SIMULATION - You need to create a policy that identifies content in Microsoft OneDrive that contains credit card numbers. To complete this task, sign in to the Microsoft 365 portal.
Suggested Answer:See explanation below.
You need to configure auto-labeling in 'simulation' mode. In the policy, you can select the 'Credit Card' sensitive info type. 1. In the Microsoft 365 compliance center, navigate to sensitivity labels: Solutions > Information protection 2. Select the Auto-labeling (preview) tab. 3. Select + Create policy. 4. For the page Choose info you want this label applied to: Select one of the templates, such as Financial or Privacy. You can refine your search by using the Show options for dropdown. Or, select Custom policy if the templates don't meet your requirements. Select Next. 5. For the page Name your auto-labeling policy: Provide a unique name, and optionally a description to help identify the automatically applied label, locations, and conditions that identify the content to label. 6. For the page Choose locations where you want to apply the label: Select OneDrive. Then select Next. 7. For the Define policy settings page: Keep the default of Find content that contains to define rules that identify content to label across all your selected locations. The rules use conditions that include sensitive information types and sharing options. For sensitive information types, you can select both built-in and custom sensitive information types. 8. Then select Next. 9. For the Set up rules to define what content is labeled page: Select + Create rule and then select Next. 10.On the Create rule page, name and define your rule, using sensitive information types and then select Save. 11.Click Next. 12.For the Choose a label to auto-apply page: Select + Choose a label, select a label from the Choose a sensitivity label pane, and then select Next. 13.For the Decide if you want to run policy simulation now or later page: Select Run policy in simulation mode if you're ready to run the auto-labeling policy now, in simulation mode. Otherwise, select Leave policy turned off. Select Next. 14.For the Summary page: Review the configuration of your auto-labeling policy and make any changes that needed, and complete the wizard. Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide
1.Security & Compliance
2.Dataloss Prevention -> Policy
3.Create Policy
4.Under Choose locations select -> Let me choose location- Select One Drive only
5.Under Find Content that contains -> Edit -> Add -> Sensitive info types -> Add -> Type Credit Card Number -> Click Add
6.Reduce instances to 1
7.Yes, turn it on right away -> Save
Hmm... the ask is to identify if credit card information is stored in OneDrive. Auto-labeling is used if you also want to set a sensitivity label of files that include this information. Correct answer would be to define a DLP policy for Credit card information in OneDrive since this will give you information if this excist.
Technically this answer is acceptable because the requirement in the question is that you create a policy.
However, you don't need a policy to achieve the stated goal of identifying credit card numbers in OneDrive content.
In Microsoft Purview:
Data Classification -> Content Explorer
Filter on the built-in sensitive information type for credit card number.
Filter for OneDrive location
This will give you counts of files that match.
A user that is assigned the following roles can drill into these to see details about the files (filename, location and even contents):
Content Explorer list viewer
Content Explorer Content Viewer
The question doesn't state what licenses are available. Note that the above is a premium feature of Purview.
https://learn.microsoft.com/en-us/microsoft-365/compliance/data-classification-content-explorer?source=recommendations&view=o365-worldwide
A DLP policy is the easiest (read: fastest) way to perform this.
You can technically do this with a Auto-Label Policy, I believe, but it's not as cut and dry with the specifics of dialing in just on OneDrive, and takes a lot longer to set up.
Shouldn't it be just data classification instead of DLP? There is nothing about protecting this data, just identify it. Credit card pattern is built-in in data classification types
You can technically do this, but it's a lot less straight-forward creating and publishing that label policy, and you can't restrict it specifically to OneDrive like you can with a DLP policy.
I also vote for DLP. With auto labeling you can choose certain user locations like this "https://contoso-my.sharepoint.com/personal/rsimone_contoso_onmicrosoft_com" to check for credit cards or stuff. https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange
First Point on article referenced by MBraga above:
"With a DLP policy, you can:
Identify sensitive information across many locations, such as Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams.
For example, you can identify any document containing a credit card number that's stored in any OneDrive for Business site, or you can monitor just the OneDrive sites of specific people."
MCAS is the most accurate solution for detecting such data on cloud storage apps
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.MS-500 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jaz600
Highly Voted 4 years, 7 months agoNalle_
2 years, 11 months agoAndersPsYnet
Highly Voted 5 years agoMBraga
5 years agoJonclark
Most Recent 2 years, 4 months agombecile
3 years, 5 months agoJakubK64
3 years, 11 months agoalialiba
3 years, 7 months agombecile
3 years, 5 months agoRockalm
4 years, 2 months agoloudlumi
4 years, 7 months agoGarrethk
4 years, 7 months agophopyi
4 years, 10 months agoMahmoudEldeep
4 years, 6 months ago