Microsoft 365: The Essential 10 Security Considerations
When we talk about Microsoft 365 security, we are talking about two things: The latter can be used to achieve the former, as well as other (non-Mic...
Read Article →Discover the latest insights, best practices, and security research related to Microsoft Purview data governance and compliance.
When we talk about Microsoft 365 security, we are talking about two things: The latter can be used to achieve the former, as well as other (non-Mic...
Read Article →A new DLP policy for Copilot prompts monitors blocked sensitive information types like credit card numbers to stop their use in Copilot prompts. Th...
Read Article →The Ignite 2025 keynote was a marathon 150-minute event, but some interesting Microsoft 365 announcements emerged, mostly centered on AI. Microsoft...
Read Article →Discover how to use PIM with RBAC roles to provide just-in-time access for users. Learn setup for Purview, Exchange, and more, plus the pros, cons,...
Read Article →I was recently asked if I knew a way to export Microsoft Purview RBAC roles with members. I couldn’t find a ready solution, so I wrote a PowerShell...
Read Article →With identities and access strengthened in part 2 , it’s time to turn our focus to real-world data protection with Authentication Contexts. One of ...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Over my last few posts, I’ve casually mentioned Authentication Context a few times, so I thought it was about time we gave the feature a proper spo...
Read Article →Purview Priority Cleanup is growing its capabilities to be able to process files stored in SharePoint Online and OneDrive for Business. Public prev...
Read Article →DLP diagnostics were announced in October 2024, and it’s taken quite a while for Microsoft to make the four DLP diagnostic tests available. In trut...
Read Article →This blog was created in response to recent policy changes related to the WeTransfer cloud storage service. These changes raised ... Read more
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Microsoft is making some important changes to Purview eDiscovery from May 26, 2025. The changes affect how content searches work and are likely to ...
Read Article →Microsoft Purview makes it easy to apply sensitivity labels to Office documents and PDF files with auto-label policies. Licenses are needed for aut...
Read Article →Microsoft Purview isn’t just another tool you switch on and walk away from. It’s a full-on transformation.
Read Article →You know that saying "another day, another dollar"? Pretty sure when the songwriters came up with that, they weren’t talking about...
Read Article →Introduction Microsoft Purview is stepping up its game again, and this time, they’re bringing data security to the network layer and...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Microsoft has announced the removal of events alerts from the Purview Audit solution. Fortunately, the decision doesn't affect activity alerts. Aud...
Read Article →Today kicks off a comprehensive blog series where I’ll delve into the security features of the Business Premium license SKU, offering...
Read Article →You likely aren’t collecting all available events to the Unified Audit Log :( First, not all events are enabled or retained optimally. Consid...
Read Article →The Purview Insider Risk Management solution can do all sorts of clever things, like tracking sensitivity label downgrades and removals as an indic...
Read Article →In a November 8 post, Microsoft says that Purview Data Lifecycle Management will allow tenants to split processing of Copilot interactions and Team...
Read Article →Adaptive searches are a nice way to target users, sites, and groups for Purview retention processing. But a user adaptive scope can't select member...
Read Article →eDiscovery is a calling best left to skilled investigators. But Microsoft 365 administrators need to know how to search and how the new Purview eDi...
Read Article →Microsoft Purview and the Exchange Online Search-UnifiedAuditLog cmdlet both perform searches of the Microsoft 365 unified audit log. Both mechanis...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →A reader wanted to know why the Purview Compliance portal doesn't show who last updated sensitivity label policies. The reason why is unclear, but ...
Read Article →Microsoft is deploying additional audit events to tenants with Purview Audit (Standard) licenses. Among the 15 Teams events in the set are Teams me...
Read Article →A May 20 post contains the welcome news that the new audit events promised for Purview Audit standard customers should be available in June 2024. S...
Read Article →April 1, 2024, seen the release of Microsoft Copilot for Security to general availability (GA). It is a generative AI solution integrating with Def...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →According to Microsoft 365 notification MC736438, Microsoft is getting tougher at enforcing the rules for Purview information protection licenses. ...
Read Article →Microsoft plans to make an eDiscovery hold report available to tenants in January 2024. This article explains how to use PowerShell to create a sim...
Read Article →Cloudy attachments are links to files sent in messages. An auto-label policy can capture copies of cloudy attachments and make them available for e...
Read Article →Microsoft has released a new free Microsoft Purview Discovery plan which includes brand new features available for free tier users. The post Get Ah...
Read Article →Microsoft expands their Microsoft Purview audit log availability to standard users for premium exchange and SharePoint activities. The post Take Ad...
Read Article →Managing the risks around data has become increasingly complex for organizations. At the current stage more and more employees are working from hom...
Read Article →Databeveiliging en classificatie is belangrijk. Een datalek via een verkeerde aanzender of toegang tot externe databronnen is snel gemaakt, waardoo...
Read Article →