Category: Security

Section 8 – Implement data lifecycle and records management – Retain and delete data by using retention labels

Plan for information retention and disposition by using retention labels You can control how long your organization keeps content using two main actions: These actions allow you to configure various retention settings: Benefits of using these retention settings: Create retention…

Continue Reading Section 8 – Implement data lifecycle and records management – Retain and delete data by using retention labels

Section 6 – Implement DLP – Implement and monitor Endpoint DLP

Configure advanced DLP rules for devices in DLP policies Supported virtualization You can include virtual machines as monitored devices in the Microsoft Purview compliance portal, and the onboarding procedures remain the same as those listed above. Onboarding Endpoint Data Loss…

Continue Reading Section 6 – Implement DLP – Implement and monitor Endpoint DLP

Section 5 – Implement DLP – Create and configure DLP policies

Design DLP policies based on an organization’s requirements Designing Data Loss Prevention could be based on the regulations of your industry or just internal security principles that should be made to carve the security measure framework in to stone. In…

Continue Reading Section 5 – Implement DLP – Create and configure DLP policies

Section 3 – Implement information protection – Design and implement encryption for email messages

Design and implement encryption for email messages Design an email encryption solution based on methods available in Microsoft 365 Features Feature Description Message Encryption (OME) – Encrypts messages for internal and external recipients. – Allows encrypted messages to any email…

Continue Reading Section 3 – Implement information protection – Design and implement encryption for email messages

Section 2 – Implement information protection – Rest of sensitivity label content and Design

This is the second part of Sensitivity labels. Sensitivity label content continued Configure auto-labeling policies for sensitivity labels Using Auto-labeling policies is called Service-side processing Service-side auto-labeling Auto-labeling on the service side, also known as auto-labeling for data at rest…

Continue Reading Section 2 – Implement information protection – Rest of sensitivity label content and Design

Section 2 – Implement information protection – Implement and manage sensitivity labels

This will be a two part section as there is a lot to talk about Sensitivity labels. Implement and manage sensitivity labels In this section we are talking on how to Protect your data scope. There is a clear story…

Continue Reading Section 2 – Implement information protection – Implement and manage sensitivity labels

Section 1 – Implement information protection – Create and SITs and trainable classifiers

The first section of this Study guide is going to cover Information types and trainable classifiers but maybe first introducing the different trials that you can use to try them out, if you don’t have real licenses available. You can…

Continue Reading Section 1 – Implement information protection – Create and SITs and trainable classifiers

Section 15 – Hunt for threats using Microsoft Sentinel

Create custom hunting queries Like stated in the last part, all Gallery content has been Centralized to Content hub. You will see the following notification under Custom hunting rules. https://learn.microsoft.com/en-us/azure/sentinel/sentinel-content-centralize If you need inspiration based on MITRE Framework for your…

Continue Reading Section 15 – Hunt for threats using Microsoft Sentinel

Microsoft Entra ID Governance

Licensing Advanced Identity governance has now a new license set and you can acquire it as a addon called Step Up. Some older functionalities still live inside P1 and P2 licensing models. Here the list of feature available only from…

Continue Reading Microsoft Entra ID Governance

Section 14 – Use Microsoft Sentinel workbooks to analyze and interpret data

Activate and customize Microsoft Sentinel workbook templates When we are talking about templates, it’s important to see the following information, you will see this inside your Sentinel workspace. Once you Click on Continue, it will start the migration and show…

Continue Reading Section 14 – Use Microsoft Sentinel workbooks to analyze and interpret data