Category: Azure
Access reviews let’s an external users or an internal users to verify the access of a user. Access reviews honors a time frame set but the minimum time that the reviews will be automatically ran is 1 day. The other…
Finally, Microsoft finally it’s coming to the public. What went wrong when you chose a name for your tenant? Probably nothing or all. Maybe you had a consultant saying “You won’t even see it when you use custom domain names…
Yesterday at Ignite 2021 Microsoft announced the following renaming of their products. Microsoft Sentinel (formerly Azure Sentinel) now offers more than 100 solutions for data collection in a new content hub for easy discovery and deployment. We’re expanding fusion’s capabilities to identify previously unknown threats, integrating with Microsoft…
In the beginning of this month I wrote about CAE and and now it came Globally available. It was there but now it’s gone and the only option you have is to disable or enforce it. So what is Continuous…
The above picture is from the CISSP material and domain 3 that talks about Security Architecture and Engineering but it could be from Microsoft material also. So what are the three layers of protection? At a high level Microsoft has…
What Is AIP scanner? Azure Information Protection Scanner is combination of Azure Information Protection Viewer, SQL DB and Azure App registration. It will discover the data from File shares, SharePoint content and it also has a network discovery functionality (that…
Have no fear coz DLP is here and it won’t let your data to escape, at least if you made right configuration. It isn’t an automatic feature that you enable and forget. There a lot of different aspect you have…
This an hyper-boosted revised version of my last guide for passing Microsoft exams so let’s get going. Ignite 2021 and learning challenge So Ignite is coming in couple of weeks (virtually and hopefully for the last time) with a three…
Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…
Well this is true for the digital society. Before it was your passwords you had to keep safe. Now the password doesn’t make a huge difference as it should be only the first stage of sign-in process and second would…