Month: October 2021

Three tiers of protection explained with use cases

The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…

Continue Reading Three tiers of protection explained with use cases

Information governance and adaptive scopes

Adaptive scopes in now in preview and will be soon released to general availability. With adaptive scopes you can define a attribute based filtering for content. Really nice addition to filtering locations easily. How to create Adaptive scopes? Go to…

Continue Reading Information governance and adaptive scopes

AIP Scanner and how to dig your content

What Is AIP scanner? Azure Information Protection Scanner is combination of Azure Information Protection Viewer, SQL DB and Azure App registration. It will discover the data from File shares, SharePoint content and it also has a network discovery functionality (that…

Continue Reading AIP Scanner and how to dig your content

(D)ata (L)oss (P)revention, content escapes your hands

Have no fear coz DLP is here and it won’t let your data to escape, at least if you made right configuration. It isn’t an automatic feature that you enable and forget. There a lot of different aspect you have…

Continue Reading (D)ata (L)oss (P)revention, content escapes your hands

Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version

This an hyper-boosted revised version of my last guide for passing Microsoft exams so let’s get going. Ignite 2021 and learning challenge So Ignite is coming in couple of weeks (virtually and hopefully for the last time) with a three…

Continue Reading Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version

(A)zure (I)nformation (P)rotection why and how?

Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…

Continue Reading (A)zure (I)nformation (P)rotection why and how?

Retention policies why and how?

The picture above is from one of the many CISSP videos that I have watched but it came to good point as I was planning to write a posts about data retention and why it matters. So why it matters?…

Continue Reading Retention policies why and how?

Azure AD guest users and how to manage them?

Well this is true for the digital society. Before it was your passwords you had to keep safe. Now the password doesn’t make a huge difference as it should be only the first stage of sign-in process and second would…

Continue Reading Azure AD guest users and how to manage them?

AAD Identity protection and Hybrid Identity

In the past years Microsoft made some excellent improvements for securing the Identity. One of these features was Azure AD Identity Protection and it’s proxy version to allow your policies to flow inside on-premises AD. It uses the same kinda…

Continue Reading AAD Identity protection and Hybrid Identity

Continuous Access Evaluation and working with tokens

Access, ID, and SAML2 ID tokens are JSON web tokens (JWT). These ID tokens consist of a header, payload, and signature. The header and signature are used to verify the authenticity of the token, while the payload contains the information about…

Continue Reading Continuous Access Evaluation and working with tokens