<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Data Security topics</title>
    <link>https://techcommunity.microsoft.com/t5/data-security/bd-p/data-security</link>
    <description>Data Security topics</description>
    <pubDate>Thu, 07 May 2026 21:04:31 GMT</pubDate>
    <dc:creator>data-security</dc:creator>
    <dc:date>2026-05-07T21:04:31Z</dc:date>
    <item>
      <title>Welcome, Purview Lightning Talks audience!</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/welcome-purview-lightning-talks-audience/m-p/4516006#M145</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;Please log in and then post any of your Data Security (and AI) spillover Purview Lightning Talks questions in the thread below. You can tag them using these hyperlinked handles:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;table border="1" style="width: 60.6957%; height: 1035.41px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 44.5758px;"&gt;&lt;td class="lia-align-center" style="height: 44.5758px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center" style="height: 44.5758px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Speaker&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;STRONG&gt;Tech Community Alias (tag)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 140.559px;"&gt;&lt;td style="height: 140.559px;"&gt;
&lt;P&gt;The Purview Label Engine: Automated Classification, Translation, and Co-Documentation for Enterprise Tenants&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 140.559px;"&gt;
&lt;P&gt;Michael Kirst Neshva&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1446467" data-lia-user-login="MichaelKirst1970" class="lia-mention lia-mention-user"&gt;MichaelKirst1970​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Stop, Think, Protect: Data Security in Real Life with Purview&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Oliver Sahlmann&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="197492" data-lia-user-login="Oliver Sahlmann" class="lia-mention lia-mention-user"&gt;Oliver Sahlmann​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Using Purview to Prevent Oversharing with AI Services&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Viktor Hedberg&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="26736" data-lia-user-login="headburgh" class="lia-mention lia-mention-user"&gt;headburgh​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;How I Helped My Customers Understand Their AI Usage (and Protect Their Sensitive Data)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Bram de Jager&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2583" data-lia-user-login="Bram de Jager" class="lia-mention lia-mention-user"&gt;Bram de Jager​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Four Labels Max for Daily Use: Which Ones &amp;amp; Why?&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Romain Dalle&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2661" data-lia-user-login="RomainDalle_MVP_MCT" class="lia-mention lia-mention-user"&gt;RomainDalle_MVP_MCT​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Data‑driven Endpoint DLP Solution with Advanced Hunting&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Tatu Seppälä&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="783541" data-lia-user-login="tseppala" class="lia-mention lia-mention-user"&gt;tseppala​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;The Purview Hack No One Talks About: Container Sensitivity Labels That Fix Oversharing Fast&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Nikki Chapple&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1200702" data-lia-user-login="nikkichapple" class="lia-mention lia-mention-user"&gt;nikkichapple​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Why You Should Create Your Own Sensitive Information Types (SITs)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Niels Jakobsen&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1901782" data-lia-user-login="Niels_Jakobsen" class="lia-mention lia-mention-user"&gt;Niels_Jakobsen​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 92.5676px;"&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;From Zero to First Signal: Insider Risk Management Prerequisites That Actually Matter&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 92.5676px;"&gt;
&lt;P&gt;Sathish Veerapandian&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="151406" data-lia-user-login="Sathish Veerapandian" class="lia-mention lia-mention-user"&gt;Sathish Veerapandian​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Securing Data in the Age of AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Júlio César Gonçalves Vasconcelos&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="815293" data-lia-user-login="jcvasconcelos" class="lia-mention lia-mention-user"&gt;jcvasconcelos​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Beyond eDiscovery – Purview DSI for Security Investigation&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Susantha Silva&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="20123" data-lia-user-login="susanthasilva" class="lia-mention lia-mention-user"&gt;susanthasilva​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 68.5717px;"&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Elevating Purview DLP with a Real‑World Use Case&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 68.5717px;"&gt;
&lt;P&gt;Victor Wingsing&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1750716" data-lia-user-login="vicwingsing" class="lia-mention lia-mention-user"&gt;vicwingsing​&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 49.9706%" /&gt;&lt;col style="width: 24.3868%" /&gt;&lt;col style="width: 25.5837%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Purview Lightning Talks takes place April 30th at 8am pacific:&lt;/EM&gt; &lt;A href="https://securitycommunity.microsoft.com/VirtualEvents/Webinar-Details/?id=da41bc6a-5929-f111-8341-000d3a58d670" target="_blank" rel="noopener"&gt;Webinar Details&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/registration-open-community-led-purview-lightning-talks/4505665" target="_blank" rel="noopener" data-lia-auto-title="Full agenda here." data-lia-auto-title-active="0"&gt;Full agenda here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-8"&gt;Also, you can come here at any time and click "Start a Discussion" to post a topic or question to your Purview Community!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Apr 2026 12:41:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/welcome-purview-lightning-talks-audience/m-p/4516006#M145</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2026-04-30T12:41:14Z</dc:date>
    </item>
    <item>
      <title>Endpoint DLP Collection Evidence on Devices</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/endpoint-dlp-collection-evidence-on-devices/m-p/4510920#M143</link>
      <description>&lt;P&gt;Hello team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am trying to setup the feature collect evidence when endpoint DLP match.&lt;BR /&gt;&lt;BR /&gt;Official feature documentation:&lt;/P&gt;&lt;P&gt;https://learn.microsoft.com/en-us/purview/dlp-copy-matched-items-learn&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/purview/dlp-copy-matched-items-get-started" target="_blank"&gt;https://learn.microsoft.com/en-us/purview/dlp-copy-matched-items-get-started&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;unfortunately, it is not working as described in the official documentation, I opened ticket with Microsoft support and MIcrosoft Service Hub, Unfortunatetly, they don't know how to setup it, or they are unable to solve the issue.&lt;/P&gt;&lt;P&gt;Support ticket:&amp;nbsp;&lt;BR /&gt;TrackingID#26040XXXXXXX9201&lt;BR /&gt;Service Hub ticket:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.serviceshub.microsoft.com/supportforbusiness/onboarding?origin=/supportforbusiness/create" target="_blank"&gt;https://support.serviceshub.microsoft.com/supportforbusiness/onboarding?origin=/supportforbusiness/create&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;TrackingID#26040XXXXXXXX924&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I follow the steps to configure:&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;based on the Microsoft documentation, I should be able to see the evidence in Activity explorer or Purview DLP alert or Defender Alerts/Incidents.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 17:27:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/endpoint-dlp-collection-evidence-on-devices/m-p/4510920#M143</guid>
      <dc:creator>Sergio_Londono</dc:creator>
      <dc:date>2026-04-13T17:27:02Z</dc:date>
    </item>
    <item>
      <title>PURVIEW - SCANNER ACCOUNT MISMATCH</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/purview-scanner-account-mismatch/m-p/4507792#M141</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I have a strange issue on Scanner&lt;BR /&gt;Setup is fine also discover is fine,&amp;nbsp;in activity explorer we see discovered file, issue was in USER column that reports not scanner dedicated user but purview admin user.&lt;/P&gt;&lt;P&gt;We also try open a case with MS but no one respond&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Zeno&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 17:47:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/purview-scanner-account-mismatch/m-p/4507792#M141</guid>
      <dc:creator>zenodj</dc:creator>
      <dc:date>2026-04-01T17:47:49Z</dc:date>
    </item>
    <item>
      <title>AIP scanner not discovering sensitivity content</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/aip-scanner-not-discovering-sensitivity-content/m-p/4506264#M138</link>
      <description>&lt;P&gt;I am deploying the&lt;STRONG&gt; &lt;/STRONG&gt;Purview Information Protection AIP scanner to scan an some of the on‑premises Windows file share and some network file shares&amp;nbsp;that is in scope for compliance and data protection. However, the scanner is not discovering sensitive content within files stored on the share for a custom configured SIT.&lt;/P&gt;&lt;P&gt;The custom SIT is tested and it properly works, but the data are being reported as no matches / no sensitive content found to discover the files that may be applied with sensitivity label.&lt;/P&gt;&lt;P&gt;This issue is observed across one or more mapped repository paths and may be inconsistent by folder, file type or file size.&amp;nbsp; I noticed&amp;nbsp; the scanner appears “healthy” service is running, repository configured and schedules enabled.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2026 11:08:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/aip-scanner-not-discovering-sensitivity-content/m-p/4506264#M138</guid>
      <dc:creator>kirh</dc:creator>
      <dc:date>2026-03-27T11:08:39Z</dc:date>
    </item>
    <item>
      <title>Data Security at Ignite🔥</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/data-security-at-ignite/m-p/4470722#M130</link>
      <description>&lt;P&gt;Have you made it to San Francisco? Make sure you attend these exciting Data Security sessions! &lt;A class="lia-external-url" href="https://aka.ms/SecIgnite" target="_blank"&gt;Check out all things Microsoft Security at Ignite.&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 17 Nov 2025 21:09:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/data-security-at-ignite/m-p/4470722#M130</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-17T21:09:09Z</dc:date>
    </item>
    <item>
      <title>Label Inheritance in outlook.</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/label-inheritance-in-outlook/m-p/4470268#M129</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When an attachment with a higher-priority sensitivity label is added, the email initially inherits that label. However, after the attachment is removed, the email reverts to the default label, and if another attachment with a different (higher priority) label is subsequently added, the email does not automatically inherit the new label. Is this correct behavior and any MS doc related to this?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Nov 2025 13:40:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/label-inheritance-in-outlook/m-p/4470268#M129</guid>
      <dc:creator>Mansha</dc:creator>
      <dc:date>2025-11-15T13:40:12Z</dc:date>
    </item>
    <item>
      <title>When the default sensitivity label is applied, an asterisk (*) appears next to the label.</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/when-the-default-sensitivity-label-is-applied-an-asterisk/m-p/4470267#M128</link>
      <description>&lt;P&gt;When I open a Word document and the default sensitivity label &lt;EM&gt;(e.g., INTERNAL)&lt;/EM&gt; is applied, an asterisk appears next to the label along with a message indicating that the file hasn’t been saved yet. Is there any detail Microsoft documentation that explains this behavior? This only occur for default label if I try to remove default label (without saving word file) and apply any other label then * mark is not there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Nov 2025 13:32:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/when-the-default-sensitivity-label-is-applied-an-asterisk/m-p/4470267#M128</guid>
      <dc:creator>Mansha</dc:creator>
      <dc:date>2025-11-15T13:32:02Z</dc:date>
    </item>
    <item>
      <title>Safeguard data on third-party collaboration platforms</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/safeguard-data-on-third-party-collaboration-platforms/m-p/4450832#M119</link>
      <description>&lt;P&gt;I am exploring options to safeguard sensitive data in third-party collaboration platforms like GitHub and Confluence.&lt;/P&gt;&lt;P&gt;Does Microsoft Purview provide any native integration for these platforms?&lt;BR /&gt;Do I need to rely on third-party connectors/integrations to extend Purview’s capabilities into these environments?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 09:38:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/safeguard-data-on-third-party-collaboration-platforms/m-p/4450832#M119</guid>
      <dc:creator>SaqibSyed</dc:creator>
      <dc:date>2025-09-04T09:38:19Z</dc:date>
    </item>
    <item>
      <title>Securing Data with Microsoft Purview IRM + Defender: A Hands-On Lab</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/securing-data-with-microsoft-purview-irm-defender-a-hands-on-lab/m-p/4448098#M114</link>
      <description>&lt;P&gt;Hi everyone&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently explored how Microsoft Purview Insider Risk Management (IRM) integrates with Microsoft Defender to secure sensitive data. This lab demonstrates how these tools work together to identify, investigate, and mitigate insider risks.&lt;/P&gt;&lt;P&gt;What I covered in this lab:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Set up Insider Risk Management policies in Microsoft Purview&lt;/LI&gt;&lt;LI&gt;Connected Microsoft Defender to monitor risky activities&lt;/LI&gt;&lt;LI&gt;Walkthrough of alerts triggered → triaged → escalated into cases&lt;/LI&gt;&lt;LI&gt;Key governance and compliance insights&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Key learnings from the lab:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Purview IRM policies detect both accidental risks (like data spillage) and malicious ones (IP theft, fraud, insider trading)&lt;/LI&gt;&lt;LI&gt;IRM principles include transparency (balancing privacy vs. protection), configurable policies, integrations across Microsoft 365 apps, and actionable alerts&lt;/LI&gt;&lt;LI&gt;IRM workflow follows: Define policies → Trigger alerts → Triage by severity → Investigate cases (dashboards, Content Explorer, Activity Explorer) → Take action (training, legal escalation, or SIEM integration)&lt;/LI&gt;&lt;LI&gt;Defender + Purview together provide unified coverage: Defender detects and responds to threats, while Purview governs compliance and insider risk&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This was part of my ongoing series of security labs.&lt;BR /&gt;Curious to hear from others — how are you approaching Insider Risk Management in your organizations or labs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 01:50:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/securing-data-with-microsoft-purview-irm-defender-a-hands-on-lab/m-p/4448098#M114</guid>
      <dc:creator>Perparim_Abdullahu</dc:creator>
      <dc:date>2025-08-26T01:50:00Z</dc:date>
    </item>
    <item>
      <title>Alert on DLP Policy Change</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/alert-on-dlp-policy-change/m-p/4438513#M111</link>
      <description>&lt;P&gt;Is it possible to configure an alert from Purview when a DLP policy is created, amended or removed?&lt;/P&gt;&lt;P&gt;I am trying to build a process to satisfy NIST CM-6(2): Respond to Unauthorized Changes that identifies when a policy chnage happens and to cross reference to an authorised change record.&lt;/P&gt;&lt;P&gt;I can find the events Updated, Created or Changed a DLP Poloicy in audit search but can Purview be configured to generate an alert when these events happen?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jul 2025 08:01:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/alert-on-dlp-policy-change/m-p/4438513#M111</guid>
      <dc:creator>GrahamP67</dc:creator>
      <dc:date>2025-07-31T08:01:15Z</dc:date>
    </item>
    <item>
      <title>DLP Alerts Naming Metadata</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/dlp-alerts-naming-metadata/m-p/4437720#M110</link>
      <description>&lt;P&gt;Im currently facing an issue that every time my DLP policy matches, it creates an Alert on Defender where the name of the file appears on it, for example:&lt;BR /&gt;&lt;BR /&gt;DLP policy match for document 'file.pdf' on a device&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DLP policy matched for email with subject (SUBJECT)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not want that file.pdf nor SUBJECT appear on the title on Defender, where i can configure to avoid this ?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 11:18:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/dlp-alerts-naming-metadata/m-p/4437720#M110</guid>
      <dc:creator>Hleo</dc:creator>
      <dc:date>2025-07-29T11:18:01Z</dc:date>
    </item>
    <item>
      <title>AADSTS50020: protected PDF issue for external users</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/aadsts50020-protected-pdf-issue-for-external-users/m-p/4420505#M103</link>
      <description>&lt;P&gt;I have been recently (don't know when it was started) observed getting error from protected PDF (sensitivity label with user defined permission) file while trying to open that pdf via AIP viewer mobile app (Android/iOS) AS external user (who has permission to open/view).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No issue with Office file types protected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;external (not internal, not guest) user (currently testing with gmail.com account, other O365 tenant user) getting error as attached from AIP view mobile app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do have AIP excluded at conditional access policy which helped so far to avoid this problem for external users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there been any recent change in behavior around user defined protected PDF? Since user having problem is external, have no clue where to look for log and start investigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error code: AADSTS50020&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 11:45:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/aadsts50020-protected-pdf-issue-for-external-users/m-p/4420505#M103</guid>
      <dc:creator>mevaibhav831345</dc:creator>
      <dc:date>2025-06-04T11:45:08Z</dc:date>
    </item>
    <item>
      <title>Restrict sharing of Power BI Data to limited users</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/restrict-sharing-of-power-bi-data-to-limited-users/m-p/4416555#M98</link>
      <description>&lt;P&gt;In the Power BI admin center, we have enabled the setting:&lt;BR /&gt;"&lt;STRONG&gt;Restrict content with protected labels from being shared via link with everyone in your organization&lt;/STRONG&gt;".&lt;BR /&gt;As expected, this prevents users from generating "People in your organization" sharing links for content protected with sensitivity labels.&lt;/P&gt;&lt;P&gt;We only have one sensitivity label with protection enabled. However, due to Power BI’s limitations with labels that include "Do Not Forward" or user-defined permissions, this label is not usable in Power BI.&lt;/P&gt;&lt;P&gt;Our Power BI team wants to restrict sensitive data from being shared org-wide and instead limit access to specific individuals. One idea was to create another sensitivity label with encryption that works with Power BI and use that to enforce the restriction. However, such a label would also affect other Microsoft 365 apps like Word, Excel, and Outlook — which we want to avoid.&lt;/P&gt;&lt;P&gt;I looked into using DLP, but MS documentation mentions below limitations, that makes me unsure if this will meet the requirement.&lt;/P&gt;&lt;P&gt;1. DLP either restricts access to the data owner or to the entire organization.&lt;BR /&gt;2. DLP rules apply to workspaces, not individual dashboards or reports.&lt;/P&gt;&lt;P&gt;My question:&lt;BR /&gt;Is there any way to restrict sharing of Power BI (or Fabric) content to specific users within the organization without changing our existing sensitivity label configurations or creating a new encryption-enabled label that could impact other apps?&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 13:46:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/restrict-sharing-of-power-bi-data-to-limited-users/m-p/4416555#M98</guid>
      <dc:creator>SaqibSyed</dc:creator>
      <dc:date>2025-05-22T13:46:39Z</dc:date>
    </item>
    <item>
      <title>DLP Policy Rule "U.S. Physical Address" exclusion</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/dlp-policy-rule-quot-u-s-physical-address-quot-exclusion/m-p/4413475#M89</link>
      <description>&lt;P&gt;We have the built in Sensitive Info Type "U.S. Physical Address" in our Default HR &amp;amp; Privacy Info Protection Policy in simulation. This is set to the location of just Exchange Email only. Everyone in the company has our physical address in their email signature. This combination keeps triggering alerts even if I set the instance count to something like 3.&lt;/P&gt;&lt;P&gt;I've asked Co-Pilot for instructions to create an exclusion where I can enter our physical address to be ignored but the instructions always mention options that don't exist in the rule edit screen.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see online people asking for signatures to be ignored but the response is they can't be. Am I doomed to ask all staff to remove their signature, remove this SIT altogether, or just let the Action of "encrypt email messages" proceed and have our organization look the fool for encrypting every email sent outside the organization? Anyone know how to tell Purview to ignore your own physical address?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 17:47:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/dlp-policy-rule-quot-u-s-physical-address-quot-exclusion/m-p/4413475#M89</guid>
      <dc:creator>ENMRSH</dc:creator>
      <dc:date>2025-05-13T17:47:54Z</dc:date>
    </item>
    <item>
      <title>Can DLP Purview scan inbound emails for Sensitive data?</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/can-dlp-purview-scan-inbound-emails-for-sensitive-data/m-p/4410881#M83</link>
      <description>&lt;P&gt;I have a unique use case where we are trying to understand if DLP Purview can scan inbound email external email for sensitive information.&amp;nbsp; If so, is there a specific white page that gives instructions on what settings need to be enabled to scan inbound.&amp;nbsp; I tried using conditions in the existing DLP policies but the external emails were not flagged.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 16:54:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/can-dlp-purview-scan-inbound-emails-for-sensitive-data/m-p/4410881#M83</guid>
      <dc:creator>Jamie34</dc:creator>
      <dc:date>2025-05-05T16:54:29Z</dc:date>
    </item>
    <item>
      <title>Data discovery | Starting Purview journey</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/data-discovery-starting-purview-journey/m-p/4409048#M81</link>
      <description>&lt;P&gt;An organization is beginning its Microsoft Purview data security journey, with sensitivity labels already published. As they prepare to implement Data Loss Prevention (DLP) and Insider Risk Management (IRM), the initial focus is on data discovery and identifying relevant use cases for policy creation. From a technical standpoint, beyond using Data Explorer and Activity Explorer, what other tools or methods can support this discovery process? How should one approach such a greenfield environment to effectively perform a Data Assessment, identify and prioritize policy use cases?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2025 08:47:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/data-discovery-starting-purview-journey/m-p/4409048#M81</guid>
      <dc:creator>SaqibSyed</dc:creator>
      <dc:date>2025-04-29T08:47:58Z</dc:date>
    </item>
    <item>
      <title>MS Purview InformationProtectionPolicy - Extract Sensitivity Labels - Permissions Granted</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/ms-purview-informationprotectionpolicy-extract-sensitivity/m-p/4408532#M80</link>
      <description>&lt;P&gt;Hello community, I'm currently facing an issue trying to extract sensitivity labels from our Microsoft 365 tenant and could use some assistance.&lt;/P&gt;&lt;P&gt;I have already ensured that the necessary permissions and application are in place. I initially attempted to retrieve the labels via the Microsoft Graph Explorer (graph-explorer) using the endpoint:&lt;BR /&gt;https://graph.microsoft.com/beta/security/informationProtection/sensitivityLabels. As you can see in the attached image, I encountered a "Forbidden - 403" error, suggesting a problem with permissions or consent, even though InformationProtectionPolicy.Read is listed under the "Modify permissions" tab as "Unconsent".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way that I found to solve it was using "https://graph.microsoft.com/beta/me/security/informationProtection/sensitivityLabels" but I need to use it in Python Code, without a user validation of credential.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next, I tried to achieve the same using Python and the Microsoft Graph API directly. I obtained an access token using a Client ID and Secret, authenticating against https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/token. The application associated with this Client ID and Secret has been granted the InformationProtectionPolicy.Read permission. However, when making a GET request to https://graph.microsoft.com/beta/security/informationProtection/sensitivityLabels in Python, I receive the following error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already granted what I believe are the relevant permissions, including InformationProtectionPolicy.Read.All, InformationProtectionPolicy.Read, Application.Read.All, and User.Read.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone successfully retrieved sensitivity labels using the Microsoft Graph API?&lt;/P&gt;&lt;P&gt;If so, could you please share any insights or potential solutions?&lt;/P&gt;&lt;P&gt;I'm wondering if there are other specific permissions required or if there's a particular nuance I might be missing. Any help would be greatly appreciated!&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;Leonardo Canal&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2025 01:45:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/ms-purview-informationprotectionpolicy-extract-sensitivity/m-p/4408532#M80</guid>
      <dc:creator>LeonardoCanal</dc:creator>
      <dc:date>2025-04-28T01:45:51Z</dc:date>
    </item>
    <item>
      <title>Purview endpoint DLP cant block file upload to web.whatsapp on open in app mode chrome browser MacOS</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/purview-endpoint-dlp-cant-block-file-upload-to-web-whatsapp-on/m-p/4405966#M77</link>
      <description>&lt;P&gt;we are using purview endpoint DLP to block file upload to web.whatsapp.com on browser for MacOS. its working fine on chrome browser when i try dirrectly upload file contain ssn pattern and its blocked by purview but if we upload using open in app mode (pwa) purview cant detect that activity and file is uploaded to web whatsapp susscessfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;try to upload senstive file to web.whatsapp.com from chrome browser and its blocked.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but when i try to use "open in app" mode (pwa) dlp purview cant detect the sensitive upload to web.whatsapp.com&lt;/P&gt;&lt;img /&gt;&lt;P&gt;how to detect and block file uploaded to unwanted url if user using pwa especially on chrome browser?&amp;nbsp;&lt;/P&gt;&lt;P&gt;try the same scenario on edge, purview able to detect pwa and can intercept the activity but why in chrome its not the same behaviour expected.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Apr 2025 02:35:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/purview-endpoint-dlp-cant-block-file-upload-to-web-whatsapp-on/m-p/4405966#M77</guid>
      <dc:creator>gumilaris2</dc:creator>
      <dc:date>2025-04-20T02:35:09Z</dc:date>
    </item>
    <item>
      <title>"Purview DLP policy is not working as expected."</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/quot-purview-dlp-policy-is-not-working-as-expected-quot/m-p/4399370#M69</link>
      <description>&lt;P&gt;I am creating a DLP policy with the following configurations:&lt;/P&gt;&lt;P&gt;A new policy applied to devices was generated.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--SCOPE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Devices&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--USERS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;DLP_TEST&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--A rule is created: DLP_TEST_APPSBLOCK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--THE FOLLOWING CONDITIONS ARE ADDED&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Document could not be scanned&lt;/P&gt;&lt;P&gt;Document did not complete analysis&lt;/P&gt;&lt;P&gt;File type is:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Word Processing&lt;/LI&gt;&lt;LI&gt;Spreadsheet&lt;/LI&gt;&lt;LI&gt;Presentation&lt;/LI&gt;&lt;LI&gt;Archive&lt;/LI&gt;&lt;LI&gt;Mail&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;File extension is:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;py&lt;/LI&gt;&lt;LI&gt;txt&lt;/LI&gt;&lt;LI&gt;HTML&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;--THE FOLLOWING ACTIONS ARE ADDED&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Application groups: DLP_TEST_APPS&lt;/P&gt;&lt;P&gt;Copy to clipboard: Block&lt;/P&gt;&lt;P&gt;Print: Block&lt;/P&gt;&lt;P&gt;Copy to USB: Block&lt;/P&gt;&lt;P&gt;Copy to shared network resource: Block&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--APPLICATIONS NOT IN THE SHARED APPLICATION GROUPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration: Block with override&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--NOTIFICATIONS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Use notifications to inform users and properly teach them about sensitive information: Enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;In restricted applications, even though I have blocked everything, it still allows me to attach documents from WhatsApp. Although it prevents copying or dragging, I can always upload documents, which should not happen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is just a test, but I would like to know what is happening and how I can solve it&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 22:55:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/quot-purview-dlp-policy-is-not-working-as-expected-quot/m-p/4399370#M69</guid>
      <dc:creator>Melvin_Maldonado03</dc:creator>
      <dc:date>2025-03-31T22:55:51Z</dc:date>
    </item>
    <item>
      <title>Suppress Alerting to Endpoint DLP Printing on "Print to PDF".</title>
      <link>https://techcommunity.microsoft.com/t5/data-security/suppress-alerting-to-endpoint-dlp-printing-on-quot-print-to-pdf/m-p/4399320#M68</link>
      <description>&lt;P&gt;Is there a way to configure an Endpoint DLP policy for Printing to NOT alert on "Print to File" events primarily Print to PDf's. For example print events where the target name are "Microsoft Print to PDF" or "Adobe PDF"? I understand you can create Printer groups, but there is no way to use as a condition when creating DLP rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 20:06:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-security/suppress-alerting-to-endpoint-dlp-printing-on-quot-print-to-pdf/m-p/4399320#M68</guid>
      <dc:creator>Dalesh07</dc:creator>
      <dc:date>2025-03-31T20:06:27Z</dc:date>
    </item>
  </channel>
</rss>

