AAS explained: Pay-as-you-go consumption-based IT services. Scale easily, cut costs. Explore SaaS, PaaS, IaaS & Softsource vBridge advantages.
ENHANCING SECURITY
ENHANCING SECURITY
Today, data compliance isn’t just a box-ticking exercise, it’s a cornerstone of trust and legality in New Zealand. Ensuring the protection of information is a necessary requirement, for your own efficiencies, and for maintaining public confidence and meeting stringent legal criteria.
For organisations, this means managing data with a high degree of responsibility, safeguarding privacy at every turn, and steering clear of hefty penalties. It’s about building a robust framework for access and accuracy while navigating the complex landscape of data regulations.
Reducing Storage Requirements
It's a no brainer – Minimising storage means reduced costs and improved performance. Implementing data deduplication and archiving strategies can significantly cut down on unnecessary data storage.
Clean Data for Accurate Metrics
Clean data is the backbone of reliable analytics. With accurate and consistent data accuracy you can access meaningful insights and metrics, vital for informed decision-making.
Single Source of Truth
This is about creating a seamless flow of information that everyone in the organisation can rely on, ensuring decisions are made with the most accurate data available.
Ethical and Environmental Considerations
Responsible data management also involves ethical handling of data and considering the environmental impact of data storage. Adopting green data practices, such as using energy-efficient data centers, contributes to sustainability.
Security and Compliance
Implementing strong security measures, such as data classification, access controls, encryption, and regular updates, is crucial for protecting data and ensuring compliance.
Let's dive deeper into Security and compliance, and the tools available in the Microsoft arsenal to help you maintain a secure, compliant, and efficient operational environment.
This feature in Microsoft 365 is designed to help SharePoint administrators manage and secure their organisation’s data.
Administrators can create an “allowed list” of SharePoint sites that are for all user access. This helps prevent sensitive or irrelevant information (e.g., employee salary files) from appearing in organisation-wide search results and through Copilot.
When enabled, only sites and content that users have permission to access will appear in search results or within sites themselves. This ensures that users only see appropriate, role related and secure content.
Even with Restricted SharePoint Search enabled, users can still interact with files and content they own or have accessed before. It’s all about keeping things secure without sacrificing convenience, although can mean less available information for Copilot to pull from, affecting the depth of its responses.
Data Security
By limiting search results to approved sites, businesses can prevent sensitive or irrelevant information from being exposed to unauthorised users.
Compliance
Ensures only compliant and reviewed content is accessible, supporting regulatory requirements and internal policies.
Efficiency
Users find relevant information faster, improving productivity and reducing the risk of data breaches.
A feature in Microsoft Entra ID designed to help administrators manage and secure access to their organisation’s resources.
Policies can be created that control access based on various conditions, such as user location, device, and risk level. This helps ensure that only authorised users can access sensitive information and applications.
Conditional Access Policies enforce specific actions, like enforcing multi-factor authentication (MFA) or changing access requirements at untrusted locations (e.g., airports). This ensures that users only access resources in a secure and compliant manner.
With Conditional Access enabled, users can still access resources they are authorised for, but with added security measures in place. It’s all about balancing security and convenience and ensuring robust protection without hindering productivity.
Data Security
By enforcing access controls based on conditions, businesses can prevent unauthorised access to sensitive information.
Compliance
Ensures that access to resources complies with regulatory requirements and internal policies, supporting data governance and legal obligations.
Efficiency
Users can securely access resources from anywhere, and from most devices, improving productivity while reducing the risk of unauthorised access.
Together, these tools help businesses protect their data, comply with regulations, and maintain efficient and secure operations.
Want to get ahead with policy based protection? Contact [email protected] to discuss how your business can improve from better data management practices.
You'll need the SharePoint Online Management Shell Application, Administrator access, and experience with PowerShell
Step 1. Check Current Status
Open SharePoint Online Management Shell.
Run the following PowerShell command to check if Restricted SharePoint Search is enabled.
Get-SPOTenantRestrictedSearchMode
This will return either Enabled or Disabled.
Step 2. Enable Restricted SharePoint Search
If the status is Disabled, enable it by running.
Set-SPOTenantRestrictedSearchMode -Mode Enabled
Step 3. Create an Allowed List
Identify the SharePoint sites you want to include in the allowed list.
Add these sites to the allowed list using the following command.
Add-SPOSiteToRestrictedSearchList -SiteUrl "https.//yourtenant.sharepoint.com/sites/sitename"
Repeat this step for each site you want to add.
Step 4. Verify the Allowed List
To see the current allowed list, run.
Get-SPOSiteFromRestrictedSearchList
Step 5. Manage the Allowed List
To remove a site from the allowed list, use.
Remove-SPOSiteFromRestrictedSearchList -SiteUrl "https.//yourtenant.sharepoint.com/sites/sitename"
Step 6. Monitor and Adjust
Regularly review and update the allowed list to ensure it meets your organisation’s needs.
Ensure that site permissions and data governance practices are up-to-date.
Creating Conditional Access policies helps you manage and secure access to your organisation’s resources. Here’s a step-by-step guide to get you started in Microsoft Entra ID
Step 1. Administrator Access
Sign in to the Microsoft Entra admin center with your admin credentials.
From the left-hand menu Navigate to Security > Click on Conditional Access.
Step 2. Create a New Policy
Click on + New policy to start creating a new Conditional Access policy.
Step 3. Configure Assignments
Select Users and Groups / Choose the users and groups to which this policy will apply. For example, you might include all employees but exclude the IT admin group.
Choose Cloud Apps or Actions / Select the cloud apps or actions that the policy will target. For instance, you might target Microsoft Teams and Outlook.
Step 4. Set Conditions
Risk Level / Apply the policy based on the risk level of the sign-in attempt. For example, require MFA for high-risk sign-ins.
Device Platforms / Target specific device platforms like iOS, Android, Windows, etc. For example, apply the policy only to Android devices.
Location / Apply the policy based on the geographic location or IP address of the sign-in attempt. For instance, enforce stricter controls for sign-ins from outside New Zealand.
Client Apps / Specify the types of client apps (e.g., browser, mobile apps) that the policy will affect. For example, apply the policy to all mobile apps.
Step 5. Configure Access Controls
Grant Controls / Choose the controls that must be satisfied to grant access. For example, require multi-factor authentication (MFA) or a compliant device.
Session Controls / Configure session controls to manage user access during a session, such as limiting the duration of the session or requiring reauthentication.
Step 6. Enable the Policy
Review your settings and enable the policy. It’s a good practice to test the policy with a small group of users before rolling it out organisation-wide.
Step 7. Monitor and Adjust
After enabling the policy, monitor its impact and make adjustments as necessary. You can view reports and logs to see how the policy is being applied and ensure it meets your security requirements.
AAS explained: Pay-as-you-go consumption-based IT services. Scale easily, cut costs. Explore SaaS, PaaS, IaaS & Softsource vBridge advantages.
Data sovereignty is more than just data residency—it’s about legal control and compliance. With major regulatory changes coming in 2025, businesses must act now.
Cybercrime-as-a-service is on the rise, making businesses of all sizes potential targets. Learn how outsourced hacking works and discover five key strategies to protect your organisation from sophist
AI-driven computers boost productivity with features like AI audio/video optimization and auto-lock. Find out about the pros and cons and how they can benefit your organisation.
Discover how cloud-native approaches transform NZ organisations by enhancing scalability, agility, and AI capabilities with on-demand scalability, flexible deployment, advanced security, and savings.