Category: Compliance

This is huge for all the Power Platform users. Now you can use Key vault to store your key, if you aren’t familiar with concept of Key vault, let me open it a bit. What features will be supported? Power…

The new Microsoft 365 Defender RBAC model makes it simple to migrate existing permissions from the individual supported RBAC models to the new RBAC model. All permissions listed within the Microsoft 365 Defender RBAC model align to permissions in the…

SQL 2022 has arrived and in this post I will try out the new setup that should have Azure ARC install embedded. Why to use Azure ARC with SQL 2022? One reason could be security, you will get these features…

Continuing with the do’s of Identity and supposing that you are in part of your journey that you have either Hybrid or fully cloud-based identities. In the last part I covered how you can create your own roles and use…
This is the fourth section to my SC-100 study guide and it will cover the following topics: Interpret compliance requirements and translate into specific technical capabilities (new or existing) Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance…

And time for the second section for my SC-100 study guide: Design a logging and auditing strategy to support security operations Develop security operations to support a hybrid or multi-cloud environment Design a strategy for SIEM and SOAR Evaluate security…

Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…

What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…

Professionals are always finding out ways to report M365 or Azure environments, automating activities or remediating threats. There is insane amount of content available to achieve these goals but I want to list some of my favorites in this post….

This pic above is exactly the opposite of how information barriers work. So how it works? When information barrier policies are in place, people who should not communicate or share files with other specific users won’t be able to find,…