You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-microsoft-365/includes/4a-evaluate-solutions-securing-data-microsoft-purview.md
+14-5Lines changed: 14 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ A sensitivity label can apply any combination of:
18
18
19
19
-**Encryption** that restricts who can access the content and what usage rights they have (view, edit, copy, print, forward).
20
20
-**Content markings** such as headers, footers, and watermarks that provide visual indicators of sensitivity.
21
-
-**Access restrictions** that prevent specific actions like forwarding emails or copying content.
21
+
-**Container protection** that controls privacy settings, external sharing, and guest access for Microsoft 365 Groups, Teams sites, and SharePoint sites.
22
22
23
23
**Label policies** control which labels are available to which users, set default labels for new content, and determine whether users must justify downgrading or removing a label. You can scope policies to specific groups or departments.
24
24
@@ -39,6 +39,7 @@ DLP policies can target the following locations:
39
39
|**Microsoft Teams**| Chat messages and channel messages |
40
40
|**Windows and macOS endpoints**| Files on user devices, including copy to USB, upload to cloud, and print actions |
41
41
|**Non-Microsoft cloud apps**| Content in third-party SaaS apps connected through Defender for Cloud Apps |
42
+
|**Fabric and Power BI**| Items in Fabric and Power BI workspaces |
42
43
|**On-premises repositories**| Files in on-premises file shares and SharePoint Server |
43
44
44
45
Each DLP policy defines conditions based on sensitive information types, sensitivity labels, or trainable classifiers, and specifies actions such as blocking, auditing, or notifying users with policy tips. You can configure rules with different severity levels to distinguish between low-volume accidental sharing and high-volume potential exfiltration.
@@ -59,13 +60,20 @@ Information Barriers restrict two-way communication and collaboration between sp
59
60
60
61
When Information Barrier policies are active, restricted users can't find, chat with, call, or share files with each other. The restrictions apply across Teams channels, SharePoint sites, and OneDrive sharing. Policies are defined by segmenting users based on Microsoft Entra attributes such as department, role, or location, and then creating policies that block or allow communication between segments.
61
62
62
-
## Evaluate Data Security Posture Management
63
+
## Evaluate Data Security Posture Management (preview)
63
64
64
-
Data Security Posture Management (DSPM) unifies visibility across Microsoft Purview solutions by organizing data security activities around specific objectives. Rather than managing individual solutions separately, DSPM presents guided workflows that group related actions from information protection, DLP, Insider Risk Management, and eDiscovery.
65
+
Data Security Posture Management (DSPM) unifies visibility across Microsoft Purview solutions by organizing data security activities around specific objectives. Rather than managing individual solutions separately, DSPM presents guided workflows that group related actions from information protection, DLP, Insider Risk Management, and Data Security Investigations.
65
66
66
-
DSPM continuously scans your environment to identify where sensitive data resides, who can access it, and whether protection policies cover it. Key objectives include preventing oversharing, preventing exfiltration to risky locations, and discovering unprotected sensitive data. Each objective provides metrics, recommended actions, and one-click policies to accelerate remediation.
67
+
DSPM continuously scans your environment to answer four fundamental questions:
67
68
68
-
The DSPM dashboard answers four fundamental data security questions: What data do you have? Where is it stored? Who can access it? How is it protected?
69
+
- What data do you have?
70
+
- Where is it stored?
71
+
- Who can access it?
72
+
- How is it protected?
73
+
74
+
Security objectives include preventing oversharing, preventing exfiltration to risky locations, discovering unprotected sensitive data, and preventing data exposure in Microsoft 365 Copilot and agent interactions. Each objective provides metrics, recommended actions, and one-click policies to accelerate remediation.
75
+
76
+
DSPM natively includes AI observability, which tracks AI app and agent activity, identifies sensitive data referenced in AI interactions, and surfaces oversharing risks specific to generative AI workloads. This capability provides the data security foundation that the AI-specific controls covered in the next unit build on.
69
77
70
78
## Design considerations for security architects
71
79
@@ -77,6 +85,7 @@ When you evaluate Microsoft Purview data security solutions, consider the follow
77
85
-**Reserve DKE for specific use cases.** DKE excludes content from Microsoft 365 service processing. Evaluate the trade-offs carefully and use DKE only when regulatory requirements demand customer-only decryption control.
78
86
-**Implement Information Barriers early in regulated environments.** Barrier policies affect collaboration across Teams, SharePoint, and OneDrive. Plan user segmentation during the design phase to avoid disruptions after deployment.
79
87
-**Use DSPM as your operational dashboard.** DSPM consolidates insights from multiple Purview solutions into objective-based workflows. Use it to track posture metrics, prioritize remediation, and report progress against data security goals.
88
+
-**Leverage Adaptive Protection to connect risk signals with enforcement.** Adaptive Protection integrates Insider Risk Management risk levels with DLP policies and Conditional Access, dynamically adjusting enforcement based on user behavior.
80
89
81
90
In the next unit, you evaluate how these Purview capabilities extend specifically to protect AI interactions in Microsoft 365 Copilot.
0 commit comments