{"id":46388,"date":"2022-01-04T03:52:00","date_gmt":"2022-01-04T08:52:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46388"},"modified":"2022-01-04T03:52:00","modified_gmt":"2022-01-04T08:52:00","slug":"how-to-visualise-security-and-threat-information-in-microsoft-power-bi","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2022\/01\/04\/how-to-visualise-security-and-threat-information-in-microsoft-power-bi\/","title":{"rendered":"How to visualise security and threat information in Microsoft Power BI"},"content":{"rendered":"\n<p>The ability to compile and visualize data from multiple sources is not anything new.  As the article mentions Excel has been doing it for years including charting.  The self-service aspect of <strong>Power BI<\/strong> and it&#8217;s broad spectrum of integration sources are the keys to adoption and benefit.  Changing reporting criteria with a mouse click puts the power in the casual user&#8217;s hands.   <\/p>\n\n\n\n<p>The best way to think of Microsoft <strong>Power BI<\/strong> is as the next generation of Excel. And like Excel, it&#8217;s not just useful for business analysts and data engineers; IT pros can also take advantage of it for understanding large amounts of data. If the security tools you use don&#8217;t have dashboards and reports that help you quickly grasp what&#8217;s going on with your systems, you can build them yourself in Power BI \u2014 and you don&#8217;t need to be an expert in analytics to create something useful.<\/p>\n\n\n\n<p>&#8220;With very little training, we have seen folks creating detailed and interactive reports that really help with compliance, audit, and security reporting,&#8221; Amir Netz, technical fellow and chief technology officer for <strong>Power BI<\/strong>, told TechRepublic.<\/p>\n\n\n\n<p>Obviously, you can use Microsoft <strong>Power B<\/strong>I to monitor <strong>Power BI<\/strong> usage, using the <strong>Power BI <\/strong>Admin APIs to track who is accessing data and visualisations and make sure it&#8217;s only the people you expect to have access to what might be critical or confidential business information (which role-based access and Microsoft Information Protection will ensure, as long as you&#8217;ve set that up). Monitoring user access permissions on <strong>Power BI<\/strong> workspace and artifacts means the IT department can feel sure sure they follow auditing and security requirements, Netz said.<\/p>\n\n\n\n<p>That can apply to any critical enterprise assets, thanks to <strong>Power BI <\/strong>integration with Microsoft Cloud App Security and Microsoft 365 compliance tools. &#8220;Microsoft Cloud App Security enables organizations to monitor and control, in real time, risky <strong>Power BI<\/strong> sessions such as user access from unmanaged devices. Security administrators can define policies to control user actions, such as downloading reports with sensitive information. With <strong>Power BI<\/strong>&#8216;s MCAS integration, you can set monitoring policy and anomaly detection and augment <strong>Power BI<\/strong> user activity with the MCAS activity log.&#8221;  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.techrepublic.com\/article\/how-to-visualise-security-and-threat-information-in-power-bi\/&amp;ct=ga&amp;cd=CAEYASoUMTgxOTY4NDQxNTM2MDMwMTc4NjQyGjMxYjVmYmY3MThkMmVmYWM6Y29tOmVuOlVT&amp;usg=AFQjCNFz2RiOIUGtMI_c_UZ6Dmv-K5CeWQ\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ability to compile and visualize data from multiple sources is not anything new. As the article mentions Excel has been doing it for years including charting. The self-service aspect of Power BI and it&#8217;s broad spectrum of integration sources <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2022\/01\/04\/how-to-visualise-security-and-threat-information-in-microsoft-power-bi\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46389,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[644,14],"tags":[645,150],"class_list":["post-46388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-power-bi","category-security","tag-power-bi","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46388"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}