Author: Harri Jaakkonen
As I mentioned in my previous posts. I like to keep my view as holistic as possible. Mixing a little bit of Azure infrastructure and Security side with a little hint of M365 Compliance and Entra Identity ingredients. So that…
Prologue Mergers, acquisitions, and reorganizations can create a tangled web of user accounts. Imagine acquiring a company where some employees collaborate with your team using external guest accounts. Integrating them fully requires converting them to internal users – a process…
Why Insider Risks matter? Employees now have greater ability to produce, manage, and exchange data across a variety of platforms and applications. In most circumstances, firms have limited resources and tools to detect and reduce organizational risks while adhering to…
So what is records management? Many principles of the solution for Data Lifecycle Management also apply for Microsoft Purview Records Management, but there are some differences. Those differences include file plan, record declaration, and record versioning. File Plan: Imagine a…
First things first, Security defaults were automatically enabled for all new tenants created after October 22, 2019. This was to ensure a strong security posture right from the start for all users. Set the stage Let’s imagine this scenario. You…
First of all if you don’t have E5, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Governing Your Data with Microsoft Keep what’s important, delete…
Plan for information retention and disposition by using retention labels You can control how long your organization keeps content using two main actions: These actions allow you to configure various retention settings: Benefits of using these retention settings: Create retention…
Analyze DLP reports DLP transmits a substantial volume of data to Microsoft Purview, encompassing monitoring, policy matches, user activities, and subsequent actions. To effectively refine your policies and assess actions on sensitive items, you must engage with and respond to…
Configure advanced DLP rules for devices in DLP policies Supported virtualization You can include virtual machines as monitored devices in the Microsoft Purview compliance portal, and the onboarding procedures remain the same as those listed above. Onboarding Endpoint Data Loss…
Design DLP policies based on an organization’s requirements Designing Data Loss Prevention could be based on the regulations of your industry or just internal security principles that should be made to carve the security measure framework in to stone. In…