Category: Azure Information Protection

Microsoft Compliance rebranded as Microsoft Purview

What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…

Continue Reading Microsoft Compliance rebranded as Microsoft Purview

Some of my personal favorites for auditing Microsoft environments

Professionals are always finding out ways to report M365 or Azure environments, automating activities or remediating threats. There is insane amount of content available to achieve these goals but I want to list some of my favorites in this post….

Continue Reading Some of my personal favorites for auditing Microsoft environments

Renaming Defender family and new security features

Yesterday at Ignite 2021 Microsoft announced the following renaming of their products. Microsoft Sentinel (formerly Azure Sentinel) now offers more than 100 solutions for data collection in a new content hub for easy discovery and deployment. We’re expanding fusion’s capabilities to identify previously unknown threats, integrating with Microsoft…

Continue Reading Renaming Defender family and new security features

Three tiers of protection explained with use cases

The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…

Continue Reading Three tiers of protection explained with use cases

AIP Scanner and how to dig your content

What Is AIP scanner? Azure Information Protection Scanner is combination of Azure Information Protection Viewer, SQL DB and Azure App registration. It will discover the data from File shares, SharePoint content and it also has a network discovery functionality (that…

Continue Reading AIP Scanner and how to dig your content

(A)zure (I)nformation (P)rotection why and how?

Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…

Continue Reading (A)zure (I)nformation (P)rotection why and how?