The course is part of this learning path
In this course, you'll gain a basic understanding of what Information Barriers are and how to create them with Information Barrier Policies.
- Microsoft Purview Information Barriers
- Configuring Information Barrier Policies
- This course is intended for those who wish to learn about Information Barriers and Information Barrier Policies.
You should have a general familiarity with Microsoft 365.
Hello and welcome to Microsoft Purview Information Barriers. In this lesson, we’ll take a look at what information barriers are and why you use them.
Microsoft 365 facilitates collaboration among different groups and organizations. However, it also offers ways to restrict communication and collaboration among certain groups if needed. For example, you might need to restrict communication and collaboration between different groups within the organization in order to prevent a conflict of interest. You might also want to restrict communication and collaboration between specific people within the organization in order to protect certain internal information.
The tool that facilitates these restrictions is called Microsoft Purview Information Barriers. This tool works with Microsoft Teams, with SharePoint Online, and with OneDrive for Business. As a Compliance Administrator or Information Barriers Administrator, you can create policies that can allow or restrict communications between groups of users in Microsoft Teams.
A real-world example of where you could leverage Information barrier policies would be a scenario where you have people in the Finance department that are working on a confidential project. If you want to prevent them from communicating with, or sharing files with, certain groups within the organization, you could define Information barrier policies to enforce this restriction.
By leveraging such information barrier policies, organizations can not only avoid possible conflicts of interest, but they can also maintain compliance with industry standards or industry regulations that they must adhere to.
In the upcoming lecture, I’ll walk you through the 6 steps of configuring information barrier policies.
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.