<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft Archives - Jay Longley</title>
	<atom:link href="https://jaylongley.com/tag/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://jaylongley.com/tag/microsoft/</link>
	<description>Innovator, Technologist &#38; Aviator</description>
	<lastBuildDate>Thu, 21 Mar 2024 17:38:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jaylongley.com/wp-content/uploads/2022/09/cropped-skull01-32x32.jpg</url>
	<title>Microsoft Archives - Jay Longley</title>
	<link>https://jaylongley.com/tag/microsoft/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Copilot for Microsoft 365: Pre-Deployment Guide</title>
		<link>https://jaylongley.com/copilot-for-microsoft-365/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 13:49:19 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=1088</guid>

					<description><![CDATA[<p>Introduction As organizations start to use Copilot for Microsoft 365, preparing your data is a must. This process includes sorting and labeling your data, training AI classifiers, setting up strong data rules and upkeep routines. For this reason, we will focus on key concepts like Azure Information Protection. AND we will place emphasis on data [&#8230;]</p>
<p>The post <a href="https://jaylongley.com/copilot-for-microsoft-365/">Copilot for Microsoft 365: Pre-Deployment Guide</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2><p>Introduction</p></h2>



<p>As organizations start to use Copilot for Microsoft 365, preparing your data is a must. This process includes sorting and labeling your data, training AI classifiers, setting up strong data rules and upkeep routines. For this reason, we will focus on key concepts like Azure Information Protection.  AND we will place emphasis on data hygiene habits, and focus on data governance in this article.</p>



<h2><p>Essentials of Data Preparation for Copilot<br><br></p></h2>



<h3><p>1. Azure Information Protection Labels:</h3></p>



<p>First off, assess and set up these labels. They&#8217;re key for sorting and keeping your documents and emails safe based on how sensitive their content is. Think of this as the main way to protect your organization&#8217;s data.</p>



<h3><p>2. Trainable Classifiers:</h3></p>



<p>Use AI to automatically sort your data. While these classifiers get better as they go, spotting sensitive info that needs to be handled carefully, like Social Security Numbers or medical terms. Getting your data sorted and secure is a must before bringing in Copilot to further enhance your capabilities.</p>



<h3><p>3. Making Your Data Ready for Copilot:</h3></p>



<ul class="wp-block-list">
<li>Clear Out Old Data: Start by getting rid of old or unused files. This not only makes searches better but also helps train the AI to understand your organization&#8217;s language and culture better.</li>



<li>Archiving and Deleting: Set up rules to keep your digital space clean and up-to-date by regularly removing unnecessary data.</li>



<li>Set Retention Labels and Policies: These are crucial for keeping the data you need and meeting legal requirements.</li>
</ul>



<h3><p>4. Organizing SharePoint:</p></h3>



<ul class="wp-block-list">
<li><strong>Create a Clear Structure:</strong> Making a well-organized system for your documents is a requirement for Copilot, yet it also makes it easier to find what you need. Set up specific sites for departments like HR and Finance, also organize them further into subfolders for things like policies or project documents.</li>



<li><strong>Standardize Naming:</strong> Use a clear naming system for your files to help everyone find them easily. Keep up with regular checks to make sure everyone is following the rules.</li>



<li><strong>Use Metadata and Tags:</strong> Adding extra details and tags to your files makes them even easier to find. Tagging customer support tickets or adding product details as metadata can make a big difference.</li>



<li><strong>Version Control:</strong> Keep only the most important versions of each document to avoid confusion and clutter. To put it simply, focus on data hygiene.</li>



<li><strong>Monitor Your Data:</strong> Keep an eye on how secure and compliant your data is, especially when it comes to personal information, to make sure it&#8217;s used correctly in Copilot for Microsoft 365.</li>
</ul>



<h3><p>5. Setting Up Data Governance:</p></h3>



<ul class="wp-block-list">
<li><strong>Assign a Data Specialist:</strong> Have someone in charge of getting your data ready and keeping it in good shape.</li>



<li><strong>Review Policies Regularly:</strong> Keep your data labels, loss prevention rules, and access controls up to date with your organization&#8217;s needs and legal requirements.</li>



<li><strong>Manage Access Wisely:</strong> Make sure people have just enough access to do their jobs, and also ensure you recheck these permissions as things change.</li>
</ul>



<h3><p>6. Keeping Up with Maintenance:</p></h3>



<ul class="wp-block-list">
<li><strong>Regular Checks:</strong> Perform monthly, quarterly, and also yearly reviews to adjust to new data needs, permission changes, and updates in regulations. This helps you stay on track and keep your data practices top-notch.</li>
</ul>



<h2><p>In Summary</p></h2>


<p>By focusing on Azure Information Protection, data hygiene habits, and data governance, you lay a strong foundation for using Copilot in Microsoft 365. Getting your data in shape makes Copilot more useful while also keeping your organization&#8217;s information safe. Furthermore this careful approach to managing data is a key step in digital transformation, helping your organization deal with today&#8217;s data challenges confidently and effectively.<br><br>Learn more about Copilot here:<br><a href="https://blogs.microsoft.com/blog/2023/03/16/introducing-microsoft-365-copilot-your-copilot-for-work/" target="_blank" rel="noreferrer noopener">https://blogs.microsoft.com/blog/2023/03/16/introducing-microsoft-365-copilot-your-copilot-for-work/</a></p>



<p>To learn more about Zero Trust, what it is, and why you should have it before Copilot, you can find my article here:<br><a href="https://jaylongley.com/what-is-zero-trust-for-technologists/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/what-is-zero-trust-for-technologists/</a></p>
<p>The post <a href="https://jaylongley.com/copilot-for-microsoft-365/">Copilot for Microsoft 365: Pre-Deployment Guide</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Zero Trust (For Everyone)</title>
		<link>https://jaylongley.com/what-is-zero-trust-for-everyone/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 21 May 2023 13:25:34 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=828</guid>

					<description><![CDATA[<p>What is Zero Trust...This is an explaination for everyone.</p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-everyone/">What is Zero Trust (For Everyone)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine you have a box filled with your favorite toys, and you want to make sure they are safe. Normally, you might let your best friend into your room because you trust them. But what if there&#8217;s a chance someone else could sneak in and take your toys? That&#8217;s where &#8220;zero trust&#8221; comes in.</p>
<p>With zero trust, you don&#8217;t automatically trust anyone who comes into your room, even if they&#8217;re your friend. Instead, you check and make sure they are who they say they are and that they&#8217;re allowed to be there. You might ask them for a secret code or use a special key to open the treasure chest. This way, you&#8217;re being careful and checking everyone before letting them play with your toys.</p>
<p>Zero trust is like having a special security system for your toys. It&#8217;s all about making sure only the right people can access your treasures. This way, even if someone sneaks into your room, they won&#8217;t be able to take your toys because they haven&#8217;t proven themselves trustworthy. It&#8217;s a way to keep your things safe and make sure only the right people can get to them.</p>
<p>If you are looking for a more consumable information on Zero Trust here, check out my article: <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">https://jaylongley.com/what-is-zero-trust-for-technologists/</a></p>
<p>If you would like to learn more about the Federal Government&#8217;s Zero Trust Strategy, you can find that here: <a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf" data-wplink-edit="true">https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf</a></p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-everyone/">What is Zero Trust (For Everyone)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Zero Trust? (For Technologists)</title>
		<link>https://jaylongley.com/what-is-zero-trust-for-technologists/</link>
					<comments>https://jaylongley.com/what-is-zero-trust-for-technologists/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 21 May 2023 13:19:22 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=825</guid>

					<description><![CDATA[<p>What is Zero Trust...Here it is explained for Technologists to review.</p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">What is Zero Trust? (For Technologists)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="825" class="elementor elementor-825">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-c3ae39d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c3ae39d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a1563bb" data-id="6a1563bb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2f7442ff elementor-widget elementor-widget-text-editor" data-id="2f7442ff" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>What is Zero Trust.  In simple terms, it is a cybersecurity strategy that doesn&#8217;t automatically trust users or devices, even if they&#8217;re already inside the network. Unlike traditional models that give broad access once someone is inside, a zero trust framework keeps a tight rein on access. It constantly checks who&#8217;s asking to enter, their device&#8217;s security status, where they are, and what they&#8217;re doing before letting them in. This careful vetting helps stop insider threats and other risks dead in their tracks.</p><p>At its heart, the framework demands that every access request is authenticated and authorized. It doesn&#8217;t matter where the request comes from; the motto is &#8220;never trust, always verify&#8221;. This means always double-checking identities and making sure everyone has just enough access to do their job, nothing more.</p><p>Here are the essentials of zero trust:</p><p>1. Identity-based Access: Who you are matters more than where you are. Access depends on your identity and permissions.<br />2. Least Privilege: Get only the access you need, limiting the damage from any security slip-ups.<br />3. Multi-factor Authentication (MFA): Prove who you are in several ways before getting in.<br />4. Micro-segmentation: Breaking the network into smaller, isolated parts makes it harder for threats to spread.<br />5. Continuous Monitoring: Keeping an eye on user actions, device health, and network traffic spots trouble early.<br />6. Strict Access Controls: Firm rules apply to everyone, no matter where they are or how they connect.</p><p>Embracing zero trust means an organization can better protect its data and systems. By assuming nothing is safe and always verifying, companies can fend off data breaches more effectively.</p><p>For a straightforward explanation of Zero Trust, visit my article:<a href="https://jaylongley.com/what-is-zero-trust-for-technologists/"> https://jaylongley.com/what-is-zero-trust-for-technologists/</a></p><p>To dive deeper into the Federal Government’s Zero Trust Strategy, check this out: <a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf</a></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">What is Zero Trust? (For Technologists)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/what-is-zero-trust-for-technologists/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
