top of page


How to Use PIM with RBAC Roles: Purview, Exchange, and More
Discover how to use PIM with RBAC roles to provide just-in-time access for users. Learn setup for Purview, Exchange, and more, plus the pros, cons, and gotchas.
Nov 11, 20259 min read


How to Export Microsoft Purview Permissions (RBAC Roles) Easily
I was recently asked if I knew a way to export Microsoft Purview RBAC roles with members. I couldn’t find a ready solution, so I wrote a PowerShell script. You can get it from my new GitHub Purview repository. Perfect for auditing and managing Purview permissions easily!
Nov 3, 20252 min read


Another day, another Purview solution: Data Security Investigations
You know that saying "another day, another dollar"? Pretty sure when the songwriters came up with that, they weren’t talking about...
Mar 28, 20253 min read


Common mistakes you may be making with Data Loss Prevention
Avoiding data breaches starts with knowing what not to do. In this guide, we break down the common mistakes in Data Loss Prevention that even experienced teams make - like weak policies, lack of employee training, and overreliance on tools. Learn how to strengthen your strategy, close security gaps, and keep sensitive data safe before it’s too late.
Mar 14, 202526 min read


Microsoft Purview permission guide
This blog post serves as a one-stop shop for all Microsoft Purview permissions, including role groups and roles for specific compliance tools and products.
Feb 13, 202512 min read


Justice for data protection: Secure by default with Microsoft Purview - Early thoughts
Introduction In today’s rapidly evolving digital landscape, organisations are increasingly prioritising the security of their...
Oct 6, 20244 min read


Understanding Exact Data Match (EDM) Classifier in Microsoft Purview - part 2
Introduction Welcome back to my series on Exact Data Match (EDM) classifiers in Microsoft Purview! In Part 1 , we explored the basics...
Oct 2, 20247 min read


Understanding Exact Data Match (EDM) Classifier in Microsoft Purview - part 1
Introduction In the realm of data governance and security, ensuring accurate classification and protection of sensitive information is...
Sep 25, 20243 min read


Email Journaling with Encryption: Keep Your Emails Safe and Compliant
Introduction Journaling your emails is like keeping a copy of every letter you send and receive, just in case you need to prove what was...
Sep 18, 20243 min read
bottom of page





