{"id":12951,"date":"2024-01-08T15:12:52","date_gmt":"2024-01-08T23:12:52","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/?p=12951"},"modified":"2025-10-17T11:14:02","modified_gmt":"2025-10-17T18:14:02","slug":"protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/","title":{"rendered":"Protecting against oversharing Power BI reports with Microsoft Sentinel"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"122\" class=\"size-medium wp-image-7436 alignright\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-stories-300x122.png\" alt=\"Microsoft Digital stories\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-stories-300x122.png 300w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-stories.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Microsoft Power BI is an essential tool for monitoring performance, identifying trends, and developing stunning data visualizations that many teams across Microsoft use every day. A well-built Power BI report can play a critical role in helping communicate business information efficiently and effectively. But with great Power BI reports comes great responsibility, which includes keeping data and reports secure, and ensuring that only the right people have access to it.<\/p>\n<p>Across Microsoft, we use <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention\" target=\"_blank\" rel=\"noopener\">Microsoft Purview Data Loss Prevention (DLP)<\/a>, which is <a href=\"https:\/\/powerbi.microsoft.com\/en-us\/blog\/announcement-microsoft-purview-data-loss-prevention-policies-for-power-bi-are-now-generally-available-ga\/\" target=\"_blank\" rel=\"noopener\">now in general availability<\/a>, to help secure our data. Purview DLP policies allow administrators to comply with governmental and industry regulations such as the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), and automatically detect sensitive information to prevent data leaks. These policies can now also uncover data that might have accidentally been uploaded to Power BI without your knowledge.<\/p>\n<p>While Purview\u2019s controls ensure sensitive data is handled appropriately, we learned from customer research that sensitive data can be accidentally overshared with unauthorized individuals when large audience groups are inadvertently granted access to the report. This often happens when report owners grant access to Power BI reports without first checking who is authorized to view them\u2014both inside and outside data boundaries.<\/p>\n<blockquote class=\"quote-body\"><p>We wanted to find a solution that would prevent this kind of unintentional oversharing and make it easy for Power BI administrations to set up, use, and configure.<\/p>\n<p class=\"source\">\u2014 Prathiba Enjeti, senior program manager, Microsoft Digital Security and Resilience team<\/p>\n<\/blockquote>\n<p>To address this problem, Microsoft Digital Security and Resilience collaborated with the Microsoft Sentinel product group to develop an out-of-the-box Microsoft Sentinel solution for Power BI reports to detect and respond to oversharing. Using the Power BI connector for Microsoft Sentinel, which is <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/data-connectors\/microsoft-powerbi\" target=\"_blank\" rel=\"noopener\">now available in preview<\/a><u>,<\/u> you can track user activity in your Power BI environment with Microsoft Sentinel using Power BI audit logs. This solution helps administrators to identify potential data leaks with automatically generated reports.<\/p>\n<h2>How it works<\/h2>\n<blockquote class=\"quote-body\"><p>With Microsoft Sentinel playbook automation for Power BI detection, the SOC can achieve higher productivity and efficiency, saving analysts\u2019 time and energy for investigative tasks.<\/p>\n<p class=\"source\">\u2014 Prathiba Enjeti, senior program manager, Microsoft Digital Security and Resilience team<\/p>\n<\/blockquote>\n<figure id=\"attachment_12961\" aria-describedby=\"caption-attachment-12961\" style=\"width: 242px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-12961 size-medium\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-242x300.jpg\" alt=\"Enjeti faces the camera standing outside in a natural area.\" width=\"242\" height=\"300\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-242x300.jpg 242w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-825x1024.jpg 825w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-768x954.jpg 768w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-1237x1536.jpg 1237w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-1649x2048.jpg 1649w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME-870x1080.jpg 870w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578-Sentinel-for-Power-BI-SME.jpg 1939w\" sizes=\"auto, (max-width: 242px) 100vw, 242px\" \/><figcaption id=\"caption-attachment-12961\" class=\"wp-caption-text\">Prathiba Enjeti is a senior security program manager on the Microsoft Security Standards and Configuration team.<\/figcaption><\/figure>\n<p>Our oversharing detection logic uses Power BI audit logs, which are cross-referenced against Microsoft Sentinel-generated watchlists that track high-risk security groups. When a report is shared with a group that exceeds a specified number of users, the detection is triggered. Thresholds can be adjusted by administrators to suit any organization\u2019s needs and policies.<\/p>\n<p>Additionally, we used the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/automate-responses-with-playbooks\" target=\"_blank\" rel=\"noopener\">Microsoft Sentinel playbook<\/a> to automate the remediation process. We configured it to automatically send email notifications containing remediation instructions to report owners. From our discussions with customers, we learned that some organizations preferred that accountability remain with the Power BI report owners for various periods of time to remediate, before escalating to the tenant administrators. To meet customer needs for flexibility, administrators can configure time spans ranging from instantaneous escalation, to hours, days, and weeks.<\/p>\n<p>\u201cWith Microsoft Sentinel playbook automation for Power BI detection, the SOC can achieve higher productivity and efficiency, saving analysts\u2019 time and energy for investigative tasks,\u201d Enjeti says.<\/p>\n<p>Automating how cases of data oversharing are found and fixed will allow IT administrators to detect, notify, and limit access to Power BI reports in real time. We\u2019re excited to bring this Microsoft Sentinel solution to our customers, which will be available for public release soon.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"74\" class=\"alignnone size-medium wp-image-7448\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png\" alt=\"Key Takeaways\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png 300w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h2>\n<p>Here are some suggestions for tackling oversharing at your company:<\/p>\n<ul class=\"c-list\">\n<li>Oversharing of data is a problem that many organizations face. They might not be aware of the magnitude of the problem. If you don\u2019t already, consider auditing distribution and security groups used by employees to share information.<\/li>\n<li>Understand where potential data loss issues might be occurring. Be sure to enable data loss prevention policies wherever possible.<\/li>\n<li>Consider implementing detections and automated workflows solutions such as the Microsoft Sentinel solution for Power BI reports oversharing to reduce manual effort and reduce time to identify and remediate oversharing.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11919\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-300x68.png\" alt=\"Try it out\" width=\"360\" height=\"82\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-300x68.png 300w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-1024x234.png 1024w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-768x175.png 768w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out.png 1319w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/pricing\/offers\/sentinel-microsoft-365-offer\/?ef_id=_k_38ccfa3813711dc0bc0c9faf1444bc74_k_&amp;OCID=AIDcmm5edswduu_SEM__k_38ccfa3813711dc0bc0c9faf1444bc74_k_&amp;msclkid=38ccfa3813711dc0bc0c9faf1444bc74?OCID=InsideTrack_Product_10578\" target=\"_blank\" rel=\"noopener\">Try Microsoft Sentinel at your company.<\/a><\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"81\" class=\"alignnone size-medium wp-image-7482\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png\" alt=\"Related links\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png 300w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h2>\n<ul class=\"c-list\">\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/moving-to-next-generation-siem-at-microsoft-with-microsoft-azure-sentinel\/\">Explore moving to next-generation SIEM at Microsoft with Microsoft Sentinel.<\/a><\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/boosting-microsofts-response-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\">Discover building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State.<\/a><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12081 size-full\" style=\"margin-top: 15px;\" src=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1.png\" alt=\"We'd like to hear from you!\" width=\"580\" height=\"85\" srcset=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1.png 580w, https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1-300x44.png 300w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/p>\n<p><a href=\"https:\/\/forms.office.com\/r\/czbs6PptPe\">Please share your feedback with us\u2014take our survey and let us know what kind of content is most useful to you.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Power BI is an essential tool for monitoring performance, identifying trends, and developing stunning data visualizations that many teams across Microsoft use every day. A well-built Power BI report can play a critical role in helping communicate business information efficiently and effectively. But with great Power BI reports comes great responsibility, which includes keeping [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":12954,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71],"tags":[331,848],"coauthors":[138],"class_list":["post-12951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","tag-data-and-ai","tag-security-and-risk-management","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Against Oversharing Power BI Reports with Microsoft Sentinel<\/title>\n<meta name=\"description\" content=\"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Against Oversharing Power BI Reports with Microsoft Sentinel\" \/>\n<meta property=\"og:description\" content=\"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T23:12:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T18:14:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lukas Velush\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/luvelush\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lukas Velush\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/\"},\"author\":{\"name\":\"Lukas Velush\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/9a0f1c52bf68827638ed385b108d2e35\"},\"headline\":\"Protecting against oversharing Power BI reports with Microsoft Sentinel\",\"datePublished\":\"2024-01-08T23:12:52+00:00\",\"dateModified\":\"2025-10-17T18:14:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/\"},\"wordCount\":774,\"image\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/01\\\/10578_Sentinel_for_Power_BI_hero.jpg\",\"keywords\":[\"Data and AI\",\"Security and risk management\"],\"articleSection\":[\"Featured\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/\",\"name\":\"Protecting Against Oversharing Power BI Reports with Microsoft Sentinel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/01\\\/10578_Sentinel_for_Power_BI_hero.jpg\",\"datePublished\":\"2024-01-08T23:12:52+00:00\",\"dateModified\":\"2025-10-17T18:14:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/9a0f1c52bf68827638ed385b108d2e35\"},\"description\":\"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/01\\\/10578_Sentinel_for_Power_BI_hero.jpg\",\"contentUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/01\\\/10578_Sentinel_for_Power_BI_hero.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We use Microsoft Sentinel as our security information and event management (SIEM) solution to limit accidental oversharing at Microsoft.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting against oversharing Power BI reports with Microsoft Sentinel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/9a0f1c52bf68827638ed385b108d2e35\",\"name\":\"Lukas Velush\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g3598919c570ecead29b9b22837aad0ca\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g\",\"caption\":\"Lukas Velush\"},\"description\":\"Lukas Velush tells the story of how Microsoft uses its own technology on this blog and on the Microsoft Digital Inside Track website (link near the top left of your screen). He's a recovering journalist who needs to not take himself too seriously.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/lukas-velush-5573762\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/luvelush\"],\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/insidetrack\\\/blog\\\/author\\\/lukas-velush\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Against Oversharing Power BI Reports with Microsoft Sentinel","description":"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Against Oversharing Power BI Reports with Microsoft Sentinel","og_description":"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.","og_url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/","og_site_name":"Inside Track Blog","article_published_time":"2024-01-08T23:12:52+00:00","article_modified_time":"2025-10-17T18:14:02+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","type":"image\/jpeg"}],"author":"Lukas Velush","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/luvelush","twitter_misc":{"Written by":"Lukas Velush","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/"},"author":{"name":"Lukas Velush","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/#\/schema\/person\/9a0f1c52bf68827638ed385b108d2e35"},"headline":"Protecting against oversharing Power BI reports with Microsoft Sentinel","datePublished":"2024-01-08T23:12:52+00:00","dateModified":"2025-10-17T18:14:02+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/"},"wordCount":774,"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","keywords":["Data and AI","Security and risk management"],"articleSection":["Featured"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/","url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/","name":"Protecting Against Oversharing Power BI Reports with Microsoft Sentinel","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","datePublished":"2024-01-08T23:12:52+00:00","dateModified":"2025-10-17T18:14:02+00:00","author":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/#\/schema\/person\/9a0f1c52bf68827638ed385b108d2e35"},"description":"Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing at Microsoft.","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","width":2300,"height":1293,"caption":"We use Microsoft Sentinel as our security information and event management (SIEM) solution to limit accidental oversharing at Microsoft."},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/protecting-against-oversharing-power-bi-reports-with-microsoft-sentinel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting against oversharing Power BI reports with Microsoft Sentinel"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/#\/schema\/person\/9a0f1c52bf68827638ed385b108d2e35","name":"Lukas Velush","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g3598919c570ecead29b9b22837aad0ca","url":"https:\/\/secure.gravatar.com\/avatar\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/084d8da5c208fc0fff3f36c46e508e9a706b1d8a928ad139b5a720a54cd5b263?s=96&d=mm&r=g","caption":"Lukas Velush"},"description":"Lukas Velush tells the story of how Microsoft uses its own technology on this blog and on the Microsoft Digital Inside Track website (link near the top left of your screen). He's a recovering journalist who needs to not take himself too seriously.","sameAs":["https:\/\/www.linkedin.com\/in\/lukas-velush-5573762\/","https:\/\/x.com\/https:\/\/twitter.com\/luvelush"],"url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/author\/lukas-velush\/"}]}},"jetpack_featured_media_url":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/uploads\/prod\/2024\/01\/10578_Sentinel_for_Power_BI_hero.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-3mT","_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/12951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=12951"}],"version-history":[{"count":13,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/12951\/revisions"}],"predecessor-version":[{"id":12970,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/12951\/revisions\/12970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/12954"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=12951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=12951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=12951"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=12951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}