Category: Compliance

Section 14 – Implement and manage Microsoft Purview Communication Compliance

Plan for communication compliance This tool helps you identify and address potential risks before they become problems. It can detect inappropriate messages like harassment or threats, as well as leaks of sensitive information across various communication channels, including email, Microsoft…

Continue Reading Section 14 – Implement and manage Microsoft Purview Communication Compliance

This is why I think you should join CCPs 💯

Imagine a giant security geek party… but way cooler! That’s kind of what the CCPs are like. Instead of just listening to someone lecture at a conference, you get to chat directly with Microsoft engineers and other security pros. It’s…

Continue Reading This is why I think you should join CCPs 💯

Section 12 – Plan and manage eDiscovery and Content search

Choose between eDiscovery (Standard) and eDiscovery (Premium) based on an organization’s requirements Feature Content Search eDiscovery (Standard) eDiscovery (Premium) Search Capabilities Basic Basic Basic Export Results Yes Yes Yes Permissions Role-based N/A N/A Legal Features – Yes Yes Case Management…

Continue Reading Section 12 – Plan and manage eDiscovery and Content search

Section 11 – Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager

Plan for regulatory compliance in Microsoft 365 It now works with Microsoft Defender for Cloud to assess compliance across Microsoft 365, Azure, Google Cloud Platform (GCP), and Amazon Web Services (AWS). This means you can see your entire compliance posture…

Continue Reading Section 11 – Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager

Encrypting Data-At-Rest with Customer Managed Keys in M365

As I mentioned in my previous posts. I like to keep my view as holistic as possible. Mixing a little bit of Azure infrastructure and Security side with a little hint of M365 Compliance and Entra Identity ingredients. So that…

Continue Reading Encrypting Data-At-Rest with Customer Managed Keys in M365

Section 8 – Implement data lifecycle and records management – Retain and delete data by using retention labels

Plan for information retention and disposition by using retention labels You can control how long your organization keeps content using two main actions: These actions allow you to configure various retention settings: Benefits of using these retention settings: Create retention…

Continue Reading Section 8 – Implement data lifecycle and records management – Retain and delete data by using retention labels

Section 7 – Implement DLP – Monitor and manage DLP activities

Analyze DLP reports DLP transmits a substantial volume of data to Microsoft Purview, encompassing monitoring, policy matches, user activities, and subsequent actions. To effectively refine your policies and assess actions on sensitive items, you must engage with and respond to…

Continue Reading Section 7 – Implement DLP – Monitor and manage DLP activities

Section 6 – Implement DLP – Implement and monitor Endpoint DLP

Configure advanced DLP rules for devices in DLP policies Supported virtualization You can include virtual machines as monitored devices in the Microsoft Purview compliance portal, and the onboarding procedures remain the same as those listed above. Onboarding Endpoint Data Loss…

Continue Reading Section 6 – Implement DLP – Implement and monitor Endpoint DLP

Section 5 – Implement DLP – Create and configure DLP policies

Design DLP policies based on an organization’s requirements Designing Data Loss Prevention could be based on the regulations of your industry or just internal security principles that should be made to carve the security measure framework in to stone. In…

Continue Reading Section 5 – Implement DLP – Create and configure DLP policies

Section 3 – Implement information protection – Design and implement encryption for email messages

Design and implement encryption for email messages Design an email encryption solution based on methods available in Microsoft 365 Features Feature Description Message Encryption (OME) – Encrypts messages for internal and external recipients. – Allows encrypted messages to any email…

Continue Reading Section 3 – Implement information protection – Design and implement encryption for email messages