Skip to content

Commit bdf7cb2

Browse files
Merge pull request #53125 from MicrosoftDocs/NEW-purview-data-security-investigations-understand
New purview data security investigations understand
2 parents f54b718 + 9daa03d commit bdf7cb2

20 files changed

Lines changed: 583 additions & 0 deletions
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.data-security-investigation-clarification
3+
title: What data security investigations are and are not
4+
metadata:
5+
title: What data security investigations are and are not
6+
description: "What data security investigations are and are not"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/data-security-investigation-clarification.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.data-security-investigation-differentiation
3+
title: How data security investigations differ from alerts, cases, and audit
4+
metadata:
5+
title: How data security investigations differ from alerts, cases, and audit
6+
description: "How data security investigations differ from alerts, cases, and audit"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/data-security-investigation-differentiation.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.data-security-investigation-need
3+
title: Why data security investigations matter
4+
metadata:
5+
title: Why data security investigations matter
6+
description: "Why data security investigations matter"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/data-security-investigation-need.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.data-security-investigation-understand
3+
title: What is a data security investigation?
4+
metadata:
5+
title: What is a data security investigation?
6+
description: "What is a data security investigation?"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/data-security-investigation-understand.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.data-security-investigations-integration
3+
title: How data security investigations integrate with Microsoft security tools
4+
metadata:
5+
title: How data security investigations integrate with Microsoft security tools
6+
description: "How data security investigations integrate with Microsoft security tools"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/data-security-investigations-integration.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-security-investigations-understand.deeper-investigation-value
3+
title: When deeper investigation adds value
4+
metadata:
5+
title: When deeper investigation adds value
6+
description: "When deeper investigation adds value"
7+
ms.date: 01/15/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/deeper-investigation-value.md)]
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
Data security investigations are designed to answer specific questions about data risk. Understanding what data security investigations are designed to do, and what they aren't meant to replace, helps ensure they're used intentionally.
2+
3+
## What a data security investigation is
4+
5+
A data security investigation is a **data-centric investigation approach**. It brings together data context, activity signals, and analysis to help determine whether sensitive or high-value data is at risk, and to what extent.
6+
7+
Rather than focusing only on events, a data security investigation emphasizes:
8+
9+
- The type and sensitivity of the data involved
10+
- Where that data lives and how it's accessed
11+
- How activity affects data exposure and risk
12+
13+
**Microsoft Purview Data Security Investigations** provides this capability by correlating data and activity information so investigations can focus on understanding risk, not just tracking actions.
14+
15+
## What a data security investigation isn't
16+
17+
A data security investigation isn't designed to replace existing security or compliance tools. It doesn't function as:
18+
19+
- An alerting system that detects suspicious activity
20+
- An incident response workflow for containment and remediation
21+
- A case management solution for legal or regulatory review
22+
- A substitute for audit logs or activity tracking
23+
24+
Those tools remain essential. Data security investigations complement them by providing depth when understanding data exposure and sensitivity is critical.
25+
26+
## Why these boundaries matter
27+
28+
Without clear boundaries, investigations can become inefficient or misleading. Using a data security investigation when simpler tools are sufficient can slow response time. Relying only on alerts when deeper analysis is needed can lead to decisions based on incomplete information.
29+
30+
Data security investigations are most effective when used:
31+
32+
- After activity has been identified and requires validation
33+
- When the scope or sensitivity of data is unclear
34+
- When decisions depend on confidence rather than speed alone
35+
36+
Recognizing what the tool is designed to do helps ensure it's applied where it adds the most value.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
Security teams use several tools to investigate activity and assess risk. Each serves a distinct purpose. Each serves a different purpose, and understanding those differences helps determine when a data security investigation is the right choice.
2+
3+
Data security investigations don't replace alerts, cases, or audit. They fill a specific gap when decisions depend on understanding **data exposure and sensitivity**, not just activity.
4+
5+
### Alerts focus on activity signals
6+
7+
Alerts are designed to surface activity that might require attention. They're effective for identifying:
8+
9+
- Unusual behavior
10+
- Policy violations
11+
- Potential security events
12+
13+
Alerts answer questions like:
14+
15+
- What happened?
16+
- Who performed the action?
17+
- When did it occur?
18+
19+
What alerts often don't provide is enough data context to assess risk. An alert can confirm that activity occurred without showing whether sensitive data was involved or exposed.
20+
21+
### Cases organize investigation work
22+
23+
Cases help group related alerts, evidence, and actions into a single investigation record. They're useful for:
24+
25+
- Tracking investigation progress
26+
- Coordinating work across teams
27+
- Documenting decisions and outcomes
28+
29+
Cases improve organization, but they don't inherently add data insight. Understanding data sensitivity and exposure often still requires investigation outside the case structure.
30+
31+
### Audit provides detailed activity records
32+
33+
Audit logs capture detailed records of actions taken across services and workloads. They're valuable for:
34+
35+
- Reviewing historical activity
36+
- Verifying who did what and when
37+
- Supporting compliance and review requirements
38+
39+
Audit data is comprehensive, but it's activity-centric. It typically requires manual effort to correlate events with data sensitivity, scope, and risk.
40+
41+
### Where data security investigations fit
42+
43+
Data security investigations focus on **data context**, not just events. They bring together:
44+
45+
- Information about the data itself
46+
- Activity associated with that data
47+
- Analysis that helps assess exposure and risk
48+
49+
This approach is most useful when:
50+
51+
- Alerts identify activity but don't provide enough confidence to act
52+
- Audit logs show behavior without clarifying data sensitivity
53+
- Decisions require validation before remediation or escalation
54+
55+
Now that you understand how data security investigations differ from alerts, cases, and audit, you can look at how investigations can be used in both reactive and proactive ways.
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
Detecting activity is only the first step in understanding data risk. Modern environments generate large volumes of alerts, signals, and logs, but those signals rarely provide enough context to make confident decisions about sensitive data.
2+
3+
An alert can show that something happened. It doesn't always explain whether that activity mattered.
4+
5+
## The gap between activity and risk
6+
7+
Most security tooling is designed to surface activity quickly. That works well for identifying unusual behavior, but it often leaves important questions unanswered when sensitive data is involved.
8+
9+
For example:
10+
11+
- An alert might confirm that a file was downloaded, but not whether the file contained sensitive data.
12+
- Activity logs might show who accessed content, but not how exposed that data became afterward.
13+
- A case might group related events, but still require manual effort to understand data scope and sensitivity.
14+
15+
When decisions depend on data risk rather than activity alone, these gaps slow investigations and increase uncertainty.
16+
17+
## Why data context changes decisions
18+
19+
Not all data carries the same level of risk, and not all data activity requires action. The same behavior can be acceptable in one situation and concerning in another, depending on the data involved.
20+
21+
Understanding data context helps answer questions such as:
22+
23+
- Whether the data involved is sensitive or high value
24+
- Whether exposure was limited or widespread
25+
- Whether the activity represents an isolated event or a broader pattern
26+
27+
Without this context, teams are forced to make decisions based on partial information, which can lead to unnecessary escalation or missed risk.
28+
29+
## When deeper investigation becomes necessary
30+
31+
Organizations need data security investigations when:
32+
33+
- Alerts lack enough context to support a decision
34+
- The scope of potential exposure is unclear
35+
- Decisions require validation before remediation or escalation
36+
- Data sensitivity and organizational risk must be weighed carefully
37+
38+
In these situations, deeper investigation supports more accurate outcomes and reduces reliance on assumptions.
39+
40+
This need becomes more pronounced as data environments grow in size and complexity, and as sensitive data is distributed across more locations and workloads.
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
A data security investigation focuses on understanding **what data is involved in a security concern**, **how that data was used**, and **what risk it presents**. The goal isn't to detect activity or generate alerts, but to determine the **actual scope and risk** of a potential data security issue.
2+
3+
For example, an alert might show a file was downloaded. An activity-based investigation asks who downloaded it and when. A data security investigation asks: Was the file sensitive? Where did it come from? Did the activity create risk, or was it expected behavior?
4+
5+
A data security investigation exists to close that gap.
6+
7+
## How data security investigations differ from activity-based investigation
8+
9+
Traditional security investigation often starts with activity. An alert fires, a user performs an action, or a signal indicates something unusual. From there, the investigation focuses on timelines, indicators, and behavior.
10+
11+
A data security investigation starts from a different place. It centers on **the data itself**.
12+
13+
Instead of asking only what happened, a data security investigation asks:
14+
15+
- What data was involved?
16+
- Where does that data live?
17+
- How sensitive is it?
18+
- Who accessed or handled it?
19+
- Does the data create risk in this context?
20+
21+
This shift matters because not all activity involving data is risky, and not all risky data activity is obvious from alerts alone.
22+
23+
## What a data security investigation helps you understand
24+
25+
A data security investigation is designed to help answer questions such as:
26+
27+
- Whether sensitive or high-value data was exposed
28+
- Whether the scope of exposure is small and contained or broad and systemic
29+
- Whether the situation requires remediation, escalation, or no action at all
30+
31+
These answers support informed decisions. They help avoid both under-reacting to real risk and over-reacting to noise.
32+
33+
## Where Data Security Investigations fits
34+
35+
**Microsoft Purview Data Security Investigations** provides a dedicated investigation experience for this kind of analysis. It brings together data context, activity signals, and AI-assisted analysis so investigations can focus on **data impact**, not just events.
36+
37+
Rather than replacing existing security tools, it complements them by adding depth where understanding data exposure and sensitivity is critical.
38+
39+
In the next unit, you’ll look at **why organizations need this type of investigation**, and why traditional alert-driven approaches often fall short when sensitive data is involved.

0 commit comments

Comments
 (0)