Category: Security

Section 13 – Manage and analyze audit logs and reports in Microsoft Purview

Choose between Audit (Standard) and Audit (Premium) based on an organization’s requirements Standard vs. Premium Audit Features Capability Audit (Standard) Audit (Premium) Enabled by default Thousands of searchable audit events Audit search tool in the compliance portal Search-UnifiedAuditLog cmdlet Export…

Continue Reading Section 13 – Manage and analyze audit logs and reports in Microsoft Purview

Deep dive on Copilots and Security

Microsoft Copilots Microsoft Copilot isn’t a single service, but rather a suite of AI-powered assistants designed to enhance productivity and security across various Microsoft products and services. Here’s a breakdown of the different Copilots available: Security Copilot architecture, I could…

Continue Reading Deep dive on Copilots and Security

In-browser protection with Microsoft Edge for Business (Preview)

What is Microsoft Edge for Business? It’s a web browser designed specifically for organizations. It builds upon the standard Microsoft Edge browser, adding features that benefit both IT professionals and regular users. Here are some key capabilities of Microsoft Edge…

Continue Reading In-browser protection with Microsoft Edge for Business (Preview)

Section 11 – Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager

Plan for regulatory compliance in Microsoft 365 It now works with Microsoft Defender for Cloud to assess compliance across Microsoft 365, Azure, Google Cloud Platform (GCP), and Amazon Web Services (AWS). This means you can see your entire compliance posture…

Continue Reading Section 11 – Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager

Encrypting Data-At-Rest with Customer Managed Keys in M365

As I mentioned in my previous posts. I like to keep my view as holistic as possible. Mixing a little bit of Azure infrastructure and Security side with a little hint of M365 Compliance and Entra Identity ingredients. So that…

Continue Reading Encrypting Data-At-Rest with Customer Managed Keys in M365

Entra ID – Convert external users to internal (Preview)

Prologue Mergers, acquisitions, and reorganizations can create a tangled web of user accounts. Imagine acquiring a company where some employees collaborate with your team using external guest accounts. Integrating them fully requires converting them to internal users – a process…

Continue Reading Entra ID – Convert external users to internal (Preview)

Insider Risks and Conditional Access

Why Insider Risks matter? Employees now have greater ability to produce, manage, and exchange data across a variety of platforms and applications. In most circumstances, firms have limited resources and tools to detect and reduce organizational risks while adhering to…

Continue Reading Insider Risks and Conditional Access

Section 10 – Implement Microsoft Purview records management

So what is records management? Many principles of the solution for Data Lifecycle Management also apply for Microsoft Purview Records Management, but there are some differences. Those differences include file plan, record declaration, and record versioning. File Plan: Imagine a…

Continue Reading Section 10 – Implement Microsoft Purview records management

My tenant has Security defaults enabled and I want to disable them. What to do?

First things first, Security defaults were automatically enabled for all new tenants created after October 22, 2019. This was to ensure a strong security posture right from the start for all users. Set the stage Let’s imagine this scenario. You…

Continue Reading My tenant has Security defaults enabled and I want to disable them. What to do?

Section 9 – Manage data retention in Microsoft 365 workloads

First of all if you don’t have E5, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Governing Your Data with Microsoft Keep what’s important, delete…

Continue Reading Section 9 – Manage data retention in Microsoft 365 workloads