Phishing Past Mail Protection Controls Using Azure Information Protection
Offered By: YouTube
Course Description
Overview
Explore phishing techniques that bypass mail protection controls using Azure Information Protection (AIP) in this 30-minute conference talk from Derbycon 2019. Learn about AIP's features, including windows, file sizes, types, licensing, costs, and tracking capabilities. Discover how to implement document classification, encryption, and revocation. Watch live demonstrations of sending and opening encrypted documents, utilizing tracking features, and uploading documents. Examine the tracking timeline and results. Compare AIP with competitors, and understand email-specific features like padlock integration and Rights Management Services (RMS) configuration.
Syllabus
Intro
Credentials
Bio
What is AIP
AIP windows
File size
File types
Licensing and costs
Tracking
Cost
Features
Detection
Transport Rule
Document Revocation
Demos
Demo
Classification
Sending an encrypted document
Opening an encrypted document
Tracking feature
Tracking demo
Tracking timeline
Uploading a document
Checking the results
Competitors
Email
Email padlock
Configure RMS
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube