Skip to content

Commit 6c3abcf

Browse files
Merge pull request #53264 from riswinto/main
change wording for unit handoffs
2 parents 8befeb6 + 9faeccd commit 6c3abcf

9 files changed

Lines changed: 12 additions & 9 deletions

File tree

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/adaptive-protection-data-loss-prevention.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,3 +59,4 @@ Extending DLP with adaptive behavior makes sense when:
5959
- Static policies no longer scale with real usage patterns
6060

6161
When applied intentionally, risk-based behavior extends DLP capabilities without sacrificing clarity or control.
62+

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/define-policy-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,4 +74,4 @@ This includes workflows where:
7474

7575
In these cases, detection quality matters more than aggressive enforcement. Clear, accurate detection helps ensure policies respond to real risk instead of incidental use.
7676

77-
With detection defined, the next step is deciding where the policy should apply and who it should affect.
77+
With detection defined, scope becomes the deciding factor for whether those signals create insight or noise.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/guided-walkthrough-create-policy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,9 +211,11 @@ Understanding how policy type, location, detection, actions, and simulation mode
211211

212212
## Additional scenarios
213213

214-
This walkthrough focuses on a file-based sharing scenario to show how DLP policy decisions appear during creation.
214+
This walkthrough uses a file-sharing scenario to illustrate how DLP policy decisions come together during creation.
215215

216-
The Microsoft documentation includes additional guided scenarios that apply the same concepts to other locations and data types. These scenarios are most closely aligned with the topics covered here:
216+
The same decision process applies to other locations and data types. Microsoft documentation includes guided scenarios that show how these concepts translate to email, SharePoint, OneDrive, and other common risk patterns.
217+
218+
These scenarios apply the same policy decision patterns in different contexts:
217219

218220
- [Create and deploy data loss prevention policies](/purview/dlp-create-deploy-policy?azure-portal=true)
219221
- [Help prevent sharing sensitive items via SharePoint and OneDrive with external users](/purview/dlp-create-policy-spo-odb-external?azure-portal=true)

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/manage-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,4 +93,4 @@ Frequent alerts don't automatically indicate failure. In many cases, they highli
9393

9494
Viewed this way, alerts act as feedback rather than punishment. They help guide thoughtful updates that improve protection while minimizing disruption.
9595

96-
Understanding how to interpret and respond to alerts is the next step in managing DLP effectively.
96+
When static rules no longer scale with behavior, enforcement needs additional context.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,4 +71,4 @@ Patterns in justifications can help answer questions like:
7171

7272
Using this feedback helps improve policy quality over time.
7373

74-
With actions defined, the policy is ready to be validated and refined before enforcement.
74+
Any action choice carries assumptions, and those assumptions need to be tested before enforcement.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-intent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ When policy behavior aligns with real workflows:
4444
- Users are more likely to understand enforcement decisions
4545
- Policies act as guardrails instead of obstacles
4646

47-
With clear intent and well-defined boundaries, policy creation becomes a deliberate design exercise rather than a trial-and-error configuration task.
47+
Once intent is clear, the next constraint becomes how much control the policy needs from the start.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-scope.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,4 +82,4 @@ For example, a policy might apply to browser-based AI tools while allowing appro
8282

8383
Rather than blocking entire categories of activity, deliberate scoping helps ensure policies address risky behavior without preventing acceptable use.
8484

85-
With scope defined, the next step is deciding how the policy should respond when risky activity occurs.
85+
Once scope is set, enforcement choices determine whether protection guides behavior or disrupts it.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-validation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,4 +79,4 @@ Once enforced, policies should continue to be reviewed and refined as:
7979

8080
Viewing validation as the beginning of a lifecycle helps keep policies relevant and effective over time.
8181

82-
With validation complete, you can move the policy into enforcement with confidence in how it behaves.
82+
Validation confirms readiness, but real environments continue to change once enforcement begins.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/template-custom-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,4 +58,4 @@ Clear naming helps:
5858

5959
This matters even more as policies grow in number and complexity.
6060

61-
With a clear starting point and well-defined intent, you're ready to move from planning into defining what the policy actually detects.
61+
The starting point defines how much freedom you have, but detection determines whether the policy actually reflects risk.

0 commit comments

Comments
 (0)