<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Purview topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-purview/bd-p/AzurePurview</link>
    <description>Microsoft Purview topics</description>
    <pubDate>Fri, 01 May 2026 17:51:54 GMT</pubDate>
    <dc:creator>AzurePurview</dc:creator>
    <dc:date>2026-05-01T17:51:54Z</dc:date>
    <item>
      <title>Microsoft Purview to detect passwords</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-to-detect-passwords/m-p/4516367#M2778</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would you recommend for scanning and setting up scheduled scans in Microsoft Purview to detect passwords or sensitive credentials stored in SharePoint sites and OneDrive?&lt;/P&gt;&lt;P&gt;We would like to discover whether anyone has shared or stored passwords in SharePoint or OneDrive, as we have already had an incident because of this.&lt;/P&gt;&lt;P&gt;Are there any recommended Purview solutions, policies, or detection rules we should use for this? Ideally, we would like to schedule regular scans and receive alerts or reports when potential passwords, credentials, or secrets are detected.&lt;/P&gt;&lt;P&gt;Any advice or recommended approach would be appreciated. thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Miro&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 22:26:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-to-detect-passwords/m-p/4516367#M2778</guid>
      <dc:creator>miro2022</dc:creator>
      <dc:date>2026-04-30T22:26:52Z</dc:date>
    </item>
    <item>
      <title>Activity explorer scoping to AU</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/activity-explorer-scoping-to-au/m-p/4515918#M2769</link>
      <description>&lt;P&gt;I remember that Activity Explorer can be fully scoped to Admin Units, and that the Restricted admin can see activity explorer and DLP matching events for the scoped AU only, is that correct?&lt;BR /&gt;Cause I was checking and I found the Restricted admin can see the activities also for the users out of the scoped AU. Does that make sense?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 15:39:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/activity-explorer-scoping-to-au/m-p/4515918#M2769</guid>
      <dc:creator>AlaaAy</dc:creator>
      <dc:date>2026-04-29T15:39:32Z</dc:date>
    </item>
    <item>
      <title>eDiscovery search: Sites not available when adding a Group data source</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/ediscovery-search-sites-not-available-when-adding-a-group-data/m-p/4515146#M2761</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am attempting to use Purview eDiscovery to search a SharePoint site associated with a Group.&lt;/P&gt;&lt;P&gt;When adding the Data Source, I search for the URL of the SharePoint site, and the Group is returned.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;However, after selecting the group and clicking Manage, it indicates Sites are "Not Available".&lt;/P&gt;&lt;img /&gt;&lt;P&gt;What causes this, and how do fix it?&lt;/P&gt;&lt;P&gt;My user is a member of the "eDiscovery Manager" role group as an "eDiscovery Administrator", and licensed with "Microsoft 365 E3" and "Microsoft Purview Suite". It is also an Owner of the target Group / SP Site.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 15:30:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/ediscovery-search-sites-not-available-when-adding-a-group-data/m-p/4515146#M2761</guid>
      <dc:creator>danielschmidt</dc:creator>
      <dc:date>2026-04-27T15:30:12Z</dc:date>
    </item>
    <item>
      <title>Label usage rights not working correctly in office web-view</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/label-usage-rights-not-working-correctly-in-office-web-view/m-p/4514983#M2757</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I’ve created three simple Purview sensitivity labels (PUBLIC, RESTRICTED, CONFIDENTIAL). RESTRICTED and CONFIDENTIAL use usage-rights, so every internal employee and group is the owner of the document. External users are not permitted to open the document.&lt;/P&gt;&lt;P&gt;Unfortunately, I can’t export or print my labeled documents in the Office Web View. In Office Desktop, however, the labels work correctly.&lt;BR /&gt;This issue occurs for various internal users. Tested with Word, Excel, and PowerPoint.&lt;/P&gt;&lt;P&gt;Co-authoring is enabled. User access never expires. Offline access is permitted.&lt;/P&gt;&lt;P&gt;Do you have any ideas?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Label usage rights&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Web-view&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Office Desktop&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 07:58:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/label-usage-rights-not-working-correctly-in-office-web-view/m-p/4514983#M2757</guid>
      <dc:creator>mdohm1355</dc:creator>
      <dc:date>2026-04-27T07:58:30Z</dc:date>
    </item>
    <item>
      <title>Auto Labeling Policy Delay for Old Files (Exsisting Files)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;We are observing a difference in auto labelling policy behaviour in Purview for Sharepoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An auto labelling policy has been enabled and scoped to sharepoint with metadata based rule(document creation date or document modification date). The scoped sharepoint only contain 7 unlabeled files that were uploaded before the policy turned on. The policy is working because if i placed any new file after enabling the policy got labelled within about 5 minutes, but the exsisting files are not labeled and remains unlabelled. It seems the new files are evalauated via the near time while exsisting file rely on asychronous mode. Can anyone help explain why exsisting files take longer to be proceesed even when there there are only a few files or share if you faced similar behaviour. This is the test scenario, as we plan to enable the same policy across more than 50 plus sites containing millions of unlabeled files and we want to understand and predict that even though its takes time all exsisting unlabeled files will eventually will be labelled. This is very crucial, so please helo us understand this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;BanuMurali&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 14:44:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</guid>
      <dc:creator>BanuMurali</dc:creator>
      <dc:date>2026-04-26T14:44:29Z</dc:date>
    </item>
    <item>
      <title>ErrorBoundary@wicd-mail/main</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</link>
      <description>&lt;P&gt;I'm trying to investigate a possible phishing email and when I click on View Message List, I get that error.&amp;nbsp; It does show removed after delivery, but I want to block either the sender or the domain.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 12:16:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</guid>
      <dc:creator>CCraft301</dc:creator>
      <dc:date>2026-04-24T12:16:04Z</dc:date>
    </item>
    <item>
      <title>Unified Catalog Self-serve analytics integration</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-self-serve-analytics-integration/m-p/4513477#M2745</link>
      <description>&lt;P&gt;I'm hoping someone has gone through the process of setting up the Self-serve analytics in the Unified Catalog settings to push the Unified Catalog information down to a Fabric Lakehouse.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a Workspace, and then created a lakehouse in this workspace, and created a folder under the files section in the lakehouse.&amp;nbsp; I used the MSI that is shown in Purview when you configure the storage for the connection and granted it contriubutor access to the Workspace.&lt;/P&gt;&lt;P&gt;I then went into Purview, settings for Unified Catalog, and in the solution integrations, set up Fabric storage and provided the URL to the File folder I set up on the lakehouse.&lt;/P&gt;&lt;P&gt;I tested the connection and it tested successfully.&lt;/P&gt;&lt;P&gt;When I set up the scheduler to run, I received the following:&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;The blacked out is the Workspace ID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to understand what I'm missing, I'm assuming write permissions are missing somewhere, but I'm not sure.&amp;nbsp; Any assistance is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:52:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-self-serve-analytics-integration/m-p/4513477#M2745</guid>
      <dc:creator>JBNFM</dc:creator>
      <dc:date>2026-04-21T18:52:14Z</dc:date>
    </item>
    <item>
      <title>Shared capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/shared-capabilities/m-p/4512873#M2718</link>
      <description>&lt;P&gt;I am writing my thesis about Microsoft Purview. And something is not very clear to me about the shared capabilities. So I know Microsoft has the platform and the product shared capabilities. The platform shared capabilities are the foundation for Purview. Like audit logs and retention labels etc. The product shared capabilities are products as Adaptive Protection and OCR. There is a lot information about the product shared capabilities on learn.microsoft.com. But is there anything I can find about the platform shared capabilities like a blogpost or a webinar?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 08:53:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/shared-capabilities/m-p/4512873#M2718</guid>
      <dc:creator>RalfBauer1</dc:creator>
      <dc:date>2026-04-20T08:53:04Z</dc:date>
    </item>
    <item>
      <title>How to identify users handling SITs before purchasing Microsoft Purview licenses?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/how-to-identify-users-handling-sits-before-purchasing-microsoft/m-p/4512804#M2717</link>
      <description>&lt;P&gt;Posting this on behalf of a customer we are currently advising as a Microsoft Partner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer is in the evaluation stage of Microsoft Purview and has raised a licensing concern that we would like the community's guidance on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CUSTOMER'S CONCERN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Purview licenses are user-based, meaning every user who directly or indirectly benefits from the service needs to be licensed. However, to determine which users actually handle sensitive data (and therefore require a license), tools like Content Explorer and Activity Explorer are needed — both of which require an E5 or equivalent license to access in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This creates a chicken-and-egg problem for the customer:&lt;/P&gt;&lt;P&gt;They need Purview to identify who handles sensitive data, but they need to know who handles sensitive data to decide how many Purview licenses to buy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;QUESTIONS ON BEHALF OF THE CUSTOMER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is there an official Microsoft-supported mechanism or tool that allows customers to assess their SIT exposure and identify affected users before committing to a full Purview license purchase?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Is it viable for the customer to purchase a single license (1 qty) assigned to an admin account to perform a tenant-wide scoping and discovery exercise — and would that single license provide sufficient access to identify all users handling SITs across the tenant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. If the 90-day Purview E5 trial is the recommended path, does Content Explorer automatically scan and surface SIT matches across all users in the tenant without requiring any pre-configured DLP policies or sensitivity labels to be set up first?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a partner, we want to ensure we are guiding our customer toward the correct pre-purchase assessment approach before recommending a licensing SKU and quantity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guidance from the community or Microsoft would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 06:59:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/how-to-identify-users-handling-sits-before-purchasing-microsoft/m-p/4512804#M2717</guid>
      <dc:creator>elangamban</dc:creator>
      <dc:date>2026-04-20T06:59:38Z</dc:date>
    </item>
    <item>
      <title>Microsoft Purview PowerShell: Interactive Sign-In Basics + Fixing Common Connect-IPPSSession Errors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-powershell-interactive-sign-in-basics-fixing/m-p/4512639#M2713</link>
      <description>&lt;P&gt;If you’re new to Microsoft Purview PowerShell and your&amp;nbsp;&lt;STRONG&gt;interactive sign-in&lt;/STRONG&gt; fails when you run &lt;STRONG&gt;Connect-IPPSSession&lt;/STRONG&gt;, you’re not alone.&lt;/P&gt;
&lt;P&gt;In this post, I’ll walk through the quick setup (module install + connection) and then cover practical fixes for a common authentication failure: &lt;STRONG&gt;“A window handle must be configured”&lt;/STRONG&gt; (WAM / MSAL window handle error).&lt;/P&gt;
&lt;P&gt;Once connected, you can run Purview-related cmdlets for tasks like working with sensitivity labels, DLP policies, eDiscovery, and other compliance operations (depending on your permissions).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Install the Exchange Online PowerShell module&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Install-Module ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Connect to Microsoft Purview (Security &amp;amp; Compliance) PowerShell&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For interactive sign-in, you can start with the standard connection pattern below (replace the placeholder with your User Principal Name)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Common issue: Interactive sign-in fails with a WAM “window handle” error&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The ExchangeOnlineManagement module uses modern authentication. In some hosts/environments, the sign-in UI can’t attach to a parent window, so token acquisition fails and you may see the error below. This is commonly associated with WAM (Web Account Manager) / MSAL interactive sign-in.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;Error Acquiring Token:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;At C:\Program Files\WindowsPowerShell\Modules\ExchangeOnlineManagement\3.9.2\netFramework\ExchangeOnlineManagement.psm1:591 char:21&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; throw $_.Exception.InnerException;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; + CategoryInfo&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : OperationStopped: (:) [], MsalClientException&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; + FullyQualifiedErrorId : A window handle must be configured. See https://aka.ms/msal-net-wam#parent-window-handles&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You’ll often hit this on secured devices, PowerShell ISE, or hardened corporate images. Below are two solutions to bypass this error. Start with the recommended option first.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Recommended workaround: Use Get-Credential without disabling WAM&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This approach avoids the WAM-based interactive prompt. You’ll be asked for credentials via a standard PowerShell credential dialog, and the module will complete modern authentication.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;$cred = Get-Credential
Connect-IPPSSession -Credential $cred 
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A credential prompt appears: Enter your username and password.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;After authentication, you should be connected to the &lt;STRONG&gt;Security &amp;amp; Compliance (Microsoft Purview) PowerShell session&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;As a quick validation, try a lightweight cmdlet such as&lt;SPAN class="lia-text-color-15"&gt; &lt;EM&gt;&lt;STRONG&gt;Get-Label&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; or&lt;EM&gt; &lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;Get-DlpCompliancePolicy&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt; (availability depends on permissions).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If this works in your environment, it’s a simple way to proceed without changing system-wide WAM behavior.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Alternative workaround: Disable WAM for the session (use with caution)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the interactive UI is failing, you can try disabling WAM. Newer versions of the ExchangeOnlineManagement module support a &lt;STRONG&gt;-DisableWAM&lt;/STRONG&gt; switch on the connection cmdlets, which bypasses the WAM broker and can avoid the “window handle” failure.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Connect-IPPSSession -UserPrincipalName &amp;lt;yourUPN&amp;gt; -DisableWAM&lt;/LI-CODE&gt;
&lt;P&gt;If you can’t use &lt;STRONG&gt;-DisableWAM &lt;/STRONG&gt;or if it is not working as expected (or you’re troubleshooting a specific host issue), some admins set an environment variable to disable WAM for MSAL using the commands below. Treat this as a temporary troubleshooting step and follow your organization’s security guidance.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;$env:MSAL_DISABLE_WAM = "1"
setx MSAL_DISABLE_WAM 1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-13"&gt;&lt;STRONG&gt;Important warning!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Changing authentication/broker behavior can have security and supportability implications.&lt;/LI&gt;
&lt;LI&gt;Use this only for troubleshooting and revert when you’re done using the following commands.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="powershell"&gt;$env:MSAL_DISABLE_WAM = "0"
setx MSAL_DISABLE_WAM 0&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Quick summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re scripting for Microsoft Purview and interactive sign-in fails due to the WAM “window handle” error, try the sequence below.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Install-Module ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement
$cred = Get-Credential
Connect-IPPSSession -Credential $cred &lt;/LI-CODE&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you’ve hit this in a specific host (PowerShell ISE vs Windows PowerShell vs PowerShell 7, RDP/jump box, etc.), share what worked for you in the comments.&lt;/P&gt;
&lt;P&gt;Thanks for reading. Happy Scripting!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/powershell/exchange/connect-to-scc-powershell?view=exchange-ps" target="_blank"&gt;Connect to Security &amp;amp; Compliance PowerShell | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2026 17:17:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/microsoft-purview-powershell-interactive-sign-in-basics-fixing/m-p/4512639#M2713</guid>
      <dc:creator>Prathista Ilango</dc:creator>
      <dc:date>2026-04-18T17:17:03Z</dc:date>
    </item>
    <item>
      <title>Purview Integration during Merger and Acquisitions</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-integration-during-merger-and-acquisitions/m-p/4512159#M2709</link>
      <description>&lt;P&gt;a { text-decoration: none; color: #464feb; } tr th, tr td { border: 1px solid #e6e6e6; } tr th { background-color: #f5f5f5; }&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are currently in the process of merging with two other organizations and are looking to integrate our Microsoft Purview environments.&lt;/P&gt;&lt;P&gt;All three organizations have different sensitivity labeling schemes, and we would like guidance on the best approach to achieve a unified labeling strategy across the merged organization.&lt;/P&gt;&lt;P&gt;Specifically, should we create a new, common set of sensitivity labels for the combined organization and plan a phased transition for users? One of the organizations already has the majority of its documents labeled, so maintaining those existing labels during the merger is a key concern.&lt;/P&gt;&lt;P&gt;We are also looking for best practices to ensure that existing labels are preserved when the two additional organizations are onboarded into Purview, while still moving toward a consistent, unified labeling framework.&lt;/P&gt;&lt;P&gt;Any suggestions or if any one had already been a part of such a merger, please share your experience&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 17:33:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-integration-during-merger-and-acquisitions/m-p/4512159#M2709</guid>
      <dc:creator>arunsekaran</dc:creator>
      <dc:date>2026-04-16T17:33:54Z</dc:date>
    </item>
    <item>
      <title>Purview DLP Behaviours in SharePoint and OneDrive</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-sharepoint-and-onedrive/m-p/4511627#M2704</link>
      <description>&lt;P&gt;We are currently testing Microsoft Purview DLP policies for user awareness across SharePoint Online, and OneDrive. The policy is configured such that sensitive information (based on a sensitivity label-OFFICIAL Sensitive) shared externally triggers a policy tip, with override allowed (justification options enabled) and no blocking action configured.&lt;/P&gt;&lt;P&gt;In SharePoint Online and OneDrive, users are not experiencing any DLP-related behaviour. When attempting to share labelled content externally:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;No policy tips are displayed&lt;/LI&gt;&lt;LI&gt;No override prompts are presented&lt;/LI&gt;&lt;LI&gt;No indication of DLP enforcement is shown&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Users are able to share content externally without any awareness prompt or restriction.&lt;/P&gt;&lt;img&gt;Sharing in OneDrive/SharePoint&lt;/img&gt;&lt;P&gt;Expected behaviour:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Users should receive a policy tip during the sharing process&lt;/LI&gt;&lt;LI&gt;Users should be prompted for justification when overriding, aligned with the DLP configuration&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Has anyone observed similar behaviour with DLP in SharePoint Online and OneDrive, particularly in scenarios where no blocking action is configured? Keen to understand if this is expected behaviour, a known limitation, or if there are any configuration considerations or workarounds to achieve a consistent user experience across workloads.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:53:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-sharepoint-and-onedrive/m-p/4511627#M2704</guid>
      <dc:creator>manojviduranga</dc:creator>
      <dc:date>2026-04-15T14:53:11Z</dc:date>
    </item>
    <item>
      <title>Purview DLP Behaviours in Outlook Desktop</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-outlook-desktop/m-p/4511623#M2703</link>
      <description>&lt;P&gt;We are currently testing Microsoft Purview DLP policies for user awareness, where sensitive information shared externally triggers a policy tip, with override allowed (justification options enabled) and no blocking action configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are observing the following behaviours in Outlook Desktop:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Inconsistent policy tip display (across Outlook Desktop Windows clients) &lt;/STRONG&gt;– For some users, the policy tip renders correctly, while for others it appears with duplicated/stacked lines of text. This is occurring across users with similar configurations.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Override without justification &lt;/STRONG&gt;– Users are able to click “Send Anyway/Confirm and send” without selecting any justification option (e.g. business justification, manager approval, etc.), which bypasses the intended control.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;New Outlook:&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Classic Outlook:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;This has been observed on Outlook Desktop (Microsoft 365 Apps), including:&lt;/P&gt;&lt;P&gt;Version 2602 (Build 19725.20170 Click-to-Run)&lt;/P&gt;&lt;P&gt;Version 2602 (Build 16.0.19725.20126 MSO)&lt;/P&gt;&lt;P&gt;Has anyone experienced similar behaviour with DLP policy tips or override enforcement in Outlook Desktop? Keen to understand if this is a known issue or if there are any recommended fixes or workarounds.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:45:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-dlp-behaviours-in-outlook-desktop/m-p/4511623#M2703</guid>
      <dc:creator>manojviduranga</dc:creator>
      <dc:date>2026-04-15T14:45:51Z</dc:date>
    </item>
    <item>
      <title>DLP Policy - DSPM Block sensitive info from AI sites</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/dlp-policy-dspm-block-sensitive-info-from-ai-sites/m-p/4511198#M2700</link>
      <description>&lt;P&gt;Having issues with this DLP policy not being triggered to block specific SITs from being pasted into ChatGPT, Google Gemine, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spent several hours troubleshooting this issue on Windows 11 VM running in Parallels Desktop. Testing was done in Edge.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Troubleshooting\testing done:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Built &lt;STRONG&gt;Endpoint DLP policy scoped to Devices&lt;/STRONG&gt; and confirmed device is onboarded/visible in Activity Explorer.&lt;/LI&gt;&lt;LI&gt;Created/edited DLP rule to &lt;STRONG&gt;remove sensitivity label dependency&lt;/STRONG&gt; and use &lt;STRONG&gt;SIT-based conditions&lt;/STRONG&gt; (Credit Card, ABA, SSN, etc.).&lt;/LI&gt;&lt;LI&gt;Set &lt;STRONG&gt;Paste to supported browsers = Block&lt;/STRONG&gt; and &lt;STRONG&gt;Upload to restricted cloud service domains = Block&lt;/STRONG&gt; in the same rule.&lt;/LI&gt;&lt;LI&gt;Configured &lt;STRONG&gt;Sensitive service domain restrictions&lt;/STRONG&gt; and tested &lt;STRONG&gt;priority/order&lt;/STRONG&gt; (moved policy/rule to top).&lt;/LI&gt;&lt;LI&gt;Created &lt;STRONG&gt;Sensitive service domain group&lt;/STRONG&gt; for AI sites; corrected entries to &lt;STRONG&gt;hostname + prefix wildcard a &lt;/STRONG&gt;format (e.g., chatgpt.com + *.chatgpt.com) after wildcard/URL-format constraints were discovered.&lt;/LI&gt;&lt;LI&gt;Validated &lt;STRONG&gt;Target domain = chatgpt.com&lt;/STRONG&gt; in Activity Explorer for paste events.&lt;/LI&gt;&lt;LI&gt;Tested multiple SIT payloads (credit card numbers with/without context) and confirmed detection occurs.&lt;/LI&gt;&lt;LI&gt;Confirmed paste events consistently show: &lt;STRONG&gt;Policy = Default Policy&lt;/STRONG&gt;, &lt;STRONG&gt;Rule = JIT Fallback Allow Rule&lt;/STRONG&gt;, &lt;STRONG&gt;Other matches = 0&lt;/STRONG&gt;, &lt;STRONG&gt;Enforcement = Allow&lt;/STRONG&gt; (meaning configured rules are not matching the &lt;EM&gt;PastedToBrowser&lt;/EM&gt; activity).&lt;/LI&gt;&lt;LI&gt;Verified &lt;STRONG&gt;Upload enforcement works&lt;/STRONG&gt;: “DLP rule matched” events show &lt;STRONG&gt;Block&lt;/STRONG&gt; for file upload to ChatGPT/LLM site group—proves domain scoping and endpoint enforcement works for upload.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Disabled JIT&lt;/STRONG&gt; and retested; paste events still fall back to &lt;STRONG&gt;JIT Fallback Allow Rule&lt;/STRONG&gt; with &lt;STRONG&gt;JIT triggered = false&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Verified Defender platform prerequisites: &lt;STRONG&gt;AMServiceVersion (Antimalware Client) = 4.18.26020.6&lt;/STRONG&gt; (meets/exceeds requirements).&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 14 Apr 2026 13:02:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/dlp-policy-dspm-block-sensitive-info-from-ai-sites/m-p/4511198#M2700</guid>
      <dc:creator>Bosanac89</dc:creator>
      <dc:date>2026-04-14T13:02:05Z</dc:date>
    </item>
    <item>
      <title>Purview Graph API</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-graph-api/m-p/4509708#M2696</link>
      <description>&lt;P&gt;Hello. I'm trying to find information on the Purview Graph API and it's endpoints. It looks like the endpoints aren't posted publicly and are listed within an admin console. Can someone help me with how to view the endpoints?&lt;/P&gt;&lt;P&gt;Also, are the graph API endpoints capable of reading and creating assets into Purview?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 18:20:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/purview-graph-api/m-p/4509708#M2696</guid>
      <dc:creator>southpawmurph</dc:creator>
      <dc:date>2026-04-08T18:20:11Z</dc:date>
    </item>
    <item>
      <title>Leveraging Microsoft Graph to Automate Compliance Workflows MS Purview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/leveraging-microsoft-graph-to-automate-compliance-workflows-ms/m-p/4509628#M2694</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Purview provides organizations with capabilities to discover, classify, protect, and govern sensitive information across Microsoft 365 workloads. As organizations increasingly rely on Purview for compliance operations such as auditing, investigations, and regulatory response, there is a growing need to automate these processes beyond the Microsoft Purview portal.&lt;/P&gt;
&lt;P&gt;Microsoft exposes key compliance capabilities through Microsoft Graph APIs, enabling organizations to integrate Purview operations directly into automation workflows. The Microsoft Purview APIs in Microsoft Graph allow applications to align with data governance, security, and compliance policies defined within the Purview portal, helping ensure that applications handling sensitive information respect organizational controls.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Automating eDiscovery Operations with Microsoft Graph&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Microsoft Purview eDiscovery APIs available through Microsoft Graph enable organizations to automate repetitive compliance tasks and integrate with existing investigation or legal workflows. These APIs are intended to support litigation, investigation, and regulatory scenarios by allowing administrators to programmatically manage key eDiscovery components such as cases, custodians, searches, review sets, and exports.&lt;/P&gt;
&lt;P&gt;This capability allows organizations to move from manual portal‑based workflows toward repeatable, policy‑aligned processes integrated into automation platforms or downstream compliance tooling.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Programmatic Access to Audit Logs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Purview Audit captures thousands of operations across Microsoft 365 services and retains them in the unified audit log for security investigations and compliance obligations. Through Microsoft Graph, administrators can now programmatically search and retrieve audit logs using the Purview Audit Search API.&lt;/P&gt;
&lt;P&gt;This API enables administrators and applications to query and retrieve relevant audit activity logs across workloads such as Exchange, Entra ID, OneDrive, SharePoint, and Intune, providing visibility into user activity and administrative operations performed across the organization.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This provides a programmatic alternative to legacy PowerShell‑based audit search methods, improving reliability and enabling automation of compliance monitoring workflows.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Supporting Policy‑Aware Applications&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Applications that integrate with Microsoft Purview APIs through Microsoft Graph can interpret and enforce compliance policies such as sensitivity labels or data loss prevention (DLP) rules. Microsoft documents that apps built using these APIs can prevent data misuse by aligning with compliance and security requirements defined within the organization’s governance framework.&lt;/P&gt;
&lt;P&gt;This integration also allows enterprise applications to respect sensitivity labels and policy‑driven controls, ensuring that interactions with organizational data remain compliant with regulatory requirements and internal governance policies.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Purview governs organizational data through classification, retention, auditing, and investigation capabilities. Microsoft Graph provides the automation layer that allows these governance controls to be accessed programmatically. By integrating Microsoft Graph with Microsoft Purview APIs, organizations can automate eDiscovery workflows, retrieve audit logs programmatically, and ensure that applications interacting with sensitive data respect compliance policies defined within their Microsoft 365 environment.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Learning Resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/security-ediscovery-apioverview?view=graph-rest-1.0" target="_blank"&gt;Use the Microsoft Purview eDiscovery API in Microsoft Graph&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/edisc-ref-api-guide" target="_blank"&gt;Use Microsoft Purview APIs for eDiscovery&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/developer/microsoft-purview-sdk-documentation-overview" target="_blank"&gt;Overview of Microsoft Purview APIs in Microsoft Graph&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-the-microsoft-purview-audit-search-graph-api/4115818" target="_blank"&gt;Introducing the Microsoft Purview Audit Search Graph API&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:32:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/leveraging-microsoft-graph-to-automate-compliance-workflows-ms/m-p/4509628#M2694</guid>
      <dc:creator>milgo</dc:creator>
      <dc:date>2026-04-08T12:32:38Z</dc:date>
    </item>
    <item>
      <title>Unable to use MS Graph DLP Api's to use with my Entra Registered App</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/unable-to-use-ms-graph-dlp-api-s-to-use-with-my-entra-registered/m-p/4509171#M2692</link>
      <description>&lt;P&gt;In purview, I have set of policies in DLP, where I have registered to block the US SSN in the text contents and I have created different policies in all of them&lt;/P&gt;&lt;P&gt;I have selected the available locations:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Exchange email - All accounts&lt;/LI&gt;&lt;LI&gt;SharePoint sites&lt;/LI&gt;&lt;LI&gt;OneDrive accounts - All accounts&lt;/LI&gt;&lt;LI&gt;Teams chat and channel messages - All accounts&lt;/LI&gt;&lt;LI&gt;Devices - All accounts&lt;/LI&gt;&lt;LI&gt;Microsoft Defender for Cloud Apps&lt;/LI&gt;&lt;LI&gt;On-premises repositories&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And selected action as block all, in all of them for the rule and enabled the rule (not in simulation mode)&lt;/P&gt;&lt;P&gt;Now, I have the app registered in Entra and I try to use the following API's&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/graph/api/userprotectionscopecontainer-compute?view=graph-rest-1.0" target="_blank"&gt;https://learn.microsoft.com/en-us/graph/api/userprotectionscopecontainer-compute?view=graph-rest-1.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/graph/api/userdatasecurityandgovernance-processcontent?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank"&gt;https://learn.microsoft.com/en-us/graph/api/userdatasecurityandgovernance-processcontent?view=graph-rest-1.0&amp;amp;tabs=http&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But whenever I use the compute api I can see i'm only getting&lt;/P&gt;&lt;LI-CODE lang="bash"&gt;curl -X POST https://graph.microsoft.com/v1.0/users/5fd51e08-c5f1-4298-b79b-a357eaa414ff/dataSecurityAndGovernance/protectionScopes/compute\
    -H 'Authorization: Bearer &amp;lt;ACCESS_TOKEN&amp;gt;'\
    -H 'Content-Type: application/json' -d '{
    "activities": "uploadText,downloadText"
}'&lt;/LI-CODE&gt;&lt;LI-CODE lang="bash"&gt;{
    "@odata.context": "https://graph.microsoft.com/v1.0/$metadata#Collection(microsoft.graph.policyUserScope)",
    "value": [
        {
            "activities": "uploadText,downloadText",
            "executionMode": "evaluateOffline",
            "locations": [
                {
                    "@odata.type": "#microsoft.graph.policyLocationApplication",
                    "value": "b48106d9-1cdb-4d90-9485-fe2b6ee78acf"
                }
            ],
            "policyActions": []
        }
    ]
}&lt;/LI-CODE&gt;&lt;P&gt;My sample App's Id is showing up but always with `evaluateOffline`&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I don't know why it always gives 'evaluteOffline' and policyActions is always empty array&lt;/P&gt;&lt;P&gt;Also, I can see my Entra registered app is showing up here in the value of the locations&lt;/P&gt;&lt;P&gt;And when I use the processContent api , I always get modified in the response and nothing else like below:&lt;/P&gt;&lt;LI-CODE lang="bash"&gt;curl -XPOST https://graph.microsoft.com/v1.0/users/5fd51e08-c5f1-4298-b79b-a357eaa414ff/dataSecurityAndGovernance/processContent \
    -H 'Authorization: &amp;lt;ACCESS TOKEN&amp;gt;'\
    -H 'Content-Type: application/json' -d '{
  "contentToProcess": {
    "contentEntries": [
      {
        "@odata.type": "microsoft.graph.processConversationMetadata",
        "identifier": "07785517-9081-4fe7-a9dc-85bcdf5e9075",
        "content": {
          "@odata.type": "microsoft.graph.textContent",
          "data": "Please process this application for John VSmith, his SSN is 121-98-1437 and credit card number is 4532667785213500"
        },
        "name": "Postman message",
        "correlationId": "d63eafd2-e3a9-4c1a-b726-a2e9b9d9580d",
        "sequenceNumber": 0,
        "isTruncated": false,
        "createdDateTime": "2026-04-06T00:23:20",
        "modifiedDateTime": "2026-04-06T00:23:20"
      }
    ],
    "activityMetadata": {
      "activity": "uploadText"
    },
    "deviceMetadata": {
      "operatingSystemSpecifications": {
        "operatingSystemPlatform": "Windows 11",
        "operatingSystemVersion": "10.0.26100.0"
      },
      "ipAddress": "127.0.0.1"
    },
    "protectedAppMetadata": {
      "name": "Postman",
      "version": "1.0",
      "applicationLocation": {
        "@odata.type": "microsoft.graph.policyLocationApplication",
        "value": "b48106d9-1cdb-4d90-9485-fe2b6ee78acf"
      }
    },
    "integratedAppMetadata": {
      "name": "Postman",
      "version": "1.0"
    }
  }
}'&lt;/LI-CODE&gt;&lt;P&gt;In the above request I have mentioned some sample US Security SSN, but the response I get is&lt;/P&gt;&lt;LI-CODE lang="json"&gt;{
    "@odata.context": "https://graph.microsoft.com/v1.0/$metadata#microsoft.graph.processContentResponse",
    "protectionScopeState": "notModified",
    "policyActions": [],
    "processingErrors": []
}&lt;/LI-CODE&gt;&lt;P&gt;But Ideally I want to see whether I can get the content is valid or not, for example in the above request, it has SSN, so ideally I should get&amp;nbsp;&lt;EM&gt;restrictAction&lt;/EM&gt;&amp;nbsp;or something right?&lt;/P&gt;&lt;P&gt;Or is that &lt;EM&gt;evaluateInline&lt;/EM&gt; is not available or something?&lt;/P&gt;&lt;P&gt;Note that I have purchased E5 and assigned to the user who is trying this&lt;BR /&gt;&lt;BR /&gt;Also, whenever I choose to create a Policy in DLP , I got two options&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;And Lets say I choose "&lt;EM&gt;Enterprise applications &amp;amp; devices",&lt;/EM&gt; what happens is in the Locations, I'm seeing only these as the options:&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;And If I choose the "&lt;EM&gt;Inline Traffic&lt;/EM&gt;", i'm seeing only these options&lt;/P&gt;&lt;img /&gt;&lt;P&gt;In Unmanaged, I'm seeing the following&lt;/P&gt;&lt;img /&gt;&lt;P&gt;And in the Enforcement Options, I have the following :&lt;/P&gt;&lt;img /&gt;&lt;P&gt;And in the "Advanced DLP rules" I'm seeing only these&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;So, can you tell me the exact steps in the Purview suite, I couldn't where to mention the Entra registered App, I searched and I couldn't find one&lt;/P&gt;&lt;P&gt;But in the compute endpoint,&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/graph/api/userprotectionscopecontainer-compute?view=graph-rest-1.0" target="_blank"&gt;https://learn.microsoft.com/en-us/graph/api/userprotectionscopecontainer-compute?view=graph-rest-1.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I'm getting my app but only with "evaluateOffline" and with that ETag, If I use the processContent Api, its not giving anything except as I mentioned above in the post&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 11:33:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/unable-to-use-ms-graph-dlp-api-s-to-use-with-my-entra-registered/m-p/4509171#M2692</guid>
      <dc:creator>prasath5s</dc:creator>
      <dc:date>2026-04-07T11:33:58Z</dc:date>
    </item>
    <item>
      <title>Co Authoring with Sensitivity Labels</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/co-authoring-with-sensitivity-labels/m-p/4508457#M2691</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am working with sensitivity labels with my organization. We currently have Standard, Confidential, and Highly Confidential which all are encrypted. I have Co-Authoring turned on but I have some trouble with. We a lot of documents being collaborated on.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Standard&lt;/STRONG&gt;: Co-Authoring functions normal and Auto-Save is toggled on.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Highly Confidential&lt;/STRONG&gt;: Custom Permission in Sensitivity Label (View, Edit, Reply, Forward) I asked copilot and it stated even though my permissions are selected custom I have "Edit" on their for my internal users it is reading it as Co authoring; Co-Authoring is on and functioning but internal end users Auto-Save is toggled off and they are being asked to save a copy of the document or excel sheet then upload it again to SharePoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why isn't "Auto-Save" toggled on for "Highly Confidential" label? Can it be adjusted so it can be on? Do I have to make adjustments to my permissions in the Sensitivity label?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 14:55:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/co-authoring-with-sensitivity-labels/m-p/4508457#M2691</guid>
      <dc:creator>Tiffanyb</dc:creator>
      <dc:date>2026-04-03T14:55:30Z</dc:date>
    </item>
    <item>
      <title>Unified Catalog activity / usage reporting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-activity-usage-reporting/m-p/4505553#M2681</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are building out our data products and glossary terms in Purivews Data Governance Unified catalog. &amp;nbsp;I’d like to get some metrics on data consumer activity/usage. &amp;nbsp;Metrics like how many users running searches for terms or data products. &amp;nbsp;How many people navigating into data assets to discover data, etc. &amp;nbsp;I haven’t found any reports like this. &amp;nbsp;Is there any audit logs specific to data governance I can query? &amp;nbsp;I’m trying to gauge user adoption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 14:02:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/unified-catalog-activity-usage-reporting/m-p/4505553#M2681</guid>
      <dc:creator>Brian_Winterlich</dc:creator>
      <dc:date>2026-03-25T14:02:52Z</dc:date>
    </item>
    <item>
      <title>Mange all people</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/mange-all-people/m-p/4505235#M2677</link>
      <description>&lt;P&gt;If I click this button, will everyone get scabies?&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 16:26:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/mange-all-people/m-p/4505235#M2677</guid>
      <dc:creator>tgraham-legalops</dc:creator>
      <dc:date>2026-03-24T16:26:13Z</dc:date>
    </item>
  </channel>
</rss>

