purview
68 TopicsPurview Glossary Terms
Hi everyone, Needed help with respect to how to update or have separate business glossary in the new or updated portal of Purview Tool. Since in the last or previous version I was able to define separate business glossary term according my defined database, but new portal that seems to be missing or am I not able to find. If anyone has one idea or solution about this, request for your help on the same8Views0likes0CommentsUnable to view PDF with sensitivity label
Hello, I am testing a confidential label with various settings, so far it works fantastically. When applying the [Confidential] label to a word file it works. However when I turn that Word document into a PDF and try to view it I am presented with the following screen: I input my email that also has an Acrobat Pro license and proceed. Then I am presented with the following login: When I press continue, quite literally, nothing happens. It just seems to get stuck in the login screen. Additionally if I do "open with" to the file I can view it normall on Microsoft Edge.30Views0likes2CommentsHow can we help you?
You may have noticed that this Purview Community space has had a bit of a glow-up, and the great news is that it will continue to be tailored to meet the needs of its members. Our engineers, subject matter experts, MVPs, and enthusiastic technologists would like to bring you the content and engagements that you desire, and there's no better way to know what you want than to ask! So, please take the Purview Community Engagement Survey by March 3rd 2025 and share it widely with any other Purview users that you know! Do you have additional thoughts about what you'd like to see in the Purview community and would like to gather others' opinions? Post a comment below so that others can view and weigh in! Don't forget to take the survey!228Views2likes1CommentMS Purview - Teams call audit
Is it possible to get details (time and number of calls) of Teams one-one calls between 2 individuals for a given date period? I tried Purview auditing and eDiscovery but unable to find an activity suitable for this to run search/discovery on. thank you.74Views0likes3CommentsPurview Retention Policies
I have a requirement to retain and delete Exchange Online email >7 years old for the majority of our user base but also need to retain email for a subset of users indefinitely and exclude Share Mailboxes completely. The solution I was thinking of is as follows; Create a Purview Adaptive Scope which with a query of RecipientTypeDetails -eq 'UserMailbox' which will return only User mailboxes and exclude Shared Mailboxes. Create an Adaptive Retention policy using the adaptive scope in point 1 which will delete all Exchange Online email >7 years. Create a Purview Adaptive Scope which with a query of the UPN of the users we need to keep email indefinitely for. Create an Adaptive Retention policy using the adaptive scope in point 3 to retain email My question firstly, is this a valid solution and secondly will the retain policy take precedence over the delete policy even though the users will be in both policies. Thanks In Advance ChrisSolved44Views0likes3CommentsPurview AMA March 12 - Ask Questions Below!
The next Purview AMA covering Data Security, Compliance, and Governance takes place on 12 March at 8am Pacific. Register HERE! Your subject matter experts are: Maxime Bombardier - Purview Data Security and Horizontals Sandeep Shah - Purview Data Governance Peter Oguntoye - Purview Compliance And, if you'd like to get started now, feel free to post your questions as comments below. They may be answered live, or if we don't get to them, they will be answered in-text below (you may also note what you'd prefer!) Thank you for being a part of the Purview community, we can't do exciting events like this without you! Don't forget to register ✏️48Views0likes0CommentsMicrosoft Purview Best Practices
Microsoft Purview is a solution that helps organizations manage data and compliance. It also uses AI to classify data, monitor compliance, and identify risks. Key features include data discovery, classification, governence, retention, compliance management, encryption, and access controls. Purview ensures data security, prevents insider threats, and helps implement data loss prevention policies to meet compliance requirements. Hello everyone - This is just a short introduction, I am Dogan Colak. I have been working as an M365 Consultant for about 5 years, holding certifications such as MCT, SC-100, SC-200, SC-300, and MS-102, with a focus on Security & Compliance. This year, I am excited to share what I have learned with the Microsoft Technology Community. In the coming days, I will be publishing videos and articles based on the training agenda I have created. I will also share these articles on LinkedIn, so feel free to follow me there. I am always open to feedback and suggestions. See you soon!366Views2likes1CommentScanning Salesforce with Purview / Connector Exception: Can not retrieve access token.
Hello everyone, I am trying to scan a demo Salesforce system that is publicly available over the internet (so no SHIR needed as I see it). Nevertheless even when trying out the SHIR as well as AIR to run a scan after registering the Salesforce with the URL, i get the error message: "Failed to testConnection: Exception when processing request: Connector Exception: Can not retrieve access token. Make sure you specify proper parameters." I know it has to do with the User Name & Password and Connected App Consumer Key & Consumer Secret combination. I created a key vault that is connected, the MI of Purview has sufficient read rights (Key Vault Secrets Officer as well as Key Vault Secrets User) on that key vault and I created 4 secrets. the concatted api user password & security token just the API User Password just the Consumer Secret of the Connected App and finally just the security token I tried every possible combination maybe I did overlook something here? From the Connect to and manage Salesforce in Microsoft Purview documentation: Select Consumer key while creating a credential. (Automatically checked) Provide the username of the user that the connected app is imitating in the User name input field. (I am using an integration user with permission set for this) Store the password of the user that the connected app is imitating in an Azure Key Vault secret. If your self-hosted integration runtime machine's IP is within the trusted IP ranges for your organization set on Salesforce, provide just the password of the user. Otherwise, concatenate the password and security token as the value of the secret. The security token is an automatically generated key that must be added to the end of the password when logging in to Salesforce from an untrusted network. Learn more about how to get or reset a security token. (not applicable but I also tried through an SHIR with the concatenated password and security key) Provide the consumer key from the connected app definition. You can find it on the connected app's Manage Connected Apps page or from the connected app's definition. (took this exactly) Stored the consumer secret from the connected app definition in an Azure Key Vault secret. You can find it along with consumer key. (took this exactly and stored in key vault) I found an older post where some people seem to have made it work: Trying to connect purview to salesforce ... - Microsoft Q&A So I think you always need to concatenate the user password and securtiy token when using AIR too no? I'd really appreciate any input or ideas! Best regards and a nice day to you all, MatthiasSolved169Views0likes3CommentsSet Up Endpoint DLP Evidence Collection on your Azure Blob Storage
Endpoint Data Loss Prevention (Endpoint DLP) is part of the Microsoft Purview Data Loss Prevention (DLP) suite of features you can use to discover and protect sensitive items across Microsoft 365 services. Microsoft Endpoint DLP allows you to detect and protect sensitive content across onboarded Windows 10, Windows 11 and macOS devices. Learn more about all of Microsoft's DLP offerings. Before you start setting up the storage, you should review Get started with collecting files that match data loss prevention policies from devices | Microsoft Learn to understand the licensing, permissions, device onboarding and your requirements. Prerequisites Before you begin, ensure the following prerequisites are met: You have an active Azure subscription. You have the necessary permissions to create and configure resources in Azure. You have setup endpoint Data Loss Prevention policy on your devices Configure the Azure Blob Storage You can follow these steps to create an Azure Blob Storage using the Azure portal. For other methods refer to Create a storage account - Azure Storage | Microsoft Learn Sign in to the Azure Storage Accounts with your account credentials. Click on + Create On the Basics tab, provide the essential information for your storage account. After you complete the Basics tab, you can choose to further customize your new storage account, or you accept the default options and proceed. Learn more about azure storage account properties Once you have provided all the information click on the Networking tab. In network access, select Enable public access from all networks while creating the storage account. Click on Review + create to validate the settings. Once the validation passes, click on Create to create the storage Wait for deployment of the resource to be completed and then click on Go to resource. Once the newly created Blob Storage is opened, on the left panel click on Data Storage -> Containers Click on + Containers. Provide the name and other details and then click on Create Once your container is successfully created, click on it. Assign relevant permissions to the Azure Blob Storage Once the container is created, using Microsoft Entra authorization, you must configure two sets of permissions (role groups) on it: One for the administrators and investigators so they can view and manage evidence One for users who need to upload items to Azure from their devices Best practice is to enforce least privilege for all users, regardless of role. By enforcing least privilege, you ensure that user permissions are limited to only those permissions necessary for their role. We will use portal to create these custom roles. Learn more about custom roles in Azure RBAC Open the container and in the left panel click on Access Control (IAM) Click on the Roles tab. It will open a list of all available roles. Open context menu of Owner role using ellipsis button (…) and click on Clone. Now you can create a custom role. Click on Start from scratch. We have to create two new custom roles. Based on the role you are creating enter basic details like name and description and then click on JSON tab. JSON tab gives you the details of the custom role including the permissions added to that role. For owner role JSON looks like this: Now edit these permissions and replace them with permissions required based on the role: Investigator Role: Copy the permissions available at Permissions on Azure blob for administrators and investigators and paste it in the JSON section. User Role: Copy the permissions available at Permissions on Azure blob for usersand paste it in the JSON section. Once you have created these two new roles, we will assign these roles to relevant users. Click on Role Assignments tab, then on Add + and on Add role assignment. Search for the role and click on it. Then click on Members tab Click on + Select Members. Add the users or user groups you want to add for that role and click on Select Investigator role – Assign this role to users who are administrators and investigators so they can view and manage evidence User role – Assign this role to users who will be under the scope of the DLP policy and from whose devices items will be uploaded to the storage Once you have added the users click on Review+Assign to save the changes. Now we can add this storage to DLP policy. For more information on configuring the Azure Blob Storage access, refer to these articles: How to authorize access to blob data in the Azure portal Assign share-level permissions. Configure storage in your DLP policy Once you have configured the required permissions on the Azure Blob Storage, we will add the storage to DLP endpoint settings. Learn more about configuring DLP policy Open the storage you want to use. In left panel click on Data Storage -> Containers. Then select the container you want to add to DLP settings. Click on the Context Menu (… button) and then Container Properties. Copy the URL Open the Data Loss Prevention Settings. Click on Endpoint Settings and then on Setup evidence collection for file activities on devices. Select Customer Managed Storage option and then click on Add Storage Give the storage name and copy the container URL we copied. Then click on Save. Storage will be added to the list. Storage will be added to the list for use in the policy configuration. You can add up to 10 URLs Now open the DLP endpoint policy configuration for which you want to collect the evidence. Configure your policy using these settings: Make sure that Devices is selected in the location. In Incident reports, toggle Send an alert to admins when a rule match occurs to On. In Incident reports, select Collect original file as evidence for all selected file activities on Endpoint. Select the storage account you want to collect the evidence in for that rule using the dropdown menu. The dropdown menu shows the list of storages configured in the endpoint DLP settings. Select the activities for which you want to copy matched items to Azure storage Save the changes Please reach out to the support team if you face any issues. We hope this guide is helpful and we look forward to your feedback. Thank you, Microsoft Purview Data Loss Prevention Team1.2KViews6likes1CommentPurview Webinars
Register for all webinars here🔗 Upcoming Microsoft Purview Webinars MAR 12 (8:00AM) Microsoft Purview | Microsoft Purview AMA - Data Security, Compliance, and Governance MAR 18 (8:00AM) Microsoft Purview | Microsoft Teams and Purview Information Protection: Inheriting Sensitivity Labels from Shared Files to Teams Meetings Microsoft Purview Information Protection now supports label policy settings to apply inheritance from shared files to meetings. This enhances protection in Teams when sensitive files are shared in Teams chat or live shared during meeting. MAR 19 (8:00AM) Microsoft Purview | Unlocking the Power of Microsoft Purview for ChatGPT Enterprise Join us for an exciting presentation where we unveil the seamless integration between Microsoft Purview and ChatGPT Enterprise. Discover how you can effortlessly set up and integrate these powerful tools to ensure that interactions are securely captured, meet regulatory requirements and manage data effectively. Don't miss out on this opportunity to learn about the future of intelligent data management and AI-driven insights! 2025 Past Recordings JAN 8 - Microsoft Purview AMA | Blog Post 📺 Subscribe to our Microsoft Security Community YouTube channel for ALL Microsoft Security webinar recordings, and more!428Views0likes0Comments