You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/purview-data-security-investigations-understand/includes/data-security-investigation-understand.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,8 @@ For example, an alert might show a file was downloaded. An activity-based invest
4
4
5
5
A data security investigation exists to close that gap.
6
6
7
+
8
+
7
9
## How data security investigations differ from activity-based investigation
8
10
9
11
Traditional security investigation often starts with activity. An alert fires, a user performs an action, or a signal indicates something unusual. From there, the investigation focuses on timelines, indicators, and behavior.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/data-security-objectives.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,8 @@ Data security objectives exist to solve that problem.
8
8
9
9
In data security posture management (DSPM), objectives are the primary way risk is organized and addressed. An objective represents a specific outcome related to data security, like reducing oversharing, limiting exposure, or strengthening protection for sensitive data.
10
10
11
+
:::image type="content" source="../media/objectives-as-outcomes.png" border="false" alt-text="Diagram showing objectives progressing through assess, identify, recommend, and validate steps over time." lightbox="../media/objectives-as-outcomes.png":::
12
+
11
13
Objectives aren't checklists or static views. They function as workflows that connect:
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/purview-data-security-posture-management-understand/includes/understand-data-security-posture-management.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,10 +29,12 @@ DSPM brings these questions together in one place so you can reason about exposu
29
29
30
30
DSPM doesn't inspect data or user behavior on its own. It aggregates signals from other Microsoft Purview solutions that already do that work.
31
31
32
+
:::image type="content" source="../media/posture-aggregation-overview.png" border="false" alt-text="Diagram showing signals from Purview tools flowing into a single data security posture overview." lightbox="../media/posture-aggregation-overview.png":::
33
+
32
34
Those signals come from areas like:
33
35
34
-
-**Data Loss Prevention**, which detects risky data handling
35
36
-**Information Protection**, which shows how data is classified and labeled
37
+
-**Data Loss Prevention**, which detects risky data handling
36
38
-**Insider Risk Management**, which highlights risky patterns and behaviors
37
39
-**Audit and activity data**, which provide evidence of how data is used
38
40
-**Investigation tools**, which add context when deeper review is needed
@@ -51,6 +53,6 @@ Keeping this boundary clear is important. DSPM is a starting point for action, n
51
53
52
54
AI changes how data moves through an organization. Prompts, responses, summaries, and agent workflows create new paths for sensitive information to be shared, reused, or exposed. This activity is often distributed across users, apps, and services, which makes risk harder to see when you look at tools in isolation.
53
55
54
-
In these environments, posture matters more than individual alerts. You need to understand patterns like oversharing, repeated exposure, or gaps in protection before those patterns lead to incidents. DSPM treats AI interactions as another signal source, not a separate problem to solve in isolation.
56
+
In these environments, posture matters more than individual alerts. Identifying patterns like oversharing, repeated exposure, or gaps in protection helps prevent those patterns from escalating into incidents. DSPM treats AI interactions as another signal source, not a separate problem to solve in isolation.
55
57
56
58
By focusing on posture, DSPM helps organizations stay ahead of risk in environments where data is constantly in use, not just sitting at rest.
0 commit comments