Category: Microsoft Purview
- From Alert to Action: Using Purview DSI with Entra ID for End‑to‑End Data Breach Response (18/09/2025)
- Microsoft Security Copilot: Revolutionizing Data Security Investigations with AI-Powered Deep Content Analysis (07/04/2025)
- Exploring Microsoft Azure’s Security Technical Capabilities (02/04/2025)
- Section 17 - Implement and manage privacy requirements by using Microsoft Priva (03/05/2024)
- Section 16 - Implement and manage Microsoft Purview Information Barriers (IBs) (28/04/2024)
- Section 14 - Implement and manage Microsoft Purview Communication Compliance (20/04/2024)
- Section 15 - Implement and manage Microsoft Purview Insider Risk Management (13/04/2024)
- This is why I think you should join CCPs 💯 (13/04/2024)
- Graph activity logs is now generally available (11/04/2024)
- Defender for Office 365 and QR-code phishing (10/04/2024)
- Section 12 - Plan and manage eDiscovery and Content search (05/04/2024)
- Copilot for Security: Your AI Partner 🤖 (05/04/2024)
- Unify SIEM and XDR for Enhanced Threat Detection (04/04/2024)
- Section 13 - Manage and analyze audit logs and reports in Microsoft Purview (28/03/2024)
- Deep dive on Copilots and Security (23/03/2024)
- Section 11 - Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager (20/03/2024)
- Encrypting Data-At-Rest with Customer Managed Keys in M365 (17/03/2024)
- Insider Risks and Conditional Access (14/03/2024)
- Section 10 - Implement Microsoft Purview records management (11/03/2024)
- Section 9 - Manage data retention in Microsoft 365 workloads (10/03/2024)
- Section 8 - Implement data lifecycle and records management - Retain and delete data by using retention labels (28/02/2024)
- Section 7 - Implement DLP - Monitor and manage DLP activities (26/11/2023)
- Section 5 - Implement DLP - Create and configure DLP policies (29/10/2023)
- Section 3 - Implement information protection - Design and implement encryption for email messages (22/10/2023)
- Exam cram for SC-400 - Administering Information Protection and Compliance in M365 (24/09/2023)
- Azure AD Privileged Identity Management and new features (08/03/2023)
- Section 2 - Mitigate threats using Microsoft 365 Defender - Mitigate threats to the productivity environment by using Microsoft 365 Defender (12/02/2023)
- Tips and tricks on Securing your Data factory (20/12/2022)
- SQL Server 2022 and Azure ARC with Azure subscription model (28/11/2022)
- Section 7 - Design a strategy for data and applications - Specify security requirements for applications and design a strategy for securing data (07/09/2022)
- Section 4 - Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies - Design a regulatory compliance strategy (17/08/2022)
- Section 14 - Secure data and applications - Configure security for databases (22/05/2022)
- How handle security in a Power BI environment? (22/04/2022)
- Microsoft Compliance rebranded as Microsoft Purview (20/04/2022)