Use Purview DLP Simulation Mode to Understand PII Risks
In most organizations, the end of the year is a unique time. People are scrambling to balance taking time off, finishing projects, enrolling in the new year’s benefit plans, preparing for tax reporting, and performing year-end administrative tasks. Many of these events involve sharing or processing more employee and customer PII (Personally Identifiable Information) data […]
What Should I Do with These DLP Alerts, Anyway?
Today I am going to address a common tactical and process challenge that comes up when working with clients implementing Data Loss Prevention policies: How are DLP alerts handled? Also, who performs triage, investigation, and resolution? DLP alerts are unique. They can be an indicator of a number of different issues, and they frequently require […]
Eliminate Security Gaps with Microsoft Entra Suite’s Advanced Identity Protection

Microsoft Entra Suite expands identity and security capabilities, delivering Zero Trust access control, AI-driven identity protection, and automated governance.
Purview’s New AI Hub: Reduce AI Risks, Improve AI Visibility
Purview’s New AI Hub: Reduce AI Risks and Improve AI Visibility I have written extensively about getting data governance programs off the ground and the fundamentals of Purview Compliance. Today, though, I would like to address the AI concerns in organizations that already have mature Purview implementations, including advanced E5 features like Endpoint DLP, Insider […]
Dive Into Business Processes to Improve Data Governance and AI Efforts
We engage with a lot of small- to mid-sized organizations that are in different phases of planning or implementing data governance, compliance, or AI initiatives. I have noticed that there is a common circumstance that can slow down or frustrate these projects: The people tasked with getting a data governance program off the ground (often […]
Crowdsourced Incident Response Plan Tabletop Exercise Results
Interested In Comparing Your Ability To Respond To Cyber Incidents To Others’? This blog provides details of a noteworthy cyber incident, and data about how a variety of organizations would manage it. This information comes from a crowdsourced tabletop exercise led by our Strategic Advisory team. You’ll find poll results and discussions about the good, bad, […]
Microsoft Intune Multi-Admin Approval
Microsoft Intune is a cloud-based device management service that allows you to manage and secure your organization’s devices, apps, and data. As an Intune Administrator, you can configure Microsoft Intune settings, such as creating policies, applications, compliance, and assigning roles. However, some of these changes may have a significant impact on your organization’s security and […]
How to Deploy Microsoft Intune Endpoint Privilege Management
Endpoint Privilege Management is a crucial aspect of IT security and compliance. It involves granting the minimum level of permissions and privileges necessary for devices and users to perform their tasks, while preventing unauthorized or malicious actions. Endpoint Privilege Management can help reduce the risk of data breaches, malware infections, ransomware attacks, and other cyber […]
Securing What Really Matters
Securing What Really Matters The Problem is the Perp, Not the Victim When a hospital is victimized by ransomware, patients whose care is disrupted due to postponed or relocated appointments have a right to be angry. When the prices of gas or meat spike because of a cyber incident, consumers are right to demand action. […]
Intune Windows Autopilot Device Preparation
New Announcement! There is a new Intune Windows Autopilot in town! Welcome Intune Windows Autopilot device preparation to general availability for Entra ID joined devices! Windows Autopilot device preparation should simplify and expedite the process, reducing the time it takes to run devices through Autopilot—plus near real-time deployment status, monitoring capabilities, and improved troubleshooting. Currently, […]