Skip to content

Commit 1481a81

Browse files
committed
new intro module
1 parent 76d5d19 commit 1481a81

File tree

5 files changed

+161
-15
lines changed

5 files changed

+161
-15
lines changed

learn-pr/wwl-sci/purview-protect-sensitive-data/includes/data-protection-need.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@ Data is one of an organization's most valuable assets, but it's constantly at ri
22

33
## The consequences of data breaches and insider threats
44

5-
Cyber threats targeting sensitive data are increasing in scale and sophistication. According to ENISA's 2024 _Threat Landscape_ report, data-related threats have surged, affecting public administration (12%), digital infrastructure (10%), finance (9%), and business services (8%). The report also notes that data compromise incidents rose in 2023-2024, reinforcing the need for strong data protection measures. Organizations that fail to implement security measures risk financial losses, regulatory penalties, and reputational damage. ([ENISA](https://www.enisa.europa.eu/))
5+
Cyber threats targeting sensitive data are increasing in scale and sophistication. According to ENISA's 2024 _[Threat Landscape](https://www.enisa.europa.eu/sites/default/files/2024-11/ENISA%20Threat%20Landscape%202024_0.pdf?azure-portal=true)_ report, data-related threats have surged, affecting public administration (12%), digital infrastructure (10%), finance (9%), and business services (8%). The report also notes that data compromise incidents rose in 2023-2024, reinforcing the need for strong data protection measures. Organizations that fail to implement security measures risk financial losses, regulatory penalties, and reputational damage.
66

7-
Cybersecurity and Infrastructure Security Agency's (CISA) _Insider Threats 101_ fact sheet states that the total average cost of an insider risk increased in 2023 to $16.2 million per organization, with an average of 86 days required to identify and contain such threats. These insider incidents can stem from accidental exposure, compromised credentials, or malicious intent, all of which underscore the need for proactive data protection. ([CISA](https://www.cisa.gov/))
7+
Cybersecurity and Infrastructure Security Agency's (CISA) _[Insider Threats 101](https://www.cisa.gov/sites/default/files/2024-07/insider-threat-101-fact-sheet_07-29-2024_508.pdf?azure-portal=true)_ fact sheet states that the total average cost of an insider risk increased in 2023 to $16.2 million per organization, with an average of 86 days required to identify and contain such threats. These insider incidents can stem from accidental exposure, compromised credentials, or malicious intent, all of which underscore the need for proactive data protection.
88

99
Examples of data security risks include:
1010

11-
- **MOVEit Data Breach**: In June 2023, a vulnerability in the MOVEit file transfer software was exploited in a series of cyberattacks. These attacks affected thousands of organizations and nearly 100 million individuals, including major corporations and government agencies. This breach highlighted the risks of unprotected sensitive data. ([Wikipedia](https://en.wikipedia.org/wiki/2023_MOVEit_data_breach))
12-
- **Social Engineering Attacks**: ENISA's report highlights a sharp rise in Business Email Compromise (BEC), where attackers manipulate employees into disclosing sensitive data. Without proper security controls, unauthorized data exposure can lead to fraud, identity theft, and corporate espionage.
13-
- **Data Leaks and Misconfigurations**: Unintentional data exposure remains a major issue, as noted in ENISA's findings. Security misconfigurations and lack of visibility over sensitive data can lead to breaches, making it essential to implement policies that restrict unauthorized access.
11+
- **Data breaches from unauthorized access**: Weak access controls, compromised credentials, and unprotected data storage can result in data breaches. Attackers exploit vulnerabilities to steal sensitive information, leading to financial and reputational damage. Organizations must enforce strong authentication, least privilege access, and data encryption to reduce exposure.
12+
- **Social engineering attacks**: Cybercriminals use deceptive tactics, such as phishing and Business Email Compromise (BEC), to manipulate employees into revealing sensitive data. These attacks can result in fraud, identity theft, and corporate espionage. Organizations can reduce risk by training employees, using email security controls, and implementing verification processes for sensitive transactions.
13+
- **Data leaks and misconfigurations**: Unsecured cloud storage, misconfigured access settings, and accidental data sharing can expose sensitive information. Organizations that lack clear data governance, visibility, and access restrictions are at higher risk of unintentional data exposure. Regular security audits and automated access controls help mitigate these risks.
1414

1515
## Risks organizations face
1616

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
AI, cloud services, and collaboration platforms have transformed how organizations generate, share, and analyze data. While these technologies drive efficiency and innovation, they also introduce new security challenges. Sensitive information can be exposed through unauthorized access, accidental sharing, or AI-driven tools processing data in unintended ways.
2+
3+
As organizations increase their use of AI-driven tools and cloud-based collaboration, security teams must address new risks, such as unintentional data exposure and policy violations. Without a proactive data security strategy, organizations risk financial losses, compliance violations, and operational disruptions.
4+
5+
Microsoft Purview provides a comprehensive approach to safeguarding data across cloud, endpoint, and AI environments. It enables organizations to classify, label, and protect sensitive information, enforce data loss prevention policies, and detect potential risks before they lead to security incidents.
6+
7+
## Learning objectives
8+
9+
By the end of this module, you'll be able to:
10+
11+
- Describe the challenges of protecting sensitive data in cloud and AI environments.
12+
- Explain how Microsoft Purview helps classify, label, and secure data.
13+
- Identify the role of data loss prevention (DLP) in reducing security risks.
14+
- Understand how Insider Risk Management supports proactive threat detection.
15+
- Describe security monitoring capabilities that help organizations manage data risks.
16+
17+
This module provides you with the knowledge and tools needed to strengthen data security while enabling safe and efficient collaboration.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
Protecting sensitive data in modern organizations is more complex than ever. With the rise of cloud services, AI-driven tools, and remote collaboration, security teams must safeguard data against unauthorized access, accidental exposure, and emerging risks. Without a structured approach to data protection, organizations face compliance violations, financial losses, and reputational damage.
2+
3+
This module explored how Microsoft Purview provides a comprehensive approach to data security. It enables organizations to classify, label, and protect data, enforce data loss prevention policies, and detect potential risks before they lead to security incidents.
4+
5+
In this module, you learned to:
6+
7+
- Describe the challenges of protecting sensitive data in cloud and AI environments.
8+
- Explain how Microsoft Purview helps classify, label, and secure data.
9+
- Identify the role of data loss prevention (DLP) in reducing security risks.
10+
- Understand how Insider Risk Management supports proactive threat detection.
11+
- Describe security monitoring capabilities that help organizations manage data risks.
12+
13+
Without a proactive data security strategy, organizations might struggle to keep pace with evolving threats. Microsoft Purview enables security teams to apply dynamic protections, enforce compliance policies, and detect risks early, ensuring data remains secure while supporting seamless collaboration.
14+
15+
## References
16+
17+
- [Learn about Microsoft Purview](/purview/purview)
18+
- [Implementing Zero Trust with Microsoft Purview](/zero-trust-microsoft-purview)
19+
- [Microsoft Purview data security solutions](/purview/purview-security)
20+
-

learn-pr/wwl-sci/purview-protect-sensitive-data/includes/understand-classification-protection.md

Lines changed: 19 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,29 +17,38 @@ These capabilities help organizations secure sensitive data while ensuring users
1717

1818
### Data classification
1919

20-
Data classification helps organizations identify and categorize sensitive information. By labeling data based on content, context, and usage, organizations can apply security controls more effectively.
20+
Data classification helps organizations identify and categorize sensitive information, making it easier to apply appropriate security controls. By classifying data based on content, context, and usage, organizations can improve compliance, reduce exposure risks, and enforce protection policies effectively.
2121

22-
Microsoft Purview provides built-in classification capabilities, including sensitive information types and trainable classifiers, to help automate classification across cloud, endpoint, and collaboration environments.
22+
Microsoft Purview provides built-in classification capabilities that automate the identification of sensitive data across cloud, endpoint, and collaboration environments. These include:
23+
24+
- **Sensitive information types**: Predefined and customizable patterns that detect data such as financial records, personal identifiers, and healthcare information.
25+
- **Trainable classifiers**: AI-powered classifiers that recognize sensitive content based on real-world examples, improving detection accuracy for unstructured data.
26+
27+
By using these classification tools, organizations can identify and label sensitive data at scale, ensuring that security policies apply consistently across their digital environment.
2328

2429
### Sensitivity labels
2530

26-
Sensitivity labels define how data should be handled, enforcing policies for encryption, access control, and visual markings. These labels ensure that data remains protected across emails, files, and cloud services, regardless of where it's shared.
31+
Sensitivity labels classify and protect data by enforcing encryption, access control, and visual markings. Unlike data classification, which identifies sensitive data, sensitivity labels define how data should be handled and secured throughout its lifecycle.
2732

2833
Microsoft Purview Sensitivity Labels allow organizations to:
2934

30-
- Apply **automatic** or **manual** labels based on content and policies.
31-
- Restrict file sharing and enforce **access controls**.
32-
- Add **visual markings** such as headers, footers, and watermarks.
35+
- **Classify and protect data** with persistent labels that travel with content across emails, files, and cloud services.
36+
- **Apply automatic or manual labels** based on content inspection and policy rules.
37+
- **Restrict file sharing and enforce access controls** to ensure only authorized users can access or modify data.
38+
- **Apply encryption** to protect information at rest and in transit.
39+
- **Add visual markings** such as headers, footers, and watermarks to indicate data sensitivity.
40+
41+
By integrating sensitivity labels with Microsoft Purview’s classification capabilities, organizations can automate data protection, ensuring sensitive content is properly secured, even when shared outside the organization.
3342

3443
### Encryption
3544

3645
Encryption secures data by converting it into an unreadable format, ensuring that only authorized users can access it. It protects information at rest, in transit, and in use to prevent unauthorized exposure.
3746

38-
Microsoft Purview encryption policies support:
47+
Microsoft Purview provides encryption capabilities for securing data across applications, files, emails, and on-premises storage:
3948

40-
- **Microsoft 365 apps**, enabling encryption for emails and files..
41-
- **Automatic encryption** for highly sensitive content.
42-
- **Microsoft Purview Information Protection scanner** for discovering and classifying sensitive data across on-premises locations.
49+
- **Sensitivity labels in Microsoft 365 apps**: Encrypt emails and files in Outlook, Word, Excel, and PowerPoint with automatic encryption based on classification and security policies.
50+
- **Microsoft Purview Information Protection scanner**: Discover, classify, and encrypt sensitive data across on-premises locations.
51+
- **Microsoft Purview Message Encryption**: Encrypt email communication for secure messaging inside and outside the organization.
4352

4453
### Data loss prevention (DLP) and retention policies
4554

Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-sensitive-data.knowledge-check
3+
title: Knowledge check
4+
metadata:
5+
title: Knowledge check
6+
description: "Knowledge check"
7+
ms.date: 03/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
quiz:
15+
title: "Check your knowledge"
16+
questions:
17+
- content: "Your organization is expanding its data protection strategy. You need a way to classify and protect sensitive files across Microsoft 365 services. Which feature should you implement?"
18+
choices:
19+
- content: "Microsoft Purview Sensitivity Labels"
20+
isCorrect: true
21+
explanation: "Correct: Sensitivity labels help classify and protect data by applying encryption, access restrictions, and content markings."
22+
- content: "Microsoft Purview Data Loss Prevention (DLP)"
23+
isCorrect: false
24+
explanation: "Incorrect: DLP helps prevent unauthorized data sharing but does not classify and label data."
25+
- content: "Microsoft Defender for Cloud"
26+
isCorrect: false
27+
explanation: "Incorrect: Microsoft Defender for Cloud focuses on cloud security posture management, not data classification."
28+
29+
- content: "Your organization is adopting AI-driven tools to improve efficiency. However, leadership is concerned about the risk of sensitive data being used in AI model training. Which Microsoft Purview feature can help prevent unauthorized data use?"
30+
choices:
31+
- content: "Data Loss Prevention (DLP) policies"
32+
isCorrect: true
33+
explanation: "Correct: DLP policies can prevent sensitive data from being shared with unauthorized AI tools."
34+
- content: "Insider Risk Management"
35+
isCorrect: false
36+
explanation: "Incorrect: Insider Risk Management identifies risky user behavior but doesn't directly prevent AI data use."
37+
- content: "Microsoft Defender XDR"
38+
isCorrect: false
39+
explanation: "Incorrect: Microsoft Defender XDR focuses on threat detection rather than data protection for AI models."
40+
41+
- content: "Your company is expanding remote work options, and employees are accessing sensitive files from unmanaged devices. Which approach aligns with Zero Trust principles to secure access?"
42+
choices:
43+
- content: "Require multifactor authentication (MFA) and conditional access policies."
44+
isCorrect: true
45+
explanation: "Correct: Zero Trust requires continuous verification through MFA and conditional access."
46+
- content: "Allow access from any device but require VPN usage."
47+
isCorrect: false
48+
explanation: "Incorrect: VPN alone does not enforce identity verification and risk-based access."
49+
- content: "Block all remote access to sensitive files."
50+
isCorrect: false
51+
explanation: "Incorrect: Blocking all access is not practical and hinders productivity."
52+
53+
- content: "Your security team wants to analyze how sensitive data is being accessed and shared within your organization. Which tool provides insights into user activity and data movement?"
54+
choices:
55+
- content: "Activity Explorer"
56+
isCorrect: true
57+
explanation: "Correct: Activity Explorer helps track user activity, data access, and movement within Microsoft 365."
58+
- content: "Content Explorer"
59+
isCorrect: false
60+
explanation: "Incorrect: Content Explorer helps view classified data but does not track user activity."
61+
- content: "Microsoft Purview Audit"
62+
isCorrect: false
63+
explanation: "Incorrect: Microsoft Purview Audit provides forensic activity logs but does not focus on real-time data movement."
64+
65+
- content: "Your organization recently experienced a data breach due to an insider threat. Leadership wants a solution to identify risky user behavior before a breach occurs. Which Microsoft Purview feature should be implemented?"
66+
choices:
67+
- content: "Insider Risk Management"
68+
isCorrect: true
69+
explanation: "Correct: Insider Risk Management detects and analyzes risky user behavior before a data breach happens."
70+
- content: "Microsoft Defender XDR"
71+
isCorrect: false
72+
explanation: "Incorrect: Microsoft Defender XDR focuses on external threat detection rather than insider risks."
73+
- content: "Sensitivity Labels"
74+
isCorrect: false
75+
explanation: "Incorrect: Sensitivity Labels help classify and protect data but do not identify risky user behavior."
76+
77+
- content: "A security analyst needs to investigate an incident where an employee accessed a large volume of sensitive files. Which Microsoft Purview tool can provide detailed activity logs for the investigation?"
78+
choices:
79+
- content: "Microsoft Purview Audit"
80+
isCorrect: true
81+
explanation: "Correct: Microsoft Purview Audit provides detailed activity logs for security investigations."
82+
- content: "Content Explorer"
83+
isCorrect: false
84+
explanation: "Incorrect: Content Explorer shows classified data but does not provide user activity logs."
85+
- content: "Insider Risk Management"
86+
isCorrect: false
87+
explanation: "Incorrect: Insider Risk Management helps detect risk but does not provide detailed forensic logs."
88+
89+
90+
- content: "Your company is concerned about unauthorized sharing of classified financial documents. How can Microsoft Purview help prevent data leaks?"
91+
choices:
92+
- content: "Implement DLP policies to block unauthorized sharing."
93+
isCorrect: true
94+
explanation: "Correct: DLP policies can prevent financial documents from being shared outside the organization."
95+
- content: "Use Content Explorer to track classified financial documents."
96+
isCorrect: false
97+
explanation: "Incorrect: Content Explorer provides insights but does not prevent data leaks."
98+
- content: "Configure Microsoft Defender XDR to detect financial threats."
99+
isCorrect: false
100+
explanation: "Incorrect: Defender XDR detects threats but does not enforce sharing restrictions."

0 commit comments

Comments
 (0)