Protect sensitive data in a digital world
Protect sensitive data in a digital world.
- The growing need for data protection
- The challenges of managing sensitive data
- Protect data in a Zero Trust world
- Understand data classification and protection
- Prevent data leaks and insider threats
- Manage security alerts and respond to threats
- Protect AI-generated and AI-processed data
- Module assessment
Classify data for protection and governance
Learn about the information available to help you understand your data landscape and know your data.
- Data classification overview
- Classify data using sensitive information types
- Classify data using trainable classifiers
- Create a custom trainable classifier
- Module assessment
Review and analyze data classification and protection
Review and analyze data classification and protection.
- Review classification and protection insights
- Analyze classified data with data and content explorer
- Monitor and review actions on labeled data
- Module assessment
Create and manage sensitive information types
Create and manage sensitive information types.
- Sensitive information type overview
- Compare built-in versus custom sensitive information types
- Create and manage custom sensitive information types
- Create and manage exact data match sensitive info types
- Implement document fingerprinting
- Describe named entities
- Create a keyword dictionary
- Module assessment
- Summary and resources
Create and configure sensitivity labels with Microsoft Purview
Microsoft Purview sensitivity labels enable you to classify and protect sensitive data throughout your organization, including in the cloud and on devices. This module covers how to classify and protect sensitive information to ensure its security and compliance.
- Sensitivity label overview
- Create and configure sensitivity labels and label policies
- Configure encryption with sensitivity labels
- Implement auto-labeling policies
- Track and evaluate sensitivity label usage in Microsoft Purview
- Module assessment
Apply sensitivity labels for data protection
Apply sensitivity labels for data protection.
- Foundations of sensitivity label integration in Microsoft 365
- Manage sensitivity labels in Office apps
- Apply sensitivity labels with Microsoft 365 Copilot for secure collaboration
- Protect meetings with sensitivity labels
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
- Module assessment
- Summary and resources
Classify and protect on-premises data with Microsoft Purview
Classify and protect on-premises data with Microsoft Purview.
- Protect on-premises files with Microsoft Purview
- Prepare your environment for the Microsoft Purview Information Protection scanner
- Configure and install the Microsoft Purview Information Protection scanner
- Run and manage the scanner
- Enforce data loss prevention policies on on-premises files
- Module assessment
Understand Microsoft 365 encryption
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
- Introduction to Microsoft 365 encryption
- Learn how Microsoft 365 data is encrypted at rest
- Understand service encryption in Microsoft Purview
- Explore customer key management using Customer Key
- Learn how data is encrypted in-transit
- Summary and knowledge check
Protect email with Microsoft Purview Message Encryption
Protect email with Microsoft Purview Message Encryption
- Understand message encryption
- Plan for Microsoft Purview Message Encryption
- Configure Microsoft Purview Message Encryption
- Customize encrypted email branding with Microsoft Purview
- Control encrypted email access with Advanced Message Encryption
- Use Microsoft Purview Message Encryption templates in mail flow rules
- Module assessment
- Summary and resources
Prevent data loss with Microsoft Purview
Microsoft Purview Data Loss Prevention (DLP) helps safeguard sensitive information by monitoring and preventing accidental data leaks across your organization's digital platforms. In this module, you'll learn how to plan, deploy, and adjust DLP policies to protect sensitive data in your organization, ensuring security without disrupting daily work.
- Data loss prevention overview
- Plan and design DLP policies
- Understand DLP policy deployment and simulation mode
- Create and manage DLP policies
- Integrate Adaptive Protection with DLP
- Use DLP analytics (preview) to identify data risks
- Understand DLP alerts and activity tracking
- Module assessment
- Summary and resources
Implement endpoint data loss prevention (DLP) with Microsoft Purview
Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
- Endpoint data loss prevention (DLP) overview
- Understand the endpoint DLP implementation workflow
- Onboard devices for endpoint DLP
- Configure settings for endpoint DLP
- Create and manage endpoint DLP policies
- Deploy the Microsoft Purview browser extension
- Configure just-in-time (JIT) protection
- Module assessment
- Summary and resources
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
- Configure data loss prevention policies for Power Platform
- Integrate data loss prevention in Microsoft Defender for Cloud Apps
- Configure policies in Microsoft Defender for Cloud Apps
- Manage data loss prevention violations in Microsoft Defender for Cloud Apps
- Module assessment
- Summary and resources
Investigate and respond to Microsoft Purview Data Loss Prevention alerts
Investigate and Respond to Microsoft Purview Data Loss Prevention Alerts.
- Understand data loss prevention (DLP) alerts
- Understand the DLP alert lifecycle
- Configure DLP policies to generate alerts
- Investigate DLP alerts in Microsoft Purview
- Investigate DLP alerts in Microsoft Defender XDR
- Respond to DLP alerts
- Exercise - Investigate a DLP alert and related incident
- Module assessment
Understand Microsoft Purview Insider Risk Management
Understand Microsoft Purview Insider Risk Management.
- What is an insider risk?
- Microsoft Purview Insider Risk Management overview
- Microsoft Purview Insider Risk Management features
- Case study: Protect sensitive data with Insider Risk Management
- Module assessment
Prepare for Microsoft Purview Insider Risk Management
Prepare for Microsoft Purview Insider Risk Management.
- Plan for Insider Risk Management
- Prepare your organization for Insider Risk Management
- Configure settings for Insider Risk Management
- Integrate Insider Risk Management with data sources and tools
- Module assessment
Create and manage Insider Risk Management policies
Create and manage Insider Risk Management policies.
- Understand Insider Risk Management policy templates
- Compare quick and custom insider risk policies
- Create a custom Insider Risk Management policy
- Manage policies in Insider Risk Management
- Module assessment
Investigate insider risk alerts and related activity
Investigate Insider Risk Alerts and Related Activity.
- Understand insider risk alerts and investigations
- Manage alert volume in insider risk management
- Investigate and triage insider risk alerts in Microsoft Purview
- Analyze alert context with the All risk factors tab
- Investigate activity details with the Activity explorer tab
- Review patterns over time with the User activity tab
- Investigate insider risk alerts in Microsoft Defender XDR
- Manage and take action on insider risk cases
- Exercise - Investigate potential data theft using Insider Risk Management
- Module assessment
Implement Adaptive Protection in Insider Risk Management
Understand how Adaptive Protection applies machine learning to assess user risk and automatically enforce the right level of security controls. By dynamically assigning Data loss prevention, Data lifecycle management, and Conditional Access policies, it strengthens data security while reducing unnecessary alerts and manual intervention.
- Adaptive Protection overview
- Understand and configure risk levels in Adaptive Protection
- Configure Adaptive Protection
- Manage Adaptive Protection
- Summary and knowledge check
Understand How to Secure AI Data with Microsoft Purview
Understand how to secure AI data with Microsoft Purview.
- Understand AI data security risks
- Understand how Microsoft Purview secures AI data
- Evaluate compliance risks for AI usage
- Identify AI-related data exposure risks
- Understand how Microsoft Purview controls AI data access
- Detect and respond to risky AI activity
- Retain and search Copilot prompts and responses
- Module assessment
Secure Microsoft 365 Copilot interactions with Microsoft Purview
AI tools like Microsoft 365 Copilot create new ways to interact with sensitive data, but they also introduce new risks. Learn how Microsoft Purview helps you apply security and compliance controls that protect data, manage AI activity, and support responsible use at scale.
- Understand how Microsoft 365 Copilot changes data protection needs
- Assess Copilot regulatory compliance with Compliance Manager
- Audit Copilot interactions with Microsoft Purview
- Analyze Copilot interactions with Communication Compliance
- Classify and protect Copilot content with sensitivity labels
- Apply DLP policies to Microsoft 365 Copilot
- Apply retention policies to Copilot prompts and responses
- Investigate and delete Copilot activity with eDiscovery
- Module assessment
Secure enterprise and browser-based AI apps with Microsoft Purview
Secure enterprise and browser-based AI apps with Microsoft Purview
- Understand risks from enterprise and non-Microsoft AI tools
- Assess AI usage for security and compliance
- Identify policy violations with Communication Compliance
- Detect risky AI usage with Insider Risk Management
- Protect sensitive data in AI apps with Microsoft Purview DLP
- Case study: Use Adaptive Protection to respond to AI-related risk
- Apply retention policies to AI app prompts and responses
- Module assessment
Secure developer AI environments with Microsoft Purview
Microsoft Purview provides tools to secure developer AI environments by discovering apps, assessing data access, and applying appropriate protections. This includes detecting generative AI usage, assigning user risk levels, and applying dynamic enforcement based on user behavior and data sensitivity.
- Understand risks and responsibilities in AI development environments
- Discover and assess AI apps with DSPM for AI
- Classify, restrict, and retain AI prompt data
- Enforce protections in Azure AI services and Azure AI Foundry
- Apply controls for Microsoft Entra-registered custom AI apps
- Secure AI agents built in Copilot Studio
- Manage data risks in Copilot in Fabric
- Investigate and respond to risky AI activity
- Module assessment
Understand retention in Microsoft Purview
Understand retention in Microsoft Purview
- Overview of retention and the data lifecycle
- Understand retention labels and retention policies
- Decide when to apply retention
- Module assessment
Implement and manage Microsoft 365 retention and recovery
Implement and manage Microsoft 365 retention and recovery.
- Plan for retention and disposition with retention labels
- Create and publish retention labels
- Create and manage auto-apply retention labels
- Create and configure adaptive scopes
- Create and configure retention policies
- Understand policy and label precedence in Microsoft Purview
- Recover content in Microsoft 365 workloads
- Module assessment
Search and investigate with Microsoft Purview Audit
Search and investigate with Microsoft Purview Audit.
- Microsoft Purview Audit overview
- Configure and manage Microsoft Purview Audit
- Conduct searches with Audit (Standard)
- Audit Microsoft Copilot for Microsoft 365 interactions
- Investigate activities with Audit (Premium)
- Export audit log data
- Configure audit retention with Audit (Premium)
- Module assessment
Search for content with Microsoft Purview eDiscovery
Use Microsoft Purview eDiscovery to search for content across Microsoft 365. This module covers how to configure cases, define search criteria, and locate messages, files, and other organizational data.
- Understand eDiscovery and content search capabilities
- Prerequisites for using eDiscovery in Microsoft Purview
- Create an eDiscovery search
- Conduct an eDiscovery search
- Export eDiscovery search results
- Module assessment
- Summary and resources