Uploaded by Bharade R

Day 4 - Discover and Respond (1)

advertisement
Microsoft 365 Compliance Master Class
Day 4 – Discover & Respond
Leon Butler
June 17th 2020
Discover & Respond
eDiscovery
Private cloud
Remote
Structured
Platforms
Digital
transformation
Emails
Documents
Data is created, stored,
and shared everywhere
Corporate
Records
Vendors
SMS
Unstructured
SaaS
Public
Discovering data efficiently is top of
mind for many organizations
$10B
was spent on eDiscovery in 2018
57%
of corporate counsel plan to increase their total eDiscovery
spend next year
63%
expect their company to conduct more investigations over
the next three years
Poll:
“Which eDiscovery platforms do you and your customers use?”
Poll:
“Do I need another tool to query non-Office 365 content?”
eDiscovery in Microsoft 365
Quickly find what’s relevant and reduce risk with intelligent eDiscovery in Microsoft 365
Create a case
Create a case, add stakeholders and manage
case execution
Put holds on users and content
Identify relevant content locations and users and
place on hold
Search for content in place
Search by keyword, date range, users, labels and
more criteria to get a handle on relevant data
Electronic Discovery Reference Model (EDRM) workflow
Information
Protection and
Governance in
Microsoft 365
eDiscovery
in Microsoft 365
Processing
Preservation
Information
governance
Identification
Review
Production
Presentation
Collection
Analysis
VOLUME
RELEVANCE
Demo: Core eDiscovery
Poll:
“Who, in your experience, typically conducts data gathering for eDiscovery cases?”
Challenges to “collect and export”
Advanced eDiscovery design principles
Collect and discover data
where it is
Manage end-to-end
workflows in one solution
Find relevant data and
insights intelligently
Cost reduction
Lower cost per
custodian average
Review relevant Office 365 and
non-Office 365 content faster
Do more, in-place
eDiscovery in
Microsoft 365
Efficiency
Reduce
collection activities
Export matter-relevant
content
Security
Logging and auditing
from one place
Include data outside of Microsoft 365
hundreds
of other file types supported
Electronic Discovery Reference Model (EDRM) workflow
Information
Protection and
Governance in
Microsoft 365
Advanced eDiscovery in Microsoft 365
eDiscovery
in Microsoft 365
Processing
Preservation
Information
governance
Identification
Review
Production
Presentation
Collection
Analysis
VOLUME
RELEVANCE
Advanced eDiscovery supporting EDRM workflow
Identify data
Preserve data &
hold notices
Collect content that
might be relevant
Process data
Review data
Analyze data
Export data
Risk & cost
M365
Vendor 2
Vendor 3
Vendor 1
OR
All Microsoft
365
Vendor 4
Vendor 5
Vendor 4
Reduce cost per custodian
Microsoft’s legal team found 85% reduction in cost/custodian
100
Outsourcing
76
Cost/Custodian %
80
60
44
40
Core eDiscovery
20
4
7
11
27
81
48
30
17
Advanced eDiscovery
0
1
2
3
4
5
6
Years
7
8
9
10
Advanced eDiscovery for Microsoft 365
Custodian
management &
communications
Deep crawling
& indexing
Review & manage
case data
Analyze & cull
your data
intelligently with
ML
Custodian management and communications
Manage holds, data sources & notification workflows
Custodian management
and communications
Deep crawling and
indexing
Review and manage case
data
Analyze and cull your
data intelligently with ML
Manage custodians and legal holds
Add and remove custodians, and apply legal holds
Custodian notifications
Manage legally required workflows around notifications to
custodians and their acknowledgments
Custodian activity
Identify shared data that custodians had access to or were active
on and likely custodians based on criteria
22
Deep crawling and indexing
Search for and collect content from Office 365
Custodian management
and communications
Deep crawling and
indexing
Review and manage case
data
Analyze and cull your
data intelligently with ML
Pre-collection analytics
Scope content for collection, and tune queries to minimize
volumes
Deep processing
Deep processing (e.g. higher size limits, file types, …)
to extract and index text & metadata
Increased transparency
Static working sets, transparency (e.g. error reporting, item level
auditing, …) and additional controls (e.g. error remediation, …)
23
Review and manage case data
Manage static sets of documents that can be analyzed, queried, viewed, tagged and exported
Custodian management
and communications
Deep crawling and
indexing
Review and manage case
data
Analyze and cull your
data intelligently with ML
View content in review set
content is also displayed in several viewers – e.g. native, text,
annotate.
Conversation reconstruction
Teams chats are reconstructed and threaded for more context
Visualize data in dashboard
create custom widgets to make analyzing and reporting on your
review set intuitive
Load non-Office 365 data
Collect non-Office 365 data into a review set - supported files
also enabled for OCR, viewable in native view and annotate
viewer
24
Analyze and cull your data intelligently with ML
Quickly explore and analyze unstructured data to identify what’s relevant
Custodian management
and communications
Deep crawling and
indexing
Review and manage case
data
Analyze and cull your
data intelligently with ML
Near duplication
Use near duplicate detection to organize
Email threading
Reconstruct email conversations
ML based content classification
Use the system to identify potential high value content such as
attorney client privilege or offensive language
25
Advanced eDiscovery supporting EDRM workflow
Custodian Sources
Hold
Management
Search O365
Enhanced
Enhanced
Processing
Processing
(OCR,
(OCR,
PST,PST,
Media)
Media)
Rich meta-data and
full text search
Near dups
Export natives
Case
Management
Custodian activity
Hold Notifications
Collect
non-O365 data
Defensibility Reports/Tools
Native, text, and
Persistent chat
viewer
Threads
Export with
annotations
Auditing
In place hold
Collection into
document
documentworking
review sets
sets
Deep crawling & indexing
Document coding
and culling
Conceptual
clustering
Load file
generation
Security &
Permissions
Annotations and
Redactions
Predictive Coding
Data visualization
to support ECA
ML based
content-based
classification
Pre-collection
analytics
In Product Now
Tenant level
reporting
Poll:
“Can eDiscovery query encrypted content in Office 365?”
Current
Legacy
Multiple
environments
3rd party
Processing Tool
O365 Security & Compliance Center
Collect from
myriad sources
Import and
process data
Search O365 sources in place with deep
indexing, add to working set
3rd party Review tool
Import
Remediate exceptions:
Decrypt Crack
Passwords OCR
Run analytics
Batch & review
Redact & log
Produce
Overlay remediated
files
Collect and import non-O365 data
to working set
Remediate exceptions and overlay remediated
files in O365 case
Search, tag, analyze, review, redact in O365 case
with outside counsel collaboration
Export processed, redacted dataset
Search, report, iterate
Export
3rd party tool (as required)
Import
Batched
review
Redact/
log
Produce
Legacy
3rd party Legal
Hold Tool
Create case
Past
O365 Security &
Compliance Center
Create SCC Case
Current
3rd Party Legal
Hold Tool
O365 Security &
Compliance Center
Create case
PowerShell
Automation
M365 Compliance Portal
Create Advanced eDiscovery case
Create SCC Case
hold policy
Add appropriate
individuals
Issue hold notice
Generate hold
activity report
Create SCC case
hold policy
Add appropriate
individuals
Look up custodian
sources
Issue hold notice
Add sources to
case hold policy
Generate hold
activity report
Look up custodian
sources
Add sources to
case hold policy
Add custodians
Confirm policy
sync status
Report daily
activity
Issue hold notice and apply
hold policy
Demo: Advanced eDiscovery
Compliance boundaries for eDiscovery investigations
Compliance boundaries in Office 365
Contoso
LTD (Office
365 org)
Search permissions
filters control access
to agencies
Admin role
groups control
access to
eDiscovery cases
eDiscovery
Managers
Fourth
Coffee
(Agency)
Coho Winery
(Agency)
Investigators
eDiscovery
Managers
Investigators
DSAR solution spotlight
The challenge: “Give me everything you have on me!”
With less than seven days’ notice, we were tasked to review and categorize all
internal communications referencing a particular data subject.
The solution: O365 Advanced eDiscovery
2,611 parent-level items
After extraction, the 2,611 items expanded to a total of 9,202 individual
reviewable items
Review attorney can review 400 items per 8-hour day, so this would have taken
23 days for linear review
After threading and deduplication, there were 1,340 unique items to manage
Reduction of 89%
How did we do this?
• AED themes were used to
group similar documents
based on content.
• We had the system distill the
top 20 themes, so we could
review a sample of each
thematic category and provide
a simplified description of the
types of content represented.
• The export list spreadsheet
was the only review
organization tool necessary to
manage the actual review
work for the case.
Poll:
“Which of the following services are NOT discoverable in Office 365?”
In Review…
eDiscovery is in-place – built-in vs. bolt-on
No continuous transfers of data out of Office 365 to a third party
hosted eDiscovery service
Reduced risk
Data stays in-place, protected by Office 365’s stringent security
Reduced time to produce eDiscovery results
Data indexed in-place, no time spent collecting, exporting, and
transferring it to a third party
Intelligent
Integrated analytics reduce the challenges of sorting through data
quickly to find what is relevant
Reduced costs
Advanced eDiscovery reduces the data sent to review, reducing org
eDiscovery costs by 85%
Microsoft 365 eDiscovery features by plan
E-discovery
E3
E5/E5
Compliance/eDis
covery and Audit
SKU
In-Place Preservation
✓
✓
Custodian management
✓
Case Management
✓
✓
Custodian communication
✓
Search
✓
✓
Deep indexing
✓
Export
✓
✓
Review set
✓
RMS Decryption
✓
✓
Review, tag and annotate
✓
Native Export
✓
✓
Conversation reconstruction
✓
Non-Office 365 ingestion
✓
✓
Dashboard
✓
Advanced Processing
✓
Tenant level reports (Preview)
✓
Email Threading
✓
Smart tags (Preview)
✓
Near Duplicate Identification
✓
Themes
✓
Predictive Coding
✓
Processed Export with Load File
✓
E-discovery
E3
E5/E5
Compliance/eDis
covery and Audit
SKU
Audit
Enterprise-scale audit is essential
to modern organizations
60M
User activity searches per day against Microsoft 365
15B
Records processed per day
1500+
Unique event types
Audit in Microsoft 365: comprehensive and unified logs
Comprehensive coverage across
Microsoft 365 services
Consistent audit log search
experience
Seamless integration to power
investigations and compliance
obligations
Audit in Microsoft 365: Beyond compliance reporting
Comprehensive set of feature with unique intelligence across critical end points
CUSTOMER NEEDS
Enterprise-Level Identity
Need to know who
Protection
accessedand
what,
when &
Implement
manage
how across
services
cloud
identityM365
and access.
Audit and mitigate use of
cloud apps.
Control and Protect
Get visibility into changes
Information
to policies,
groups
&
Assess
and classify
customer
sensitive
information
data.
Implement
and
across
M365
manage information policies
and procedures.
Proactive Attack Detection
Need investigation
and Prevention
capability
around
breaches
Perform
security
assessment
and identified
threats
analysis,
migrate and
deploy
security solutions and
provide managed
security services.
Regulatory
Help organizations prepare
Compliance
forcustomers
audit evidence
Help
with and
compliance
reporting
increased
demands
of
regulators and legal
authorities in every
country in which
they operate.
Audit in the context of investigations
User
Documents
Folders
Devices
E.g. what did this
person do?
E.g. who read this
confidential document?
E.g. who had access to
this private folder?
E.g. What was accessed
on this device?
• Tell me all the users that had membership changes
• Which users had failed logins
• Which users had mailbox permissions changes
• What delegate activities did said user carry out on mailboxes
• What delegate activities happened on said mailbox
• Which users forwarded mails to external domains
Common
questions that
need answers
• What other searches did user do on SharePoint sites in the org
• What other search patterns or terms did user go after
• Tell me bulk download activities from given location
• All users that received emails with said high value attachments?
• All users that replied/ forwarded said high value emails
• Tell me who attempted bulk exfiltration
• How many times was a said email read, by whom and which clients
• Give me all logins from external IP and different clients
• Which users shared confidential documents internally/ externally
• Which users participated in said Teams meetings
• Which documents were bulk download to USB or file shares
• … etc.
Customer pain points
What prevents them from performing effective investigations?
• Search terms
Missing events
• Teams chat or call participation and sharing
• Mail reads
Manual Insights and
correlations
• Correlations of audit logs across users and content
• Correlations of activities across workloads
• Time to detect breach: ~200 days
Short lived signals
• Audit log retention: 90 days
• Typical investigations: 6 months to 1 year
Introducing Advanced Audit in Microsoft 365:
Power fast and effective forensic and investigations
High value events to power quicker
investigations
Processed insights to show context
and key patterns
Longer-term retention to meet
investigation and compliance
requirements
Near real-time access to data to
enable fast access to audit events
Advanced Audit in Microsoft 365:
High value events
High value events to power quicker
investigations
New high value events such as Mail
reads and Search teams
New events across key workloads
Public preview by end of year
Advanced Audit in Microsoft 365:
Processed insights
Processed insights to show context
and key patterns
Correlations and prebuilt queries
on top of logs
Ready answers to key questions
Public preview by end of year
Advanced Audit in Microsoft 365:
Longer-term retention
Longer-term retention to meet
investigation and compliance
requirements
Retention option up to 365 days
Ability to customize by events or users
Public preview ready at Ignite
Advanced Audit in Microsoft 365:
Near real-time access to data
Near real-time access to data to
enable fast access to audit events
Limits at tenant level with higher
bandwidth for advanced tenants
Dynamic bandwidth proportional to
size of org
Public preview ready at Ignite
Customer Story
High confidential
document leaked
Data officer identifies
documents of
interest
Iteratively searches
document audit logs
to identify access
and sharing patterns
Identifies Jane as
person of interest
Iteratively searches
user activity audit
logs to identify usage
pattern and potential
leak
Investigating user activity and content
Advanced Audit
Advanced eDiscovery
Power faster and more effective forensic and
compliance investigations
Reduce risk and cost with eDiscovery in
Microsoft 365
• Access to crucial events (activities)
• End-to-end solution built-in Microsoft 365
• Longer-term retention
• eDiscovery for collaboration workspaces (e.g. Teams
and Yammer)
• Increased bandwidth to management activity API
• Custodian management
77
Communications Compliance
Ensuring a safe work environment
Employees suspended after making inappropriate comments in an email
In June of 2019, two employees of a major finance institution were suspended for violating company policy for the
writing and forwarding of an email that harassed one of their co-workers.
Email identified, and two
employees suspended. One
for writing the email, and
another for forwarding it.
Sr. executive sends email to team
with an inappropriate, named
reference regarding one of their
colleagues.
Data spillage
Confidentiality
violations
IP theft
Fraud
Workplace
violence
Insider trading
Policy
violations
Leaks of sensitive
data
Conflicts of
interest
Data spillage
Workplace
harassment
Regulatory
Compliance
Violations
Corporate Policies
Employees must comply with ethical and other
corporate standards
ORGANIZATION NEEDS
Identifying violations across
company communications
Risk Management
Identify and manage legal and corporate risk
Regulatory Compliance
SEC, FINRA require communications oversight
Typical workflow and customers pain points
INCREASED
REGULATORY
ENFORCEMENT
INCREASING DATA
DIFFICULT TO FIND SUBJECT
MATTER EXPERTS TO REVIEW
RESULT
Violations slip
through
Intelligent customizable playbooks
Leverage machine learning to detect violations
across Teams, Exchange and 3rd party content
Flexible remediation workflows
Remediation workflows to quickly act on violations
Actionable insights
Interactive dashboard with policy violations, actions
and trends
Intelligent customizable playbooks
Leverage machine learning to intelligently
reduce false positives
Customizable pre-configured templates to
address common communications risks
Build your own machine learning model to
detect violations unique to your organization
Flexible remediation workflows
Conversation threading, keyword
highlighting, exact & near duplicates,
filters for efficient review
Built-in remediation workflows to quickly act
on violations
Historical user context on past violations and
remediation actions
Actionable insights
Proactive intelligent alerts on policy violations
requiring immediate attention
Interactive dashboard showing violations,
actions and trends by policy
Full audit of review activities and tracking of
policy implementation
CONFIGURE
Create & tune policies
• Playbooks
• Custom policy creation
Monitor
• Alerts
• Productivity reports
• Audit
INVESTIGATE
Identify violations
• Tag and comment
• Document review
• User history
REMEDIATE
Resolve violations
• Resolve
• Notify
• Escalate
• Compliance solution handoff
Human Resources
INFORMATION
TECH/SECURITY
Risk/Compliance
Legal
Corporate Policies
Comply with ethical and
other corporate standards
Risk Management
Identify and manage legal
and corporate risk
Regulatory Compliance
SEC, FINRA require
communications oversight
Demo: Communications Compliance
Thank You.
© Copyright Microsoft Corporation. All rights reserved.
Live Q&A
Download