View
176
Download
4
Embed Size (px)
DESCRIPTION
Nikola, IT menadžer Microsofta, nam je držao predavanje o novostima u Office 2013, sa posebnim osvrtom na KONTROLU podataka. Ukoliko neko nije instalirao novi Office 2013 – neka to obavezno uradi. Zaista vredi!
Citation preview
Users can and often do populate Excel spreadsheets with information that is outdated, inconsistent, and full of errors, and with formulas that deviate significantly from company-approved analytical models.
Track changes for regulatory
compliance
Evaluate complexity
and common errors
Identify external
dependencies & broken links
Inventory and assess
risk across locations
A PolicyTip notifies you of a
policy violation while
composing an email
45/23/2013
High Business Impact (HBI)Disclosure would immediately and directly cause considerable material loss.
Examples:
• All data belonging to customer or about the customer
• Authentication/authorization credentials - username/password pairs, PINs, and hardware or software tokens.
• Sensitive PII - government-provisioned identification numbers (tax number, driver’s license), financial transaction
authorization information (e.g. credit card information).
Moderate Business Impact (MBI)Disclosure may indirectly cause limited material loss
Examples:
• PII such as name, address, phone number, fax number, and email address (note that some elements of PII are
considered Sensitive PII and must be classified HBI).
• Assets labeled Microsoft Confidential
• Business plans, trade secrets, or financial results.
• Internal employee directory, purchase order data, unreleased product schedules, information on internal websites or
file shares.
Low Business Impact (LBI)Assets not falling into either HBI or MBI are classified as Low Business Impact, and have no formal classification or
protection requirements.
55/23/2013
Content Sensitivity Sent within the corporate network Sent outside the corporate network
(HBI)High Business Impact
S/MIME encryption is recommended and IRM is acceptable.
S/MIME encryption is required and IRM is acceptable.
(MBI)Moderate Business Impact
IRM is recommended whenever you are concerned that the content may be inappropriately shared.
S/MIME encryption is required and IRM is recommended.
(LBI)Low Business Impact
No content protection or encryption is required. No content protection or encryption is required.
Overview of When to Use IRM and S/MIME
- S/MIME /Secure Multipurpose Internet Mail Extensions/
- IRM /Information Rights Management/
Policy details transparently
displayed to end user
Right click to assign policy to an
item, folder or to all your email
Get instant
statistics
Use proximity searches to
understand context
Query results across
Exchange & SharePoint
Laser focused refiners to help
find the data you need
Fine tune
complex queries
New Office Telemetry to centrally manage client health, maintain performance, and aid migrations
Granular configuration management support with Active Directory Group Policy
Central management of mobile device settings – PIN, password policies and remote wipe
Full control over client software updating with Office 365 ProPlus
Multi-language support
overall health and Office deployment
across the organization
View and manage
customizations
Easily combine data from any source to create fully interactive reports and insights with guided exploration
Visually discover and share insights for collaborative decision making across the organization
Manage self-service BI with control & compliance for end user created assets
Fine tune your reports with chart and view filters
Visualize your insights with
interactivecharts
Define relationships, hierarchies and KPIs
Model analytical requirements from
various data sources
Quickly navigate
through your data
Team alias keeps
communications tracked
Single folder to access
Email & documents
Documents stored in SharePoint
Associates an Exchange mailbox with a SharePoint site
Enables users to access SharePoint and Exchange content from Outlook