Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data
Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data Over the past 5 months, this blog series has covered the fundamentals of Microsoft Purview. As we have shown, Purview provides a powerful layer of data-aware visibility and protection that complements more traditional security controls like identity management, access control lists, group memberships, endpoint security, […]
Summary of Announcements from Microsoft
Summary of Announcements from Microsoft A flurry of pricing info, new product innovations, and name changes have been announced in the past two weeks. Here’s a summary and some resources for your research and planning. Microsoft 365 Copilot Commercial pricing for Microsoft 365 Copilot was announced at $30/user/month. No release date information yet. Microsoft joined […]
Easily Collaborate with External M365 Users
Easily Collaborate with External Microsoft 365 Users Remember what a nightmare it was for the Griswolds when Cousin Eddie came for a visit? Microsoft Entra ID (formerly known as Azure AD) administrators might feel the same way with the options and headaches that come with managing external identities. The Griswolds were gracious hosts– Directory and data managers […]
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 1)
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 1) Introduction At eGroup | Enabling Technologies, we define as a best practice the implementation of Microsoft Intune to provide device management used by authenticated users in Microsoft 365 tenants. The Intune component enrolls these devices and applies device […]
Improving Cloud Security Policies
Improving Cloud Security Policies Our Strategic Advisors find a consistent gap when reviewing our customers’ security policies: a lack of focus on cloud computing. Even in organizations with many traditional policy documents, there’s a lag in updating them for cloud technologies like Microsoft 365. Additionally, the gap widens when it comes to documenting the standard […]
Introduction to Azure Purview – Data Governance
Introduction to Azure Purview – Data Governance The word “purview” is loosely defined as range of vision, scope, operations, and/or insight. In the vast cloud technology landscape that most organizations operate today, data governance is becoming overwhelmingly challenging to maintain. Data sprawl and multi-tenancy make these challenges even more difficult. It is nearly impossibly to truly know your data with absolute certainty, let alone […]
Azure Sentinel Operations
Azure Sentinel Operations Introduction Now that Azure Sentinel has started collecting data, it’s time for a deep dive into each component to discover how to utilize the data. The examples below are sample use cases of what Azure Sentinel can do. It is by no means an extensive overview of the capabilities. There is a […]
Onboarding Data Sources Into Azure Sentinel
Onboarding Data Sources Into Azure Sentinel Knowing what data you wish to analyze within a SIEM solution provides a tremendous advantage to deploying Azure Sentinel. However, that is not always the case during an initial deployment. You don’t know what you don’t know. Luckily, Microsoft allows free ingestion of most Azure and Office 365 activities […]
Intro to Azure Sentinel
Intro to Azure Sentinel Azure Sentinel is a cloud native Security Information Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solution. A SIEM solution aggregates data and provides real-time analysis of security alerts generated by applications and network appliances. A SOAR solution automates the investigations and responses of security alerts. It is common for IT Professionals to mix up the capabilities of SIEM and SOAR since they tend to work together for the goal of protection. However, these […]
Azure Bastion: Replacement for Jump Box Server
Azure Bastion: Replacement for Jump Box Server Bastion can be defined as a fortified place used to protect something of value. In technology, a Bastion host is used to securely connect to resources on your network, typically for a single purpose. This host is typically placed in outside your network or security zone to protect […]