Category: Compliance
- Section 17 - Implement and manage privacy requirements by using Microsoft Priva (03/05/2024)
- Section 16 - Implement and manage Microsoft Purview Information Barriers (IBs) (28/04/2024)
- Section 14 - Implement and manage Microsoft Purview Communication Compliance (20/04/2024)
- This is why I think you should join CCPs 💯 (13/04/2024)
- Section 12 - Plan and manage eDiscovery and Content search (05/04/2024)
- Section 11 - Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager (20/03/2024)
- Encrypting Data-At-Rest with Customer Managed Keys in M365 (17/03/2024)
- Section 8 - Implement data lifecycle and records management - Retain and delete data by using retention labels (28/02/2024)
- Section 7 - Implement DLP - Monitor and manage DLP activities (26/11/2023)
- Section 6 - Implement DLP - Implement and monitor Endpoint DLP (19/11/2023)
- Section 5 - Implement DLP - Create and configure DLP policies (29/10/2023)
- Section 3 - Implement information protection - Design and implement encryption for email messages (22/10/2023)
- Section 2 - Implement information protection - Rest of sensitivity label content and Design (15/10/2023)
- Section 2 - Implement information protection - Implement and manage sensitivity labels (08/10/2023)
- Section 1 - Implement information protection - Create and SITs and trainable classifiers (01/10/2023)
- Exam cram for SC-400 - Administering Information Protection and Compliance in M365 (24/09/2023)
- Power Platform and customer-managed encryption key (preview) with some HSM (02/04/2023)
- Microsoft 365 Defender role-based access control (29/01/2023)
- SQL Server 2022 and Azure ARC with Azure subscription model (28/11/2022)
- Do's and don'ts concerning security for Identity part 6 (13/11/2022)
- Section 4 - Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies - Design a regulatory compliance strategy (17/08/2022)
- Section 2 - Design a Zero Trust strategy and architecture - Design a security operations strategy (03/08/2022)
- How handle security in a Power BI environment? (22/04/2022)
- Microsoft Compliance rebranded as Microsoft Purview (20/04/2022)
- Some of my personal favorites for auditing Microsoft environments (24/03/2022)
- Information barriers, the GUI experience (Public preview) (02/02/2022)
- Insider risk management continued, device onboarding and protection (30/12/2021)
- Insider risk management, what, why and how (13/12/2021)
- Hybrid identity and how to protect your users? (07/11/2021)
- Three tiers of protection explained with use cases (31/10/2021)
- AIP Scanner and how to dig your content (21/10/2021)
- (D)ata (L)oss (P)revention, content escapes your hands (20/10/2021)
- (A)zure (I)nformation (P)rotection why and how? (15/10/2021)
- Retention policies why and how? (12/10/2021)
- Office 365 ORCA and Configuration analyzer (20/09/2021)
- Azure Defender for container registries (20/09/2021)
- Enterprise applications SSO with custom manifest configuration (08/09/2021)
- Using attack simulator for user education and gather insights. (07/09/2021)
- Why to use Compliance Manager for assessments and attack simulator to educate users. (06/09/2021)