Discover and Protect Your Sensitive Data with Microsoft’s On Premises Scanner
Table of Contents
Introduction
In this tutorial, we will explore how to utilize Microsoft Purview Information Protection scanner to discover and protect sensitive data within your organization's on-premises repositories. This guide covers deployment preparation, configuration, scanning processes, monitoring, and ongoing management practices. By following these steps, you can ensure compliance and enhance data security effectively.
Step 1: Prepare for Deployment
Before deploying the Microsoft Purview Information Protection scanner, ensure you have a solid plan in place:
-
Assess Your Environment
- Identify the on-premises repositories that store sensitive data, such as file shares and databases.
- Determine data types that require protection, e.g., personally identifiable information (PII), payment card information (PCI), etc.
-
Install Required Components
- Ensure that you have the necessary licenses and access to Microsoft Purview.
- Download and install the Microsoft Purview Information Protection scanner on a dedicated server.
-
Configure Network and Permissions
- Verify network configurations to allow the scanner to access your data sources.
- Set permissions for the scanner to read data without altering it.
Step 2: Configure the Scanner
Proper configuration of the scanner is essential for effective data discovery:
-
Access Scanner Settings
- Open the Microsoft Purview portal.
- Navigate to the scanner configuration section.
-
Define Scanning Locations
- Specify the paths of the on-premises repositories you want to scan.
- Use UNC paths for file shares (e.g.,
\\YourServer\YourShare
).
-
Set Up Data Classification Rules
- Determine which types of sensitive data you want the scanner to identify.
- Create and apply classification policies based on regulatory requirements and business needs.
Step 3: Perform a Data Scan
Once configured, you can proceed to scan for sensitive data:
-
Initiate the Scan
- In the scanner dashboard, select the configured scanning locations.
- Choose the option to start a new scan.
-
Monitor Scan Progress
- Check the status of the scan in real-time via the dashboard.
- Look for any errors or warnings that may need addressing.
-
Review Scan Results
- After the scan completes, review the findings in the reports section.
- Identify areas with sensitive data and assess the level of risk.
Step 4: Monitor Status and View Reports
Regular monitoring is crucial to maintain data security:
-
Access Reports
- Navigate to the reporting section in the Microsoft Purview portal.
- Analyze the scan reports for insights into where sensitive data is located.
-
Set Up Alerts
- Configure alerts for significant findings or compliance issues.
- Ensure relevant stakeholders are notified of any critical risks.
Step 5: Ongoing Management and Best Practices
To maintain effective data protection, establish ongoing management practices:
-
Regular Scans
- Schedule periodic scans to ensure that new sensitive data is identified promptly.
- Adjust scanning configurations as your data landscape evolves.
-
Review and Update Policies
- Regularly evaluate and update data classification and protection policies.
- Stay informed of changes in compliance regulations that may affect your policies.
-
Engage Stakeholders
- Keep communication open with teams responsible for data management.
- Provide training and resources on data protection best practices.
Conclusion
By following these steps, you can effectively deploy and manage the Microsoft Purview Information Protection scanner within your organization. Regularly assess and update your data protection strategies to adapt to new challenges and ensure compliance with regulations. For further assistance, consider reaching out to experts in the field or exploring additional resources provided by Microsoft and Quorum Cyber.