Skip to content

Commit 057ce74

Browse files
authored
Merge pull request #5088 from DebLanger/US490274_Purview
Add Purview eDLP tagging for Critical Assets - three new device class…
2 parents d468b3c + b9e3c90 commit 057ce74

File tree

2 files changed

+21
-1
lines changed

2 files changed

+21
-1
lines changed

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: ornat-spodek
77
ms.topic: reference
88
ms.service: exposure-management
9-
ms.date: 06/16/2025
9+
ms.date: 09/30/2025
1010
---
1111

1212
# Predefined classifications - Microsoft Security Research
@@ -50,6 +50,9 @@ Current asset types are:
5050
| VMware vCenter | Device | High | The VMware vCenter Server is crucial for managing virtual environments. It provides centralized management of virtual machines and ESXi hosts. If it fails, it could disrupt the administration and control of your virtual infrastructure, including provisioning, migration, load balancing of virtual machines, and data center automation. However, as there are often redundant vCenter Servers and High Availability configurations, the immediate halt of all operations might not occur. Its failure could still cause significant inconvenience and potential performance issues. |
5151
| Hyper-V Server | Device | High | The Hyper-V hypervisor is essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. If the Hyper-V host fails, it can lead to the unavailability of hosted virtual machines, potentially causing downtime and disrupting business operations. Moreover, it can result in significant performance degradation and operational challenges. Ensuring the reliability and stability of Hyper-V hosts is therefore critical for maintaining seamless operations in a virtual environment. |
5252
| SharePoint Server | Device | Medium | The SharePoint server is responsible for secure content management, collaboration, and document sharing across teams. It hosts intranet portals and enterprise search within an organization. Compromise could lead to unauthorized access to sensitive information and disruption of content services. |
53+
| Devices with Sensitive Information (Azure Document DB Auth Key) | Device | High | Devices that have accessed documents containing Azure Document DB Auth Keys, which are identified as sensitive data. These devices are automatically classified as High criticality when interacting with sensitive content and revert to their baseline classification after 5 consecutive days without accessing the sensitive file. Learn more [here](/purview/sit-sensitive-information-type-learn-about) |
54+
| Devices with Sensitive Information (Azure Redis Cache Connection String) | Device | High | Devices that have accessed documents containing Azure Redis Cache Connection Strings, which are identified as sensitive data. These devices are automatically classified as High criticality when interacting with sensitive content and revert to their baseline classification after 5 consecutive days without accessing the sensitive file. Learm more [here](/purview/sit-defn-azure-redis-cache-connection-string).|
55+
| Devices with Sensitive Information (Azure Storage Account Key) | Device | High | Devices that have accessed documents containing Azure Storage Account Keys, which are identified as sensitive data. These devices are automatically classified as High criticality when interacting with sensitive content and revert to their baseline classification after 5 consecutive days without accessing the sensitive file. Learn more [here](/purview/sit-defn-azure-storage-account-key).|
5356

5457
##### Identity
5558

exposure-management/whats-new.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,23 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
2626
2727
## September 2025
2828

29+
### Critical assets classified based on interaction with sensitive documents (Purview eDLP)
30+
31+
Microsoft Security Exposure Management now integrates with Microsoft Purview Endpoint Data Loss Prevention (eDLP) to automatically identify and classify critical assets based on their interaction with sensitive documents. This new capability introduces dynamic criticality reclassification where endpoints accessing high-sensitivity documents are automatically tagged as high criticality.
32+
33+
Key features include:
34+
35+
- **Dynamic reclassification**: Endpoints are automatically elevated to high criticality when accessing sensitive content
36+
- **Automatic reversion**: Asset classification reverts to baseline after 5 consecutive days of inactivity with sensitive content
37+
- **Out-of-the-box detection**: Built-in detection rules for three Purview Classifier Sensitive Information Types:
38+
- Azure Document DB Auth Key
39+
- Azure Redis Cache Connection String
40+
- Azure Storage Account Key
41+
- **Enhanced visibility**: Critical assets are surfaced across Microsoft Defender XDR experiences for improved security posture management
42+
43+
This integration provides the first offering to combine the experience between Purview and Microsoft Defender Portal for classifying critical assets and gathering important pre-breach insights.
44+
45+
For more information, see [Predefined classifications](predefined-classification-rules-and-levels.md).
2946
### Blast radius analysis
3047

3148
Blast radius analysis is an advanced graph visualization integrated into incident investigation experience. Built on the Microsoft Sentinel data lake and graph infrastructure, it generates an interactive graph showing possible propagation paths from the selected node to predefined critical targets scoped to the user’s permissions.

0 commit comments

Comments
 (0)