Author: Harri Jaakkonen

Access reviews for External Guest users

Access reviews let’s an external users or an internal users to verify the access of a user. Access reviews honors a time frame set but the minimum time that the reviews will be automatically ran is 1 day. The other…

Continue Reading Access reviews for External Guest users

Hybrid identity and how to protect your users?

Hybrid identity in a trendy way to distribute your identity across cloud services. Identity has always been an important part in user interactions with services. It’s your unique identifier in the directory that you belong to. This theme can also…

Continue Reading Hybrid identity and how to protect your users?

SharePoint tenant rename, why and how?

Finally, Microsoft finally it’s coming to the public. What went wrong when you chose a name for your tenant? Probably nothing or all. Maybe you had a consultant saying “You won’t even see it when you use custom domain names…

Continue Reading SharePoint tenant rename, why and how?

Renaming Defender family and new security features

Yesterday at Ignite 2021 Microsoft announced the following renaming of their products. Microsoft Sentinel (formerly Azure Sentinel) now offers more than 100 solutions for data collection in a new content hub for easy discovery and deployment. We’re expanding fusion’s capabilities to identify previously unknown threats, integrating with Microsoft…

Continue Reading Renaming Defender family and new security features

Conditional Access – CAE and Resilience defaults

In the beginning of this month I wrote about CAE and and now it came Globally available. It was there but now it’s gone and the only option you have is to disable or enforce it. So what is Continuous…

Continue Reading Conditional Access – CAE and Resilience defaults

Three tiers of protection explained with use cases

The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…

Continue Reading Three tiers of protection explained with use cases

Information governance and adaptive scopes

Adaptive scopes in now in preview and will be soon released to general availability. With adaptive scopes you can define a attribute based filtering for content. Really nice addition to filtering locations easily. How to create Adaptive scopes? Go to…

Continue Reading Information governance and adaptive scopes

AIP Scanner and how to dig your content

What Is AIP scanner? Azure Information Protection Scanner is combination of Azure Information Protection Viewer, SQL DB and Azure App registration. It will discover the data from File shares, SharePoint content and it also has a network discovery functionality (that…

Continue Reading AIP Scanner and how to dig your content

(D)ata (L)oss (P)revention, content escapes your hands

Have no fear coz DLP is here and it won’t let your data to escape, at least if you made right configuration. It isn’t an automatic feature that you enable and forget. There a lot of different aspect you have…

Continue Reading (D)ata (L)oss (P)revention, content escapes your hands

Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version

This an hyper-boosted revised version of my last guide for passing Microsoft exams so let’s get going. Ignite 2021 and learning challenge So Ignite is coming in couple of weeks (virtually and hopefully for the last time) with a three…

Continue Reading Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version