Skip to content

Commit b442314

Browse files
committed
update intro
1 parent dc73f3f commit b442314

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

  • learn-pr/wwl-sci/purview-data-security-investigations-understand/includes

learn-pr/wwl-sci/purview-data-security-investigations-understand/includes/introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
Security teams investigate activity every day, but understanding **what happened to the data** is often harder than detecting the activity itself. Alerts, cases, and audit logs can show who did something and when, but they don't always answer more important questions. Was the data sensitive? How exposed was it? Did the activity create real risk, or was it expected behavior?
1+
Security teams investigate activity every day. Alerts, cases, and audit logs can show who did something and when it happened. What's often harder to determine is **what happened to the data itself**.
22

3-
Data security investigations focus on answering those questions. Instead of centering on events alone, they examine data context, sensitivity, and exposure to help teams make informed decisions about response and prevention. This approach supports both reactive investigations, where activity has already occurred, and proactive investigations, where potential risk needs validation before an incident happens.
3+
When sensitive or high-value data is involved, activity alone doesn't always provide enough information to make confident decisions. Teams might see that an action occurred without knowing whether the data was sensitive, how exposed it became, or whether the situation represents real risk. Data security investigations exist to close that gap by focusing on data context, sensitivity, and exposure.
44

5-
Understanding when and how to use data security investigations helps avoid unnecessary escalation, reduces guesswork, and ensures deeper analysis is applied only when it adds value. It also clarifies how this capability fits alongside existing security tools rather than replacing them.
5+
By understanding when and how to use data security investigations, teams can apply deeper analysis where it adds value and rely on simpler investigation paths when appropriate.
66

77
By the end of this module, you'll be able to:
88

0 commit comments

Comments
 (0)