Category: Compliance
This is the fourth section to my SC-100 study guide and it will cover the following topics: Interpret compliance requirements and translate into specific technical capabilities (new or existing) Evaluate infrastructure compliance by using Microsoft Defender for Cloud Interpret compliance…
And time for the second section for my SC-100 study guide: Design a logging and auditing strategy to support security operations Develop security operations to support a hybrid or multi-cloud environment Design a strategy for SIEM and SOAR Evaluate security…
Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…
What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…
Professionals are always finding out ways to report M365 or Azure environments, automating activities or remediating threats. There is insane amount of content available to achieve these goals but I want to list some of my favorites in this post….
This pic above is exactly the opposite of how information barriers work. So how it works? When information barrier policies are in place, people who should not communicate or share files with other specific users won’t be able to find,…
Now to part two of this series and onboarding devices to Compliance center. Continuing device onboarding. Go to device onboarding. You have these options to onboard. I will be choosing local scripts but the fundamentals will be the same no…
What is Insider risk management Insider risk management is a solutions for example to prevent leavers to take precious company data with them when to go. But there is also options to lower the risk for users, example anonymizing usernames….
Hybrid identity in a trendy way to distribute your identity across cloud services. Identity has always been an important part in user interactions with services. It’s your unique identifier in the directory that you belong to. This theme can also…
The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…