Category: Compliance

Section 2 – Implement information protection – Implement and manage sensitivity labels

This will be a two part section as there is a lot to talk about Sensitivity labels. Implement and manage sensitivity labels In this section we are talking on how to Protect your data scope. There is a clear story…

Continue Reading Section 2 – Implement information protection – Implement and manage sensitivity labels

Section 1 – Implement information protection – Create and SITs and trainable classifiers

The first section of this Study guide is going to cover Information types and trainable classifiers but maybe first introducing the different trials that you can use to try them out, if you don’t have real licenses available. You can…

Continue Reading Section 1 – Implement information protection – Create and SITs and trainable classifiers

Exam cram for SC-400 – Administering Information Protection and Compliance in M365

Previously I did Study guides for SC-300, AZ-500, SC-100 and SC-200. So now it’s the turn for the Compliance part under the Security umbrella. See here for the previous Study guides. And if you want to have 1to1 mentoring sessions,…

Continue Reading Exam cram for SC-400 – Administering Information Protection and Compliance in M365

Power Platform and customer-managed encryption key (preview) with some HSM

This is huge for all the Power Platform users. Now you can use Key vault to store your key, if you aren’t familiar with concept of Key vault, let me open it a bit. What features will be supported? Power…

Continue Reading Power Platform and customer-managed encryption key (preview) with some HSM

Microsoft 365 Defender role-based access control

The new Microsoft 365 Defender RBAC model makes it simple to migrate existing permissions from the individual supported RBAC models to the new RBAC model. All permissions listed within the Microsoft 365 Defender RBAC model align to permissions in the…

Continue Reading Microsoft 365 Defender role-based access control

SQL Server 2022 and Azure ARC with Azure subscription model

SQL 2022 has arrived and in this post I will try out the new setup that should have Azure ARC install embedded. Why to use Azure ARC with SQL 2022? One reason could be security, you will get these features…

Continue Reading SQL Server 2022 and Azure ARC with Azure subscription model

Do’s and don’ts concerning security for Identity part 6

Continuing with the do’s of Identity and supposing that you are in part of your journey that you have either Hybrid or fully cloud-based identities. In the last part I covered how you can create your own roles and use…

Continue Reading Do’s and don’ts concerning security for Identity part 6

Section 2 – Design a Zero Trust strategy and architecture – Design a security operations strategy

And time for the second section for my SC-100 study guide: Design a logging and auditing strategy to support security operations Develop security operations to support a hybrid or multi-cloud environment Design a strategy for SIEM and SOAR Evaluate security…

Continue Reading Section 2 – Design a Zero Trust strategy and architecture – Design a security operations strategy

How handle security in a Power BI environment?

Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…

Continue Reading How handle security in a Power BI environment?