Getting Started with Microsoft Purview: A Comprehensive Guide


Welcome to the first blog post about Microsoft Purview. Todays post is going to be more of a generel introduction to the Purview portal, which features are available, what you should be aware of, the licensing requirements and other practical stuff.

Microsoft purview, is as microsoft would describe it : "a comprehensive set of solutions that can help your organization govern, protect, and manage data, wherever it lives"

What this really means, is that this your one stop portal for everything related to compliance, data governance, data protection and managing the data lifecycle.

{{brizy_dc_image_alt imageSrc=

Exploring the Solutions Offered in the Microsoft Purview Portal

In the ever-evolving landscape of data management, governance, and compliance, Microsoft Purview stands out as a comprehensive suite of solutions designed to help organizations navigate these complexities. Microsoft Purview integrates various tools and services to provide a unified platform for managing data across on-premises, cloud, and hybrid environments. In this blog post, we’ll delve into the different solutions offered in the Microsoft Purview portal, highlighting their features and benefits.

1. Audit

Microsoft Purview Audit provides an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. It captures, records, and retains thousands of user and admin operations performed across various Microsoft services and solutions in a unified audit log. Key features include:

  • Audit Log Search: Search for a wide range of audited activities.
  • Retention Policies: Retain audit logs for up to 10 years with Audit (Premium).
  • Intelligent Insights: Gain insights into user activities and potential security incidents.

2. Communication Compliance

Microsoft Purview Communication Compliance helps organizations detect, capture, and act on inappropriate messages that can lead to potential data security or compliance incidents. It evaluates text and image-based messages in Microsoft and third-party apps for potential business policy violations. Key features include:

  • Machine Learning Models: Identify messages containing potential violations.
  • Role-Based Access Controls: Ensure user-level privacy with pseudonymization.
  • Remediation Actions: Remove inappropriate messages and notify senders.

3. Compliance Manager

Microsoft Purview Compliance Manager simplifies compliance and reduces risk by providing pre-built assessments for common industry and regional standards and regulations. It offers:

  • Compliance Score: Measure your compliance posture with a risk-based score.
  • Improvement Actions: Detailed guidance on actions to comply with standards.
  • Workflow Capabilities: Efficiently complete risk assessments through a single tool.

4. Data Catalog

Microsoft Purview Data Catalog is a searchable repository of data assets, including detailed metadata, classifications, and lineage information. It promotes data democratization by allowing data consumers to discover and understand data assets. Key features include:

  • Metadata Management: Manage and explore metadata for data assets.
  • Data Lineage: Understand data flow and transformations.
  • Search and Discovery: Easily find and access data assets.

5. Data Lifecycle Management

Microsoft Purview Data Lifecycle Management (formerly Microsoft Information Governance) provides tools and capabilities to retain the content that you need to keep and delete the content that you don’t. Key features include:

  • Retention Policies: Configure policies for retaining or deleting content.
  • Retention Labels: Apply labels to manage exceptions and specific retention requirements.
  • Mailbox Archiving: Provide additional storage space for mailboxes.

6. Data Loss Prevention (DLP)

Microsoft Purview Data Loss Prevention helps prevent the accidental or intentional sharing of sensitive information. It allows organizations to define and apply DLP policies to identify, monitor, and automatically protect sensitive items. Key features include:

  • Policy Management: Create and manage DLP policies from a single location.
  • Sensitive Data Detection: Use deep content analysis to detect sensitive information.
  • Protection Actions: Block, audit, or notify users about potential data leaks.

7. eDiscovery

Microsoft Purview eDiscovery provides tools for identifying, preserving, and reviewing data for legal and compliance purposes. It supports end-to-end workflows for internal or legal investigations. Key features include:

  • Content Search: Search for content across Microsoft 365 data sources.
  • Case Management: Create and manage eDiscovery cases.
  • Legal Hold: Place holds on content locations relevant to a case.

8. Information Barriers

Microsoft Purview Information Barriers (IB) allows organizations to restrict communication and collaboration between specific groups of users. It helps avoid conflicts of interest and safeguard internal information. Key features include:

  • Policy Configuration: Define policies to allow or prevent communications.
  • Two-Way Restrictions: Restrict communication and collaboration in Microsoft Teams, SharePoint, and OneDrive.
  • Privacy Controls: Ensure user-level privacy with pseudonymization and role-based access controls.

9. Information Protection

Microsoft Purview Information Protection provides a framework, process, and capabilities to protect sensitive data across clouds, apps, and devices. Key features include:

  • Data Classification: Discover and classify sensitive data.
  • Sensitivity Labels: Apply labels to protect data with encryption and access restrictions.
  • Policy Enforcement: Enforce protection policies across your digital estate.

10. Insider Risk Management

Microsoft Purview Insider Risk Management helps detect, investigate, and act on malicious and inadvertent activities in your organization. It correlates various signals to identify potential insider risks. Key features include:

  • Risk Indicators: Define policies to identify risk indicators.
  • Investigation Tools: Investigate and act on potential risks.
  • Privacy Controls: Ensure user-level privacy with pseudonymization and role-based access controls.

11. Records Management

Microsoft Purview Records Management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records. Key features include:

  • Retention Labels: Apply labels to manage records.
  • Automated Classification: Use machine learning to classify records.
  • Compliance Reporting: Generate reports to demonstrate compliance with regulatory requirements.
{{brizy_dc_image_alt imageSrc=

To access the purview portal, go to https://purview.microsoft.com/. From here you will be able to access all the settings mentioned above. Most of the features are available with the E3 license, but if you want to make sure you can access them all, E5 or E3 + E5 Compliance is the way to go.

So how do we get started? - By defining an Information Protection Strategy


Information protection refers to the processes and technologies used to safeguard data from unauthorized access, disclosure, alteration, and destruction. It encompasses a wide range of practices, including data encryption, access controls, data masking, and more. The goal is to ensure the confidentiality, integrity, and availability of data, thereby protecting it from both internal and external threats.

Many industries are subject to stringent regulatory requirements regarding data protection. Regulations such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and California Consumer Privacy Act (CCPA) mandate specific measures for protecting sensitive information.

Non-compliance with these regulations can result in hefty fines, legal consequences, and damage to an organization’s reputation. A well-defined information protection strategy ensures that an organization meets these regulatory requirements and avoids potential penalties.


In more simple words.

  1. Know your Data
  2. Locate your Data
  3. Define what sensitive data is to you
  4. Determine how you want to classify data
  5. Set up policies to make you compliant with the different regulations.
{{brizy_dc_image_alt imageSrc=
Scroll to Top