This lab is designed to be used as a supplement to Instructor Led Training and has several sections that you will go through over the next few days. Please click the lab below that corresponds to the technology your are working with.
[!ALERT] When stopping each section, please ensure that you SAVE the session in between labs rather than END the lab. If you end the lab, all VM configuration will be reset to initial state and will hinder the experience during future labs. We have designed this lab to be a good representation of the interoperability between Microsoft 365 Security Technologies so several of the labs will feed information into future labs.
===
There are a few prerequisites that need to be set up to complete all the sections in this lab. This Exercise will walk you through the items below.
For several of the exercises in this lab series, you will require an active subscription. We are providing an Azure Pass for this purpose. You will be provided with an Azure Pass code to use with the instructions below.
-
[] On @lab.VirtualMachine(Client01).SelectLink, log in with the password [email protected](Client01).Password+++.
-
[] Right-click on Edge in the taskbar and click on New InPrivate window.
-
[] In the InPrivate window, navigate to
https://www.microsoftazurepass.com
-
[] Click the Start button to get started.
!IMAGEwdir7lb3.jpg
-
[] Log in using the credentials below.
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] Click Confirm if the correct email address is listed.
!IMAGEteyx280d.jpg
-
[] Click in the Promo code box and type
@lab.CloudCredential(244).PromoCode
, then click the Claim Promo Code button.!IMAGEe1l35ko2.jpg
[!NOTE] It may take up to 5 minutes to process the redemption.
-
[] While waiting for this to process, continue to the next exercise.
In this task, we will create new Azure AD users and assign licenses via PowerShell. In a procduction evironment this would be done using Azure AD Connect or a similar tool to maintain a single source of authority, but for lab purposes we are doing it via script to reduce setup time.
-
[] Log into @lab.VirtualMachine(Scanner01).SelectLink using the password [email protected](Scanner01).Password+++
-
[] On the desktop, right-click on AADConfig.ps1 and click Run with PowerShell.
!IMAGEAADConfig
[!NOTE] If prompted to change the execution policy, type y and Enter.
-
[] When prompted for the Tenant name, click in the text box and enter
@lab.CloudCredential(139).TenantName
. -
[] When prompted, provide the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
[!KNOWLEDGE] We are running the PowerShell code below to create the accounts and groups in AAD and assign licenses for EMS E5 and Office E5. This script is also available at https://aka.ms/labscripts as AADConfig.ps1.
Azure AD User and Group Configuration
$tenantfqdn = "@lab.CloudCredential(139).TenantName" $tenant = $tenantfqdn.Split('.')[0]
Build Licensing SKUs
$office = $tenant+":ENTERPRISEPREMIUM" $ems = $tenant+":EMSPREMIUM"
Connect to MSOLService for licensing Operations
Connect-MSOLService -Credential $cred
Remove existing licenses to ensure enough licenses exist for our users
$LicensedUsers = Get-MsolUser -All | where {$ .isLicensed -eq $true} $LicensedUsers | foreach {Set-MsolUserLicense -UserPrincipalName $.UserPrincipalName -RemoveLicenses $office, $ems}Connect to Azure AD using stored credentials to create users
Connect-AzureAD -Credential $cred
Import Users from local csv file
$users = Import-csv C:\users.csv
foreach ($user in $users){
Store UPN created from csv and tenant
$upn = $user.username+"@"+$tenantfqdn
Create password profile preventing automatic password change and storing password from csv
$PasswordProfile = New-Object -TypeName Microsoft.Open.AzureAD.Model.PasswordProfile $PasswordProfile.ForceChangePasswordNextLogin = $false $PasswordProfile.Password = $user.password
Create new Azure AD user
New-AzureADUser -AccountEnabled $True -DisplayName $user.displayname -PasswordProfile $PasswordProfile -MailNickName $user.username -UserPrincipalName $upn }
MCAS user and group creation
$upn = "mcasAdminUS@"+$tenantfqdn New-AzureADUser -AccountEnabled $True -DisplayName "MCAS US admin" -PasswordProfile $PasswordProfile -MailNickName "mcasadminUS" -UserPrincipalName $upn New-AzureADGroup -DisplayName "US employees" -MailNickName "USemployees" -SecurityEnabled $true -MailEnabled $false $groupId = Get-AzureADGroup -SearchString "usemployees" $userId = Get-AzureADUser -SearchString "mcasadminus" Add-AzureADGroupMember -RefObjectId $userId.ObjectId -ObjectId $groupId.ObjectId
Start-Sleep -s 10 foreach ($user in $users){
Store UPN created from csv and tenant
$upn = $user.username+"@"+$tenantfqdn
Assign Office and EMS licenses to users
Set-MsolUser -UserPrincipalName $upn -UsageLocation US Set-MsolUserLicense -UserPrincipalName $upn -AddLicenses $office, $ems }
Assign Office and EMS licenses to Admin user
$upn = "admin@"+$tenantfqdn Set-MsolUser -UserPrincipalName $upn -UsageLocation US Set-MsolUserLicense -UserPrincipalName $upn -AddLicenses $office, $ems
[!NOTE] The PowerShell window will automatically close once users have been created and licenses have been assigned
-
[] Return to @lab.VirtualMachine(Client01).SelectLink and log in using the password [email protected](Client01).Password+++.
-
[] Scroll to the bottom of the page and click Next.
!IMAGEihrjazqi.jpg
[!NOTE] You can keep the pre-populated information.
-
[] Check the box to agree to the terms and click Sign up.
!IMAGEk2a97g8e.jpg
[!NOTE] It may take a few minutes to process the request. Continue to the next section.
In this task, we will join 3 systems to the Azure AD tenant to provide SSO capabilities in Office.
-
[] Log into @lab.VirtualMachine(Client01).SelectLink using the password [email protected](Client01).Password+++.
-
[] Right-click on the start menu and click Run.
-
[] In the Run dialog, type
ms-settings:workplace
and click OK.!IMAGEmssettings.png
-
[] In the Access Work or School settings menu, click on + Connect and enter the credentials below to workplace join the client.
adamj@@lab.CloudCredential(139).TenantName
pass@word1
-
[] Click Done.
-
[] Log into @lab.VirtualMachine(Client02).SelectLink using the password [email protected](Client01).Password+++.
-
[] Right-click on the start menu and click Run.
-
[] In the Run dialog, type
ms-settings:workplace
and click OK.^IMAGEOpen Screenshot
-
[] In the Access Work or School settings menu, click on + Connect and enter the credentials below to workplace join the client.
alicea@@lab.CloudCredential(139).TenantName
pass@word1
-
[] Click Done.
-
[] Log into @lab.VirtualMachine(Client03).SelectLink using the password [email protected](Client01).Password+++.
-
[] Right-click on the start menu and click Run.
-
[] In the Run dialog, type
ms-settings:workplace
and click OK.^IMAGEOpen Screenshot
-
[] In the Access Work or School settings menu, click on + Connect and enter the credentials below to workplace join the client.
evang@@lab.CloudCredential(139).TenantName
pass@word1
-
[] Click Done.
There are a few prerequisites that need to be set up to complete all the sections in this lab. This Exercise will walk you through the items below.
To be able to complete the different parts of the Cloud App Security labs, the following configuration steps are required.
- Enabling File Monitoring
- Create a Developer Box Account
- Connect Office 365 and Box to Cloud App Security
- Enabling Azure Information Protection integration
-
[] On @lab.VirtualMachine(Client01).SelectLink log in with the password [email protected](Client01).Password+++.
-
[] In the InPrivate window, open a new tab and browse to
https://portal.cloudappsecurity.com
and click on the Gear and then Settings.[!NOTE] If necessary, log in using the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
!IMAGESettings
-
[] Under the Information Protection section click on Files and verify that the Enable file monitoring checkbox is checked. If it is not, check the box and click on the "Save button.
!IMAGEEnable files
-
[] Next, open a new tab in your browser and navigate to
https://developer.box.com
and click on Get Started.!IMAGEBoxdev
-
[] Enter the values from the table below, check the box to solve the captcha, and click Submit.
Full Name MOD Admin
Email Address @lab.CloudCredential(139).UserName
^IMAGEOpen Screenshot
-
[] In a new tab, browse to
https://outlook.office365.com/OWA
. -
[] If prompted, choose a time zone and click Save.
-
[] In the MOD Admin inbox, click on Other mail, search for the Box confirmation email and click the Verify Email. link in the email from Box.
^IMAGEOpen Screenshot
-
[] In the new window that opens, enter the password to use with Box. We'll use
@lab.CloudCredential(139).password
in each of the password boxes. Click the Update button to save your password. -
[] You can now close the Box and Office 365 mailbox tabs.
-
[] Click on the + button again, and this time click on Box.
!IMAGE2
-
[] In the Instance name box, type
Box API Demo
, and click Connect Box.^IMAGEOpen Screenshot
-
[] In the Connect Box dialog, click follow this link.
!IMAGE4
-
[] Log into Box using the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] Click on the Authorize button.
-
[] Click on Grant access to Box
^IMAGEOpen Screenshot
-
[] Close the Connect Box dialog and click on Box API Demo to expand.
[!NOTE] If you do not see Box API Demo listed, refresh the page.
-
[] Click on the Test now button.
^IMAGEOpen Screenshot
[!KNOWLEDGE] Once the connection is succesful - it will say Connected.
!IMAGE8
-
[] Close the dialog and you should be able to see Box API Demo as a Connected app in the list.
^IMAGEOpen Screenshot
[!NOTE] If testing is taking a long time, open a new tab to
https://portal.cloudappsecurity.com
and continue with the next section.
To prepare the Information Protection lab, we have to enable the integration between Cloud App Security and Azure Information Protection as explained in the Cloud App Security documentation. Enabling the integration between the two solutions is as easy as selecting one single checkBox.
-
[] Click on the Gear icon and then Settings.
!IMAGESettings
-
[] Go down in the settings to the Azure Information Protection section and check the Automatically scan new files checkBox and click on the "Save button. !IMAGEEnable AIP
[!NOTE]: It can take up to 1h for Cloud App Security to sync the Azure Information classifications.
-
[] Login into @lab.VirtualMachine(ContosoDC).SelectLink using the password [email protected](ContosoDC).Password+++
-
[] Open Internet Explorer and browse to
https://portal.atp.azure.com
and login with the following credentials.@lab.CloudCredential(139).UserName
@lab.CloudCredential(139).Password
-
[] Click Create.
-
[] Click Provide a username and password to connect to your Active Directory forest.
-
[] On the Directory Services page enter the following and click Save:
Username | aatpservice |
Password | Password123!@# |
Domain | contoso.azure |
-
[] Scroll up and click the Download Sensor Setup link.
-
[] Click Download to download the Sensor installer package.
-
[] Copy the Access key, this will be needed during the installation of the Sensor.
-
[] Extract the installation files from the Zip file and run Azure ATP sensor setup.exe.
[!NOTE] Do not run the installer from within the Zip file, you need to extract the files before running the installer.
-
[] Click Run in the Open File Security Warning page.
-
[] Select the installation language of choice and click Next.
-
[] Click Next on the Sensor deployment type page.
-
[] Paste the Access key copied from above and click Install.
-
[] Click Finish to complete the installation.
- [] In the Azure ATP console click on the deployed Sensor (ContosoDC) and toggle the Domain synchronizer candidate switch to On and click Save.
===
The lab environment setup is now complete. The next section will cover Azure Information Protection (Roadmap discussion then Hands On Lab). If you decide to close out of the Lab during the roadmap discussion, please ensure that you Save the lab using the menu in the upper right corner of the browser.
!IMAGESave
===
Estimated time to complete this lab
60-120 minutes*
After completing this lab, you should be able to (depending on the exercises you choose):
- Discover sensitive data using the Azure Information Protection scanner
- Configure Azure Information Protection labels
- Configure Azure Information Protection policies
- Classify and protect content with Azure Information Protection in Office applications
- Bulk Protect documents using the AIP client Windows integration
- Enable and Publish labels and policies in the Security and Compliance Center
- Classify and Protect sensitive data discovered by the AIP Scanner
- Monitor Usage, User Activity, and Data Risk using the Azure Log Analytics AIP dashboards
- Configure Exchange Online Mail Flow Rules to protect content and enhance AIP usability
Before working on this lab, you must have:
- Familiarity using Windows 10
- Familiarity with PowerShell
- Familiarity with Office 365 applications
This lab is designed to be completed on either a native Windows 10 machine or a VM with the following characteristics:
- Windows 10 Enterprise
- Office 365 ProPlus
- Azure Information Protection client (1.45.32.0)
Microsoft 365 E5 Tenant credentials will be provided during the event. If you want to run through this lab after the event, you may use a tenant created through https://demos.microsoft.com or your own Microsoft 365 Tenant.
===
In order to collect log data from Azure Information Protection clients and services, you must first configure the log analytics workspace.
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Open a new InPrivate tab and browse to
https://aka.ms/AIPConsole
.[!NOTE] If necessary, log in using the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] In the Azure Information Protection blade, under Manage, click Configure analytics (preview).
-
[] Next, click on + Create new workspace.
!IMAGEqu68gqfd.jpg
[!ALERT] The reason we recommend creating a new workspace here is that, by default, only the creator and subscription administrators have access to an Azure Log Analytics workspace.
The data contained in this workspace will contain details about the location and contents of files containing sensitive information.
Restricting access to this workspace only to trusted administrators with a need to know is highly recommended.
-
[] Configure the Log analytics workspace using the values in the table below and click OK.
Log Analytics Workspace Type a globally unique Workspace Name (random characters usually works) Resource Group AIP-RG
Location Choose a location near the event Pricing tier Per GB [!HINT] The Log Analytics Workspace name must be unique across all of Azure. The name is not relevant for this lab, so feel free to use random characters.
-
[] Next, back in the Configure analytics (preview) blade, check the boxes next to the workspace and next to Enable Content Matches and click OK.
!IMAGE1547437013585
[!KNOWLEDGE] Checking the box next to Enable Content Matches allows the actual matched content to be stored in the Azure Log Analytics workspace. This could include many types of sensitive information such as SSN, Credit Card Numbers, and Banking Information. This option is typically used during testing of automatic conditions and not widely used in production settings due to the sensitive nature of the collected data. If this is used in a production setting, extreme caution should be taken with securing access to this workspace.
-
[] Click Yes, in the confirmation dialog.
!IMAGEzgvmm4el.jpg
===
Azure Information Protection (AIP) is a cloud-based solution that can help organizations to protect sensitive information by classifying and (optionally) encrypting documents and emails on Windows, Mac, and Mobile devices. This is done using an organization defined classification taxonomy made up of labels and sub-labels. These labels may be applied manually by users, or automatically by administrators via defined rules and conditions.
The phases of AIP are shown in the graphic below.
!IMAGEPhases.png
In this lab, we will give you options for addressing each of these phases using various features of AIP.
The AIP Scanner Discovery exercise, will guide you through performing Discovery using the AIP scanner. We recommend that everyone complete this exercise first as this step is important to help show the current state of sensitive data in on-premises repositories. This enables you to make data based risk decisions that can help drive appropriate levels of urgency around the rest of your AIP deployment. 🕙 10-15 min
The Base Configuration exercise, contains information on configuring and testing Global and Scoped Policy and Labels. This will also include demonstrating Recommended and Automatic labeling via the AIP client in Office 365 on Windows 10. This is the longest exercise in the lab as it requires configuration of policy and the use of multiple clients. We recommend this exercise if you have minimal experience with AIP. 🕙 30-45 min
The Bulk Classification exercise, shows how to manually classify, label, and protect content using the Windows integration features of the AIP client. 🕙 5 min
The Security and Compliance Center exercise, will help you understand how to Enable and Publish labels in the Security and Compliance Center so they can be used with Mac, Mobile, ISVs (like Adobe PDF), and other unified clients. We will demonstrate this functionality using the Adobe PDF reader during the AIP Scanner CLP exercise. 🕙 5-10 min
The AIP Scanner Classification, Labeling, and Protection exercise, will show how to use the AIP scanner in Enforce mode to take advantage of features like Automatic Conditions to help you Classify, Label, and Protect the discovered information easily. This exercise has a dependancy on completion of the AIP Scanner Dicovery exercise. 🕙 5-10 min
In the AIP Analytics Dashboards exercise, we will show how to Monitor AIP Usage, User Activity, and Data Risk using the new Azure Log Analytics dashboards built into the AIP Azure Portal. 🕙 5 min
In the Exchange IRM exercise, we will use Exchange PowerShell to create a Mail Flow Rule to prevent sensitive information from leaving your network in the clear. We will also create a mail flow rule that prevents internal protected messages from accidentally being sent to external recipients who will be unable to open the content. 🕙 10-15 min
Click on one of the options below to begin. At the end of each section, there will be a summary and links to the other sections so you may continue from that point.
- AIP Scanner Discovery
- Base Configuration
- Bulk Classification
- Security and Compliance Center
- AIP Scanner CLP
- AIP Analytics Dashboards
- Exchange IRM
===
Even before configuring an AIP classification taxonomy, customers can scan and identify files containing sensitive information based on the built-in sensitive information types included in the Microsoft Classification Engine.
!IMAGEahwj80dw.jpg
Often, this can help drive an appropriate level of urgency and attention to the risk customers face if they delay rolling out AIP classification and protection.
In this exercise, we will configure an AIP scanner profile in the Azure portal and install the AIP scanner. Initially, we will run the scanner against repositories in discovery mode. Later in this lab (after configuring labels and conditions), we will revisit the scanner to perform automated classification, labeling, and protection of sensitive documents. This Exercise will walk you through the items below.
The new AIP scanner preview client (1.45.32.0) and future GA releases will use the Azure portal central management user interface. You are now able to manage multiple scanners without the need to sign in to the Windows computers running the scanner, set whether the scanner runs in Discovery or Enforcement mode, configure which sensitive information types are discovered and set repository related settings, like file types scanner, default label etc. Configuration from the Azure portal helps your deployments be more centralized, manageable, and scalable.
!IMAGEScannerUI
To make the admin’s life easier we created a repository default that can be set one time on the profile level and can be reused for all added repositories. You can still adjust settings for each repository in case you have a repository that requires some special treatment.
The AIP scanner operational UI helps you run your operations remotely using a few simple clicks. Now you can:
- Monitor the status of all scanner nodes in the organization in a single place
- Get scanner version and scanning statistics
- Initiate on-demand incremental scans or run full rescans without having to sign in to the computers running the scanners
!IMAGEScannerUI2
In this task, we will configure the repository default and add a new profile with the repositories we want to scan.
-
[] On @lab.VirtualMachine(Client01).SelectLink, in the Azure Information Protection blade, under Scanner, click Profiles (Preview).
!IMAGEScannerProfiles
[!NOTE] If the Azure portal is not already open, navigate to
https://aka.ms/ScannerProfiles
and log in with the credentials below.@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] In the Scanner Profiles blade, click the + Add button.
-
[] In the Add a new profile blade, enter
East US
for the Proflie name.[!Note] The default Schedule is set to Manual, and Info types to be discovered is set to All.
-
[] Under Policy Enforcement, set the Enforce switch to Off.
-
[] Note the various additional settings, but do not modify them. Click Save to complete initial configuration.
[!KNOWLEDGE] For additional information on the options available for the AIP scanner profile, see the documentation at https://aka.ms/ProfileConfiguration
-
[] Once the save is complete, click on Configure repositories.
!IMAGEConfigure Repository
-
[] In the Repositories blade, click the + Add button.
-
[] In the Repository blade, under Path, type
\\Scanner01\documents
. -
[] Under Policy enforcement, make the modifications shown in the table below.
Policy Value Default label Custom Confidential \ All Employees Default owner Custom adamj@@lab.CloudCredential(139).TenantName
!IMAGERepo
[!NOTE] These Policy enforcement settings will set a custom default label of Confidential \ All Employees for all files that do not match a policy in this repository.
It will also set the default owner for all files protected by the Scanner to
adamj@@lab.CloudCredential(139).TenantName
. This can be used to assign the Rights Management Owner of all protected files for a repository to a specific user rather than the AIP scanner service account. For instance, if an executive has a shared folder on a server, this can be used to allow that executive to be the rights management owner of all of the files contained in their folder. -
[] Click Save.
-
[] In the Repositories blade, click the + Add button.
-
[] In the Repository blade, under Path, type
C:\PII
. -
[] Under Policy enforcement, make the modifications shown in the table below.
Policy Value Label files based on content Off Default label Custom Highly Confidential \ All Employees Relabel files On !IMAGERepo2
[!KNOWLEDGE] These Policy enforcement settings will cause all files in the repository to have the same label (Highly Confidential \ All Employees). Additionally, if a file with a different label is added to this repository, the scanner will relabel the label to Highly Confidential \ All Employees.
-
[] Click Save.
-
[] In the Repositories blade, click the + Add button.
-
[] In the Repository blade, under Path, type
http://Scanner01/documents
. -
[] Leave all policies at Profile default, and click Save.
[!NOTE] We have now configured all three supported AIP Scanner repository types (CIFS File Share, Local Directory, and on-premises SharePoint Document Library). Note that scanning local folders on the AIP scanner server is not recommended in a production setting as it could affect performance of the scanner service. This is included to demonstrate the capabilities of the scanner profile.
In this task we will use a script to install the AIP scanner service and create the Azure AD Authentication Token necessary for authentication.
The first step in configuring the AIP Scanner is to install the service and connect the database. This is done with the Install-AIPScanner cmdlet that is provided by the AIP Client software. The AIPScanner service account has been pre-staged in Active Directory for convenience.
-
[] Switch to @lab.VirtualMachine(Scanner01).SelectLink and log in using the Credentials below.
+++AIPScanner+++
+++Somepass1+++
-
[] Open an Administrative PowerShell Window and type
C:\Scripts\InstallScannerPreview.ps1
and press Enter. -
[] When prompted, enter the Global Admin credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] In the popup box, click OK to accept the default Profile value East US.
[!NOTE] This script installs the AIP scanner Service using the local domain user account (Contoso\AIPScanner) provisioned for the AIP Scanner. SQL Server is installed locally and the default instance will be used. The script will prompt for Tenant Global Admin credentials, the AIP scanner Profile name, and finally the AIP Scanner cloud account. In a production environment, this will likely be the synced on-prem account, but for this demo we created a cloud only account during AAD Configuration earlier in the lab.
This script only works if logged on locally to the server as the AIP scanner Service Account, and the service account is a local administrator. Please see the scripts at https://aka.ms/ScannerBlog for aadditional instructions.
[!KNOWLEDGE] This script will run the code below. This script is available online as Install-ScannerPreview.ps1 at https://aka.ms/labscripts
Add-Type -AssemblyName Microsoft.VisualBasic
$daU = "contoso\AIPScanner" $daP = "Somepass1" | ConvertTo-SecureString -AsPlainText -Force $dacred = New-Object System.Management.Automation.PSCredential -ArgumentList $daU, $daP
$gacred = get-credential -Message "Enter Global Admin Credentials"
Connect-AzureAD -Credential $gacred
$SQL = "Scanner01"
$ScProfile = [Microsoft.VisualBasic.Interaction]::InputBox('Enter the name of your configured AIP Scanner Profile', 'AIP Scanner Profile', "East US")
Install-AIPScanner -ServiceUserCredentials $dacred -SqlServerInstance $SQL -Profile $ScProfile
$Date = Get-Date -UFormat %m%d%H%M $DisplayName = "AIPOBO" + $Date $CKI = "AIPClient" + $Date
New-AzureADApplication -DisplayName $DisplayName -ReplyUrls http://localhost $WebApp = Get-AzureADApplication -Filter "DisplayName eq $DisplayName" New-AzureADServicePrincipal -AppId $WebApp.AppId $WebAppKey = New-Guid $Date = Get-Date New-AzureADApplicationPasswordCredential -ObjectId $WebApp.ObjectID -startDate $Date -endDate $Date.AddYears(1) -Value $WebAppKey.Guid -CustomKeyIdentifier $CKI
$AIPServicePrincipal = Get-AzureADServicePrincipal -All $true | Where-Object { $_.DisplayName -eq $DisplayName } $AIPPermissions = $AIPServicePrincipal | Select-Object -expand Oauth2Permissions $Scope = New-Object -TypeName "Microsoft.Open.AzureAD.Model.ResourceAccess" -ArgumentList $AIPPermissions.Id, "Scope" $Access = New-Object -TypeName "Microsoft.Open.AzureAD.Model.RequiredResourceAccess" $Access.ResourceAppId = $WebApp.AppId $Access.ResourceAccess = $Scope
New-AzureADApplication -DisplayName $CKI -ReplyURLs http://localhost -RequiredResourceAccess $Access -PublicClient $true $NativeApp = Get-AzureADApplication -Filter "DisplayName eq $CKI" New-AzureADServicePrincipal -AppId $NativeApp.AppId
Set-AIPAuthentication -WebAppID $WebApp.AppId -WebAppKey $WebAppKey.Guid -NativeAppID $NativeApp.AppId
Restart-Service AIPScanner Start-AIPScan
-
[] When prompted, enter the AIP Scanner cloud credentials below:
AIPScanner@@lab.CloudCredential(139).TenantName
Somepass1
-
[] In the Permissions requested window, click Accept.
!IMAGEnucv27wb.jpg
[!NOTE] If you get any errors, copy the command from C:\scripts\Set-AIPAuthentication.txt and run it in the Admin PowerShell prompt. Next run the commands below to start the discovery scan
Restart-Service AIPScanner
Start-AIPScan
[!NOTE] An AIP scanner Discovery scan will start directly after aquiring the application access token.
[!ALERT] If you see a Visual Studio Just-In-Time Debugger dialog with a .NET exception, press OK in the dialog. This is due to SharePoint startup in the VM environment.
===
In this exercise, we installed the AIP scanner and performed a discovery scan against an on premises CIFS repository and SharePoint document library. Although this was a very limited demonstration of the capabilities of the AIP scanner for discovery, it helps to show how quickly you can configure this tool and get actionable information which can be used to make data driven decisions about your security posture. Choose one of the exercises below or click the Next button to continue sequentially.
- Base Configuration
- Bulk Classification
- AIP Scanner CLP
- Security and Compliance Center
- AIP Analytics Dashboards
- Exchange IRM
===
This exercise demonstrates using the Azure Information Protection blade in the Azure portal to configure policies and sub-labels. We will create a new sub-label and configure protection and then modify an existing sub-label. We will also create a label that will be scoped to a specific group.
Next, we will configure AIP Global Policy to use the General sub-label as default, and finally, we will configure a scoped policy to use the new scoped label by default for Word, Excel, and PowerPoint while still using General as default for Outlook. This Exercise will walk you through the items below.
- Creating, Configuring, and Modifying Sub-Labels
- Configuring Global Policy
- Creating a Scoped Label and Policy
- Configuring Advanced Policy Settings
- Defining Recommended and Automatic Conditions
In this task, we will configure a label protected for internal audiences that can be used to help secure sensitive data within your company. By limiting the audience of a specific label to only internal employees, you can dramatically reduce the risk of unintentional disclosure of sensitive data and help reduce the risk of successful data exfiltration by bad actors.
However, there are times when external collaboration is required, so we will configure a label to match the name and functionality of the Do Not Forward button in Outlook. This will allow users to more securely share sensitive information outside the company to any recipient. By using the name Do Not Forward, the functionality will also be familiar to what previous users of AD RMS or Azure RMS may have used in the past.
-
[] On @lab.VirtualMachine(Client01).SelectLink, log in with the password [email protected](Client01).Password+++.
-
[] In the Azure Information Protection blade, under Classifications in the left pane, click on Labels to load the Azure Information Protection – Labels blade.
^IMAGEOpen Screenshot
-
[] In the Azure Information Protection – Labels blade, right-click on Confidential and click Add a sub-label.
^IMAGEOpen Screenshot
-
[] In the Sub-label blade, type
Contoso Internal
for the Label display name and for Description enter text similar toConfidential data that requires protection, which allows Contoso Internal employees full permissions. Data owners can track and revoke content.
^IMAGEOpen Screenshot
-
[] Then, under Set permissions for documents and emails containing this label, click Protect, and under Protection, click on Azure (cloud key).
^IMAGEOpen Screenshot
-
[] In the Protection blade, click + Add Permissions.
^IMAGEOpen Screenshot
-
[] In the Add permissions blade, click on + Add contoso – All members and click OK.
^IMAGEOpen Screenshot
-
[] In the Protection blade, click OK.
^IMAGEOpen Screenshot
-
[] In the Sub-label blade, scroll down to the Set visual marking (such as header or footer) section and under Documents with this label have a header, click On.
Use the values in the table below to configure the Header.
Setting Value Header text Contoso Internal
Header font size 24
Header color Purple Header alignment Center [!NOTE] These are sample values to demonstrate marking possibilities and NOT a best practice.
^IMAGEOpen Screenshot
-
[] To complete creation of the new sub-label, click the Save button and then click OK in the Save settings dialog.
^IMAGEOpen Screenshot
-
[] In the Azure Information Protection - Labels blade, expand Confidential (if necessary) and then click on Recipients Only.
^IMAGEOpen Screenshot
-
[] In the Label: Recipients Only blade, change the Label display name from Recipients Only to
Do Not Forward
.^IMAGEOpen Screenshot
-
[] Next, in the Set permissions for documents and emails containing this label section, under Protection, click Azure (cloud key): User defined.
^IMAGEOpen Screenshot
-
[] In the Protection blade, under Set user-defined permissions (Preview), verify that only the Box next to In Outlook apply Do Not Forward is checked, then click OK.
^IMAGEOpen Screenshot
[!knowledge] Although there is no action added during this step, it is included to show that this label will only display in Outlook and not in Word, Excel, PowerPoint or File Explorer.
-
[] Click Save in the Label: Recipients Only blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] Click the X in the upper right corner of the blade to close.
^IMAGEOpen Screenshot
In this task, we will assign the new sub-label to the Global policy and configure several global policy settings that will increase Azure Information Protection adoption among your users and reduce ambiguity in the user interface.
-
[] In the Azure Information Protection blade, under Classifications on the left, click Policies.
-
[] Click the Global policy.
^IMAGEOpen Screenshot
-
[] In the Policy: Global blade, wait for the labels to load.
[!knowledge] The policies should look like the image below. If they show as loading, refresh the full browser on this page and go back into the Global policy and they should load.
!IMAGElabels.png
-
[] Below the labels, click Add or remove labels.
-
[] In the Policy: Add or remove labels blade, ensure that the Boxes next to all labels including the new Contoso Internal label are checked and click OK.
-
[] In the Policy: Global blade, under the Configure settings to display and apply on Information Protection end users section, configure the policy to match the settings shown in the table and image below.
Setting Value Select the default label General All documents and emails must have a label… On Users must provide justification to set a lower… On For email messages with attachments, apply a label… Automatic Display the Information Protection Bar in Office apps On Add the Do Not Forward button to the Outlook ribbon Off !IMAGEOpen Screenshot
-
[] Click Save, then OK to complete configuration of the Global policy.
^IMAGEOpen Screenshot
-
[] Click the X in the upper right corner to close the Policy: Global blade.
^IMAGEOpen Screenshot
Now that you have learned how to work with global labels and policies, we will create a new scoped label and policy for the Legal team at Contoso.
-
[] Under Classifications on the left, click Labels.
^IMAGEOpen Screenshot
-
[] In the Azure Information Protection – Labels blade, right-click on Highly-Confidential and click Add a sub-label.
^IMAGEOpen Screenshot
-
[] In the Sub-label blade, enter
Legal Only
for the Label display name and for Description enterData is classified and protected. Legal department staff can edit, forward and unprotect.
.^IMAGEOpen Screenshot
-
[] Then, under Set permissions for documents and emails containing this label, click Protect and under Protection, click Azure (cloud key).
^IMAGEOpen Screenshot
-
[] In the Protection blade, under Protection settings, click the + Add permissions link.
!IMAGEozzumi7l.jpg
-
[] In the Add permissions blade, click + Browse directory.
^IMAGEOpen Screenshot
-
[] In the AAD Users and Groups blade, wait for the names to load, then check the Boxes next to Adam Jones and Alice Anderson, and click the Select button.
^IMAGEOpen Screenshot
[!Note] In a production environment, you will typically use a synced or Azure AD Group rather than choosing individuals.
-
[] In the Add permissions blade, click OK.
^IMAGEOpen Screenshot
-
[] In the Protection blade, under Allow offline access, reduce the Number of days the content is available without an Internet connection value to
3
and press OK .[!Knowledge] This value determines how many days a user will have offline access from the time a document is opened, and an initial Use License is acquired. While this provides convenience for users, it is recommended that this value be set appropriately based on the sensitivity of the content.
^IMAGEOpen Screenshot
-
[] Click Save in the Sub-label blade and OK to the Save settings prompt to complete the creation of the Legal Only sub-label.
^IMAGEOpen Screenshot
-
[] In the Azure Information Protection blade, under Classifications on the left, click Policies then click the +Add a new policy link.
^IMAGEOpen Screenshot
-
[] In the Policy blade, for Policy name, type
No Default Label Scoped Policy
and click on Select which users or groups get this policy. Groups must be email-enabled.!IMAGE1sjw3mc7.jpg
-
[] In the AAD Users and Groups blade, click on Users/Groups.
-
[] Then in the second AAD Users and Groups blade, wait for the names to load and check the Boxes next to AIPScanner, Adam Jones, and Alice Anderson.
[!NOTE] The AIPScanner account is added here to prevent all scanned documents from being labeled with a default label.
-
[] Click the Select button.
-
[] Finally, click OK.
^IMAGEOpen Screenshot
-
[] In the Policy blade, under the labels, click on Add or remove labels to add the scoped label.
!IMAGEb6e9nbui.jpg
-
[] In the Policy: Add or remove labels blade, check the Box next to Legal Only and click OK.
^IMAGEOpen Screenshot
-
[] In the Policy blade, under Configure settings to display and apply on Information Protection end users section, under Select the default label, select None as the default label for this scoped policy.
!IMAGE4mxceage.jpg
-
[] Click Save, then OK to complete creation of the No Default Label Scoped Policy.
^IMAGEOpen Screenshot
-
[] Click on the X in the upper right-hand corner to close the policy.
There are many advanced policy settings that are useful to tailor your Azure Information Protection deployment to the needs of your environment. In this task, we will cover one of the settings that is very complimentary when using scoped policies that have no default label or a protected default label. Because the No Default Label Scoped Policy we created in the previous task uses a protected default label, we will be adding an alternate default label for Outlook to provide a more palatable user experience for those users.
-
[] In the Azure Information Protection blade, under Classifications on the left, click on Labels and then click on the General label.
^IMAGEOpen Screenshot
-
[] In the Label: General blade, scroll to the bottom and copy the Label ID and close the blade using the X in the upper right-hand corner.
!IMAGE8fi1wr4d.jpg
-
[] In the AIP Portal, under Classifications on the left, click on Policies.
-
[] Right-click on the No Default Label Scoped Policy and click on Advanced settings.
^IMAGEOpen Screenshot
-
[] In the Advanced settings blade, in the textBox under VALUE, paste the Label ID for the General label you copied previously. In the textBox under NAME, type
OutlookDefaultLabel
, then click Save and close.[!ALERT] CAUTION: Please check to ensure that there are no spaces before or after the Label ID when pasting as this will cause the setting to not apply.
!IMAGEezt8sfs3.jpg
[!HINT] This and additional Advanced Policy Settings can be found at https://docs.microsoft.com/en-us/azure/information-protection/rms-client/client-admin-guide-customizations
One of the most powerful features of Azure Information Protection is the ability to guide your users in making sound decisions around safeguarding sensitive data. This can be achieved in many ways through user education or reactive events such as blocking emails containing sensitive data.
However, helping your users to properly classify and protect sensitive data at the time of creation is a more organic user experience that will achieve better results long term. In this task, we will define some basic recommended and automatic conditions that will trigger based on certain types of sensitive data.
-
[] Under Analytics on the left, click on Data discovery (Preview) to view the results of the discovery scan we performed previously.
!IMAGEDashboard.png
[!KNOWLEDGE] Notice that there are no labeled or protected files shown at this time. This uses the AIP P1 discovery functionality available with the AIP Scanner. Only the predefined Office 365 Sensitive Information Types are available with AIP P1 as Custom Sensitive Information Types require automatic conditions to be defined, which is an AIP P2 feature.
[!NOTE] Now that we know the sensitive information types that are most common in this environment, we can use that information to create Recommended conditions that will help guide user behavior when they encounter this type of data.
[!ALERT] If no data is shown, it may still be processing. Continue with the lab and come back to see the results later.
-
[] Under Classifications on the left, click Labels then expand Confidential, and click on Contoso Internal.
^IMAGEOpen Screenshot
-
[] In the Label: Contoso Internal blade, scroll down to the Configure conditions for automatically applying this label section, and click on + Add a new condition.
!IMAGEcws1ptfd.jpg
-
[] In the Condition blade, in the Select information types search Box, type
EU
and check the Boxes next to the items shown below.!IMAGExaj5hupc.jpg
-
[] Next, before saving, replace EU in the search bar with
credit
and check the Box next to Credit Card Number.^IMAGEOpen Screenshot
-
[] Click Save in the Condition blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
[!Knowledge] By default the condition is set to Recommended and a policy tip is created with standardized text.
!IMAGEqdqjnhki.jpg
-
[] Click Save in the Label: Contoso Internal blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] Press the X in the upper right-hand corner to close the Label: Contoso Internal blade.
^IMAGEOpen Screenshot
-
[] Next, expand Highly Confidential and click on the All Employees sub-label.
^IMAGEOpen Screenshot
-
[] In the Label: All Employees blade, scroll down to the Configure conditions for automatically applying this label section, and click on + Add a new condition.
^IMAGEOpen Screenshot
-
[] In the Condition blade, select the Custom tab and enter
Password
for the Name and in the textBox below Match exact phrase or pattern, typepass@word1
.!IMAGEra7dnyg6.jpg
-
[] Click Save in the Condition blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] In the Labels: All Employees blade, in the Configure conditions for automatically applying this label section, click Automatic.
!IMAGE245lpjvk.jpg
[!HINT] The policy tip is automatically updated when you switch the condition to Automatic.
-
[] Click Save in the Label: All Employees blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] Press the X in the upper right-hand corner to close the Label: All Employees blade.
^IMAGEOpen Screenshot
===
Now that you have 3 test systems with users being affected by different policies configured, we can start testing these policies. This exercise will run through various scenarios to demonstrate the use of AIP global and scoped policies and show the functionality of recommended and automatic labeling. This Exercise will walk you through the items below.
- Testing User Defined Permissions
- Testing Global Policy
- Testing Scoped Policy
- Testing Recommended and Automatic Classification
[!ALERT] If you see a warning about a metered connection in Office, click Connect anyway to allow Office to connect. If you do not do this you will get errors when connecting to the AIP service. The VMs are set to metered to increase network speed.
One of the most common use cases for AIP is the ability to send emails using User Defined Permissions (Do Not Forward). In this task, we will send an email using the Do Not Forward label to test that functionality.
- [] On @lab.VirtualMachine(Client03).SelectLink, log in using the password [email protected](Client01).Password+++.
- [] Launch Microsoft Outlook, and click Accept and start Outlook.
- [] In the username Box, type
EvanG@@lab.cloudcredential(139).TenantName
and click Connect. - [] When prompted, type
pass@word1
and Sign in. - [] On the Use this account everywhere page, click Yes then click Done.
- [] Once configuration completes, uncheck the Box to Set up Outlook Mobile and click OK.
- [] Close Outlook and reopen to complete activation.
- [] Once Outlook opens, if you receive a metered connection warning, click Connect anyway.
- [] Click on the New email button.
!IMAGE6wan9me1.jpg
> [!KNOWLEDGE] Note that the **Sensitivity** is set to **General** by default.
>
> !IMAGE[5esnhwkw.jpg](\Media\5esnhwkw.jpg)
- [] Send an email to Adam Jones and Alice Anderson (
Adam Jones;Alice Anderson
). You may optionally add an external email address (preferably from a major social provider like gmail, yahoo, or outlook.com) to test the external recipient experience. For the Subject and Body typeTest Do Not Forward Email
.
^IMAGEOpen Screenshot
- [] In the Sensitivity Toolbar, click on Confidential and then the Do Not Forward sub-label and click Send.
!IMAGEw8j1w1lm.jpg
> [!Knowledge] If you receive the error message below, click on the Confidential \ Contoso Internal sub-label to force the download of your AIP identity certificates, then follow the steps above to change the label to Confidential \ Do Not Forward.
>
> !IMAGE[6v6duzbd.jpg](\Media\6v6duzbd.jpg)
- [] Switch over to @lab.VirtualMachine(Client01).SelectLink, log in using the password [email protected](Client01).Password+++ and open Outlook.
- [] Run through setup, this time using the credentials
adamj@@lab.CloudCredential(139).TenantName
andpass@word1
. - [] Review the email in Adam Jones’s Outlook. You will notice that the email is automatically shown in Outlook natively.
!IMAGE0xby56qt.jpg
> [!Hint] The **Do Not Forward** protection template will normally prevent the sharing of the screen and taking screenshots when protected documents or emails are loaded. However, since this screenshot was taken within a VM, the operating system was unaware of the protected content and could not prevent the capture.
>
>It is important to understand that although we put controls in place to reduce risk, if a user has view access to a document or email they can take a picture with their smartphone or even retype the message. That said, if the user is not authorized to read the message then it will not even render and we will demonstrate that next.
> [!KNOWLEDGE] If you elected to send a Do Not Forward message to an external email, you will have an experience similar to the images below. These captures are included to demonstrate the functionality for those that chose not to send an external message.
>
> !IMAGE[tzj04wi9.jpg](\Media\tzj04wi9.jpg)
>
> Here the user has received an email from Evan Green and they can click on the **Read the message** button.
>
>!IMAGE[wiefwcho.jpg](\Media\wiefwcho.jpg)
>
>Next, the user is given the option to either log in using the social identity provider (**Sign in with Google**, Yahoo, Microsoft Account), or to **sign in with a one-time passcode**.
>
>If they choose the social identity provider login, it should use the token previously cached by their browser and display the message directly.
>
>If they choose one-time passcode, they will receive an email like the one below with the one-time passcode.
>
>!IMAGE[m6voa9xi.jpg](\Media\m6voa9xi.jpg)
>
>They can then use this code to authenticate to the Office 365 Message Encryption portal.
>
>!IMAGE[8pllxint.jpg](\Media\8pllxint.jpg)
>
>After using either of these authentication methods, the user will see a portal experience like the one shown below.
>
>!IMAGE[3zi4dlk9.jpg](\Media\3zi4dlk9.jpg)
In this task, we will create a document and send an email to demonstrate the functionality defined in the Global Policy.
-
[] Switch to @lab.VirtualMachine(Client03).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] In Microsoft Outlook, click on the New email button.
^IMAGEOpen Screenshot
-
[] Send an email to Adam Jones, Alice Anderson, and yourself (
Adam Jones;Alice Anderson;@lab.User.Email
). For the Subject and Body typeTest Contoso Internal Email
.^IMAGEOpen Screenshot
-
[] In the Sensitivity Toolbar, click on Confidential and then Contoso Internal and click Send.
^IMAGEOpen Screenshot
-
[] On @lab.VirtualMachine(Client01).SelectLink, log in using the password [email protected](Client01).Password+++ and observe that you are able to open the email natively in the Outlook client. Also observe the header text that was defined in the label settings.
!IMAGEbxz190x2.jpg
-
[] In your email, note that you will be unable to open this message. This experience will vary depending on the client you use (the image below is from Outlook 2016 for Mac) but they should have similar messages after presenting credentials. Since this is not the best experience for the recipient, later in the lab we will configure Exchange Online Mail Flow Rules to prevent content classified with internal only labels from being sent to external users.
!IMAGE52hpmj51.jpg
In this task, we will create a document and send an email from one of the users in the Legal group to demonstrate the functionality defined in the first exercise. We will also show the behavior of the No Default Label policy on documents.
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] In Microsoft Outlook, click on the New email button.
^IMAGEOpen Screenshot
-
[] Send an email to Alice Anderson and Evan Green (
Alice Anderson;Evan Green
). For the Subject and Body typeTest Highly Confidential Legal Email
. -
[] In the Sensitivity Toolbar, click on Highly Confidential and the Legal Only sub-label, then click Send.
^IMAGEOpen Screenshot
-
[] Switch to @lab.VirtualMachine(Client02).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Run through setup, this time using the credentials
AliceA@@lab.CloudCredential(139).TenantName
andpass@word1
. -
[] Review the email in Alice Anderson’s Outlook. You should be able to open the message natively in the client as Alice.
!IMAGEqeqtd2yr.jpg
-
[] Switch to @lab.VirtualMachine(Client03).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Click on the email. You should be unable to open the message as Evan.
!IMAGE6y99u8cl.jpg
[!Knowledge] You may notice that the Office 365 Message Encryption wrapper message is displayed in the preview pane. It is important to note that the content of the email is not displayed here. The content of the message is contained within the encrypted message.rpmsg attachment and only authorized users will be able to decrypt this attachment.
!IMAGEw4npbt49.jpg
If an unauthorized recipient clicks on Read the message to go to the OME portal, they will be presented with the same wrapper message. Like the external recipient from the previous task, this is not an ideal experience. So, you may want to use a mail flow rule to manage scoped labels as well.
!IMAGEhtjesqwe.jpg
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Open Microsoft Word.
-
[] Create a new Blank document and type
This is a test document
and save the document.[!ALERT] When you click Save, you will be prompted to choose a classification. This is a result of having None set as the default label in the scoped policy while requiring all documents to be labeled. This is a useful for driving active classification decisions by specific groups within your organization. Notice that Outlook still has a default of General because of the Advanced setting we added to the scoped policy. This is recommended because user send many more emails each day than they create documents. Actively forcing users to classify each email would be an unpleasant user experience whereas they are typically more understanding of having to classify each document if they are in a sensitive department or role.
-
[] Choose a classification to save the document.
In this task, we will test the configured recommended and automatic conditions we defined in Exercise 1. Recommended conditions can be used to help organically train your users to classify sensitive data appropriately and provides a method for testing the accuracy of your dectections prior to switching to automatic classification. Automatic conditions should be used after thorough testing or with items you are certain need to be protected. Although the examples used here are fairly simple, in production these could be based on complex regex statements or only trigger when a specific quantity of sensitive data is present.
-
[] Switch to @lab.VirtualMachine(Client03).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Launch Microsoft Word.
-
[] In Microsoft Word, create a new Blank document and type
My AMEX card number is 344047014854133. The expiration date is 09/28, and the CVV is 4368
and save the document.[!NOTE] This card number is a fake number that was generated using the Credit Card Generator for Testing at https://developer.paypal.com/developer/creditCardGenerator/. The Microsoft Classification Engine uses the Luhn Algorithm to prevent false positives so when testing, please make sure to use valid numbers.
-
[] Notice that you are prompted with a recommendation to change the classification to Confidential \ Contoso Internal. Click on Change now to set the classification and protect the document.
!IMAGEurl9875r.jpg
[!Knowledge] Notice that, like the email in Task 2 of this exercise, the header value configured in the label is added to the document.
!IMAGEdcq31lz1.jpg
-
[] In Microsoft Word, create a new Blank document and type
my password is pass@word1
and save the document.[!HINT] Notice that the document is automatically classified and protected wioth the Highly Confidential \ All Employees label.
!IMAGE6vezzlnj.jpg
-
[] Next, in Microsoft Outlook, click on the New email button.
^IMAGEOpen Screenshot
-
[] Draft an email to Alice Anderson and Adam Jones (
Alice Anderson;Adam Jones
). For the Subject and Body typeTest Highly Confidential All Employees Automation
.^IMAGEOpen Screenshot
-
[] Attach the second document you created to the email.
!IMAGE823tzyfd.jpg
[!HINT] Notice that the email was automatically classified as Highly Confidential \ All Employees. This functionality is highly recommended because matching the email classification to attachments provides a much more cohesive user experience and helps to prevent inadvertent information disclosure in the body of sensitive emails.
!IMAGEyv0afeow.jpg
-
[] In the email, click Send.
===
In this exercise, we walked through the configuration of Global and Scoped policies and labels. We demonstrated the use of these and showed how recommended and automatic conditions function within the Office applications. Choose one of the exercises below or click the Next button to continue sequentially.
- AIP Scanner Discovery
- Bulk Classification
- AIP Scanner CLP
- Security and Compliance Center
- AIP Analytics Dashboards
- Exchange IRM
===
In this task, we will perform bulk classification using the built-in functionality of the AIP client. This can be useful for users that want to classify/protect many documents that exist in a central location or locations identified by scanner discovery. Because this is done manually, it is an AIP P1 feature.
-
[] On @lab.VirtualMachine(Scanner01).SelectLink, log in with the password [email protected](Scanner01).Password+++.
-
[] Browse to the C:\.
-
[] Right-click on the PII folder and select Classify and Protect.
!IMAGECandP.png
-
[] When prompted, click use another account and use the credentials below to authenticate:
AIPScanner@@lab.CloudCredential(139).TenantName
Somepass1
-
[] In the AIP client Classify and protect interface, select Highly Confidential\All Employees and press Apply.
!IMAGECandP2.png
[!Alert] If you are unable to see the Apply button due to screen resolution, click Alt+A and Enter to apply the label to the content.
[!NOTE] You may review the results in a text file by clicking show results, or simply close the window.
===
In this exercise, we performed bulk classification using the built-in functionality of the AIP client. This can be useful for users that want to classify/protect many documents that exist in a central location or locations identified by scanner discovery. Choose one of the exercises below or click the Next button to continue sequentially.
- AIP Scanner Discovery
- Base Configuration
- AIP Scanner CLP
- Security and Compliance Center
- AIP Analytics Dashboards
- Exchange IRM
===
In this exercise, we will migrate your AIP Labels and activate them in the Security and Compliance Center. This will allow you to see the labels in Microsoft Information Protection based clients such as Office 365 for Mac and Mobile Devices.
Although we will not be demonstrating these capabilities in this lab, you can use the tenant information provided to test on your own devices.
In this task, we will activate the labels from the Azure Portal for use in the Security and Compliance Center.
-
[] On @lab.VirtualMachine(Client01).SelectLink, in the AIP blade, click on Unified labeling (Preview).
!IMAGEUnified Labeling
-
[] Click Activate and Yes.
!IMAGEo0ahpimw.jpg
[!NOTE] You should see a message similar to the one below.
!IMAGESCCMigration.png
-
[] In a new tab, browse to
https://protection.office.com/
and click on Classifications and Labels to review the migrated labels.[!NOTE] Keep in mind that now the SCC Sensitivity Labels have been activated, so any modifications, additions, or deletions will be syncronised to Azure Information Protection in the Azure Portal. There are some functional differences between the two sections (DLP in SCC, HYOK & Custom Permissions in AIP), so please be aware of this when modifying policies to ensure a consistent experience on clients.
The previous step enabled the AIP labels for use in the Security and Compliance Center. However, this did not also recreate the policies from the AIP portal. In this step we will publish a Global policy like the one we used in the AIP portal for use with unified clients.
-
[] In the Security and Compliance Center, under Classifications, click on Label policies.
-
[] In the Label policies pane, click Publish labels.
^IMAGEOpen Screenshot
-
[] On the Choose labels to publish page, click the Choose labels to publish link.
^IMAGEOpen Screenshot
-
[] In the Choose labels pane, click the + Add button.
^IMAGEOpen Screenshot
-
[] Click the box next to Display name to select all labels, then click the Add button.
^IMAGEOpen Screenshot
-
[] Click the Done button.
^IMAGEOpen Screenshot
-
[] Back on the Choose labels to publish page, click the Next button.
^IMAGEOpen Screenshot
-
[] On the Publish to users and groups page, notice that All users are included by default. If you were creating a scoped policy, you would choose specific users or groups to publish to. Click Next.
^IMAGEOpen Screenshot
-
[] On the Policy settings page, select the General label from the drop-down next to Apply this label by default to documents and email.
-
[] Check the box next to Users must provide justification to remove a label or lower classification label and click the Next button.
!IMAGEOpen Screenshot
-
[] In the Name textbox, type
Global Policy
and for the Description typeThis is the default global policy for all users.
and click the Next button.^IMAGEOpen Screenshot
-
[] Finally, on the Review your settings page, click the Publish button.
!IMAGEOpen Screenshot
===
In this exercise, we enabled and published labels and policies in the Security and Compliance Center for use with clients based on the MIP SDK. We demonstrated this using Adobe PDF integration. Choose one of the exercises below or click the Next button to continue sequentially.
- AIP Scanner Discovery
- Base Configuration
- Bulk Classification
- AIP Scanner CLP
- AIP Analytics Dashboards
- Exchange IRM
===
The Azure Information Protection scanner allows you to classify and protect sensitive information stored in on-premises CIFS file shares and SharePoint sites.
In this exercise, you will configure conditions for automatic classification. After that, we will run the AIP Scanner in enforce mode to classify and protect the identified sensitive data. This Exercise will walk you through the items below.
[!Alert] This exercise requires completion of the previous AIP Scanner Discovery exercise. If you did not already complete that exercise, please do so prior to continuing.
The Azure Information Protection scanner requires Automatic conditions to enforce labeling and protection on discovered files in repositories. In this task, we will configure Automatic conditions for use with the scanner.
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] In the AIP blade, under Analytics on the left, click on Data discovery (Preview) to view the results of the discovery scan we performed previously.
!IMAGEDashboard.png
[!KNOWLEDGE] The screenshot above shows a discovery only scan. Notice that there are no labeled or protected files shown at this time. This uses the AIP P1 discovery functionality available with the AIP Scanner. Only the predefined Office 365 Sensitive Information Types are available with AIP P1 as Custom Sensitive Information Types require automatic conditions to be defined, which is an AIP P2 feature.
[!ALERT] It is very likely that the dashboard in your lab will not be populated at this point as you have just started the discovery scan. Continue with the lab and we will come back to see the results later.
-
[] Under Classifications on the left, click Labels then expand Confidential, and click on All Employees.
^IMAGEOpen Screenshot
-
[] In the Label: All Employees blade, scroll down to the Configure conditions for automatically applying this label section, and click on + Add a new condition.
!IMAGEcws1ptfd.jpg
-
[] In the Condition blade, in the Select information types search box, type
EU
and check the boxes next to the items shown below.!IMAGExaj5hupc.jpg
-
[] Click Save in the Condition blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] In the Labels: All Employees blade, in the Configure conditions for automatically applying this label section, click Automatic.
-
[] Click Save in the Label: All Employees blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] Press the X in the upper right-hand corner to close the Label: All Employees blade.
^IMAGEOpen Screenshot
-
[] Next, expand Highly Confidential and click on the All Employees sub-label.
^IMAGEOpen Screenshot
-
[] In the Label: All Employees blade, scroll down to the Configure conditions for automatically applying this label section, and click on + Add a new condition.
^IMAGEOpen Screenshot
-
[] In the Condition blade, in the search bar type
credit
and check the box next to Credit Card Number.^IMAGEOpen Screenshot
-
[] Click Save in the Condition blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] In the Labels: All Employees blade, in the Configure conditions for automatically applying this label section, click Automatic.
[!HINT] The policy tip is automatically updated when you switch the condition to Automatic.
!IMAGE245lpjvk.jpg
-
[] Click Save in the Label: All Employees blade and OK to the Save settings prompt.
^IMAGEOpen Screenshot
-
[] Press the X in the upper right-hand corner to close the Label: All Employees blade.
^IMAGEOpen Screenshot
In this task, we will modify the AIP scanner Profile to enforce the conditions we set up and have it run on all files using the Start-AIPScan command.
-
[] On @lab.VirtualMachine(Client01).SelectLink, return to Scanner > Profiles (Preview) in the Azure Portal.
[!NOTE] If needed, navigate to
https://aka.ms/ScannerProfiles
and log in with the credentials below:@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] Click on the East US profile.
-
[] In the East US profile, under Profile settings, configure the settings in the table below.
Policy Value Schedule Always Info types to be discovered Policy only Enforce On !IMAGEEnforce
[!NOTE] These settings will cause the scanner to run continuously on the repositories, make the scanner only look for the sensitive information types we defined in conditions, and Enforce the labeling and protection of files based on those conditions. Leave all other settings in their current state.
-
[] Click Save then click the X to close the blade.
-
[] Next, under Scanner, click on Nodes.
!IMAGENodes
-
[] Highlight the row containing Scanner01.Contoso.Azure, and click Scan now in the command list above.
!IMAGEScanNow
-
[] The previous command can take up to 5 minutes to run on the AIP scanner Server. Follow the commands below to accelerate the process.
-
[] Switch to @lab.VirtualMachine(Scanner01).SelectLink and log in with the password [email protected](Scanner01).Password+++.
-
[] In an Administrative PowerShell window, run the
Start-AIPScan
command.
-
Now that we have Classified and Protected documents using the scanner, we can review the documents to see their change in status.
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Navigate to
\\Scanner01.contoso.azure\documents
.If needed, use the credentials below:
Contoso\LabUser
Pa$$w0rd
^IMAGEOpen Screenshot
-
[] Open one of the Contoso Purchasing Permissions documents.
-
[] When prompted, provide the credentials below:
EvanG@@lab.CloudCredential(139).TenantName
pass@word1
-
[] Click Yes to allow the organization to manage the device.
[!NOTE] Observe that the document is classified as Highly Confidential \ All Employees.
!IMAGEs1okfpwu.jpg
-
[] Next, in the same documents folder, open one of the pdf files.
-
[] When prompted by Adobe, enter
EvanG@@lab.CloudCredential(139).TenantName
and press Next. -
[] Check the box to save credentials and press Yes.
-
[] Click Accept in the Permissions requested dialog.
[!NOTE] The PDF will now open and display the sensitivity across the top of the document.
!IMAGEPDF
[!Knowledge] The latest version of Acrobat Reader DC and the MIP Plugin have been installed on this system prior to the lab. Additionally, the sensitivity does not display by default in Adobe Acrobat Reader DC. You must make the modifications below to the registry to make this bar display.
In HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\MicrosoftAIP, create a new DWORD value of bShowDMB and set the Value to 1.
!IMAGE1547416250228
===
In this exercise, we configured the AIP scanner to use automatic conditions to classify, label, and protect documents in our defined repositories. Choose one of the exercises below or click the Next button to continue sequentially.
- AIP Scanner Discovery
- Base Configuration
- Bulk Classification
- Security and Compliance Center
- AIP Analytics Dashboards
- Exchange IRM
===
In this exercise, we will go to the AIP Analytics dashboards and observe them after completing all of the steps in the various exercises. These dashboards give actionable data to AIP admins and their management related to how users are classifying and protecting data and where sensitive data is located throughout the environment. Depending on which exercises you completed these may look different from the screenshots.
-
[] On @lab.VirtualMachine(Client01).SelectLink, open the browser that is logged into the Azure Portal.
-
[] In the AIP Portal, under Analytics, click on Usage report (Preview).
[!NOTE] Observe that there are now entries from the AIP scanner, File Explorer, Microsoft Outlook, and Microsoft Word based on our activities in this lab.
!IMAGEUsage.png
-
[] Next, under Analytics, click on Activity logs (preview).
[!NOTE] We can now see activity from various users and clients including the AIP Scanner and specific users.
!IMAGEactivity.png
You can also very quickly filter to just the Highly Confidential documents and identify the repositories and devices that contain this sensitive information.
!IMAGEactivity2.png
-
[] Finally, click on Data discovery (Preview).
[!NOTE] In the Data discovery dashboard, you can see a breakdown of how files are being protected and locations that have sensitive content.
!IMAGEDiscovery.png
If you click on one of the locations, you can drill down and see the content that has been protected on that specific device or repository.
!IMAGEdiscovery2.png
===
In this exercise, we reviewed the new AIP Azure Log Analytics dashboards. Choose one of the exercises below or click the Next button to continue sequentially.
- AIP Scanner Discovery
- Base Configuration
- Bulk Classification
- AIP Scanner CLP
- Security and Compliance Center
- Exchange IRM
===
Exchange Online can work in conjunction with Azure Information Protection to provide advanced capabilities for protecting sensitive data being sent over email. You can also manage the flow of classified content to ensure that it is not sent to unintended recipients. This Exercise will walk you through the items below.
In this task, we will configure a mail flow rule to detect sensitive information traversing the network in the clear and encrypt it using the Encrypt Only RMS Template. We will also create a mail flow rule to prevent messages classified as Confidential \ All Employees from being sent to external recipients.
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and open an Admin PowerShell Prompt.
-
[] In an Administrative PowerShell window, type
C:\Users\LabUser\Desktop\EncryptSensitiveMFR.ps1
and press Enter. -
[] When prompted, provide the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
[!NOTE] If prompted to remove a transport rule, hit Enter.
[!KNOWLEDGE] This mail flow rule can be used to encrypt sensitive data leaving via email. This can be customized to add additional sensitive data types. A breakdown of the command is listed below.
New-TransportRule
-Name "Encrypt external mails with sensitive content"
-SentToScope NotInOrganization
-ApplyRightsProtectionTemplate "Encrypt"
-MessageContainsDataClassifications @(@{Name="ABA Routing Number"; minCount="1"},@{Name="Credit Card Number"; minCount="1"},@{Name="Drug Enforcement Agency (DEA) Number"; minCount="1"},@{Name="International Classification of Diseases (ICD-10-CM)"; minCount="1"},@{Name="International Classification of Diseases (ICD-9-CM)"; minCount="1"},@{Name="U.S. / U.K. Passport Number"; minCount="1"},@{Name="U.S. Bank Account Number"; minCount="1"},@{Name="U.S. Individual Taxpayer Identification Number (ITIN)"; minCount="1"},@{Name="U.S. Social Security Number (SSN)"; minCount="1"})
[!KNOWLEDGE] The script runs the code below. This script is available online at https://aka.ms/labscripts
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection Import-PSSession $Session
If(Get-TransportRule Delete){Remove-TransportRule Delete}
New-TransportRule -Name "Encrypt external mails with sensitive content" -SentToScope NotInOrganization -ApplyRightsProtectionTemplate "Encrypt" -MessageContainsDataClassifications @(@{Name="ABA Routing Number"; minCount="1"},@{Name="Credit Card Number"; minCount="1"},@{Name="Drug Enforcement Agency (DEA) Number"; minCount="1"},@{Name="International Classification of Diseases (ICD-10-CM)"; minCount="1"},@{Name="International Classification of Diseases (ICD-9-CM)"; minCount="1"},@{Name="U.S. / U.K. Passport Number"; minCount="1"},@{Name="U.S. Bank Account Number"; minCount="1"},@{Name="U.S. Individual Taxpayer Identification Number (ITIN)"; minCount="1"},@{Name="U.S. Social Security Number (SSN)"; minCount="1"})
[!HINT] Next, we need to capture the Label ID for the Confidential \ All Employees label.
-
[] Switch to the Azure Portal and under Classifications click on Labels, then expand Confidential and click on All Employees.
!IMAGEw2w5c7xc.jpg
[!HINT] If you closed the azure portal, open an Edge InPrivate window and navigate to
https://portal.azure.com
. -
[] In the Label: All Employees blade, scroll down to the Label ID and copy the value.
!IMAGElypurcn5.jpg
[!ALERT] Make sure that there are no spaces before or after the Label ID as this will cause the mail flow rule to be ineffective.
-
[] Next, paste the copied value into a new txt file to use in the next step.
-
[] In an Administrative PowerShell window, type
C:\Users\LabUser\Desktop\BlockInternal.ps1
and press Enter. -
[] When prompted, provide the credentials below:
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
[!NOTE] If prompted to remove a transport rule, hit Enter.
[!KNOWLEDGE] This mail flow rule can be used to prevent internal only communications from being sent to an external audience.
New-TransportRule
-name "Block Confidential Contoso All Employees"
-SentToScope notinorganization
-HeaderContainsMessageHeader "msip_labels"
-HeaderContainsWord $labeltext
-RejectMessageReasonText “Contoso internal messages cannot be sent to external recipients.”
[!KNOWLEDGE] The script runs the code below. This script is available online at https://aka.ms/labscripts
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection Import-PSSession $Session
Add-Type -AssemblyName Microsoft.VisualBasic
$labelid = [Microsoft.VisualBasic.Interaction]::InputBox('Enter the LabelId for your All Employees Label', 'LabelId')
If(Get-TransportRule Delete){Remove-TransportRule Delete}
$labeltext = "MSIP_Label_"+$labelid+"_enabled=true" New-TransportRule -name "Block Confidential Contoso All Employees" -SentToScope notinorganization -HeaderContainsMessageHeader "msip_labels" -HeaderContainsWord $labeltext -RejectMessageReasonText “Contoso internal messages cannot be sent to external recipients.”
[!NOTE] In a production environment, customers would want to create a rule like this for each of their labels that they did not want going externally.
In this task, we will send emails to demonstrate the results of the Exchange Online mail flow rules we configured in the previous task. This will demonstrate some ways to protect your sensitive data and ensure a positive user experience with the product.
-
[] Switch to @lab.VirtualMachine(Client03).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Open an InPrivate browsing session and browse to
https://outlook.office365.com/owa/
. -
[] Log in using the credentials below.
EvanG@@lab.CloudCredential(139).TenantName
pass@word1
-
[] Send an email to Adam Jones, Alice Anderson, and yourself (
Adam Jones;Alice Anderson;@lab.User.Email
). For the Subject, typeTest Credit Card Email
and for the Body, typeMy AMEX card number is 344047014854133. The expiration date is 09/28, and the CVV is 4368
, then click Send. -
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Review the received email.
!IMAGEpidqfaa1.jpg
> [!Knowledge] Note that there is no encryption applied to the message. That is because we set up the rule to only apply to external recipients. If you were to leave that condition out of the mail flow rule, internal recipients would also receive an encrypted copy of the message. The image below shows the encrypted message that was received externally.
>
>!IMAGE[c5foyeji.jpg](\Media\c5foyeji.jpg)
>
>Below is another view of the same message received in Outlook Mobile on an iOS device.
>
>!IMAGE[599ljwfy.jpg](\Media\599ljwfy.jpg)
- [] Next, in Microsoft Outlook, click on the New email button.
^IMAGEOpen Screenshot
. [] Send an email to Evan Green, Alice Anderson, and yourself (Evan Green;Alice Anderson;@lab.User.Email
). For the Subject and Body type Another Test Contoso Internal Email
.
^IMAGEOpen Screenshot
- [] In the Sensitivity Toolbar, click on Confidential and then All Employees and click Send.
^IMAGEOpen Screenshot
- [] In about a minute, you should receive an Undeliverable message from Exchange with the users that the message did not reach and the message you defined in the previous task.
!IMAGEkgjvy7ul.jpg
> [!NOTE] This rule may take a few minutes to take effect, so if you do not get the undeliverable message, try again in a few minutes.
> [!HINT] There are many other use cases for Exchange Online mail flow rules but this should give you a quick view into what is possible and how easy it is to improve the security of your sensitive data through the use of Exchange Online mail flow rules and Azure Information Protection.
===
In this exercise, we created several Exchange Online Mail Flow Rules to protect sensitive data or improve user experience. Choose one of the exercises below or click the Next button to complete the Lab.
- AIP Scanner Discovery
- Base Configuration
- Bulk Classification
- AIP Scanner CLP
- Security and Compliance Center
- AIP Analytics Dashboards
===
Congratulations! You have completed the Azure Information Protection Hands on Lab.
===
Microsoft Cloud App Security is Microsoft CASB (Cloud Access Security Broker) and is a critical component of the Microsoft Cloud Security stack. It's a comprehensive solution that can help your organization as you move to take full advantage of the promise of cloud applications, but keeps you in control through improved visibility into activity. It also helps increase the protection of critical data across cloud applications (Microsoft and 3rd parties). With tools that help uncover shadow IT, assess risk, enforce policies, investigate activities, and stop threats, your organization can more safely move to the cloud while maintaining control of critical data.
The diagram below describe typical use cases for CASB's.
!IMAGEMCAS intro
This lab will guide you through some of Microsoft Cloud App Security (MCAS) capabilities and top use cases.
===
!IMAGELab environment
- Client01 is a Windows 10 VM that will be used to access Office 365 and Cloud app Security management consoles and configure the log collector running on LinuxVM, using Putty.
- LinuxVM is an Ubuntu 18.04 computer on which we install Docker to run the Cloud App Security Discovery log collector.
- Office 365 and Cloud App Security are test tenants for the labs.
- Office 365:
https://portal.office.com
- Cloud App Security:
https://portal.cloudappsecurity.com
- Security & Compliance Center:
https://protection.office.com
- Windows Defender ATP:
https://securitycenter.windows.com
===
[!ALERT] Before going to the different labs section, please be sure to complete the environment preparation.
The different Cloud App Security capabilities covered in the labs are:
- Cloud apps Discovery
- Conditional Access App Control with Office 365
- Automate alerts management with Microsoft Flow
- Threat Protection
- Information Protection
[!HINT] If you have questions or want to go further in your Cloud App Security journey, join our Tech community !
===
On average, more than 1,100 cloud applications are used by enterprises today, of which 61% are not sanctioned by IT. This results in duplicate capabilities, apps not meeting compliance standards or posing a security risk to the organization without any IT oversight. Discovery identifies current cloud apps, provides risk assessments and ongoing analytics and lifecycle management capabilities to control the use.
!IMAGEDiscovery
To provide this visibility on Shadow IT and cloud apps usage, Cloud App Security ingest and analyze network logs from proxy, firewall but also from Windows 10 clients within or ouside the corporate network, using the native integration with Windows Defender ATP.
!IMAGEDiscovery intro
Once the logs have been analyzed, Cloud App Security provides the visibility on Shadow IT and alerts you when it detects risky apps or anomalous usage.
!IMAGEDiscovery intro
[!NOTE] In this lab, we will simulate the upload of network logs from a SQUID proxy to analyze the apps used withing your company. We will not test the Windows Defender ATP integration at it can take up to 2h before the logs are parsed and the results are visible in the console.
===
In this lab, we will create a Discovery Snapshot report. Snapshot Reports is the manual method of uploading files into Cloud App Security. This process is a great and easy way to validate your logs format of have a quick look at the Cloud App Security Discovery capability. You can upload batches of 20 logs of 1 GB max at a time and they will parse into their own separate report. Any discovery policies you create will not apply to these types of reports.
To create snapshot reports:
-
[] Go to the Discover section and click on Create snapshot report.
^IMAGEOpen Screenshot
-
[] In the Add data source window, use the settings below (do not close the window yet) and click on View and verify....
Report Name Demo report
Description Data Source SQUID (Common) Anonymize private information Check the Box -
[] Click on View and Verify in the window and then click on the Download sample log button and save it to your desktop.
!IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Close that window.
-
[] Click on the Browse button and in the new window, select the log you downloaded and click Open.
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Now that the log has been selected, click on the Create button to create your report.
^IMAGEOpen Screenshot
-
[] Your report will then be processed. It will take a couple of minutes before it's marked as Ready.
!IMAGEReport processing
!IMAGEReport processing
-
[] Once your report is marked as ready, click on the text Ready. You will be redirected to your snapshot report where you can start exploring the discovered apps, users, IPs.
[!NOTE] If after a couple of minutes the status hasn't change, refresh the page in your browser.
^IMAGEOpen Screenshot
!IMAGEReport dashboard
!IMAGEReport dashboard -risk
After network logs have been parsed, Cloud App Security provides reports on the applications used within the company. In this section, we will explore how you can review the discovered apps and categorize them.
-
[] On the Dicovery dashboard, Cloud App Security shows a summary or the discovered apps, their risks and categories.
!IMAGEDashboard
-
[] Click on the Discovered apps tab
^IMAGEOpen Screenshot
-
[] You have here discovered apps and their risk scores, calculated using different criteria like General, Security, Compliance and Legal capabilities of the apps.
-
[] Click on Microsoft SharePoint Online. You can see the different capabilities of the app assessed by Cloud App Security.
[!KNOWLEDGE] The green checkmark indicate that this application is Sanctioned (approved and managed by the company IT).
^IMAGEOpen Screenshot
!IMAGESharePoint
-
[] Go back to the top of the page and search for apps with a Risk score between 0 and 3. Those apps are considered as High risk apps.
^IMAGEOpen Screenshot
-
[] On the left of the screen, you can see the different categories of those high risk apps. Click on Cloud storage to discover risky apps used within the company to store files.
^IMAGEOpen Screenshot
-
[] Review the apps capabilities. You can see for this example that the app do not provide auditing or SAML suppport for SSO capabilities which are probably required to be acceptable in your organization.
!IMAGEReview
-
[] As those apps are not compliant with your organization requirements, tag those apps as Unsanctioned (not managed and accepted by the company IT).
!IMAGEReview
[!KNOWLEDGE] This app classification can be automated using automatic logs upload and Discovery policies, which we do not cover in this lab but that are normally used in production environments.
-
[] Now that we have classified our apps, Cloud App Security can generate block scripts for configuring your network appliance to prevent your users to access those apps.
-
[] Click on this icon at the top of the page and select Generate block script.
!IMAGEReview
-
[] Select PA Series Firewall. This will generate a configuration script for Palo Alto firewalls with the apps domains or IPs to block.
^IMAGEOpen Screenshot
-
[] Open the generated script. You can see here the domains to block to prevent access to the apps marked as Unsantionned.
^IMAGEOpen Screenshot
In this task we will generate a detailed report that can be sent to your company executives. This report contains information about the discovered apps, their risks and usage and the recommended actions.
-
[] Click on this icon at the top of the page and select Generate Cloud Discovery executive reports. Cloud App Security will then create a PDF report that can be sent to your management.
!IMAGEReview
-
[] Open the generated report and review its content.
!IMAGEReview
!IMAGEReview
[!NOTE] Congratulations! You have completed the Cloud Discovery lab.
===
Conditional Access App Control utilizes a reverse proxy architecture and is uniquely integrated with Azure AD conditional access. Azure AD conditional access allows you to enforce access controls on your organization’s apps based on certain conditions. The conditions define who (for example a user, or group of users) and what (which cloud apps) and where (which locations and networks) a conditional access policy is applied to. After you’ve determined the conditions, you can route users to the Microsoft Cloud App Security where you can protect data with Conditional Access App Control by applying access and session controls.
Conditional Access App Control enables user app access and sessions to be monitored and controlled in real time based on access and session policies.
!IMAGEAAD portal
[!NOTE] App Control Access and Session policies give you the capability to the following:
- Block on download: You can block the download of sensitive documents. For example, on unmanaged devices.
- Protect on download: Instead of blocking the download of sensitive documents, you can require documents to be protected via encryption on download. This ensures that the document is protected, and user access is authenticated, if the data is downloaded to an untrusted device.
- Monitor low-trust user sessions: Risky users are monitored when they sign into apps and their actions are logged from within the session. You can investigate and analyze user behavior to understand where, and under what conditions, session policies should be applied in the future.
- Block access: You can completely block access to specific apps for users coming from unmanaged devices or from non-corporate networks.
- Create read-only mode: By monitoring and blocking custom in-app activities you can create a read-only mode to specific apps for specific users.
- Restrict user sessions from non-corporate networks: Users accessing a protected app from a location that is not part of your corporate network, are allowed restricted access and the download of sensitive materials is blocked or protected.
===
In this lab, we will implement Conditional Access App Control to prevent the download of sensitive documents stored in Office 365 when a user is connecting from a non-corporate device, like in a Bring Your Own Device scenario. The different steps of this lab are:
===
-
[] Go to the Azure portal
https://portal.azure.com
and open the Azure Active Directory blade.^IMAGEOpen Screenshot
-
[] Scroll down to Security and click on Conditional Access.
^IMAGEOpen Screenshot
-
[] Create a new conditional access policy with the following settings:
Name Assignments Apps Office365 AppControl All users Exchange, SharePoint -
Click on New Policy
^IMAGEOpen Screenshot
-
Name it
Office365 App Control
-
Under assignments: Click on All users and then Done
^IMAGEOpen Screenshot
-
Go to the next section: Cloud Apps: Select Apps and choose Office 365 Exchange Online and Office 365 SharePoint Online and Done
^IMAGEOpen Screenshot
-
Under Access Controls, click on Session and check off Use Conditional Access App Control.
-
In the dropdown menu, select Use custom policy
[!KNOWLEDGE] Monitor only or Block downloads helps you to perform the related configuration in Cloud App Security for easy onboarding. For this lab, we want you to perform the full configuration in Azure AD and Cloud App Security.
!IMAGE[Open Screenshot](\Media\cond-policy-4.png)
-
Click on ON in Enable the policy and click Create
^IMAGEOpen Screenshot
-
-
[] Sign out of the Azure Portal and close you browser.
-
[] Open your browser and go to the Exchange Web App
https://outlook.office.com
. -
[] Connect using :
@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
[!HINT] This is done to force the use of conditional access. Once a session has been redirected to Cloud App Security, you will be able to configure the application for App Control in Cloud App Security.
-
[] Go back to Cloud App Security
https://portal.cloudappsecurity.com
, click on the Gear icon and click on Conditional Access App Control.^IMAGEOpen Screenshot
[!HINT] You will see that Exchange Online appeared as an application and can now be used in policies.
!IMAGEOpen Screenshot
-
[] On the left hand side click on Control and then Policies.
!IMAGEOpen Screenshot
-
[] Click on Create Policy and click on Session policy.
^IMAGEOpen Screenshot
-
Name:
Proxy - Block sensitive files download
-
Under Session Control Type choose Control file download (with DLP)
^IMAGEOpen Screenshot
-
Add Activity Filters: Device Tag does not equal Compliant, Domain joined
-
App equals Office 365 Exchange Online
!IMAGESession policy
-
Content inspection check Enabled. Include files that match a preset expression anc choose US: PII: Social Security Number
!IMAGESession policy
-
Under Actions: go to Block
-
Click: Customize block message:
This file contains SSN information and cannot be downloaded on non-coporate devices.
-
Click: Verify that Create an alert for each matching event with the policy's severity is checked.
-
Click: Create
!IMAGESession policy
-
====
Now is time to test our configuration. We will here simulate the user experience while accessing company apps protected by Cloud App Security from an unmanaged device
-
[] Sign out, close you browser and open the Exchange Web App
https://outlook.office.com
. Use the following credentials to connect:@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
You should receive the following message, as you are redirected through Cloud App Security before accessing the application.
Click Continue to Exchange Online.
!IMAGEWarning
-
[] You are now directed to Exchange Online and your session is now passing through Cloud App Security.
[!HINT] By taking a look at the URL, you can verify that your session is actually being redirected to Cloud App Security.
!IMAGESession
-
[] To test our policy, perform the following:
- On @lab.VirtualMachine(Client01).SelectLink, unzip the file "Demo files.zip"
^IMAGEOpen Screenshot
-
Create a new mail and attach the Word document named Personal employees information.docx and the Excel spreadsheet named Workplace Innovation.xlsx from the folder you just extracted. Send the mail to your user,
@lab.CloudCredential(139).Username
!IMAGETest
-
[] Wait until you receive your email in the web mail.
-
Once the message is received, click on the attached document Personal employees information.docx. This will open the file preview. As you can see, the user can access the document using the Office Online app.
!IMAGEWarning
-
[] Try now to download the Personal employees information.docx document. As this file contains social security numbers, the download will be blocked and will trigger an alert in Cloud App Security.
!IMAGETest
!IMAGETest
-
[] Now let's try to download the Workplace Innovation.xlsx spreadsheet. As this file do not contain social security numbers, the download will be allowed.
!IMAGETest
!IMAGETest
!IMAGETest
!IMAGETest
[!KNOWLEDGE] We just demonstrated App Control capabilities to go further than just allow/block scenarios, based on session risks. This capability can open many scenarios, like BYOD access for example.
====
Now that we validated our configuration, let's go back to the admin view.
-
[] Go back to the Cloud App Security console
https://portal.cloudappsecurity.com
-
[] Go to the Alerts page.
^IMAGEOpen Screenshot
-
[] Click on the alert generated by our policy.
!IMAGEMenu
-
[] On the alert page, you can see that the admin user tried to download a file named Personal employees information.docx but Session control blocked the download. You also see the name of the policy that triggered the alert.
!IMAGEMenu
-
[] To go further in the investigation, click on View all user activity. This will redirect you to the Activity log where you can see all the user activities.
!IMAGEMenu
-
[] By looking at the user activities, you can follow her/his trace:
[!NOTE] Congratulations! You have completed the Conditional access App Control lab.
===
Cloud App Security integrates now with Microsoft Flow to provide custom alert automation and orchestration playbooks. By using the ecosystem of connectors available in Microsoft Flow, you can automate the triggering of playbooks when Cloud App Security generates alerts. For example, automatically create an issue in ticketing systems using ServiceNow connector or send an approval email to execute a custom governance action when an alert is triggered in Cloud App Security.
!IMAGEMenu
===
In this lab, we will automate alerts resolution for one of the policy we created in the previous exercise using Cloud App Security integration with Microsoft Flow.
- Create a Teams channel for your SOC team
- Generate a security token
- Create a Flow posting alerts in Microsoft Teams
- Configure a policy to use Flow
- Test the created Flow execution
- Verify the message in Teams
===
For this lab, we'll need to create a new Teams' team for our SOC where Cloud App Security alerts will be posted, using Microsoft Flow automation.
-
[] Open a new tab in your browser and go to
https://teams.microsoft.com
. If needed, connect using:@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
[] Click on the Teams icon and click on the Create team button.
^IMAGEOpen Screenshot
-
[] For the team's name use
SOC team
and keep Privacy at Private. Click then on Next.^IMAGEOpen Screenshot
-
[] On the Add members to SOC team page, click on the Skip button.
^IMAGEOpen Screenshot
-
[] You can now see that you just created a new team named SOC team with a channel named General
^IMAGEOpen Screenshot
-
[] Go to Cloud App Security
https://portal.cloudappsecurity.com
, click on the Gear icon and click on Security extensions.^IMAGEOpen Screenshot
-
[] In the API token tab, click on the + icon to generate a new token.
^IMAGEOpen Screenshot
[!KNOWLEDGE] This API token will be used by Flow to access Cloud App Security alerts. The same token can be used to access Cloud App Security programmatically using PowerShell, for example.
-
[] Name your token
Flow
and click on Generate.^IMAGEOpen Screenshot
[!WARNING] Do not close the window as we will need this token later !
-
[] Open a new tab in your browser and go to Cloud App Security
https://portal.cloudappsecurity.com
. Click on the Gear icon and click on Security extensions.^IMAGEOpen Screenshot
-
[] Click on the Playbooks tab and click on the + icon.
^IMAGEOpen Screenshot
-
[] You are redirected to Microsoft Flow page. Click on the Get started button.
^IMAGEOpen Screenshot
-
[] Click on the New button and select Create from blank.
^IMAGEOpen Screenshot
-
[] Click on the Create from blank.
^IMAGEOpen Screenshot
-
[] Search for the
cloud app security
connector and click on the When an alert is generated trigger.!IMAGEOpen Screenshot
-
[] As Connection name use
Lab
and use the API token generated in the previous task. It should be in the other open Cloud App Security tab as we didn't close it.!IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Flow has now access to Cloud App Security.
!IMAGEOpen Screenshot
-
[] Click on New step.
!IMAGEOpen Screenshot
-
[] In the search bar, type
teams
and click on Post message.!IMAGEOpen Screenshot
[!KNOWLEDGE] We are here using Flow to post messages containing information about the alert in Microsoft Teams. As Flow integrates with hundreds of 3rd party connectors, you could do the same with Exchange Online, Slack, ServiceNow, Jira and more !
-
[] Customize the message to post.
-
Team id: select Soc team
-
Channel id: select General
-
Message: select Description, IP address and Alert type.
!IMAGEOpen Screenshot
[!HINT] For this exercise, we are posting basic information in Teams but you could use the Azure AD connector to get more information about the user and then configuring it to use MFA for example.
-
-
[] Click on the Save button.
^IMAGEOpen Screenshot
-
[] Close the Flow page.
-
[] Go back to Cloud App Security
https://portal.cloudappsecurity.com
and go to the Policy section.^IMAGEOpen Screenshot
-
[] Open the Proxy - Block sensitive files download App Control policy that we created in the previous lab.
^IMAGEOpen Screenshot
-
[] Go to the bottom of the page, check the Send alerts to Flow checkbox, select the Flow you created and click Update.
^IMAGEOpen Screenshot
===
-
[] Sign out, close you browser and open the Exchange Web App
https://outlook.office.com
. Use the following credentials to connect:@lab.CloudCredential(139).Username
@lab.CloudCredential(139).Password
-
You should receive the following message, as you are redirected through Cloud App Security before accessing the application.
Click Continue to Exchange Online.
!IMAGEWarning
-
[] You are now directed to Exchange Online and your session is now passing through Cloud App Security.
!IMAGESession
-
Open the message we sent during the previous lab. Try to download the Personal employees information.docx document. As this file contains social security numbers, the download will be blocked and will trigger an alert in Cloud App Security. This alert should trigger our Flow and post a message in Teams.
!IMAGETest
!IMAGETest
-
-
[] Open a new tab in your browser and go to
https://teams.microsoft.com
. -
[] Go to the SOC team Team and open the General channel.
^IMAGEOpen Screenshot
-
[] In the General channel you can see now that the Flow posted a new message with the alert information you configured.
!IMAGEOpen Screenshot
[!NOTE] Congratulations! You have completed the Automate alerts management with Microsoft Flow lab where we discovered the power of the integration between Cloud App Security and Microsoft Flow.
===
Cloud App Security provides several threat detection policies using machine learning and user behavior analytics to detect suspicious activities across your different applications. Those policies are enabled by default and after an initial learning period, Cloud App Security will start alerting you when suspicious actions like activity from anonymous IP addresses, infrequent country, suspicious IP addresses, impossible travel, ransomware activity, suspicious inBox forwarding configuration or unusual file download are detected.
!IMAGEThret protection
===
[!ALERT] It can take up to 24 hours for the auditing in Office 365 to be configured, meaning that Cloud App Security will not receive the activities events. As many alerts relies on activities events to work, we will be using a pre-populated tenant for this portion of the lab so we can see alerts and have the ability to investigate them.
[!HINT] LOG OUT OF YOUR CURRENT CLOUD APP SECURITY TENANT AND LOG BACK IN USING THE CREDENTIALS BELOW.
Portal:
https://portal.cloudappsecurity.com
Username:
[email protected]
Password:
P@sswordEvent!1
Using the pre-populated environment, we will here simulate a security analyst investigation through the alerts below:
- Anonymous access:
- Impossible travel:
- Activity from infrequent country:
- Malware detection:
- Email exfiltration using suspicious inBox forwarding:
- Ransomware activity:
- Suspicious application consent:
===
This detection identifies that users were active from an IP address that has been identified as an anonymous proxy IP address. These proxies are used by people who want to hide their device’s IP address, and may be used for malicious intent. This detection uses a machine learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization.
As your authentication during the previous steps came from an anonymous IP address, it will be detected as suspicious by Cloud App Security.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGETOR alert
-
[] Click on the alert to open it. You see in this page more information on the alert and the related activities:
!IMAGETOR alert
-
[] Click on the activities to get more information on the specific activity, the user and the IP address:
-
[] You can go further in your investigation by looking at the related actions performed during that session by clicking on the “investigate in activity log" button:
!IMAGETOR alert
-
[] You will then be redirected to the activity log where you will be able to investigate on the actions performed during that session, like configuration changes or data exfiltration.
This detection identifies two user activities (is a single or multiple sessions) originating from geographically distant locations within a time period shorter than the time it would have taken the user to travel from the first location to the second, indicating that a different user is using the same credentials. This detection uses a machine learning algorithm that ignores obvious "false positives" contributing to the impossible travel condition, such as VPNs and locations regularly used by other users in the organization. The detection has an initial learning period of seven days during which it learns a new user’s activity pattern.
As the first and the second authentication came from distinct locations, Cloud App Security will detect that those time to travel between those two locations was to short and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEImpossible travel alert
-
[] The investigation steps are similar to the anonymous access but by looking at the IP address details and the ISP, you will be able to determine the possible risk:
!IMAGEImpossible travel alert
[!KNOWLEDGE] To reduce the amount of false positives, edit the impossible travel policy.
*You can adjust the policy by clicking on the alert and Resolve and click on Adjust policy.
Each anomaly detection policy can be independently scoped so that it applies only to the users and groups you want to include and exclude in the policy. For example, you can set the Activity from infrequent county detection to ignore a specific user who travels frequently.
To scope an anomaly detection policy:
- Click Control and then Policies, and set the Type filter to Anomaly detection policy.
- Click on the policy you want to scope.
- Under Scope, change the drop-down from the default setting of All users and groups, to Specific users and groups.
- Select Include to specify the users and groups for whom this policy will apply. Any user or group not selected here won't be considered a threat and won't generate an alert.
- Select Exclude to specify users for whom this policy won't apply. Any user selected here won't be considered a threat and won't generate an alert, even if they're members of groups selected under Include.
Sensitivity Slider:
You can set the sensitivity slider to determine the level of anomalous behavior needed before an alert is triggered. For example, if you set it to low, it will suppress Impossible Travel alerts from a user’s common locations, and if you set it to high, it will surface such alerts.
This detection considers past activity locations to determine new and infrequent locations. The anomaly detection engine stores information about previous locations used by users in the organization. An alert is triggered when an activity occurs from a location that wasn't recently or never visited by any user in the organization.
After an initial learning period, Cloud App Security will detect that this location was not used before by your user or other people within the organization and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEInfrequent country alert
-
[] The investigation steps are similar to the anonymous access but by looking at the IP address details and the ISP, you will be able to determine the possible risk. In this specific example, we see it’s coming from a TOR IP, so this authentication is suspicious:
!IMAGEInfrequent country alert
[!NOTE] Possible resolution options are available on the top bar for single click remediation.
!IMAGEInfrequent country alert
This detection identifies malicious files in your cloud storage, whether they're from your Microsoft apps or third-party apps. Microsoft Cloud App Security uses Microsoft's threat intelligence to recognize whether certain files are associated with known malware attacks and are potentially malicious. This built-in policy is disabled by default. Not every file is scanned, but heuristics are used to look for files that are potentially risky. After files are detected, you can then see a list of Infected files. Click on the malware file name in the file drawer to open a malware report that provides you with information about that type of malware the file is infected with.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEMalware detected alert
-
[] Click on the alert to open it. You see in this page more information on the alert and the related activities:
!IMAGEMalware detected alert
-
[] In the alert, you have more information on the file and its location, but also the malware that we identified:
!IMAGEMalware family
-
[] Click on the malware type link to have access to the Microsoft Threat Intelligence report regarding this file:
!IMAGEMalware family
-
[] Back in the alert, you can scroll down to the related activities. There, you will have more information on how the file was uploaded to OneDrive and possibly who downloaded it:
!IMAGEMalware family
This detection looks for suspicious email forwarding rules, for example, if a user created an inBox rule that forwards a copy of all emails to an external address.
As the rules redirects your user’s emails to a suspicious external address, Cloud App Security will detect this rule creation and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
-
[] Click on the alert to open it. You see in this page more information on the alert, like the destination address and the related activities:
-
[] With this information, you can now go back to the user to remove this rule but also investigate in Exchange trace logs which emails were sent to that destination address.
Cloud App Security extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity,Cloud App Security ensures holistic and robust protection. If Cloud App Security identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Cloud App Security detects ransomware, see Protecting your organization against ransomware.
As the rules redirects your user’s emails to a suspicious external address, Cloud App Security will detect this rule creation and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGERansomware alert
-
[] Click on the alert to open it. You see in this page more information on the impacted user, the number of encrypted files, the location of the files and the related activities:
!IMAGERansomware alert
-
[] Now that we’ve seen the alert, let’s go back to the policies:
!IMAGEPolicies
-
[] Search for the “Ransomware activity” policy and open it:
!IMAGERansomware policy
-
[] At the bottom of the policy, review the possible alerts and governance actions:
!IMAGERansomware policy
Many third-party productivity apps that might be installed by business users in your organization request permission to access user information and data and sign in on behalf of the user in other cloud apps, such as Office 365, G Suite and Salesforce. When users install these apps, they often click accept without closely reviewing the details in the prompt, including granting permissions to the app. This problem is compounded by the fact that IT may not have enough insight to weigh the security risk of an application against the productivity benefit that it provides. Because accepting third-party app permissions is a potential security risk to your organization, monitoring the app permissions your users grant gives you the necessary visibility and control to protect your users and your applications. The Microsoft Cloud App Security app permissions enable you to see which user-installed applications have access to Office 365 data, G Suite data and Salesforce data, what permissions the apps have, and which users granted these apps access to their Office 365, G Suite and Salesforce accounts.
Here is an example of such user consent:
!IMAGEApp consent
-
[] Without even creating policies, Cloud App Security shows you the applications that received permissions from your users:
!IMAGEApp permissions
-
[] From this page, you can easily see who granted permissions to those apps, if they are commonly used or their permissions level:
!IMAGEApp commodity
-
[] If you detect that an application should not be granted access to your environment, you can revoke the app access.
IMPORTANT: This operation will apply to the entire organization:
!IMAGEApp revoke
-
[] When investigating, you can search for apps rarely used in Office 365 which were granted high privileges and create a policy to be automatically alerted when such action is performed:
!IMAGEApp filter
-
[] After clicking on the “New policy from search” button, you can see that your filter will be used to create a new policy:
!IMAGEApp policy
-
[] Go down on that page and review the possible alerts and governance automatic actions that you can configure:
!IMAGEApp policy
-
[] To go further in your investigation, let’s now pivot to the “Activity log”:
!IMAGEActivity log
-
[] In the activity log, search for "Consent to application" activities:
!IMAGEActivity log
-
[] You will then be able to investigate on who, when and from where your users granted access to applications:
!IMAGEActivity log
Now that we reviewed some of the default detection capabilities of Cloud App Security, you should start creating your own policies. Cloud App Security provides by default many has policies templates to start creating your custom policies.
-
[] To create your policies, go to “Policies”:
!IMAGEPolicies
-
[] Click on “Create policy” and select the type of policy you want to create:
!IMAGEPolicies types
-
[] In the policy screen, choose the policy template you want to use:
!IMAGEPolicies templates
-
[] Apply the template:
!IMAGEApply template
-
[] Cloud App Security will then populate the different properties of the policy:
!IMAGEPolicy template filter
-
[] Review those properties and customize them if needed.
-
[] Explore other types of policies and review the proposed templates.
[!NOTE] Congratulations! You have completed the Threat protection lab.
===
In a perfect world, all your employees understand the importance of information protection and work within your policies. But in a real world, it's probable that a partner who works with accounting uploads a document to your Box repository with the wrong permissions, and a week later you realize that your enterprise's confidential information was leaked to your competition. Microsoft Cloud App Security helps you prevent this kind of disaster before it happens.
!IMAGEIP
===
File policies are a great tool for finding threats to your information protection policies, for instance finding places where users stored sensitive information, credit card numbers and third-party ICAP files in your cloud. With Cloud App Security, not only can you detect these unwanted files stored in your cloud that leave you vulnerable, but you can take im/mediate action to stop them in their tracks and lock down the files that pose a threat. Using Admin quarantine, you can protect your files in the cloud and remediate problems, as well as prevent future leaks from occurring.
In this lab, we are going to configure a file policy to apply an Azure Information Protection template on documents containing social security numbers. This method could be compared to the Azure Information Protection Scanner for documents that are stored on file servers.
-
[] In the Cloud App Security portal, go to Control and then click on Policies.
!IMAGEOpen Screenshot
-
[] Create a Policy click on File policy.
^IMAGEOpen Screenshot
-
[] Provide the following settings to that policy:
Policy Name Protect SSN documents in sensitive site
Files matching all of the following App equals Box Apply to All Files ^IMAGEOpen Screenshot
-
[] In the inspection method, select Data Classification Service.
^IMAGEOpen Screenshot
[!KNOWLEDGE] Microsoft Data Classification Service provides a unified information protection experience across Office 365, Azure Information Protection, and Microsoft Cloud App Security. [!KNOWLEDGE] [!KNOWLEDGE] The classification service allows you to extend your data classification efforts to the third-party cloud apps protected by Cloud App Security, using the decisions you already made across an even greater number of apps.
-
[] Click on Choose inspection type and then on sensitive information type.
^IMAGEOpen Screenshot
-
Search and select the all the information types matching
SSN
and click on Done.[!HINT] Be sure to select the checkboxes as clicking on the name do not select the information type.
!IMAGESSN type
-
[] Click on the Unmask the last 4 characters of a match and the Create an alert for each matching file checkboxes.
^IMAGEOpen Screenshot
[!KNOWLEDGE] In production scenarios, as you will probably have thousands of matches, you will not create alerts but use the policy matches approach instead.
-
[] In the Governance actions, click on Box and select Apply classification label. Select the Highly Confidental - All Employees label.
[!ALERT] If you are not able to select Azure Information Protection templates, verify that you configured the integration in the prerequisites section or that you waited the 1h for the classifications to sync. In addition log out of the Cloud App Security Portal and log back in and see and if you're able to apply the label.
!IMAGEgov
- [] Click Create to finish the policy creation.
In this lab, we are going to configure a file policy to quarantine sensitive PDF files that are shared externally, so an admin can review those files and validate if they could or not be shared externally. Admin quarantine can also be used to isolate files that should not have been uploaded to cloud storage apps.
-
[] In the Cloud App Security portal, go to Control and then click on Policies.
!IMAGEOpen Screenshot
-
[] Create a Polick and click on File policy that will determine which files should be placed in quarantine.
^IMAGEOpen Screenshot
-
[] Provide the following settings to that policy:
Policy name Files matching all of the following Quarantine sensitive pdf
Extension equals pdf and Access level equals Public, External ^IMAGEOpen Screenshot
-
[] Check the Create an alert for each matching file checkBox.
-
[] In Governance actions of the policy, select Put in admin quarantine for Box and click on the Create button.
!IMAGEUnmask
We are now going to test our files policies by performing the following actions.
-
[] On @lab.VirtualMachine(Client01).SelectLink, if not done yet, unzip the content of the Demo files.zip.
-
[] Go to the Box files
https://app.box.com/folder/0
-
[] Upload the unzipped files to the site.
^IMAGEOpen Screenshot
-
[] After upload is complete, share the PDF document named Protect with Microsoft Cloud App Security proxy.pdf
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Cloud App Security will now scan those documents and search for matches to your created policies.
[!HINT] The scan can take several minutes before completion.
-
[] To monitor the evolution of the scan, go back to Cloud App Security, select Investigate and open the Files page.
^IMAGEOpen Screenshot
-
[] You can search for the files you uploaded using different criteria, like file name, type, ... or just look at all the files discovered by Cloud App Security. When a policy match is discovered, you will notice it on this page by looking at the icones next to the file name. You will also have icons related to the applied Governance action (AIP label or Admin Quarantine in our lab).
^IMAGEOpen Screenshot
-
[] To open the details of the file, click on its name. You can see there the matched policies and the scan status of the files.
^IMAGEScan status
-
[] You can also view the related governance actions, like applying the Azure Information classification or moving the file to the quarantine folder, at the file level or in the Governance log.
!IMAGEGovernance log
-
[] As we configured Alerts in our lab, you can also review the related alerts in the Alerts page.
^IMAGEAlert
^IMAGEAlert
-
[] If you go back to Box, you will also notice that the quarantined files will be replaced by placeholders. The original file will be moved to the Quarantine.
[!KNOWLEDGE] For Box, the quarantine folder location and user message can't be customized. The folder location is the drive of the admin who connected Box to Cloud App Security. For SharePoint and OneDrive, the location and the message can be customized in Cloud App Security settings.
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] The other way to review the policy matches is to go back to the Policies page and look at the matches number.
!IMAGEMatches
[!NOTE] Congratulations! You have completed the Information Protection lab.
===
Congratulations! You have completed the Microsoft Cloud App Security Hands on Lab. To go further in your Cloud App Security journey, visit the following links:
-
Get started with a free trial: aka.ms/mcastrial
-
Learn more about Microsoft Cloud App Security: aka.ms/mcastech
-
Join the conversation on TechCommunity!: aka.ms/mcascommunity
-
Stay up to date and subscribe to our blog!: aka.ms/mcasblog
-
Visit our Website: aka.ms/mcas
===
The rest of the lab will be instructor led via PowerPoint.