SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
Microsoft Purview
Comprehensive solutions to
help govern, protect, and
manage your data estate
Improve risk and
compliance posture
Identify data risks and
manage regulatory
compliance requirements
Understand &
govern data
Manage visibility and
governance of data assets
across your environment
Safeguard data,
wherever it lives
Protect sensitive data
across clouds, apps, and
devices
The new Microsoft Purview
Current
Name
Microsoft 365 Basic/Advanced Audit
Microsoft 365 Communication Compliance
Microsoft Compliance Manager
Office 365 Customer Lockbox
Azure Purview Data Catalog
Microsoft Information Governance
Office 365 Data Loss Prevention
Azure Purview Data Map
Double Key Encryption for Microsoft 365
Records Management in Microsoft 365
Office 365 Core/Advanced eDiscovery
Microsoft 365 Information Barriers
Microsoft Information Protection
Microsoft 365 Insider Risk Management
Azure Purview portal
Microsoft 365 compliance center
Azure Purview Data Insights
Microsoft 365 Customer Key
New
Name
Microsoft Purview Audit (Standard)/(Premium)
Microsoft Purview Communication Compliance
Microsoft Purview Compliance Manager
Microsoft Purview Customer Lockbox
Microsoft Purview Data Catalog
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Microsoft Purview Data Map
Microsoft Purview Double Key Encryption
Microsoft Purview Records Management
Microsoft Purview eDiscovery (Standard)/(Premium)
Microsoft Purview Information Barriers
Microsoft Purview Information Protection
Microsoft Purview Insider Risk Management
Microsoft Purview governance portal
Microsoft Purview compliance portal
Microsoft Purview Data Estate Insights
Microsoft Purview Customer Key
Understand and
govern data
Manage visibility and governance of
data assets across your environment
Microsoft Purview Data Map
Microsoft Purview Data Catalog
Microsoft Purview Data Estate Insights
Safeguard data,
wherever it lives
Protect sensitive data across clouds,
apps, and devices
Microsoft Purview Information Protection
An intelligent, built-in, and extensible solution to know and protect sensitive data
Discover and classify data at scale using automation
and machine-learning
Built-in labeling and protection
Platform extends the protection experience
Encryption built into Microsoft 365: at rest, in transit,
and in use
On-premises
Cloud
Excel
Microsoft Purview Data Loss Prevention
Prevent accidental or unauthorized sharing of sensitive data
Automatically enforce compliance with regulations
and internal policies across cloud and on-premises
Extend DLP policy to both Microsoft and
non-Microsoft endpoints, on premises file shares,
user apps, browsers, and services
Apply flexible policy administration to balance
user productivity
Cloud
Apps
Endpoint
Microsoft Purview Insider Risk Management
Identify and act on insider risks with an integrated end-to-end approach
Identify risky activity and hidden risks with
customizable templates and contextual
insights
Maintain user privacy with built-in controls
that keep user data anonymous
Enable collaboration across security, HR, and
legal with integrated investigation workflows
Microsoft Purview Data Lifecycle Management
Classify and govern data at scale
Retain or delete data and manage records where users
collaborate to manage risk and prevent productivity loss
Demonstrate compliance with label analytics
insights, defensible disposal, and rich audit trails
Manage non-Microsoft data import with pre-built
data connectors*
*Pre-built data connectors include connectors built by Microsoft and by partners – Veritas, Telemessage, CellTrust and 17a-4 LLC. Except for Veritas,
Telemessage, CellTrust and 17a-4 LLC, Microsoft does not have direct relationships with the data source companies in bringing these data connectors to the
platform.
Powered by an intelligent platform
Microsoft 365
Non-
Microsoft data
Improve risk and
compliance
posture
Identify data risks and manage
regulatory compliance requirements
Microsoft Purview Compliance Manager
Intuitive end-to-end compliance management
Manage end-to-end compliance from
easy onboarding to control
implementation
Configure out of the box assessments
to meet your requirements across all
assets
Simplify compliance with continuous
assessments, automated control
mapping, and a compliance score
Your compliance score:
1254/2000 points achieved
Compliance Manager
65%
Microsoft Purview Communication Compliance
Quickly identify and act on code-of-conduct policy violations
Intelligent customizable playbooks detect
violations across Teams, Exchange, and
third-party content
Flexible remediation workflows enable quick
action on violations, like remove incriminating
messages on Teams
Identify and investigate communications risks
while maintaining end-user privacy
Microsoft Purview eDiscovery
Discover, preserve, collect, process, cull, and analyze your data in place
Preserve content by custodian, send hold
notifications, and track acknowledgements
Review and manage static sets of documents
within a case, that can be independently
searched, analyzed, shared, and acted upon
Near duplicate detection, email threading,
themes, and ML models to identify potential
high value content and make the review
process more efficient
Microsoft Purview Audit
Power your forensic and compliance investigations
Tap into additional events that are important
for forensic investigations (e.g. mail items
accessed, mail send, user search)
Preserve audit logs for up to a year, with
option for 10-year retention add-on
High bandwidth access to data with ~2x the
baseline
Discussion
© Copyright Microsoft Corporation. All rights reserved.
Thank you.

More Related Content

PPTX
Deep dive into Microsoft Purview Data Loss Prevention
PPTX
Microsoft Defender for Endpoint Overview.pptx
PPTX
Secure and govern your data with Microsoft Purview
PPTX
Breakdown of Microsoft Purview Solutions
PDF
Microsoft-Entra-Identity-and-Access-presentation.pdf
PPTX
OpManager Technical Overview
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
Splunk Architecture
Deep dive into Microsoft Purview Data Loss Prevention
Microsoft Defender for Endpoint Overview.pptx
Secure and govern your data with Microsoft Purview
Breakdown of Microsoft Purview Solutions
Microsoft-Entra-Identity-and-Access-presentation.pdf
OpManager Technical Overview
Technology Overview - Symantec Data Loss Prevention (DLP)
Splunk Architecture

What's hot (20)

PPTX
Microsoft Information Protection: Your Security and Compliance Framework
PPTX
Microsoft Information Protection.pptx
PDF
Microsoft 365 Enterprise Security with E5 Overview
PPTX
CollabDaysBE - Microsoft Purview Information Protection demystified
PPTX
Microsoft Information Protection demystified Albert Hoitingh
PPTX
Azure conditional access
PDF
Microsoft 365 Compliance
PDF
Microsoft 365 Compliance and Security Overview
PDF
Overview of Data Loss Prevention Policies in Office 365
PDF
Microsoft 365 Security and Compliance
PPTX
2 Modern Security - Microsoft Information Protection
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Microsoft 365 and Microsoft Cloud App Security
PPTX
Microsoft Purview Information Barriers and Communication Compliance and Micro...
PPTX
Microsoft Defender for Endpoint
PPTX
Managing iOS with Microsoft Intune
PPTX
Microsoft intune
PPTX
Azure information protection
PDF
Microsoft Defender and Azure Sentinel
PDF
Modern Devices Management
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection.pptx
Microsoft 365 Enterprise Security with E5 Overview
CollabDaysBE - Microsoft Purview Information Protection demystified
Microsoft Information Protection demystified Albert Hoitingh
Azure conditional access
Microsoft 365 Compliance
Microsoft 365 Compliance and Security Overview
Overview of Data Loss Prevention Policies in Office 365
Microsoft 365 Security and Compliance
2 Modern Security - Microsoft Information Protection
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Microsoft 365 and Microsoft Cloud App Security
Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Defender for Endpoint
Managing iOS with Microsoft Intune
Microsoft intune
Azure information protection
Microsoft Defender and Azure Sentinel
Modern Devices Management
Ad

Similar to Microsoft Purview Overview Deck.pptx is for Microsoft Purview (20)

PPTX
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
PDF
Information protection & classification
PPSX
Value Microsoft 365 E5 English
PDF
One name unify them all
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PPTX
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
PPTX
Primend praktiline konverents - Office 365 turvalisus
PDF
Microsoft 365 eEnterprise E5 Overview
PPTX
Top 10 use cases for Microsoft Purview.pptx
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PPTX
Office 365 Security And Compliance
PDF
Microsoft 365 | Modern workplace
PDF
Microsoft Office 365 Security and Compliance Updates
PDF
Protect your data in / with the Cloud
PPTX
Securely Harden Microsoft 365 with Secure Score
PPTX
Security and compliance in Office 365 -Part 1
PPTX
Stay Productive, Collaborative, and Secure with Microsoft 365
PPTX
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
PPTX
Information management and data governance in Office 365
PDF
SPUnite17 Information Management and Data Governance in Office365
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
Information protection & classification
Value Microsoft 365 E5 English
One name unify them all
Office 365 Security, Privacy and Compliance - SMB Nation 2015
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Primend praktiline konverents - Office 365 turvalisus
Microsoft 365 eEnterprise E5 Overview
Top 10 use cases for Microsoft Purview.pptx
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Office 365 Security And Compliance
Microsoft 365 | Modern workplace
Microsoft Office 365 Security and Compliance Updates
Protect your data in / with the Cloud
Securely Harden Microsoft 365 with Secure Score
Security and compliance in Office 365 -Part 1
Stay Productive, Collaborative, and Secure with Microsoft 365
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Information management and data governance in Office 365
SPUnite17 Information Management and Data Governance in Office365
Ad

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administraation Chapter 3
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Introduction to Artificial Intelligence
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
AI in Product Development-omnex systems
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ai tools demonstartion for schools and inter college
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Odoo POS Development Services by CandidRoot Solutions
Digital Strategies for Manufacturing Companies
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How to Migrate SBCGlobal Email to Yahoo Easily
top salesforce developer skills in 2025.pdf
System and Network Administraation Chapter 3
Navsoft: AI-Powered Business Solutions & Custom Software Development
Operating system designcfffgfgggggggvggggggggg
Upgrade and Innovation Strategies for SAP ERP Customers
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Introduction to Artificial Intelligence
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
Odoo Companies in India – Driving Business Transformation.pdf
AI in Product Development-omnex systems
Design an Analysis of Algorithms II-SECS-1021-03
ai tools demonstartion for schools and inter college
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo POS Development Services by CandidRoot Solutions

Microsoft Purview Overview Deck.pptx is for Microsoft Purview

  • 1. Microsoft Purview Comprehensive solutions to help govern, protect, and manage your data estate
  • 2. Improve risk and compliance posture Identify data risks and manage regulatory compliance requirements Understand & govern data Manage visibility and governance of data assets across your environment Safeguard data, wherever it lives Protect sensitive data across clouds, apps, and devices
  • 3. The new Microsoft Purview Current Name Microsoft 365 Basic/Advanced Audit Microsoft 365 Communication Compliance Microsoft Compliance Manager Office 365 Customer Lockbox Azure Purview Data Catalog Microsoft Information Governance Office 365 Data Loss Prevention Azure Purview Data Map Double Key Encryption for Microsoft 365 Records Management in Microsoft 365 Office 365 Core/Advanced eDiscovery Microsoft 365 Information Barriers Microsoft Information Protection Microsoft 365 Insider Risk Management Azure Purview portal Microsoft 365 compliance center Azure Purview Data Insights Microsoft 365 Customer Key New Name Microsoft Purview Audit (Standard)/(Premium) Microsoft Purview Communication Compliance Microsoft Purview Compliance Manager Microsoft Purview Customer Lockbox Microsoft Purview Data Catalog Microsoft Purview Data Lifecycle Management Microsoft Purview Data Loss Prevention Microsoft Purview Data Map Microsoft Purview Double Key Encryption Microsoft Purview Records Management Microsoft Purview eDiscovery (Standard)/(Premium) Microsoft Purview Information Barriers Microsoft Purview Information Protection Microsoft Purview Insider Risk Management Microsoft Purview governance portal Microsoft Purview compliance portal Microsoft Purview Data Estate Insights Microsoft Purview Customer Key
  • 4. Understand and govern data Manage visibility and governance of data assets across your environment Microsoft Purview Data Map Microsoft Purview Data Catalog Microsoft Purview Data Estate Insights
  • 5. Safeguard data, wherever it lives Protect sensitive data across clouds, apps, and devices
  • 6. Microsoft Purview Information Protection An intelligent, built-in, and extensible solution to know and protect sensitive data Discover and classify data at scale using automation and machine-learning Built-in labeling and protection Platform extends the protection experience Encryption built into Microsoft 365: at rest, in transit, and in use On-premises Cloud Excel
  • 7. Microsoft Purview Data Loss Prevention Prevent accidental or unauthorized sharing of sensitive data Automatically enforce compliance with regulations and internal policies across cloud and on-premises Extend DLP policy to both Microsoft and non-Microsoft endpoints, on premises file shares, user apps, browsers, and services Apply flexible policy administration to balance user productivity Cloud Apps Endpoint
  • 8. Microsoft Purview Insider Risk Management Identify and act on insider risks with an integrated end-to-end approach Identify risky activity and hidden risks with customizable templates and contextual insights Maintain user privacy with built-in controls that keep user data anonymous Enable collaboration across security, HR, and legal with integrated investigation workflows
  • 9. Microsoft Purview Data Lifecycle Management Classify and govern data at scale Retain or delete data and manage records where users collaborate to manage risk and prevent productivity loss Demonstrate compliance with label analytics insights, defensible disposal, and rich audit trails Manage non-Microsoft data import with pre-built data connectors* *Pre-built data connectors include connectors built by Microsoft and by partners – Veritas, Telemessage, CellTrust and 17a-4 LLC. Except for Veritas, Telemessage, CellTrust and 17a-4 LLC, Microsoft does not have direct relationships with the data source companies in bringing these data connectors to the platform. Powered by an intelligent platform Microsoft 365 Non- Microsoft data
  • 10. Improve risk and compliance posture Identify data risks and manage regulatory compliance requirements
  • 11. Microsoft Purview Compliance Manager Intuitive end-to-end compliance management Manage end-to-end compliance from easy onboarding to control implementation Configure out of the box assessments to meet your requirements across all assets Simplify compliance with continuous assessments, automated control mapping, and a compliance score Your compliance score: 1254/2000 points achieved Compliance Manager 65%
  • 12. Microsoft Purview Communication Compliance Quickly identify and act on code-of-conduct policy violations Intelligent customizable playbooks detect violations across Teams, Exchange, and third-party content Flexible remediation workflows enable quick action on violations, like remove incriminating messages on Teams Identify and investigate communications risks while maintaining end-user privacy
  • 13. Microsoft Purview eDiscovery Discover, preserve, collect, process, cull, and analyze your data in place Preserve content by custodian, send hold notifications, and track acknowledgements Review and manage static sets of documents within a case, that can be independently searched, analyzed, shared, and acted upon Near duplicate detection, email threading, themes, and ML models to identify potential high value content and make the review process more efficient
  • 14. Microsoft Purview Audit Power your forensic and compliance investigations Tap into additional events that are important for forensic investigations (e.g. mail items accessed, mail send, user search) Preserve audit logs for up to a year, with option for 10-year retention add-on High bandwidth access to data with ~2x the baseline
  • 16. © Copyright Microsoft Corporation. All rights reserved. Thank you.

Editor's Notes

  • #2: Microsoft Purview unifies information protection, data governance, risk management, and compliance solutions so that customers can manage their data all from one place. Now, they can leverage that visibility across their environment to help close exposure gaps, simplify tasks through automation, stay up-to-date with regulatory requirements, and keep their most important asset, data, safe. 
  • #5: With Microsoft Purview we bring together compliance and data governance The risk and compliance portfolio joins with our unified data governance
  • #11: Talk track: Let’s start with your first challenge: knowing and protecting sensitive data that resides across your hybrid environment. The bedrock of our solution is our comprehensive set of both manual and automatic data classification methods. Especially notable are our classifiers that leverage machine learning to automatically identify and classify sensitive content at scale using pattern-matching methods. You may not otherwise easily find this content, such as patents, contracts, and résumés. We have invested to ensure high accuracy in our various classification capabilities. Once you know your data, you can benefit from using our built-in labeling and protection experience in your core productivity solutions. Apps like Word, Excel, or PowerPoint, or services like SharePoint, Exchange, or Power BI, use these core workloads instead of a bolted-on, plug-in experience. This not only lowers your costs by eliminating the need to deploy and maintain additional software, but also delivers better performance by eliminating the need to load add-ons every time a user launches an app or service. The Microsoft information protection development platform further extends our classification, labeling, and protection experience, in a consistent way, to non-Microsoft apps, services, and file types. Using our platform (SDK/APIs), 200-plus industry partners create further customer value such as enabling users to open encrypted PDF files in the Edge browser and Adobe Acrobat Reader or allowing them to label and protect CAD artifacts. These are two of the 80+ product integrations available since GA of the SDK in November 2018. In addition to information protection for your productivity apps and services, we’ve also built encryption into Microsoft 365 services and data protection into Azure. The encryption built into Azure protects your data while at rest, in transit, and in use.  We also offer guidance on deployment, leveraging the experience and learnings gained from enabling other similar organizations. <Internal: Library of case studies made available online for customers looking to learn from information-protection experience of peers> ------------------------- Internal reference only: EDM: A custom sensitive information type that uses exact data values, instead of matching only with generic patterns. In other words, EDM-based classification enables you to create custom sensitive information types that refer to exact values in a database of sensitive information. ML trainable classifiers: This classification method is particularly well-suited to content that either the manual or automated pattern-matching methods cannot easily identify. This method of classification is more about training a classifier to identify an item based upon what it is (e.g., résumé, contract, or invoice), as opposed to the elements the item contains (pattern matching). Encryption: Services like Azure storage and Azure SQL database encrypt data at rest by default and confidential computing can help protect your data while in use.
  • #12: Talk track:  Now that you understand your sensitive data, you will want to establish a protection plan to address the risks of accidental or inappropriate sharing of sensitive information across the applications, services, and tools your users use every day.  Your employees access data from a multitude of devices and locations and they engage with multiple internal and external business partners to perform a wide array of activities. These touchpoints can expose your organization to data oversharing or even present risks of inappropriate sensitive data disclosure which can result in regulatory compliance concerns. As part of our information protection solution, we offer unified data-loss-prevention that provides a consistent set of policies and actions across a broad ecosystem of user apps and services, both on-premises and in the cloud. These capabilities automatically classify your data, apply the correct information protection policy and then enforce policies in a way that’s consistent, fully transparent, and auditable.  These capabilities ensure that your employees will only use and share sensitive information within its approved regulatory and internal security policy context. Microsoft's unified DLP solution automatically blocks actions outside of this context, which prevents accidental or inappropriate information sharing. Data-loss prevention's deep integration within the security stack creates a holistic and clearly differentiated information protection solution in the market because it provides full control and auditability from policy creation to policy enforcement to incident remediation and user education.  The classification engine for DLP is common across Microsoft's offerings. The engine natively incorporates 90-plus sensitive information types, and also supports the creation of custom sensitive information types. Organizations that deploy the DLP can therefore consistently address standard and bespoke sensitive data policy requirements, regardless of whether you implement the DLP policy in the cloud or on-premises. You can access our comprehensive data-loss prevention capabilities universally in Microsoft 365 desktop apps like Word, Excel, PowerPoint, and Outlook, Edge; on-premises file shares; and within services like Teams, Exchange, SharePoint, and OneDrive. These capabilities also extend to third-party apps and browsers like Chrome and services such as Box, DropBox, Salesforce, and many others.  Data-loss protection enables you to automatically block sharing of chat messages, emails, and documents that contain sensitive information. DLP also ensures that users remain fully productive and aware of policy violations via tips and notifications that explain why content they shared was blocked, specific compliance violations, and how they can address the issue in the future. DLP also supports provisions for activities deemed non-compliant by an applicable policy, but need to be allowed due to a business reason while limiting workflow interruptions. Business justifications can be reviewed post-event to ensure they were appropriate.
  • #13: Talk track: Insider risk management leverages Microsoft Graph and other services to obtain native signals across Microsoft 365, Windows 10, and Azure. This includes file activity, communications sentiment, and abnormal user behaviors without the need to deploy end-point agents. You can include additional third-party signals from human resources systems, such as termination date or performance data, to further enhance the risk signal.  A robust set of configurable templates tailored specifically for risks such as digital IP theft, confidentiality breach, and potential security violations use machine learning and intelligence to correlate the signals to identify hidden patterns and risks that traditional or manual methods might miss. Using intelligence and correlations allows the solution to focus on actual suspicious activities so you don’t get overloaded with alerts. Furthermore, you can create default pseudonymous display names for at-risk users to maintain privacy and prevent bias.   A comprehensive 360° view provides a curated and easy-to-understand visual summary of individual risks within your organization. This view includes an historical timeline of relevant in-scope activities and trends associated with each identified user. For example, you can see if a user submitted their resignation, then downloaded files and copied them to a USB device. The system also evaluates whether any of those files contained classification labels as well as sensitive information or sensitivity labels from Information Protection. In addition, with the right permissions, investigators can determine risk by viewing files accessed from Microsoft cloud resources like SharePoint Online. End-to-end integrated workflows help ensure that the right people across security, HR, legal, and compliance can quickly investigate and take action once a risk has been identified. For example, if we determined the risk to be unintentional, we could send an email explaining how the user’s actions violate company policy with a link to training or the policy handbook. If we determine the risk was malicious, we could open an investigation that collects, collates, and preserves evidence, including the documents themselves, and open a case for legal and HR to take appropriate action. Finally, many organizations already leverage existing SOAR (Security Orchestration, Automation, and Response) systems to log and classify incidents by impact and urgency to prioritize actions for those assigned to them.
  • #14: Talk track: And finally, you can now put retention and deletion policies in place to help you manage information lifecycle and meet recordkeeping obligations for data in Microsoft 365 and beyond. Microsoft Information Governance helps classify and govern data at scale with the following capabilities: In-place management: On average, organizations are wrestling with five different content systems and repositories. Duplicate information across platforms not only causes productivity loss but also increases risks. In-place management enables companies to retain information and manage records where data is created to prevent productivity loss and reduce operational and legal risks. Automated policy: The volume of information is expected to grow 4.5 times over the next two years. Relying on manual classification is ineffective since users usually care the most about the value of the information, less about the risks it generates. It’s challenging to hold them accountable to classify and manage information accurately. By automating information governance, companies can leverage various auto-classification capabilities such as file properties (e.g., Content Type defined in SPO), pattern recognition, and machine-learning classifiers to classify and govern data at scale. Defensible process: Multiple regulations, such as SEC 17a-4 and FINRA, require companies to meet stringent information governance requirements like record immutability. Companies also need to demonstrate compliance by proving they follow a defensible process to dispose of content. Microsoft 365 provides transparent insights on how data is classified to help you audit and finetune classification and policies. Moreover, the records management capabilities within Microsoft Information Governance can help companies follow a defensible process to retain and dispose of information with proof of disposals that can be kept for 7 years, disposition reviews, and rich audit trails. Pre-built data connectors: To help companies leverage the capabilities above to govern data beyond Microsoft cloud, we provide pre-built data connectors for social media, text messages, chats, and collaboration data. Microsoft not only builds its own connectors but also works with hand-picked partners like TeleMessage and Globanet to enable ongoing and high-fidelity data import. In addition to the pre-built ones, customers and partners can build their own custom connectors to continuously ingest data into Microsoft 365. You can leverage these four key capabilities to govern both the general and high-value information across various data sources: General information governance: Retain only what you need and delete what you don’t to reduce risks and liability. High-value information management: Classify, retain, review, dispose, and manage records to meet recordkeeping obligations.
  • #16: Talk track – tie it back to the opening statement (make it easy for customers) ---------------------------------- - : Vision Page : - What are we trying to achieve here? Our value can be extended to third-parties Customers can access their data using APIs Partners can use APIs to integrate Service providers to manage at scale
  • #18: Talk track: With Microsoft Purview Compliance Manager, you can now continuously assess and monitor data protection controls, get clear guidance on how to improve your score and thus reduce compliance risks, and leverage the built-in control mapping to scale your compliance effort across global, industrial, and regional standards. Intuitive management: The complexity of regulations makes it challenging for organizations and IT administrators to know specific actions they can take to meet their compliance requirements. Compliance Manager provides easy, guided onboarding and supports twenty four languages. With simple design that works out of box, IT admins and Compliance / Audit Officers can quickly collaborate to address compliance. With Compliance Manager, you don’t need to be an expert in complex regulations like the General Data Protection Regulation (GDPR) to know the actions you can take to improve compliance effectiveness. Compliance Manager now combines the functionality of compliance score and the existing Compliance Manager solutions, making it a single portal for end-to-end compliance management.  Scalable assessments: Compliance Manager provides access to a vast library of 150+ assessment templates – from global regulations such as the GDPR, PCI-DSS, COBIT 5, to regional assessments such as Brazil’s LGPD data protection law and Malaysia’s Personnel Data Protection Act. Industry-specific assessments such as HITRUST and Cybersecurity Maturity Model Certification (CMMC) are also covered. Compliance Manager now provides the ability to quickly customize these assessments to meet your unique business requirements. With the custom assessments feature, you can manage compliance across your assets in one location by bringing your own assessments into Compliance Manager. For example, if you are currently tracking compliance of your SAP data in an Excel file, you can bring that into Compliance Manager.  Built-in automation: Compliance management can be tedious, and organizations often find it difficult to know their degree of compliance with specific regulations. Translating ever-changing regulatory requirements into specific actions and controls is also challenging and not all organizations have the resources to do this accurately. Point-in-time assessments (e.g., for quarterly/semi-annual/annual audits) also mean that organizations tend to have ‘blind spots’ between these assessment windows. To help you with these challenges, Compliance Manager comes built-in with the following capabilities: compliance score, control mapping, continuous regulatory updates, and continuous assessments Microsoft Purview Compliance Manager measures your progress towards completing recommended actions that help reduce risks around data protection and regulatory standards.
  • #19: Talk Track: Intelligent Customizable playbooks: There are four pre-configured templates within Communication Compliance: regulatory compliance, offensive language, sensitive information types, conflicts of interest. These are available across first- and third-party content, in 8 languages, with the ability to customize policies. ML models continue to learn with trainable classifiers including gory, racy, adult images, harassment, discrimination, threats, profanity. Remediation workflows: Collaborative and easy-to-navigate Identify risk communication with keyword highlighting and prioritization through past user behavior Ability to send notification to employee, escalate the case for investigation, remove message from Teams channels Able to provide feedback to improve the model Privacy built in: Rules-based access controls Admin opt in of users/reviews Pseudonymization and audit trails to scan behavior
  • #20: Talk Track: We put significant investments in eDiscovery. We built whole new stack –from ground up. ​ Custodian Management It’s looking to simplify the process. For example, a typical case requires hunting down mailbox addresses and SharePoint urls in order to use scripts to find out the addresses, plus give the export of the scripts. Now, with eDiscovery, you have the ability to just tell us who has been escalated. Our solution then goes in the background and maps the content for you – these are the sources in play that you can hold to get started on a case. ​ Review Before a user exports, we wanted to provide a view of the content in review. These review tools help with analytics for culling decisions (to show related content), near duplicate detection, email threading, and redaction of content.  ​ Deep Indexing Microsoft is using a search that is tuned for performance – finding the most relevant content quickly becomes critical. Because we tune it for speed, we give it rules to look for specific items (and skip specific items that may take too long). For example, if you put a file with too many attachments, this would be skipped to optimize for speed. In our new stack, we will look at that content before we search. For example, if Jane is the custodian, looking at her content will pick up any partially and unindexed content. Jane then has the ability to index that content, so that when she searches for something specific, she is able to access primary and secondary indexes. ​ ​ ​ ​
  • #21: Talk Track: There are 3 key capabilities we offer customers in Audit to help with their regulatory, legal and compliance obligations. The first are additional audit events that help with forensic investigations. Earlier this year we delivered new events that helps investigators understand if mail items were accessed through the mail sync and mail bind operation. This is extremely helpful to organizations with regulatory obligations that require breach notifications, because now they can scope mail items that may have been compromised to reduce fines and penalties. Another key area is around retaining audit logs. According to the latest Ponemon research, it takes roughly 6 months to detect a data breach and organizations need a way to go back to the audit logs to conduct forensic investigations. Advanced Audit extends audit log retention from 90 days to 6 months. And new to Audit – optionally add 10-year retention for highly regulatory customers that need to keep audit log data for longer. And lastly, for those using activity API, Audit provides 2 times the bandwidth compared to other customers – which is valuable especially if customers are using audit data in 3rd party solutions.