Skip to content

Commit 1a77b1a

Browse files
Merge pull request #49940 from MicrosoftDocs/NEW-purview-ai-discover-data
New purview ai discover data
2 parents 6c116cf + c74dc02 commit 1a77b1a

20 files changed

+584
-0
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-ai-discover-data.audit-copilot
3+
title: Audit Microsoft 365 Copilot interactions with Microsoft Purview
4+
metadata:
5+
title: Audit Microsoft 365 Copilot interactions with Microsoft Purview
6+
description: "Audit Microsoft 365 Copilot interactions with Microsoft Purview"
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/audit-copilot.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-ai-discover-data.configure-dspm-ai
3+
title: Configure DSPM for AI
4+
metadata:
5+
title: Configure DSPM for AI
6+
description: "Configure DSPM for AI."
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 8
14+
content: |
15+
[!include[](includes/configure-dspm-ai.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-ai-discover-data.dspm-ai-overview
3+
title: Microsoft Purview Data Security Posture Management (DSPM) for AI overview
4+
metadata:
5+
title: Microsoft Purview Data Security Posture Management (DSPM) for AI overview
6+
description: "Microsoft Purview Data Security Posture Management (DSPM) for AI overview."
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/dspm-ai-overview.md)]
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
Microsoft 365 Copilot integrates with apps like Word, Excel, Outlook, and Teams to help users generate content, summarize information, and automate everyday tasks. These capabilities rely on large language models, including GPT-4, and use data from emails, chats, documents, and calendars to provide context-based assistance.
2+
3+
Because of how Copilot works, with access to sensitive content across Microsoft 365, it's important to have visibility into how it's being used. Microsoft Purview Audit helps organizations track Copilot usage to support security, compliance, and organizational policy enforcement.
4+
5+
## How Microsoft Purview Audit helps review Copilot usage
6+
7+
As users interact with Microsoft 365 Copilot across apps like Word, Excel, and Teams, it's important to verify that those interactions meet organizational and regulatory expectations. Microsoft Purview Audit supports this by recording user and admin activity across Microsoft 365, including Copilot usage.
8+
9+
These actions are stored in a unified audit log, which you can search in the Microsoft Purview portal or by using PowerShell. Audit logs help answer key questions such as:
10+
11+
- Who used Copilot and when?
12+
- In which application was it used?
13+
- Did the interaction involve labeled or sensitive content?
14+
15+
These insights give security and compliance teams the visibility they need to ensure Copilot usage aligns with policy.
16+
17+
## Search the audit log for Copilot interactions
18+
19+
Microsoft Purview Audit supports compliance management by capturing Copilot interactions across applications like Word, Excel, PowerPoint, Teams, Loop, Whiteboard, OneNote, and Microsoft 365 Chat. The audit records identify Copilot interactions by the app in which they occur, providing detailed insights into Copilot usage across different contexts.
20+
21+
### Prerequisites for using Microsoft Purview Audit to search Microsoft 365 Copilot interactions
22+
23+
Before you search and analyze Copilot interactions using Microsoft Purview Audit, there are a few steps to ensure your environment is ready. Follow these prerequisites to set up your Microsoft 365 and Purview Audit configurations:
24+
25+
| **Step** | **Description** | **Learn more** |
26+
|------|-------------|------------|
27+
| Verify prerequisites for Copilot | Ensure your IT infrastructure is ready for Copilot and Audit, including necessary network configurations and software updates. | - [Microsoft 365 Copilot requirements](/microsoft-365-copilot/microsoft-365-copilot-requirements?azure-portal=true) |
28+
| Understand searching with Audit | Understand the search functionalities in Microsoft Purview Audit to effectively analyze activities within Microsoft 365. | - [Audit New Search](/purview/audit-new-search?azure-portal=true) |
29+
| Check licensing requirements | Confirm that you have the appropriate Microsoft 365 E3/E5 licenses for Copilot and Microsoft Purview Audit. | - [Microsoft 365 Copilot service description](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-copilot?azure-portal=true#available-plan) <br> - [Microsoft Purview Audit service description](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-purview-audit?azure-portal=true) |
30+
31+
Note: Microsoft Purview Audit logging is turned on by default, but when setting up a new Microsoft 365 organization, you should verify the auditing status for your organization. If auditing isn't turned on for your organization, you can turn it on in the Microsoft Purview portal or by using Exchange Online PowerShell. For more information on verifying that auditing is enabled and enabling the audit sign in Microsoft Purview, see [Turn auditing on or off](/purview/audit-log-enable-disable?azure-portal=true).
32+
33+
### Search the audit log for Copilot interactions in Microsoft Purview
34+
35+
Microsoft Purview Audit captures user activity across Microsoft 365, including when users interact with Microsoft 365 Copilot. These interactions are recorded based on the application where they occurred, such as Word, Excel, or Teams, and can include details about referenced files, including whether sensitivity labels were applied.
36+
37+
You can search for these events in the Microsoft Purview portal using filters that help narrow your results to Copilot-specific activity.
38+
39+
1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com?azure-portal=true).
40+
1. In the left navigation pane, select **Solutions** > **Audit**.
41+
1. Select **New Search** tab at the top of the **Audit** page.
42+
1. Configure your search on the **New Search** tab:
43+
1. Set the **Start date** and **End date** for your search, with the last seven days selected by default.
44+
1. Enter relevant keywords or phrases in the **Keyword Search**, using asterisks (*) to replace special characters.
45+
1. Select administrative units from the **Admin Units** dropdown if needed.
46+
1. Under **Activities - friendly names** select specific activities relevant to Copilot by navigating to **Copilot activities** and selecting **Interacted with Copilot**. You can also use the search bar to find activities related to Copilot by entering _Copilot_.
47+
:::image type="content" source="../media/audit-copilot-new-search-activities.png" alt-text="Screenshot showing Interacted with Copilot selected under Activities - friendly names." lightbox="../media/audit-copilot-new-search-activities.png":::
48+
1. For precise searches, use **Activities - operations names** and enter _CopilotInteraction_ as the operation name for Copilot activities.
49+
1. In the **Record types** dropdown, select record types linked to Copilot activities. Enter _Copilot_ in the search box above the list for easier selection.
50+
:::image type="content" source="../media/audit-copilot-new-search-record-type.png" alt-text="Screenshot showing CopilotInteraction selected under Record types." lightbox="../media/audit-copilot-new-search-record-type.png":::
51+
1. Name your search in the **Search name** field for easy identification.
52+
1. Enter specific users in the **Users** field or leave it blank to return entries for all users (and service accounts) in your organization.
53+
1. Enter **File, folder, or site** names for targeted searches, or leave this box blank to return entries for all files and folders in your organization.
54+
1. Select **Search** to start your search job. A maximum of 10 search jobs can be run in parallel for one user account. If a user requires more than 10 search jobs, they must wait for an _In progress_ job to finish or delete a search job.
55+
56+
## Limitations and considerations for auditing Copilot interactions
57+
58+
Microsoft Purview Audit provides useful insight into how users interact with Microsoft 365 Copilot, but there are a few limitations to be aware of. Understanding these limitations helps set accurate expectations for what can and can't be captured in the audit logs.
59+
60+
### What's captured in the audit log
61+
62+
- Copilot activity is recorded based on the app in which it occurred (such as Word, Teams, or Excel).
63+
- Events typically include user IDs, time stamps, and references to accessed files.
64+
- If a referenced file has a sensitivity label, that label is included in the log entry.
65+
66+
### What's not captured in audit logs
67+
68+
- **Prompts and responses**: Audit logs record that Copilot was used, but not the actual content of the prompt or the AI-generated response. For more detailed content-level review, use Microsoft Purview eDiscovery.
69+
- **Copilot configuration changes**: Administrative updates to Copilot settings (such as enabling or disabling features) aren't currently logged in Audit.
70+
- **Device details**: Device identifiers aren't included in Copilot-related audit entries.
71+
72+
### Application-specific considerations
73+
74+
- **Copilot in Teams**: If meeting transcripts are turned off, Copilot activities in Teams aren't captured in the audit log.
75+
- **App identifiers**: The source app for each interaction is listed in the log, such as Copilot in Word or Copilot in Teams.
76+
77+
Knowing these limitations can help you plan which tools to use for broader investigations or compliance reviews. Audit is a useful first step for visibility into Copilot activity, but might need to be paired with other solutions for full context.
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
Microsoft Purview Data Security Posture Management (DSPM) for AI helps organizations understand how AI tools interact with data, identify potential risks, and connect insights to security and compliance tools that help enforce policy. To use DSPM for AI effectively, organizations need to configure key settings, enable monitoring, and apply security controls.
2+
3+
## Prerequisites
4+
5+
Before configuring DSPM for AI, check that your environment meets these requirements:
6+
7+
- **[Check permissions](/purview/ai-microsoft-purview-permissions?azure-portal=true)**: Your account needs appropriate permissions in Microsoft Entra or Microsoft Purview, such as Compliance Administrator or a related role with compliance management permissions.
8+
- **[Verify Microsoft Purview Audit is enabled](/purview/audit-log-enable-disable?azure-portal=true#verify-the-auditing-status-for-your-organization)**: Auditing is on by default for new tenants, but it's a good idea to verify.
9+
- **[Assign Copilot Licenses](/copilot/microsoft-365/microsoft-365-copilot-enable-users?azure-portal=true#assign-licenses)**: Users should be assigned Microsoft 365 Copilot licenses for activity tracking.
10+
- **[Onboard Devices to Microsoft Purview](/purview/device-onboarding-overview?azure-portal=true)**: Devices need to be onboarded to Microsoft Purview to track AI interactions.
11+
- **[Install the Microsoft Purview Browser Extension](/purview/insider-risk-management-browser-support#configure-browser-signal-detection-for-microsoft-edge?azure-portal=true)**: The Microsoft Purview browser extension is required to monitor non-Microsoft AI site visits.
12+
13+
## Steps to configure DSPM for AI
14+
15+
After completing the prerequisites, configure DSPM for AI in Microsoft Purview. This process includes enabling built-in policies, running data assessments, and verifying that AI-related security controls are in place.
16+
17+
### Step 1: Set up DSPM for AI
18+
19+
1. Sign in to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
20+
1. Navigate to **Solutions** > **DSPM for AI**.
21+
1. From the **Overview** page, go to **Get started** to complete the required setup tasks.
22+
1. Verify that **Microsoft Purview Audit** is enabled to track AI interactions.
23+
1. Install the **Microsoft Purview browser extension** to detect AI-related activity.
24+
1. **Onboard devices to Microsoft Purview** to monitor AI interactions.
25+
1. Enable **Extend your insights for data discovery** to create policies that detect risky AI usage, track AI site visits, and identify when users paste sensitive data into AI apps.
26+
27+
:::image type="content" source="../media/dspm-ai-get-started.png" alt-text="Screenshot of the DSPM for AI interface in Microsoft Purview, showing the Get started checklist with required setup steps." lightbox="../media/dspm-ai-get-started.png":::
28+
29+
### Step 2: Review and configure recommendations and policies
30+
31+
Microsoft Purview provides AI security recommendations that help organizations protect sensitive data and monitor AI interactions. These recommendations include preconfigured policy templates (one-click policies) that work with Microsoft Purview features like data loss prevention (DLP), Insider Risk Management, or Communication Compliance, as well as guidance for manual policy implementation.
32+
33+
#### How to use recommendations
34+
35+
1. Go to **Recommendations** in the Microsoft Purview portal.
36+
1. Review the available AI security recommendations and their status.
37+
1. Select a recommendation to:
38+
39+
- **Create a policy**: Instantly apply a one-click policy with built-in security settings.
40+
- **View the recommendation**: Assess and manually take action based on guidance.
41+
42+
:::image type="content" source="../media/dspm-ai-recommendations.png" alt-text="Screenshot of the Recommendations page in Microsoft Purview, showing a list of AI security recommendations categorized as Not Started, Dismissed, or Completed." lightbox="../media/dspm-ai-recommendations.png":::
43+
44+
> [!NOTE]
45+
> Recommendations that provide one-click policies include a **Create policy** button, while manual recommendations require reviewing and taking action based on the provided guidance.
46+
47+
#### Types of AI security recommendations
48+
49+
Recommendations are grouped into categories such as **Data Security**, **Data Discovery**, or **AI Regulations**. When selecting a recommendation, DSPM for AI provides either:
50+
51+
- A preconfigured policy that can be activated immediately (one-click policy)
52+
- Guidance on security measures that require manual implementation
53+
54+
**Recommendations in DSPM for AI**:
55+
56+
DSPM for AI offers a range of AI security recommendations, each designed to detect specific risks or enforce specific protections. Some apply a one-click policy. Others offer guidance for manual configuration.
57+
58+
Use this table to get a quick understanding of what each recommendation does so you can decide which to apply in your environment.
59+
60+
| Recommendation | Type | Description |
61+
|-----|-----|-----|
62+
| Fortify your data security | Data security | Uses Adaptive Protection to apply a block-with-override rule for high-risk users interacting with AI sites. |
63+
| Control unethical behavior in AI | Insight into communications | Creates a policy to detect unethical behavior in Microsoft 365 Copilot. Alerts are generated in Communication Compliance. |
64+
| Guided assistance to AI regulations | AI regulations | Provides guidance on regulatory compliance for AI interactions. |
65+
| Protect sensitive data referenced in Copilot responses | Data security | Runs a data assessment to identify oversharing risks in Copilot interactions. |
66+
| Discover and govern interactions with ChatGPT Enterprise AI (Preview) | Data discovery |Requires setting up a connector in Purview to track ChatGPT Enterprise interactions. |
67+
| Protect sensitive data referenced in Microsoft 365 Copilot (Preview) | Data security | Creates a data loss prevention policy to prevent Copilot from processing labeled content. |
68+
| Protect your data from potential oversharing risks | Data security | Provides insights into oversharing risks based on a weekly scan. |
69+
| Use Copilot to improve your data security posture (Preview) | Data security | Uses Security Copilot to investigate alerts and analyze security risks. |
70+
| Information Protection Policy for Sensitivity Labels | Data security | Sets up default sensitivity labels to preserve document access rights and protect Copilot output. |
71+
72+
#### Understand recommendation status
73+
74+
Each recommendation falls into one of three categories:
75+
76+
- **Not Started**: Recommendations that haven't been acted on.
77+
- **Dismissed**: Recommendations that were reviewed but not applied.
78+
- **Completed**: Recommendations that have been fully implemented.
79+
80+
#### Policy activation timeline
81+
82+
Policies take up to 24 hours to take effect. Once activated in the appropriate Microsoft Purview solution, policies begin tracking or enforcing rules based on AI activity and risk signals, with results appearing in DSPM reports and Activity Explorer after data processing. Deleted policies remain visible with a **PendingDeletion** status until fully removed.
83+
84+
After configuring DSPM for AI, use Microsoft Purview reports and data assessments to evaluate AI interactions and identify potential risks. Reports provide insights into policy enforcement, AI data exposure, and compliance status, while data assessments help detect oversharing risks before they affect security.

0 commit comments

Comments
 (0)