Category: Compliance

Some of my personal favorites for auditing Microsoft environments

Professionals are always finding out ways to report M365 or Azure environments, automating activities or remediating threats. There is insane amount of content available to achieve these goals but I want to list some of my favorites in this post….

Continue Reading Some of my personal favorites for auditing Microsoft environments

Information barriers, the GUI experience (Public preview)

This pic above is exactly the opposite of how information barriers work. So how it works? When information barrier policies are in place, people who should not communicate or share files with other specific users won’t be able to find,…

Continue Reading Information barriers, the GUI experience (Public preview)

Insider risk management continued, device onboarding and protection

Now to part two of this series and onboarding devices to Compliance center. Continuing device onboarding. Go to device onboarding. You have these options to onboard. I will be choosing local scripts but the fundamentals will be the same no…

Continue Reading Insider risk management continued, device onboarding and protection

Insider risk management, what, why and how

What is Insider risk management Insider risk management is a solutions for example to prevent leavers to take precious company data with them when to go. But there is also options to lower the risk for users, example anonymizing usernames….

Continue Reading Insider risk management, what, why and how

Hybrid identity and how to protect your users?

Hybrid identity in a trendy way to distribute your identity across cloud services. Identity has always been an important part in user interactions with services. It’s your unique identifier in the directory that you belong to. This theme can also…

Continue Reading Hybrid identity and how to protect your users?

Three tiers of protection explained with use cases

The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…

Continue Reading Three tiers of protection explained with use cases

AIP Scanner and how to dig your content

What Is AIP scanner? Azure Information Protection Scanner is combination of Azure Information Protection Viewer, SQL DB and Azure App registration. It will discover the data from File shares, SharePoint content and it also has a network discovery functionality (that…

Continue Reading AIP Scanner and how to dig your content

(D)ata (L)oss (P)revention, content escapes your hands

Have no fear coz DLP is here and it won’t let your data to escape, at least if you made right configuration. It isn’t an automatic feature that you enable and forget. There a lot of different aspect you have…

Continue Reading (D)ata (L)oss (P)revention, content escapes your hands

(A)zure (I)nformation (P)rotection why and how?

Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…

Continue Reading (A)zure (I)nformation (P)rotection why and how?

Retention policies why and how?

The picture above is from one of the many CISSP videos that I have watched but it came to good point as I was planning to write a posts about data retention and why it matters. So why it matters?…

Continue Reading Retention policies why and how?