Forum Discussion
How can I setup a Purview Access Alert to push to MS Teams / Slack
How can I setup a Purview Access Alert to push to MS Teams / Slack for anybody at my company who get's access to that portal?
3 Replies
- DavidMartin238Copper Contributor
Use Purview alerts with Power Automate to notify Teams channel.
- Ian_apps4RentCopper Contributor
Hew is the setup process for sending Microsoft Purview access alerts to Microsoft Teams or Slack:
Quick Setup Guide:
1. Create an Alert in Microsoft Purview:
- Go to the Purview compliance portal.
- Navigate to Alerts > Alert policies.
- Create a new policy with conditions like "User accessed Purview portal".2. Forward Alerts to Teams or Slack:
- Use Power Automate to trigger on new alerts.
- Add an action to post a message to a Teams channel or Slack using connectors.
- Customize the message with alert details.3. Optional: Use Azure Monitor or Microsoft Sentinel for advanced alerting and automation.
For official guidance, refer to Microsoft Support article on information protection in Teams using Microsoft Purview: https://support.microsoft.com/en-us/office/information-protection-in-microsoft-teams-d71ce838-d8a6-4841-bc08-3d4e93ac22a5
- Ian_apps4RentCopper Contributor
Hew is the setup process for sending Microsoft Purview access alerts to Microsoft Teams or Slack:
Quick Setup Guide
1. Create an Alert in Microsoft Purview:
- Go to the Purview compliance portal.
- Navigate to Alerts > Alert policies.
- Create a new policy with conditions like "User accessed Purview portal".2. Forward Alerts to Teams or Slack:
- Use Power Automate to trigger on new alerts.
- Add an action to post a message to a Teams channel or Slack using connectors.
- Customize the message with alert details.3. Optional: Use Azure Monitor or Microsoft Sentinel for advanced alerting and automation.
For official guidance, refer to Microsoft Support article on information protection in Teams using Microsoft Purview: https://support.microsoft.com/en-us/office/information-protection-in-microsoft-teams-d71ce838-d8a6-4841-bc08-3d4e93ac22a5