<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-purview/ct-p/Microsoft-Purview</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sat, 02 May 2026 14:58:03 GMT</pubDate>
    <dc:creator>Microsoft-Purview</dc:creator>
    <dc:date>2026-05-02T14:58:03Z</dc:date>
    <item>
      <title>Microsoft Purview to detect passwords</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-to-detect-passwords/m-p/4516367#M2778</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would you recommend for scanning and setting up scheduled scans in Microsoft Purview to detect passwords or sensitive credentials stored in SharePoint sites and OneDrive?&lt;/P&gt;&lt;P&gt;We would like to discover whether anyone has shared or stored passwords in SharePoint or OneDrive, as we have already had an incident because of this.&lt;/P&gt;&lt;P&gt;Are there any recommended Purview solutions, policies, or detection rules we should use for this? Ideally, we would like to schedule regular scans and receive alerts or reports when potential passwords, credentials, or secrets are detected.&lt;/P&gt;&lt;P&gt;Any advice or recommended approach would be appreciated. thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Miro&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 22:26:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-to-detect-passwords/m-p/4516367#M2778</guid>
      <dc:creator>miro2022</dc:creator>
      <dc:date>2026-04-30T22:26:52Z</dc:date>
    </item>
    <item>
      <title>Welcome, Purview Lightning Talks audience!</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/welcome-purview-lightning-talks-audience/m-p/4516006#M145</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;Please log in and then post any of your Data Security (and AI) spillover Purview Lightning Talks questions in the thread below. You can tag them using these hyperlinked handles:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;table border="1" style="width: 60.6957%; height: 1035.41px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 44.5758px;"&gt;&lt;td class="lia-align-center" style="height: 44.5758px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center" style="height: 44.5758px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Speaker&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Tech Community Alias (tag)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 140.559px;"&gt;&lt;td style="height: 140.559px;"&gt;
&lt;P&gt;The Purview Label Engine: Automated Classification, Translation, and Co-Documentation for Enterprise Tenants&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 140.559px;"&gt;
&lt;P&gt;Michael Kirst Neshva&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1446467" data-lia-user-login="MichaelKirst1970" class="lia-mention lia-mention-user"&gt;MichaelKirst1970​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Stop, Think, Protect: Data Security in Real Life with Purview&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Oliver Sahlmann&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="197492" data-lia-user-login="Oliver Sahlmann" class="lia-mention lia-mention-user"&gt;Oliver Sahlmann​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Using Purview to Prevent Oversharing with AI Services&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Viktor Hedberg&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="26736" data-lia-user-login="headburgh" class="lia-mention lia-mention-user"&gt;headburgh​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;How I Helped My Customers Understand Their AI Usage (and Protect Their Sensitive Data)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Bram de Jager&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2583" data-lia-user-login="Bram de Jager" class="lia-mention lia-mention-user"&gt;Bram de Jager​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Four Labels Max for Daily Use: Which Ones &amp;amp; Why?&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Romain Dalle&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2661" data-lia-user-login="RomainDalle_MVP_MCT" class="lia-mention lia-mention-user"&gt;RomainDalle_MVP_MCT​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Data‑driven Endpoint DLP Solution with Advanced Hunting&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Tatu Seppälä&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="783541" data-lia-user-login="tseppala" class="lia-mention lia-mention-user"&gt;tseppala​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;The Purview Hack No One Talks About: Container Sensitivity Labels That Fix Oversharing Fast&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Nikki Chapple&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1200702" data-lia-user-login="nikkichapple" class="lia-mention lia-mention-user"&gt;nikkichapple​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Why You Should Create Your Own Sensitive Information Types (SITs)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Niels Jakobsen&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1901782" data-lia-user-login="Niels_Jakobsen" class="lia-mention lia-mention-user"&gt;Niels_Jakobsen​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;From Zero to First Signal: Insider Risk Management Prerequisites That Actually Matter&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Sathish Veerapandian&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="151406" data-lia-user-login="Sathish Veerapandian" class="lia-mention lia-mention-user"&gt;Sathish Veerapandian​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Securing Data in the Age of AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Júlio César Gonçalves Vasconcelos&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="815293" data-lia-user-login="jcvasconcelos" class="lia-mention lia-mention-user"&gt;jcvasconcelos​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Beyond eDiscovery – Purview DSI for Security Investigation&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Susantha Silva&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="20123" data-lia-user-login="susanthasilva" class="lia-mention lia-mention-user"&gt;susanthasilva​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Elevating Purview DLP with a Real‑World Use Case&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Victor Wingsing&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1750716" data-lia-user-login="vicwingsing" class="lia-mention lia-mention-user"&gt;vicwingsing​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 49.9706%" /&gt;&lt;col style="width: 24.3868%" /&gt;&lt;col style="width: 25.5837%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Purview Lightning Talks takes place April 30th at 8am pacific:&lt;/EM&gt; &lt;A href="https://securitycommunity.microsoft.com/VirtualEvents/Webinar-Details/?id=da41bc6a-5929-f111-8341-000d3a58d670" target="_blank" rel="noopener"&gt;Webinar Details&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/registration-open-community-led-purview-lightning-talks/4505665" target="_blank" rel="noopener" data-lia-auto-title="Full agenda here." data-lia-auto-title-active="0"&gt;Full agenda here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-8"&gt;Also, you can come here at any time and click "Start a Discussion" to post a topic or question to your Purview Community!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Apr 2026 12:41:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/welcome-purview-lightning-talks-audience/m-p/4516006#M145</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2026-04-30T12:41:14Z</dc:date>
    </item>
    <item>
      <title>Welcome, Purview Lighting Talks audience!</title>
      <link>https://techcommunity.microsoft.com/t5/risk-and-compliance/welcome-purview-lighting-talks-audience/m-p/4516001#M20</link>
      <description>&lt;P&gt;Please log in and then post any of your Risk and Compliance spillover Purview Lightning Talks questions in the thread below. You can tag them using these hyperlinked handles:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Day Offboarding Exposed Infinite Retention - Nikki Chapple &lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1200702" data-lia-user-login="nikkichapple" class="lia-mention lia-mention-user"&gt;nikkichapple​&lt;/a&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Length: 10 minutes | Topic: Data Lifecycle Management&lt;/P&gt;
&lt;P&gt;A routine Purview request led to an unexpected discovery: more than 9,000 orphaned OneDrives and thousands of inactive mailboxes still storing content long after employees had left. This talk explains how a retain-only policy created hidden retention debt and how Adaptive Scopes can help organisations separate active users from leavers to avoid similar pitfalls.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What's In My Compliance Manager Toolbox: A Cloud Security Architect's Perspective - Jerrad Dahlager &lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="3434706" data-lia-user-login="j-dahl7" class="lia-mention lia-mention-user"&gt;j-dahl7​&lt;/a&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Length: 8 minutes | Topic: Compliance Manager&lt;/P&gt;
&lt;P&gt;A practical walkthrough of how I use Compliance Manager across real client engagements to map controls, track improvement actions, and simplify multi-framework compliance. No theory, just what works in the field.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Does M365 Support eDiscovery? - Julian Kusenberg -&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="3058721" data-lia-user-login="Leprechaun91" class="lia-mention lia-mention-user"&gt;Leprechaun91​&lt;/a&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Length: 11 minutes | Topic: eDiscovery&lt;/P&gt;
&lt;P&gt;A myth-busting session that separates perception from reality when it comes to Microsoft 365 eDiscovery capabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-8"&gt;Also, you can come here at any time and click "Start a Discussion" to post a topic or question to your Purview Community!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Purview Lightning Talks takes place April 30th at 8am pacific:&lt;/EM&gt; &lt;A href="https://securitycommunity.microsoft.com/VirtualEvents/Webinar-Details/?id=da41bc6a-5929-f111-8341-000d3a58d670" target="_blank" rel="noopener"&gt;Webinar Details&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 22:04:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/risk-and-compliance/welcome-purview-lighting-talks-audience/m-p/4516001#M20</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2026-04-29T22:04:11Z</dc:date>
    </item>
    <item>
      <title>Welcome, Purview Lighting Talks audience!</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/welcome-purview-lighting-talks-audience/m-p/4515998#M155</link>
      <description>&lt;P&gt;Please log in and then post any of your Data Governance spillover Purview Lightning Talks questions in the thread below. You can tag them using these hyperlinked handles:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;Improving Discovery, Trust, and Reuse of Analytics with Purview Data Products&lt;/STRONG&gt; -&amp;nbsp; &lt;/SPAN&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="3435228" data-lia-user-login="CraigWyndowe" class="lia-mention lia-mention-user"&gt;CraigWyndowe​&lt;/a&gt;&lt;SPAN class="lia-text-color-15"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-15"&gt;Length: 5 minutes | Topic: Governance&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-15"&gt;This talk shows how bringing Power BI and Fabric assets into Microsoft Purview Governance Domains and Data Products creates a single, trusted view of enterprise analytics. By connecting reports, semantic models, and underlying data with shared metadata, ownership, and business context, organizations can make existing assets easy to discover and safe to reuse.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;Also, you can come here at any time and click "Start a Discussion" to post a topic or question to your Purview Community!&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 21:54:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/welcome-purview-lighting-talks-audience/m-p/4515998#M155</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2026-04-29T21:54:01Z</dc:date>
    </item>
    <item>
      <title>Activity explorer scoping to AU</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/activity-explorer-scoping-to-au/m-p/4515918#M2769</link>
      <description>&lt;P&gt;I remember that Activity Explorer can be fully scoped to Admin Units, and that the Restricted admin can see activity explorer and DLP matching events for the scoped AU only, is that correct?&lt;BR /&gt;Cause I was checking and I found the Restricted admin can see the activities also for the users out of the scoped AU. Does that make sense?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 15:39:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/activity-explorer-scoping-to-au/m-p/4515918#M2769</guid>
      <dc:creator>AlaaAy</dc:creator>
      <dc:date>2026-04-29T15:39:32Z</dc:date>
    </item>
    <item>
      <title>eDiscovery search: Sites not available when adding a Group data source</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/ediscovery-search-sites-not-available-when-adding-a-group-data/m-p/4515146#M2761</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am attempting to use Purview eDiscovery to search a SharePoint site associated with a Group.&lt;/P&gt;&lt;P&gt;When adding the Data Source, I search for the URL of the SharePoint site, and the Group is returned.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;However, after selecting the group and clicking Manage, it indicates Sites are "Not Available".&lt;/P&gt;&lt;img /&gt;&lt;P&gt;What causes this, and how do fix it?&lt;/P&gt;&lt;P&gt;My user is a member of the "eDiscovery Manager" role group as an "eDiscovery Administrator", and licensed with "Microsoft 365 E3" and "Microsoft Purview Suite". It is also an Owner of the target Group / SP Site.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 15:30:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/ediscovery-search-sites-not-available-when-adding-a-group-data/m-p/4515146#M2761</guid>
      <dc:creator>danielschmidt</dc:creator>
      <dc:date>2026-04-27T15:30:12Z</dc:date>
    </item>
    <item>
      <title>Label usage rights not working correctly in office web-view</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/label-usage-rights-not-working-correctly-in-office-web-view/m-p/4514983#M2757</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I’ve created three simple Purview sensitivity labels (PUBLIC, RESTRICTED, CONFIDENTIAL). RESTRICTED and CONFIDENTIAL use usage-rights, so every internal employee and group is the owner of the document. External users are not permitted to open the document.&lt;/P&gt;&lt;P&gt;Unfortunately, I can’t export or print my labeled documents in the Office Web View. In Office Desktop, however, the labels work correctly.&lt;BR /&gt;This issue occurs for various internal users. Tested with Word, Excel, and PowerPoint.&lt;/P&gt;&lt;P&gt;Co-authoring is enabled. User access never expires. Offline access is permitted.&lt;/P&gt;&lt;P&gt;Do you have any ideas?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Label usage rights&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Web-view&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Office Desktop&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 07:58:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/label-usage-rights-not-working-correctly-in-office-web-view/m-p/4514983#M2757</guid>
      <dc:creator>mdohm1355</dc:creator>
      <dc:date>2026-04-27T07:58:30Z</dc:date>
    </item>
    <item>
      <title>Auto Labeling Policy Delay for Old Files (Exsisting Files)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;We are observing a difference in auto labelling policy behaviour in Purview for Sharepoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An auto labelling policy has been enabled and scoped to sharepoint with metadata based rule(document creation date or document modification date). The scoped sharepoint only contain 7 unlabeled files that were uploaded before the policy turned on. The policy is working because if i placed any new file after enabling the policy got labelled within about 5 minutes, but the exsisting files are not labeled and remains unlabelled. It seems the new files are evalauated via the near time while exsisting file rely on asychronous mode. Can anyone help explain why exsisting files take longer to be proceesed even when there there are only a few files or share if you faced similar behaviour. This is the test scenario, as we plan to enable the same policy across more than 50 plus sites containing millions of unlabeled files and we want to understand and predict that even though its takes time all exsisting unlabeled files will eventually will be labelled. This is very crucial, so please helo us understand this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;BanuMurali&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 14:44:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</guid>
      <dc:creator>BanuMurali</dc:creator>
      <dc:date>2026-04-26T14:44:29Z</dc:date>
    </item>
    <item>
      <title>ErrorBoundary@wicd-mail/main</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</link>
      <description>&lt;P&gt;I'm trying to investigate a possible phishing email and when I click on View Message List, I get that error.&amp;nbsp; It does show removed after delivery, but I want to block either the sender or the domain.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 12:16:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</guid>
      <dc:creator>CCraft301</dc:creator>
      <dc:date>2026-04-24T12:16:04Z</dc:date>
    </item>
    <item>
      <title>From Oversharing to Enforcement: A Practical Guide to AI Data Security with Microsoft Purview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/from-oversharing-to-enforcement-a-practical-guide-to-ai-data/ba-p/4513727</link>
      <description>&lt;H3&gt;&lt;STRONG&gt;Why AI Changed the Data Security Problem&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;AI does not create entirely new categories of risk—it supercharges existing ones.&lt;/STRONG&gt; Traditional data leakage stems from ordinary behavior: sharing a document too broadly, sending an email to the wrong person, copying regulated data to an uncontrolled device. Generative AI amplifies all of these because of the power and speed with which it can proactively surface content that may be obsolete, over-permissioned, or ungoverned. DSPM exists to help with exactly this challenge: it continuously scans your environment to identify sensitive data, assess risk, and recommend actions to reduce exposure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Oversharing at Scale&lt;BR /&gt;&lt;/STRONG&gt;Before AI, an overshared SharePoint file might sit unnoticed. Now, Copilot can summarize it in response to a casual prompt, distributing its contents far beyond the original audience.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prompt Leakage&lt;BR /&gt;&lt;/STRONG&gt;Users can inadvertently expose sensitive information—financial account numbers, health records, project code names—simply by typing them into a Copilot prompt. Because AI interactions feel conversational, users tend to drop their guard.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Shadow AI&lt;BR /&gt;&lt;/STRONG&gt;Beyond sanctioned tools, employees experiment with unapproved AI services.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Autonomous Agents&lt;BR /&gt;&lt;/STRONG&gt;
&lt;P&gt;Autonomous agents expand the data security threat surface by acting independently on sensitive information across systems and boundaries. Their ability to access and share data without direct user interaction increases the risk of oversharing, exfiltration, and unauthorized access, while also introducing complex behavior patterns that are harder to monitor, govern, and control using traditional security models.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What Microsoft Purview Now Brings Together&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H5&gt;&lt;STRONG&gt;Data Security Posture Management (DSPM)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM consolidates insights from &lt;STRONG&gt;Data Loss Prevention (DLP)&lt;/STRONG&gt;, &lt;STRONG&gt;Insider Risk Management&lt;/STRONG&gt;, &lt;STRONG&gt;Information Protection&lt;/STRONG&gt;, and &lt;STRONG&gt;Data Security Investigations&lt;/STRONG&gt; into a single view for monitoring data risks, policy coverage, and posture trends. Now also in Public Preview, DSPM extends coverage to third-party SaaS and IaaS platforms such as &lt;STRONG&gt;Google Cloud Platform&lt;/STRONG&gt;, &lt;STRONG&gt;Snowflake&lt;/STRONG&gt;, and &lt;STRONG&gt;Databricks&lt;/STRONG&gt;, and integrates with partner solutions including &lt;STRONG&gt;Cyera&lt;/STRONG&gt;, &lt;STRONG&gt;BigID&lt;/STRONG&gt;, and &lt;STRONG&gt;OneTrust&lt;/STRONG&gt; for comprehensive risk insights.&lt;/P&gt;
&lt;P&gt;A central innovation in this version is &lt;STRONG&gt;data security objectives&lt;/STRONG&gt;—prominent, selectable cards that each represent a specific security goal.&amp;nbsp;Selecting an objective guides administrators through an end-to-end workflow that groups together the most relevant Purview solutions—information protection, DLP, Insider Risk Management, and eDiscovery—so teams can focus on achieving a specific data security outcome rather than navigating separate solutions.&lt;/P&gt;
&lt;P&gt;Each &lt;STRONG&gt;Outcome&lt;/STRONG&gt; card displays key metrics such as the percentage of data covered by policies, the number of risky sharing incidents, and improvements over time. Within each outcome, DSPM surfaces &lt;STRONG&gt;suggested prioritized actions&lt;/STRONG&gt;—applying sensitivity labels, configuring DLP policies, or investigating alerts—all tailored to the organization's data. Administrators can take action directly from the workflow, including remediating oversharing, configuring &lt;STRONG&gt;one-click policies&lt;/STRONG&gt;, or launching investigations into suspicious activity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;DLP Integration for AI Interactions&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DLP is one of the core solutions integrated into DSPM's unified approach. The Activity Explorer's &lt;STRONG&gt;AI activities tab&lt;/STRONG&gt; captures events where DLP rules were matched during AI interactions—including prompts, responses, and browsing to generative AI sites. DSPM can automate remediation steps such as removing public sharing links or applying data loss prevention policies to help prevent incidents before they happen.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;AI Observability and Agent Governance&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Dedicated dashboards and metrics monitor risks associated with AI apps and agents. &lt;STRONG&gt;AI observability&lt;/STRONG&gt; enables tracking of agent-specific activities—oversharing, exfiltration, and unusual access patterns—across both Microsoft and third-party environments. Enhanced reporting provides advanced filtering and customizable views, supporting granular analysis of sensitive data usage, DLP activity, and posture trends. Audit logs and activity explorer features help track interactions with AI apps and agents, supporting compliance investigations and incident response.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;AI-Powered Security Operations&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM not only secures and governs AI apps and agents but also uses &lt;STRONG&gt;Microsoft Security Copilot and AI agents&lt;/STRONG&gt; to help secure and govern data. AI analyzes access patterns, sharing behaviors, and policy gaps to surface actionable risks and can detect unusual activity such as excessive sharing or suspicious downloads. Under administrator guidance, AI agents can take direct action on detected risks—&lt;STRONG&gt;removing public sharing links, applying DLP policies, or revoking permissions&lt;/STRONG&gt;. These actions are always audited. To streamline investigations, &lt;STRONG&gt;AI-driven triage agents&lt;/STRONG&gt; review alerts from DLP and Insider Risk Management solutions, filtering out noise and highlighting the most critical threats.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Three Practical Starting Points&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;For many organizations adopting generative AI, the biggest hurdle isn't recognizing new risks—it's figuring out where to begin. A "boil the ocean" approach can stall progress, while tackling a few targeted areas delivers quicker wins.&lt;/P&gt;
&lt;P&gt;The best early moves are those that &lt;STRONG&gt;reduce exposure quickly&lt;/STRONG&gt;, &lt;STRONG&gt;improve visibility&lt;/STRONG&gt;, and &lt;STRONG&gt;build a foundation for stronger governance&lt;/STRONG&gt; over time.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 1: Enable prompt-level protection for Microsoft 365 Copilot&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;An effective first step is to put guardrails on the &lt;STRONG&gt;prompts&lt;/STRONG&gt; users enter into AI. Microsoft Purview DLP allows administrators to restrict Microsoft 365 Copilot and Copilot Chat from processing prompts that contain sensitive information. In practice, users are often more comfortable pasting data into a chat prompt than attaching it to an email, which means a well-meaning employee could inadvertently feed a confidential file or personal data into Copilot.&lt;/P&gt;
&lt;P&gt;Enabling prompt-level DLP creates an immediate safety net: if a user's prompt includes, say, a credit card number or a customer's national ID, Copilot will detect it and refuse to process or share that content. DSPM provides suggested prioritized actions—including configuring DLP policies—that can be activated directly from the workflow, and recommended policies can start in&amp;nbsp;&lt;STRONG&gt;simulation mode&lt;/STRONG&gt;. Simulation mode lets you see what would have been blocked or flagged, without actually interrupting users, so you can fine-tune the policy and prepare your helpdesk for any questions. Once you're comfortable with the results, switching to enforcement mode will actively block disallowed prompts and log those events for review.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By activating this one control, you've significantly reduced the most immediate oversharing risk—the "oops, I pasted the wrong data" scenario—within hours of starting your AI governance program.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Simulation mode provides safety but delays enforcement. For organizations with imminent regulatory exposure, consider shortening the simulation window and monitoring alert volumes closely.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 2: Gain visibility into shadow AI usage before broad enforcement&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The second step is to &lt;STRONG&gt;illuminate what's happening in the shadows&lt;/STRONG&gt;. Before rushing into blocking every unsanctioned AI tool, it's crucial to understand how and where AI is being used across the organization. In most enterprises, there's an &lt;EM&gt;official&lt;/EM&gt; layer of AI usage and an often larger, &lt;EM&gt;unofficial&lt;/EM&gt; layer—employees experimenting with free online AI chatbots, writing assistants, or code generators.&lt;/P&gt;
&lt;P&gt;DSPM provides this visibility. The &lt;STRONG&gt;Discover &amp;gt; Apps and agents&lt;/STRONG&gt; dashboard shows AI apps used across the organization, including the top 20 most recently used agents, with details about sensitive data they accessed and how they are protected by Purview policies.&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;AI observability&lt;/STRONG&gt; page provides a broader inventory of all AI apps and agents with activity in the last 30 days, including how many are high risk and the total with sensitive interactions. The Activity Explorer's &lt;STRONG&gt;AI activities tab&lt;/STRONG&gt; shows when users browsed to generative AI sites, the prompts and responses involved, whether sensitive information was present, and whether DLP rules were matched. Armed with this insight, you can make informed decisions. If you discover that the majority of "AI consumption" comes from just two external apps, you might focus your immediate controls on those two. Conversely, if the data shows most unsanctioned usage is low-risk, you might decide to monitor rather than block it.&lt;/P&gt;
&lt;P&gt;The key is &lt;STRONG&gt;visibility first, enforcement second&lt;/STRONG&gt;—letting real data guide where to tighten controls versus where to offer secure alternatives.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Visibility without timely follow-through can create a false sense of security. Set a defined window (e.g., 30 days) after which findings must translate into at least one concrete policy action.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 3: Operationalize DSPM objectives for Copilot&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;A stronger third starting point is to use DSPM as your &lt;STRONG&gt;operational guide&lt;/STRONG&gt;, not just a dashboard of charts. DPSM introduces &lt;STRONG&gt;data security objectives&lt;/STRONG&gt;—each one a focused end-to-end workflow for a specific outcome. Rather than configuring individual features in isolation, you select an objective and let Purview navigate you through achieving that outcome with the relevant tools.&lt;/P&gt;
&lt;P&gt;For generative AI, the key objective to leverage early is &lt;STRONG&gt;"Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions"&lt;/STRONG&gt;. By selecting this objective in the Purview portal, you're effectively telling Purview, "help me implement whatever is needed to make Copilot safe with our data." The DSPM interface then groups together the critical pieces: it may prompt you to enable a DLP policy, suggest applying or refining sensitivity labels on content, or surface an Insider Risk Management policy template for detecting AI-related risky behavior. It also surfaces metrics so you can track progress—for example, the percentage of data covered by policies, or the number of risky sharing incidents that have been remediated.&lt;/P&gt;
&lt;P&gt;Using DSPM objectives keeps your team &lt;STRONG&gt;aligned on a clear goal&lt;/STRONG&gt; from day one. It shifts the conversation from "what knobs do we turn on?" to "how do we achieve this outcome?" You follow a guided plan curated by the platform's intelligence rather than navigating five different admin pages and hoping it adds up to protection.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Objectives streamline the path but can obscure the underlying complexity. Teams should periodically step outside the guided workflow to review the full policy landscape and ensure no coverage gaps exist between objectives.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;From Visibility to Remediation: Turning Insights into Action&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H5&gt;&lt;STRONG&gt;Automated Remediation at Scale&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM can automate remediation steps such as &lt;STRONG&gt;removing public sharing links&lt;/STRONG&gt; or &lt;STRONG&gt;applying data loss prevention policies&lt;/STRONG&gt; to prevent incidents before they happen. Under administrator guidance, AI agents within DSPM can take direct action on detected risks—removing sharing links, applying DLP policies, or revoking permissions—and these actions are always audited. This moves the operating model from manual, one-at-a-time fixes to systematic, policy-driven remediation.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Closing the Loop: From Risk to Standing Policy&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM's data security &lt;STRONG&gt;objectives&lt;/STRONG&gt; surface suggested prioritized actions such as applying sensitivity labels, configuring DLP policies, or investigating alerts, all tailored to the organization's data. Reporting and analytics are organized by outcome, making it easier to identify and report improvements, compliance, and risk reduction. This turns recurring findings into standing preventive controls. Instead of re-running assessments and manually fixing the same patterns, administrators create durable policies that enforce the desired state going forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Alert-Driven Investigation and Tuning&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Audit logs and activity explorer features help track interactions with AI apps and agents, supporting compliance investigations and incident response. Integrated investigation and forensics tools support rapid incident response and root cause analysis for data security events. &lt;STRONG&gt;Impact prediction visuals&lt;/STRONG&gt; and &lt;STRONG&gt;progress tracking&lt;/STRONG&gt; for remediation steps are surfaced throughout DSPM, enabling administrators to quantify the effect of their actions and adjust course.&lt;/P&gt;
&lt;P&gt;The closed-loop process is: &lt;STRONG&gt;Discover&lt;/STRONG&gt; (DSPM scans and risk assessments) → &lt;STRONG&gt;Remediate&lt;/STRONG&gt; (automated actions and bulk fixes) → &lt;STRONG&gt;Prevent&lt;/STRONG&gt; (create or tighten DLP and auto-labeling policies) → &lt;STRONG&gt;Monitor&lt;/STRONG&gt; (alert review, investigation, and policy tuning).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;What "Good" Looks Like in a Regulated or Risk-Aware Organization&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;A mature AI governance posture is defined by measurable outcomes and sustainable operating rhythms—not feature count:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Clear, communicated AI usage policies.&lt;/STRONG&gt; Users know what is and is not acceptable in AI interactions because the tools reinforce the rules. DLP policy tips delivered at the moment of a violation are a primary training mechanism—they remind users in context why their prompt was blocked and what to do instead.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Measured enablement over blanket bans.&lt;/STRONG&gt; Leading organizations allow Copilot with appropriate controls and restrict only truly unacceptable scenarios. Policies deployed initially in simulation mode provide data to calibrate enforcement thresholds before blocking. This avoids productivity backlash while preserving security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;High data hygiene and classification rates.&lt;/STRONG&gt; Purview's AI protections depend heavily on sensitivity labels. If everything is unlabeled or "General," label-based controls have nothing to act on. Mature organizations invest in auto-labeling and mandatory labeling to close this gap before deploying AI at scale. DSPM's data security objectives include suggested actions such as applying sensitivity labels, directly tying classification to governance outcomes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Quantifiable risk reduction.&lt;/STRONG&gt; Security leadership can produce metrics from Purview that show trend lines: DSPM Outcome cards display the percentage of data covered by policies, the number of risky sharing incidents, and improvements over time. These figures feed directly into compliance reporting and audit evidence. Key metrics are tracked over time, supporting continuous improvement of the organization's data security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-functional governance.&lt;/STRONG&gt; AI governance is not a solo IT Security effort. Stakeholders from security, compliance, legal, and business units review AI usage patterns, discuss policy tuning, and evaluate new Purview capabilities as they release. &lt;STRONG&gt;Role-based access controls&lt;/STRONG&gt; within DSPM provide granular access to features and AI content for delegated administration and compliance, enabling this cross-functional model without overexposing sensitive data to every participant.&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Strict enforcement can frustrate power users and slow AI adoption. Organizations should explicitly define escalation paths—if a legitimate use case is blocked by DLP, there must be a fast process to review and adjust, rather than a permanent "no."&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&lt;STRONG&gt;A Phased Adoption Model&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table style="width: 99.1667%;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Phase&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Focus&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Key Activities&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 1 — Quick Wins (weeks)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Visibility and baseline safeguards&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Enable prompt-level DLP for Copilot in simulation mode.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Run first DSPM data risk assessment for oversharing.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Enable shadow AI discovery via DSPM's Apps and agents dashboard and AI observability page.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Start from the DSPM objective "Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions."&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 2 — Broad Enforcement (months)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Acting on findings&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Switch DLP policies from simulation to enforcement.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Use automated remediation actions (removing sharing links, applying DLP policies, revoking permissions).&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Expand sensitive information type definitions and add custom types.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Rollout user communications explaining new controls and escalation paths.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 3 — Mature Governance (ongoing)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Continuous improvement and AI-powered operations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Leverage AI-driven triage agents to filter alert noise and highlight critical threats.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Conduct periodic DSPM posture reviews using Outcome card metrics.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Tune policies based on impact prediction visuals and progress tracking.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Extend protections to new AI apps and agents as they are adopted—DSPM's AI observability tracks agent-specific activities across Microsoft and third-party environments.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Formalize cross-functional AI governance cadence.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 1&lt;/STRONG&gt; should take weeks, not months—the objective is to establish a baseline before risk accumulates.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 2&lt;/STRONG&gt; is where enforcement generates measurable risk reduction.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 3&lt;/STRONG&gt; is ongoing: as Microsoft continues extending Purview to additional AI apps and agent types, the governance framework must evolve in tandem.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The DSPM preview's integration with third-party SaaS and IaaS platforms (Google Cloud Platform, Snowflake, Databricks) and partner solutions (Cyera, BigID, OneTrust) means the governance perimeter can expand alongside the organization's AI footprint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;AI adoption and data protection are not opposing forces. Microsoft Purview now provides the visibility, policy controls, and remediation workflows to move from discovering AI risk to actively governing Copilot, third-party AI apps, and agents at scale. DSPM surfaces oversharing and AI usage patterns through unified dashboards, data risk assessments, and AI observability. DLP blocks sensitive data in prompts and restricts AI access to labeled content. Insider Risk Management detects adversarial AI behavior. AI-driven triage and remediation agents close the gap between identifying a problem and fixing it—with every automated action audited.&lt;/P&gt;
&lt;P&gt;The path forward starts with practical actions: enable prompt-level DLP, illuminate shadow AI usage, and operationalize DSPM's &lt;STRONG&gt;"Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions"&lt;/STRONG&gt; objective. From there, enforce what you find, measure the results using DSPM's outcome-based metrics, and progressively mature your governance posture.&lt;/P&gt;
&lt;P&gt;Organizations that operationalize this loop will be in a strong position: able to say, &lt;EM&gt;"We use AI to work smarter—and we have the safeguards in place to do it safely."&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 14:58:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/from-oversharing-to-enforcement-a-practical-guide-to-ai-data/ba-p/4513727</guid>
      <dc:creator>George Smyrlis</dc:creator>
      <dc:date>2026-04-23T14:58:26Z</dc:date>
    </item>
    <item>
      <title>Purview : comment filtrer les résultats “Data products” par termes du glossaire ?</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/purview-comment-filtrer-les-r%C3%A9sultats-data-products-par-termes/m-p/4514040#M154</link>
      <description>&lt;P&gt;a { text-decoration: none; color: #464feb; } tr th, tr td { border: 1px solid #e6e6e6; } tr th { background-color: #f5f5f5; }&lt;/P&gt;&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je teste Microsoft Purview (Unified Catalog) avec des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; auxquels j’ai associé des &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt;.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Les termes de glossaire sont &lt;STRONG&gt;publiés&lt;/STRONG&gt; et &lt;STRONG&gt;visibles&lt;/STRONG&gt; dans l’onglet &lt;STRONG&gt;Découverte&lt;/STRONG&gt; → &lt;STRONG&gt;Glossaire d’entreprise&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Les produits de données sont également &lt;STRONG&gt;publiés&lt;/STRONG&gt; et retrouvables via la recherche.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cependant, je ne vois pas d’option (ou elle ne retourne aucun résultat) pour &lt;STRONG&gt;filtrer les résultats de recherche des produits de données par termes de glossaire&lt;/STRONG&gt;, contrairement à d’autres filtres disponibles (ex. &lt;STRONG&gt;Propriétaire&lt;/STRONG&gt;, &lt;STRONG&gt;Type de produit&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;Est-ce que le filtrage des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; par &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt; est supporté dans l’onglet Découverte ?&lt;BR /&gt;Si oui, y a-t-il des &lt;STRONG&gt;pré-requis&lt;/STRONG&gt; ou &lt;STRONG&gt;conditions&lt;/STRONG&gt; particulières (ex. type de glossaire, indexation/délai, association au niveau data product vs assets, etc.) ?&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:39:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/purview-comment-filtrer-les-r%C3%A9sultats-data-products-par-termes/m-p/4514040#M154</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:39:12Z</dc:date>
    </item>
    <item>
      <title>Filtrer les résultats de la recherche des produits de données  à l'aide des  termes de glossaire</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/filtrer-les-r%C3%A9sultats-de-la-recherche-des-produits-de-donn%C3%A9es-%C3%A0/m-p/4514036#M153</link>
      <description>&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je teste Microsoft Purview (Unified Catalog) avec des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; auxquels j’ai associé des &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt;.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Les termes de glossaire sont &lt;STRONG&gt;publiés&lt;/STRONG&gt; et &lt;STRONG&gt;visibles&lt;/STRONG&gt; dans l’onglet &lt;STRONG&gt;Découverte&lt;/STRONG&gt; → &lt;STRONG&gt;Glossaire d’entreprise&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Les produits de données sont également &lt;STRONG&gt;publiés&lt;/STRONG&gt; et retrouvables via la recherche.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cependant, je ne vois pas d’option (ou elle ne retourne aucun résultat) pour &lt;STRONG&gt;filtrer les résultats de recherche des produits de données par termes de glossaire&lt;/STRONG&gt;, contrairement à d’autres filtres disponibles (ex. &lt;STRONG&gt;Propriétaire&lt;/STRONG&gt;, &lt;STRONG&gt;Type de produit&lt;/STRONG&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;Est-ce que le filtrage des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; par &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt; est supporté dans l’onglet Découverte ?&lt;BR /&gt;Si oui, y a-t-il des &lt;STRONG&gt;pré-requis&lt;/STRONG&gt; ou &lt;STRONG&gt;conditions&lt;/STRONG&gt; particulières (ex. type de glossaire, indexation/délai, association au niveau data product vs assets, etc.) ?&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:34:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/filtrer-les-r%C3%A9sultats-de-la-recherche-des-produits-de-donn%C3%A9es-%C3%A0/m-p/4514036#M153</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:34:22Z</dc:date>
    </item>
    <item>
      <title>Métadonnées personnalisées sous Purview avec une relation un à plusieurs</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/m%C3%A9tadonn%C3%A9es-personnalis%C3%A9es-sous-purview-avec-une-relation-un-%C3%A0/m-p/4514031#M152</link>
      <description>&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je souhaite créé une métadonnée sous Purview, en l'associant à une métadonnée parent, Comment est-ce possible&lt;/P&gt;&lt;P&gt;Merci de votre retour,&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:21:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/m%C3%A9tadonn%C3%A9es-personnalis%C3%A9es-sous-purview-avec-une-relation-un-%C3%A0/m-p/4514031#M152</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:21:31Z</dc:date>
    </item>
    <item>
      <title>Unified Catalog Self-serve analytics integration</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-self-serve-analytics-integration/m-p/4513477#M2745</link>
      <description>&lt;P&gt;I'm hoping someone has gone through the process of setting up the Self-serve analytics in the Unified Catalog settings to push the Unified Catalog information down to a Fabric Lakehouse.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a Workspace, and then created a lakehouse in this workspace, and created a folder under the files section in the lakehouse.&amp;nbsp; I used the MSI that is shown in Purview when you configure the storage for the connection and granted it contriubutor access to the Workspace.&lt;/P&gt;&lt;P&gt;I then went into Purview, settings for Unified Catalog, and in the solution integrations, set up Fabric storage and provided the URL to the File folder I set up on the lakehouse.&lt;/P&gt;&lt;P&gt;I tested the connection and it tested successfully.&lt;/P&gt;&lt;P&gt;When I set up the scheduler to run, I received the following:&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;The blacked out is the Workspace ID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to understand what I'm missing, I'm assuming write permissions are missing somewhere, but I'm not sure.&amp;nbsp; Any assistance is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:52:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-self-serve-analytics-integration/m-p/4513477#M2745</guid>
      <dc:creator>JBNFM</dc:creator>
      <dc:date>2026-04-21T18:52:14Z</dc:date>
    </item>
    <item>
      <title>Shared capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/shared-capabilities/m-p/4512873#M2718</link>
      <description>&lt;P&gt;I am writing my thesis about Microsoft Purview. And something is not very clear to me about the shared capabilities. So I know Microsoft has the platform and the product shared capabilities. The platform shared capabilities are the foundation for Purview. Like audit logs and retention labels etc. The product shared capabilities are products as Adaptive Protection and OCR. There is a lot information about the product shared capabilities on learn.microsoft.com. But is there anything I can find about the platform shared capabilities like a blogpost or a webinar?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 08:53:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/shared-capabilities/m-p/4512873#M2718</guid>
      <dc:creator>RalfBauer1</dc:creator>
      <dc:date>2026-04-20T08:53:04Z</dc:date>
    </item>
    <item>
      <title>How to identify users handling SITs before purchasing Microsoft Purview licenses?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/how-to-identify-users-handling-sits-before-purchasing-microsoft/m-p/4512804#M2717</link>
      <description>&lt;P&gt;Posting this on behalf of a customer we are currently advising as a Microsoft Partner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer is in the evaluation stage of Microsoft Purview and has raised a licensing concern that we would like the community's guidance on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CUSTOMER'S CONCERN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Purview licenses are user-based, meaning every user who directly or indirectly benefits from the service needs to be licensed. However, to determine which users actually handle sensitive data (and therefore require a license), tools like Content Explorer and Activity Explorer are needed — both of which require an E5 or equivalent license to access in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This creates a chicken-and-egg problem for the customer:&lt;/P&gt;&lt;P&gt;They need Purview to identify who handles sensitive data, but they need to know who handles sensitive data to decide how many Purview licenses to buy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;QUESTIONS ON BEHALF OF THE CUSTOMER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is there an official Microsoft-supported mechanism or tool that allows customers to assess their SIT exposure and identify affected users before committing to a full Purview license purchase?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Is it viable for the customer to purchase a single license (1 qty) assigned to an admin account to perform a tenant-wide scoping and discovery exercise — and would that single license provide sufficient access to identify all users handling SITs across the tenant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. If the 90-day Purview E5 trial is the recommended path, does Content Explorer automatically scan and surface SIT matches across all users in the tenant without requiring any pre-configured DLP policies or sensitivity labels to be set up first?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a partner, we want to ensure we are guiding our customer toward the correct pre-purchase assessment approach before recommending a licensing SKU and quantity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guidance from the community or Microsoft would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 06:59:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/how-to-identify-users-handling-sits-before-purchasing-microsoft/m-p/4512804#M2717</guid>
      <dc:creator>elangamban</dc:creator>
      <dc:date>2026-04-20T06:59:38Z</dc:date>
    </item>
    <item>
      <title>Microsoft Purview PowerShell: Interactive Sign-In Basics + Fixing Common Connect-IPPSSession Errors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-powershell-interactive-sign-in-basics-fixing/m-p/4512639#M2713</link>
      <description>&lt;P&gt;If you’re new to Microsoft Purview PowerShell and your&amp;nbsp;&lt;STRONG&gt;interactive sign-in&lt;/STRONG&gt; fails when you run &lt;STRONG&gt;Connect-IPPSSession&lt;/STRONG&gt;, you’re not alone.&lt;/P&gt;
&lt;P&gt;In this post, I’ll walk through the quick setup (module install + connection) and then cover practical fixes for a common authentication failure: &lt;STRONG&gt;“A window handle must be configured”&lt;/STRONG&gt; (WAM / MSAL window handle error).&lt;/P&gt;
&lt;P&gt;Once connected, you can run Purview-related cmdlets for tasks like working with sensitivity labels, DLP policies, eDiscovery, and other compliance operations (depending on your permissions).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Install the Exchange Online PowerShell module&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Install-Module ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Connect to Microsoft Purview (Security &amp;amp; Compliance) PowerShell&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For interactive sign-in, you can start with the standard connection pattern below (replace the placeholder with your User Principal Name)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Common issue: Interactive sign-in fails with a WAM “window handle” error&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The ExchangeOnlineManagement module uses modern authentication. In some hosts/environments, the sign-in UI can’t attach to a parent window, so token acquisition fails and you may see the error below. This is commonly associated with WAM (Web Account Manager) / MSAL interactive sign-in.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;Error Acquiring Token:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;At C:\Program Files\WindowsPowerShell\Modules\ExchangeOnlineManagement\3.9.2\netFramework\ExchangeOnlineManagement.psm1:591 char:21&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; throw $_.Exception.InnerException;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; + CategoryInfo&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : OperationStopped: (:) [], MsalClientException&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; + FullyQualifiedErrorId : A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You’ll often hit this on secured devices, PowerShell ISE, or hardened corporate images. Below are two solutions to bypass this error. Start with the recommended option first.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Recommended workaround: Use Get-Credential without disabling WAM&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This approach avoids the WAM-based interactive prompt. You’ll be asked for credentials via a standard PowerShell credential dialog, and the module will complete modern authentication.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;$cred = Get-Credential
Connect-IPPSSession -Credential $cred 
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A credential prompt appears: Enter your username and password.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;After authentication, you should be connected to the &lt;STRONG&gt;Security &amp;amp; Compliance (Microsoft Purview) PowerShell session&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;As a quick validation, try a lightweight cmdlet such as&lt;SPAN class="lia-text-color-15"&gt; &lt;EM&gt;&lt;STRONG&gt;Get-Label&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; or&lt;EM&gt; &lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;Get-DlpCompliancePolicy&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt; (availability depends on permissions).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If this works in your environment, it’s a simple way to proceed without changing system-wide WAM behavior.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Alternative workaround: Disable WAM for the session (use with caution)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the interactive UI is failing, you can try disabling WAM. Newer versions of the ExchangeOnlineManagement module support a &lt;STRONG&gt;-DisableWAM&lt;/STRONG&gt; switch on the connection cmdlets, which bypasses the WAM broker and can avoid the “window handle” failure.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Connect-IPPSSession -UserPrincipalName &amp;lt;yourUPN&amp;gt; -DisableWAM&lt;/LI-CODE&gt;
&lt;P&gt;If you can’t use &lt;STRONG&gt;-DisableWAM &lt;/STRONG&gt;or if it is not working as expected (or you’re troubleshooting a specific host issue), some admins set an environment variable to disable WAM for MSAL using the commands below. Treat this as a temporary troubleshooting step and follow your organization’s security guidance.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;$env:MSAL_DISABLE_WAM = "1"
setx MSAL_DISABLE_WAM 1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-13"&gt;&lt;STRONG&gt;Important warning!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Changing authentication/broker behavior can have security and supportability implications.&lt;/LI&gt;
&lt;LI&gt;Use this only for troubleshooting and revert when you’re done using the following commands.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="powershell"&gt;$env:MSAL_DISABLE_WAM = "0"
setx MSAL_DISABLE_WAM 0&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Quick summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re scripting for Microsoft Purview and interactive sign-in fails due to the WAM “window handle” error, try the sequence below.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Install-Module ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement
$cred = Get-Credential
Connect-IPPSSession -Credential $cred &lt;/LI-CODE&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you’ve hit this in a specific host (PowerShell ISE vs Windows PowerShell vs PowerShell 7, RDP/jump box, etc.), share what worked for you in the comments.&lt;/P&gt;
&lt;P&gt;Thanks for reading. Happy Scripting!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/powershell/exchange/connect-to-scc-powershell?view=exchange-ps" target="_blank"&gt;Connect to Security &amp;amp; Compliance PowerShell | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2026 17:17:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-powershell-interactive-sign-in-basics-fixing/m-p/4512639#M2713</guid>
      <dc:creator>Prathista Ilango</dc:creator>
      <dc:date>2026-04-18T17:17:03Z</dc:date>
    </item>
    <item>
      <title>Deploy scalable ring‑fenced Purview operations with Administrative Units</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/deploy-scalable-ring-fenced-purview-operations-with/ba-p/4512556</link>
      <description>&lt;P&gt;As Microsoft Purview deployments mature, many organisations encounter the same scaling challenge: how do you decentralize operations without fragmenting governance or losing visibility? Administrative Units (AUs) provide a native way to solve this by enabling ring‑fenced operations—allowing teams to operate independently within clearly defined boundaries, while preserving central oversight.&lt;/P&gt;
&lt;P&gt;This post focuses on the why behind using Administrative Units in Microsoft Purview, with a particular emphasis on scalable, ring‑fenced operations. We’ll walk through three reference architectures that illustrate how Administrative Units support real‑world operating models—without requiring multiple tenants or separate DLP platforms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;note: this article and visuals will focus on Administrative Units support in Purview Data Loss Prevention.&amp;nbsp; However, Administrative Units are supported in additional solutions of Microsoft Purview.&amp;nbsp; Refer to &lt;A href="https://learn.microsoft.com/en-us/purview/purview-admin-units" target="_blank"&gt;Administrative units in Microsoft Purview | Microsoft Learn&lt;/A&gt; for more details and support.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;Why Administrative Units matter for scalable operations&lt;/H2&gt;
&lt;P&gt;Many large organisations operate with decentralized compliance and DLP teams, often aligned to regions, business units, or regulated functions. Historically, this led to one of two sub‑optimal patterns:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Multiple, disconnected DLP solutions or tenants&lt;/LI&gt;
&lt;LI&gt;Centralized teams managing policies and alerts for parts of the business they don’t own&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Administrative Units change this model by allowing organisations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Partition users (and supported resources) into logical units&lt;/LI&gt;
&lt;LI&gt;Assign restricted administrators who can only see and act within their unit&lt;/LI&gt;
&lt;LI&gt;Apply both global and AU‑scoped policies together, with predictable behavior&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From a Purview perspective, this enables true business function autonomy, enforced through RBAC and data visibility boundaries, while keeping global services—such as classification—centralized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Reference architecture 1: Layered governance with ring‑fenced operations&lt;/H2&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Scenario&lt;/H3&gt;
&lt;P&gt;An organisation wants to migrate from multiple legacy DLP solutions into Microsoft Purview while preserving independent operations for each business function or region.&lt;/P&gt;
&lt;H3&gt;Architecture highlights&lt;/H3&gt;
&lt;P&gt;This model introduces three distinct layers:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Central governance (Global)
&lt;UL&gt;
&lt;LI&gt;Global administrators define baseline policies applicable across the tenant&lt;/LI&gt;
&lt;LI&gt;Shared services such as classifiers and reusable components remain central&lt;/LI&gt;
&lt;LI&gt;Central teams retain cross‑tenant monitoring and reporting capabilities&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Administrative Units (per business function)
&lt;UL&gt;
&lt;LI&gt;Each business function or region is mapped to an Administrative Unit&lt;/LI&gt;
&lt;LI&gt;RBAC, policy visibility, and alert management are strictly scoped to the AU&lt;/LI&gt;
&lt;LI&gt;Policies created here only affect users within that unit&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Business function‑level operations
&lt;UL&gt;
&lt;LI&gt;Scoped DLP admins manage local policies&lt;/LI&gt;
&lt;LI&gt;Alerts and incidents are handled by the owning team&lt;/LI&gt;
&lt;LI&gt;Controls can be tuned to meet specific regulatory or operational needs&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Why this matters&lt;/H3&gt;
&lt;P&gt;This architecture enables a phased migration:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start with a single entity&lt;/LI&gt;
&lt;LI&gt;Gradually scale across additional business functions&lt;/LI&gt;
&lt;LI&gt;Avoid policy sprawl by consolidating and retiring legacy configurations&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Crucially, tenant‑wide limits and global services remain unchanged, ensuring consistent performance as scale increases.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Reference architecture 2: Ring‑fencing user activity visibility to sub‑business functions&lt;/H2&gt;
&lt;img /&gt;
&lt;H3&gt;Scenario&lt;/H3&gt;
&lt;P&gt;“We have dedicated DLP analysts for executives. DLP alerts and activities for these users must only be visible to that team.”&lt;/P&gt;
&lt;H3&gt;Architecture highlights&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;This model refines the first architecture and allowing to have DLP analysts for a subset of users only.&lt;/LI&gt;
&lt;LI&gt;Executive users are placed into a dedicated Administrative Unit representing a subset of users of a business unit.&lt;/LI&gt;
&lt;LI&gt;Policies can be published to multiple Administrative Units (ex: Americas + Americas - Execs)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this model:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Some DLP administrators may be assigned to multiple AUs so they can publish policies across them&lt;/LI&gt;
&lt;LI&gt;Users must belong to a single AU to ensure clean visibility boundaries&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Why this matters&lt;/H3&gt;
&lt;P&gt;This pattern is particularly effective for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Executive monitoring&lt;/LI&gt;
&lt;LI&gt;HR or Legal teams&lt;/LI&gt;
&lt;LI&gt;Highly sensitive populations&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It delivers strict separation of duties without duplicating policies or creating isolated tenants, and aligns with how Purview scopes alerts, activity explorer, and audit data when Administrative Units are used.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Reference architecture 3: User activity visibility for multi‑AU users&lt;/H2&gt;
&lt;img /&gt;
&lt;H3&gt;Scenario&lt;/H3&gt;
&lt;P&gt;Some users operate across multiple business functions—for example, executives or shared service leaders—while still requiring controlled visibility for analysts.&lt;/P&gt;
&lt;H3&gt;Architecture highlights&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;User activities are stamped with the &lt;STRONG&gt;sum &lt;/STRONG&gt;of all Administrative Units the user belonged to at the time of the activity&lt;/LI&gt;
&lt;LI&gt;Scoped DLP administrators:
&lt;UL&gt;
&lt;LI&gt;Can only create policies affecting users within their assigned AU.&amp;nbsp; However the sum of their policies will be applicable.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Scoped DLP analysts:
&lt;UL&gt;
&lt;LI&gt;See &lt;STRONG&gt;all &lt;/STRONG&gt;activities for users in their AU, even if those activities were generated by policies scoped to a different AU.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Why this matters&lt;/H3&gt;
&lt;P&gt;This model ensures:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;No loss of investigative context for analysts&lt;/LI&gt;
&lt;LI&gt;Predictable visibility when users span multiple organizational boundaries&lt;/LI&gt;
&lt;LI&gt;Continued enforcement of AU‑based separation of duties&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It also reinforces a key principle: Administrative Units control visibility and management scope — not the existence of the underlying activity data. Once a user's in scope of a policy, its related activities/alerts are visible to DLP analysts allowed to review this user's activities.&lt;/P&gt;
&lt;H2&gt;When not to use Administrative Units&lt;/H2&gt;
&lt;P&gt;Administrative Units are a powerful enabler for decentralized, ring‑fenced operations—but they are not required in every Purview deployment.&lt;/P&gt;
&lt;P&gt;You may choose not to introduce Administrative Units in the following situations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Single, centralized compliance team.&amp;nbsp; &lt;/STRONG&gt;If one team owns all policy creation, alert triage, and investigations across the organisation—and there is no requirement to restrict visibility—Administrative Units add limited value. In this model, global role groups already provide sufficient control.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;No need for visibility or management separation.&amp;nbsp; &lt;/STRONG&gt;Administrative Units are primarily about scoping visibility and permissions. If all administrators are expected to see all users, alerts, and activities, AU‑based scoping may introduce unnecessary complexity without operational benefit.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Early or small‑scale Purview deployments.&amp;nbsp; &lt;/STRONG&gt;Organisations at an early stage of Purview adoption—running a small number of global policies—may find it simpler to start without AUs and introduce them later as operating models mature. Administrative Units do not change tenant limits or global services, so adoption can be phased over time.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Requirements driven purely by policy targeting.&amp;nbsp; &lt;/STRONG&gt;If the primary requirement is targeting users dynamically for policy application (rather than restricting administrator access or visibility), adaptive scopes alone may be sufficient. Administrative Units become relevant when who can see and manage data is as important as which users are in scope.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In short, Administrative Units are best introduced when organisations need to scale operations with clear ownership boundaries, not simply to organise users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Centralized vs. Decentralized Functions in a Ring‑Fenced Operating Model&lt;/H2&gt;
&lt;P&gt;A scalable Microsoft Purview operating model relies on a &lt;STRONG&gt;deliberate split between functions that remain centralized at the tenant level and those that are decentralized to business functions or regions via Administrative Units (AUs)&lt;/STRONG&gt;. This balance enables autonomy without fragmentation, preserving global consistency while allowing teams to operate independently within defined boundaries.&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Functions that Remain Centralized&lt;/H3&gt;
&lt;P&gt;Certain capabilities are intentionally retained at the &lt;STRONG&gt;global (tenant) level&lt;/STRONG&gt; to ensure consistency, performance, and governance across the organisation. These functions are not delegated to Administrative Units:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Global governance and baseline policy definition&lt;/STRONG&gt;&lt;BR /&gt;Central teams define tenant‑wide baseline policies that apply consistently across all users, regardless of AU membership. This ensures minimum protection standards and avoids divergent interpretations of risk.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Shared services and reusable components&lt;/STRONG&gt;&lt;BR /&gt;Core services such as &lt;STRONG&gt;classifiers and other reusable components&lt;/STRONG&gt; remain centralized to prevent duplication, reduce administrative overhead, and maintain consistent detection behavior across the tenant.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross‑tenant monitoring and reporting&lt;/STRONG&gt;&lt;BR /&gt;Central teams retain visibility across Administrative Units for monitoring, reporting, and oversight purposes, ensuring that decentralization does not result in blind spots at the organizational level.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tenant‑wide limits and platform behavior&lt;/STRONG&gt;&lt;BR /&gt;Administrative Units do not alter tenant‑wide service limits or global platform characteristics. Keeping these aspects centralized ensures predictable performance and scalability as additional business functions are onboarded.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Functions that Are Decentralized via Administrative Units&lt;/H3&gt;
&lt;P&gt;Operational responsibility is decentralized to business functions or regions by mapping them to &lt;STRONG&gt;Administrative Units&lt;/STRONG&gt;, with strict scoping enforced through RBAC and data visibility boundaries:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy creation and management scoped to the AU&lt;/STRONG&gt;&lt;BR /&gt;Business function teams can create and manage policies that only affect users within their Administrative Unit, allowing controls to be tailored to local regulatory or operational requirements without impacting other parts of the organisation.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scoped visibility of alerts, activities, and incidents&lt;/STRONG&gt;&lt;BR /&gt;Administrators and analysts assigned to an AU can only see alerts, activities, and incidents for users in that unit. This enforces separation of duties and prevents unintended access to sensitive data belonging to other functions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Local alert handling and incident response&lt;/STRONG&gt;&lt;BR /&gt;Decentralized teams own the investigation and remediation of alerts generated within their AU, enabling faster response times and clearer accountability.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operational tuning per business function&lt;/STRONG&gt;&lt;BR /&gt;Controls can be adjusted within an AU to reflect specific risk tolerances, regulatory obligations, or operational realities, without creating policy sprawl or requiring separate tenants.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Why This Split Matters&lt;/H3&gt;
&lt;P&gt;By clearly separating &lt;STRONG&gt;centralized governance and shared services&lt;/STRONG&gt; from &lt;STRONG&gt;decentralized, AU‑scoped operations&lt;/STRONG&gt;, organisations can scale Purview deployments in a phased and controlled manner—starting with a single business function and expanding over time—while maintaining consistent governance, visibility, and performance across the tenant.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Key takeaways&lt;/H2&gt;
&lt;P&gt;Administrative Units in Microsoft Purview are not just a permissions feature—they are an operating model enabler. Used correctly, they allow organisations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Scale decentralized operations with confidence&lt;/LI&gt;
&lt;LI&gt;Enforce ring‑fenced visibility and management boundaries&lt;/LI&gt;
&lt;LI&gt;Combine global consistency with local autonomy&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For organisations planning large‑scale Purview deployments or consolidating legacy compliance tooling, Administrative Units provide a foundational architecture for sustainable growth.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-21"&gt;Learn more&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://github.com/microsoft/purview/blob/main/purview-blueprints/Administrative%20Units%20in%20Microsoft%20Purview.pdf" target="_blank"&gt;Administrative units in Microsoft Purview (presentation)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/purview/purview-admin-units" target="_blank"&gt;Administrative units in Microsoft Purview | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sat, 18 Apr 2026 01:22:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/deploy-scalable-ring-fenced-purview-operations-with/ba-p/4512556</guid>
      <dc:creator>MaximeBombardier</dc:creator>
      <dc:date>2026-04-18T01:22:01Z</dc:date>
    </item>
    <item>
      <title>Purview Integration during Merger and Acquisitions</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-integration-during-merger-and-acquisitions/m-p/4512159#M2709</link>
      <description>&lt;P&gt;a { text-decoration: none; color: #464feb; } tr th, tr td { border: 1px solid #e6e6e6; } tr th { background-color: #f5f5f5; }&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are currently in the process of merging with two other organizations and are looking to integrate our Microsoft Purview environments.&lt;/P&gt;&lt;P&gt;All three organizations have different sensitivity labeling schemes, and we would like guidance on the best approach to achieve a unified labeling strategy across the merged organization.&lt;/P&gt;&lt;P&gt;Specifically, should we create a new, common set of sensitivity labels for the combined organization and plan a phased transition for users? One of the organizations already has the majority of its documents labeled, so maintaining those existing labels during the merger is a key concern.&lt;/P&gt;&lt;P&gt;We are also looking for best practices to ensure that existing labels are preserved when the two additional organizations are onboarded into Purview, while still moving toward a consistent, unified labeling framework.&lt;/P&gt;&lt;P&gt;Any suggestions or if any one had already been a part of such a merger, please share your experience&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 17:33:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-integration-during-merger-and-acquisitions/m-p/4512159#M2709</guid>
      <dc:creator>arunsekaran</dc:creator>
      <dc:date>2026-04-16T17:33:54Z</dc:date>
    </item>
    <item>
      <title>Purview DLP Behaviours in SharePoint and OneDrive</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-sharepoint-and-onedrive/m-p/4511627#M2704</link>
      <description>&lt;P&gt;We are currently testing Microsoft Purview DLP policies for user awareness across SharePoint Online, and OneDrive. The policy is configured such that sensitive information (based on a sensitivity label-OFFICIAL Sensitive) shared externally triggers a policy tip, with override allowed (justification options enabled) and no blocking action configured.&lt;/P&gt;&lt;P&gt;In SharePoint Online and OneDrive, users are not experiencing any DLP-related behaviour. When attempting to share labelled content externally:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;No policy tips are displayed&lt;/LI&gt;&lt;LI&gt;No override prompts are presented&lt;/LI&gt;&lt;LI&gt;No indication of DLP enforcement is shown&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Users are able to share content externally without any awareness prompt or restriction.&lt;/P&gt;&lt;img&gt;Sharing in OneDrive/SharePoint&lt;/img&gt;&lt;P&gt;Expected behaviour:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Users should receive a policy tip during the sharing process&lt;/LI&gt;&lt;LI&gt;Users should be prompted for justification when overriding, aligned with the DLP configuration&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Has anyone observed similar behaviour with DLP in SharePoint Online and OneDrive, particularly in scenarios where no blocking action is configured? Keen to understand if this is expected behaviour, a known limitation, or if there are any configuration considerations or workarounds to achieve a consistent user experience across workloads.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:53:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-sharepoint-and-onedrive/m-p/4511627#M2704</guid>
      <dc:creator>manojviduranga</dc:creator>
      <dc:date>2026-04-15T14:53:11Z</dc:date>
    </item>
  </channel>
</rss>

