Skip to content

Commit 49a1931

Browse files
authored
Merge pull request #54103 from ceperezb/CEPEREZB-sc900-describe-purview-data-security
new unit
2 parents 484be5a + eff9d04 commit 49a1931

5 files changed

Lines changed: 84 additions & 21 deletions

File tree

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.describe-purview-data-solutions.describe-data-security-investigations
3+
title: Describe Microsoft Purview Data Security Investigations
4+
metadata:
5+
title: Describe Microsoft Purview Data Security Investigations
6+
description: "Describe how Microsoft Purview Data Security Investigations helps organizations investigate data security incidents."
7+
ms.date: 04/03/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 8
12+
content: |
13+
[!include[](includes/6b-describe-data-security-investigations.md)]
Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,11 @@
11
Microsoft Purview is a comprehensive set of integrated data security, data governance, and data compliance solutions that help organizations secure and govern their entire data estate while meeting compliance requirements. This module focuses on Microsoft Purview data security solutions.
22

3-
Microsoft Purview helps organizations protect sensitive data through information protection, data loss prevention, and insider risk management—working together to secure data across its lifecycle, wherever it lives. Adaptive protection brings these solutions together by automatically applying the right level of controls based on each user's current risk level. Data Security Posture Management provides a unified view of your organization's data security landscape across Microsoft and non-Microsoft environments, including visibility into AI interactions.
3+
Microsoft Purview helps organizations protect sensitive data through information protection, data loss prevention, and insider risk management—working together to secure data across its lifecycle, wherever it lives. Adaptive protection brings these solutions together by automatically applying the right level of controls based on each user's current risk level. Data Security Posture Management provides a unified view of your organization's data security landscape across Microsoft and non-Microsoft environments, including visibility into AI interactions. When an incident does occur, Data Security Investigations gives your security team generative AI–powered tools to investigate data breaches and insider leaks quickly and take action to mitigate the damage.
44

55
After completing this module, you're able to:
66

7-
- Describe the data classification capabilities of Microsoft Purview Information Protection, including sensitive information types, trainable classifiers, and the benefits of Content explorer and Activity explorer.
8-
- Describe sensitivity labels and sensitivity label policies in Microsoft Purview.
9-
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent the inappropriate sharing of sensitive data.
10-
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
11-
- Describe how adaptive protection in Microsoft Purview dynamically applies data protection controls based on insider risk levels.
12-
- Describe how Data Security Posture Management in Microsoft Purview provides unified visibility into data risks across Microsoft and non-Microsoft environments.
7+
- Describe the data classification and sensitivity labeling capabilities of Microsoft Purview Information Protection.
8+
- Describe how Microsoft Purview Data Loss Prevention prevents the inappropriate sharing of sensitive data.
9+
- Describe how Microsoft Purview Insider Risk Management and adaptive protection help minimize internal risks.
10+
- Describe how Data Security Posture Management provides unified visibility into data risks.
11+
- Describe how Microsoft Purview Data Security Investigations helps organizations investigate data security incidents.
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
2+
When a data security incident occurs—a data breach, an insider leak, or an unexpected data exposure—your security team needs to understand quickly what data was affected and what risk it creates. Historically, that kind of investigation required significant time and manual effort: downloading files, searching through them one by one, and trying to piece together what was exposed. Microsoft Purview Data Security Investigations is a purpose-built solution for cybersecurity teams. It uses generative AI to help teams analyze large amounts of data and identify the most critical risks faster than traditional methods.
3+
4+
## What is Data Security Investigations?
5+
6+
Data Security Investigations is a Microsoft Purview solution that helps security analysts investigate data security incidents from start to finish. It lets you find and review impacted data, use AI to understand what risks are present, take action to reduce the damage, and collaborate with others in your organization—such as legal, IT, and executive teams—throughout the process.
7+
8+
Think of it like a smart investigation workspace. When an incident happens, you bring the relevant data into the investigation, let the AI analyze it, review what's most at risk, and then take steps to address the problem—all from one place. This is especially helpful for security teams that don't have dedicated forensic tools or that need to respond to a high volume of incidents without a large analyst workforce.
9+
10+
## AI integration
11+
12+
One of the key strengths of Data Security Investigations is its use of generative AI to analyze data quickly. There are three main AI capabilities.
13+
14+
**Vector search** goes beyond keyword matching. Instead of only finding files that contain exact words, it understands the meaning behind your search. If you're looking for files related to client contracts, it surfaces relevant content even if those exact words don't appear in the file. This is useful when you're searching through unfamiliar data or when the language used in files is indirect.
15+
16+
**Categorization** helps you make sense of large amounts of data before committing to a deeper analysis. AI automatically sorts impacted content into categories by subject matter and risk level—using default categories, custom ones you define, or categories that the AI suggests based on what it finds. Your team can quickly see which items carry the most risk and prioritize those items.
17+
18+
**Examination** takes the analysis a step further by scanning file content for specific security risks. It can surface things like exposed credentials, network vulnerabilities, or discussion of threat actor activity buried within files. This is the step that moves from "what data was touched" to "what danger does this data actually represent."
19+
20+
## Common scenarios
21+
22+
Data Security Investigations supports several situations that security teams regularly face.
23+
24+
**Investigate a data breach.** After a security incident, it's often hard to know what sensitive data was exposed. You can use Data Security Investigations to identify intellectual property, personal data, or financial information that might be compromised. For example, if a document containing unfiled patents was downloaded from a risky IP address, you can create an investigation to see who accessed it and take steps to protect or remove the file from circulation.
25+
26+
**Investigate a potential insider data leak.** If Insider Risk Management flags a user who has been sharing files externally, you can open a Data Security Investigations investigation directly from that case. Preliminary insights are available right away, before you commit to deeper processing. When you expand the scope, the data is automatically categorized by risk level so your team knows where to prioritize.
27+
28+
**Proactively assess data risk.** You don't have to wait for an incident. Data Security Investigations also lets you scan specific data sources or a sample of users to look for gaps in your security policies before a problem occurs. This kind of proactive review can reveal risks that existing policies haven't yet addressed.
29+
30+
## Integration with other solutions
31+
32+
Data Security Investigations connects with the security tools your organization might already use, so you can move from an alert to an investigation without starting from scratch. Rather than switching between separate tools and manually copying information, the integrations let signals flow directly into investigations.
33+
34+
- **Insider Risk Management**—When an Insider Risk Management case surfaces a potential data leak, investigators can pass that case directly to Data Security Investigations for deeper content analysis. This closes the gap between detecting a risky behavior and understanding what data was exposed.
35+
- **Microsoft Defender XDR**—From the Microsoft Defender portal, you can open a Data Security Investigations investigation to get deeper insight into the data and users connected to a security alert. This helps your security operations team go beyond the alert itself to understand the data impact.
36+
- **Data Security Posture Management**—When DSPM identifies a potential exfiltration event, you can route that finding to Data Security Investigations. The investigation is automatically scoped to the recently exfiltrated data so your team can quickly assess what was exposed.
37+
- **Unified audit log**—You can query the audit log for user activities—like file downloads or sensitivity label changes—and pull that content into your investigation. Every action taken within Data Security Investigations is also recorded in the audit log, creating a clear record for compliance and legal purposes.
38+
39+
## Taking action
40+
41+
Once you understand what's at risk, Data Security Investigations gives you options to respond directly. You can soft purge items, which moves them to a recoverable deleted state in case you need to restore them later. You can also hard purge items to permanently delete them from the data source.
42+
43+
Beyond removing content, investigation findings give you the context you need to take other protective steps: tightening access controls on affected data sources, working with your IT team to apply extra encryption, or preparing documentation to meet regulatory requirements. Depending on the nature of the data and your organization's location, data protection laws might require that you notify affected individuals or authorities about a breach, and the records generated by an investigation help support that process.
44+
45+
## Billing
46+
47+
Data Security Investigations uses a pay-as-you-go billing model. The solution uses AI analysis powered by large language models and Microsoft Copilot for Security. Organizations pay only for the storage and processing they use, not a fixed per-user license. This means you're not paying for capacity you don't need. You don't need a dedicated enterprise plan to access Data Security Investigations, which makes it available to organizations of different sizes and at different points in their security maturity.

learn-pr/wwl-sci/describe-purview-data-solutions/includes/8-summary.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11

22
In this module, you learned about Microsoft Purview data security solutions.
33

4-
Microsoft Purview helps organizations protect sensitive data across its entire lifecycle by integrating data classification, sensitivity labels, data loss prevention, and insider risk management. Adaptive protection ties these solutions together by dynamically adjusting data protection controls based on the risk level that Insider Risk Management assigns to each user. This integrated approach helps organizations balance data security with productivity while meeting regulatory requirements.
4+
Microsoft Purview helps organizations protect sensitive data across its entire lifecycle by integrating data classification, sensitivity labels, data loss prevention, and insider risk management. Adaptive protection ties these solutions together by dynamically adjusting data protection controls based on the risk level that Insider Risk Management assigns to each user. Data Security Posture Management extends this picture by providing unified visibility into data risks across Microsoft and non-Microsoft environments. And when an incident occurs, Data Security Investigations gives your security team AI-powered tools to investigate data breaches and insider leaks quickly, categorize impacted data by risk level, and take direct action to mitigate the damage.
55

66

77
Now that you’ve completed this module, you should be able to:
88

9-
- Describe the data classification capabilities of Microsoft Purview Information Protection, including sensitive information types, trainable classifiers, and the benefits of Content explorer and Activity explorer.
10-
- Describe sensitivity labels and sensitivity label policies in Microsoft Purview.
11-
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent the inappropriate sharing of sensitive data.
12-
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
13-
- Describe how adaptive protection in Microsoft Purview dynamically applies data protection controls based on insider risk levels.
9+
- Describe the data classification and sensitivity labeling capabilities of Microsoft Purview Information Protection.
10+
- Describe how Microsoft Purview Data Loss Prevention prevents the inappropriate sharing of sensitive data.
11+
- Describe how Microsoft Purview Insider Risk Management and adaptive protection help minimize internal risks.
12+
- Describe how Data Security Posture Management provides unified visibility into data risks.
13+
- Describe how Microsoft Purview Data Security Investigations helps organizations investigate data security incidents.
1414

1515
## Learn more
1616

@@ -44,4 +44,8 @@ The following resources provide more information on the topics covered in this m
4444
### Describe Data Security Posture Management in Microsoft Purview
4545

4646
- [Learn about Data Security Posture Management](/purview/data-security-posture-management-learn-about)
47-
- [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview)
47+
- [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview)
48+
49+
### Describe Microsoft Purview Data Security Investigations
50+
51+
- [Learn about Data Security Investigations](/purview/data-security-investigations)

learn-pr/wwl-sci/describe-purview-data-solutions/index.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.describe-purview-data-solutions
33
metadata:
44
title: Describe the Data Security Solutions of Microsoft Purview
55
description: "Describe the data security solutions of Microsoft Purview."
6-
ms.date: 04/01/2026
6+
ms.date: 04/03/2026
77
author: wwlpublish
88
ms.author: ceperezb
99
ai-usage: ai-assisted
@@ -13,12 +13,11 @@ title: Describe the data security solutions of Microsoft Purview
1313
summary: "Describe the data security solutions of Microsoft Purview."
1414
abstract: |
1515
By the end of this module, you'll be able to:
16-
- Describe the data classification capabilities of Microsoft Purview Information Protection, including sensitive information types, trainable classifiers, and the benefits of Content explorer and Activity explorer.
17-
- Describe sensitivity labels and sensitivity label policies in Microsoft Purview.
18-
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent the inappropriate sharing of sensitive data.
19-
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
20-
- Describe how adaptive protection in Microsoft Purview dynamically applies data protection controls based on insider risk levels.
21-
- Describe how Data Security Posture Management in Microsoft Purview provides unified visibility into data risks across Microsoft and non-Microsoft environments.
16+
- Describe the data classification and sensitivity labeling capabilities of Microsoft Purview Information Protection.
17+
- Describe how Microsoft Purview Data Loss Prevention prevents the inappropriate sharing of sensitive data.
18+
- Describe how Microsoft Purview Insider Risk Management and adaptive protection help minimize internal risks.
19+
- Describe how Data Security Posture Management provides unified visibility into data risks.
20+
- Describe how Microsoft Purview Data Security Investigations helps organizations investigate data security incidents.
2221
prerequisites: |
2322
- General understanding of networking and cloud computing concepts.
2423
- General IT knowledge or any general experience working in an IT environment.
@@ -42,6 +41,7 @@ units:
4241
- learn.describe-purview-data-solutions.describe-insider-risk-management
4342
- learn.describe-purview-data-solutions.describe-adaptive-protection
4443
- learn.describe-purview-data-solutions.describe-data-security-posture-management
44+
- learn.describe-purview-data-solutions.describe-data-security-investigations
4545
- learn.describe-purview-data-solutions.knowledge-check
4646
- learn.describe-purview-data-solutions.summary
4747
badge:

0 commit comments

Comments
 (0)