Via the Microsoft Graph, authorized persons such as the Global Administrator of a Microsoft 365 Tenant have full access to almost all information in this Tenant. The Microsoft Graph itself cannot be deactivated, only hidden and now restricted:
It is important to know who, in addition to Microsoft, will act as a subcontractor for Microsoft. A new list will be published from time to time and other documents have also been updated:
When using Microsoft 365, there are various options for encrypting Microsoft’s own systems, such as the Fort Knox principle or separate keys for each tenant (4 keys can also be contributed by the user) up to BYOK, HYOK and CYOK within Microsoft Information Protection. Now Microsoft has expanded the portfolio and brought a double key […]
Information Protection is one of the important topics in a cloud world. You have to classify your data and almost very sensitivity data. In this connection the new feature „mark new files as sensitivity by default“ will help us.