able to implement those requirements yourself using Microsoft 365 features. Compliance and legal officers will understand how to communicate their technical requirements to IT.
Author Erica Toelle helps you build a solid compliance foundation by teaching you about topics such as information protection, retention, records management, eDiscovery, auditing, compliance with common regulations, managing insider risks, supervising communications, data loss prevention, protecting sensitive information, and using machine learning to reduce compliance costs.
What You Will Learn
·
Chapter 1: An Introduction to Compliance in Microsoft 365.- Chapter 2: Compliance Manager.- Chapter 3: Data Classification.- Chapter 4: Data Connectors.- Chapter 5: Information Protection.- Chapter 6: Data Loss Prevention Policies.- Chapter 7: Information Barriers.- Chapter 8: Information Governance.- Chapter 9: Records Management.- Chapter 10: Insider Risk Management.- Chapter 11: Communication Compliance.- Chapter 12: Content Search.- Chapter 13: Core eDiscovery.- Chapter 14: Advanced eDiscovery.- Chapter 15: Data Investigations.- Chapter 16: The Unified Audit Log.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.