Welcome to the first blog post about Microsoft Purview. Todays post is going to be more of a generel introduction to the Purview portal, which features are available, what you should be aware of, the licensing requirements and other practical stuff.
Microsoft purview, is as microsoft would describe it : "a comprehensive set of solutions that can help your organization govern, protect, and manage data, wherever it lives"
What this really means, is that this your one stop portal for everything related to compliance, data governance, data protection and managing the data lifecycle.

In the ever-evolving landscape of data management, governance, and compliance, Microsoft Purview stands out as a comprehensive suite of solutions designed to help organizations navigate these complexities. Microsoft Purview integrates various tools and services to provide a unified platform for managing data across on-premises, cloud, and hybrid environments. In this blog post, we’ll delve into the different solutions offered in the Microsoft Purview portal, highlighting their features and benefits.
Microsoft Purview Audit provides an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. It captures, records, and retains thousands of user and admin operations performed across various Microsoft services and solutions in a unified audit log. Key features include:
Microsoft Purview Communication Compliance helps organizations detect, capture, and act on inappropriate messages that can lead to potential data security or compliance incidents. It evaluates text and image-based messages in Microsoft and third-party apps for potential business policy violations. Key features include:
Microsoft Purview Compliance Manager simplifies compliance and reduces risk by providing pre-built assessments for common industry and regional standards and regulations. It offers:
Microsoft Purview Data Catalog is a searchable repository of data assets, including detailed metadata, classifications, and lineage information. It promotes data democratization by allowing data consumers to discover and understand data assets. Key features include:
Microsoft Purview Data Lifecycle Management (formerly Microsoft Information Governance) provides tools and capabilities to retain the content that you need to keep and delete the content that you don’t. Key features include:
Microsoft Purview Data Loss Prevention helps prevent the accidental or intentional sharing of sensitive information. It allows organizations to define and apply DLP policies to identify, monitor, and automatically protect sensitive items. Key features include:
Microsoft Purview eDiscovery provides tools for identifying, preserving, and reviewing data for legal and compliance purposes. It supports end-to-end workflows for internal or legal investigations. Key features include:
Microsoft Purview Information Barriers (IB) allows organizations to restrict communication and collaboration between specific groups of users. It helps avoid conflicts of interest and safeguard internal information. Key features include:
Microsoft Purview Information Protection provides a framework, process, and capabilities to protect sensitive data across clouds, apps, and devices. Key features include:
Microsoft Purview Insider Risk Management helps detect, investigate, and act on malicious and inadvertent activities in your organization. It correlates various signals to identify potential insider risks. Key features include:
Microsoft Purview Records Management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records. Key features include:

To access the purview portal, go to https://purview.microsoft.com/. From here you will be able to access all the settings mentioned above. Most of the features are available with the E3 license, but if you want to make sure you can access them all, E5 or E3 + E5 Compliance is the way to go.
Information protection refers to the processes and technologies used to safeguard data from unauthorized access, disclosure, alteration, and destruction. It encompasses a wide range of practices, including data encryption, access controls, data masking, and more. The goal is to ensure the confidentiality, integrity, and availability of data, thereby protecting it from both internal and external threats.
Many industries are subject to stringent regulatory requirements regarding data protection. Regulations such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and California Consumer Privacy Act (CCPA) mandate specific measures for protecting sensitive information.
Non-compliance with these regulations can result in hefty fines, legal consequences, and damage to an organization’s reputation. A well-defined information protection strategy ensures that an organization meets these regulatory requirements and avoids potential penalties.
In more simple words.
