|
| 1 | +Understanding where sensitive data is stored and how it's accessed is essential for data security and compliance. **Data explorer** and **content explorer (classic)** in Microsoft Purview provide visibility into classified data across your organization. |
| 2 | + |
| 3 | +- **Data explorer** provides a consolidated view of classified data, making it easier to analyze multiple classification types at once. |
| 4 | +- **Content explorer** offers similar insights but requires more navigation to see classification details. |
| 5 | + |
| 6 | +These tools help security and compliance teams: |
| 7 | + |
| 8 | +- **Identify sensitive data** across Microsoft 365 and connected environments. |
| 9 | +- **Analyze data classification trends** based on sensitivity labels, retention labels, and sensitive information types (SITs). |
| 10 | +- **Review access patterns** to detect potential security risks. |
| 11 | +- **Validate compliance policies** by verifying encryption, classification, and retention settings. |
| 12 | + |
| 13 | +## Access data explorer and content explorer |
| 14 | + |
| 15 | +To use data explorer or content explorer, you need the correct permissions in Microsoft Purview. |
| 16 | + |
| 17 | +### Permissions |
| 18 | + |
| 19 | +Access to these tools is highly restricted because they allow visibility into sensitive data. Permissions override local file access settings. |
| 20 | + |
| 21 | +| Role | Access level | |
| 22 | +|-----|-----| |
| 23 | +| Data Explorer List Viewer | View file metadata and classification labels but not content. | |
| 24 | +| Data Explorer Content Viewer | View file contents in addition to metadata. | |
| 25 | +| Content Explorer List Viewer | View a list of items with classification details. | |
| 26 | +| Content Explorer Content Viewer | View file contents in addition to metadata. | |
| 27 | + |
| 28 | +> [!NOTE] |
| 29 | +> Users with a **List Viewer** role can see classification details but can't open or preview file contents. The **Content Viewer** role is required to access file contents. |
| 30 | +
|
| 31 | +### Navigate to data explorer and content explorer |
| 32 | + |
| 33 | +You can access data explorer and content explorer from multiple Microsoft Purview solutions, based on the area you're working in: |
| 34 | + |
| 35 | +1. Navigate to the [Microsoft Purview portal](https://purview.microsoft.com/). |
| 36 | + |
| 37 | +1. Select **Solutions**. |
| 38 | + |
| 39 | +1. **Data explorer** and **Content explorer (classic)** can be found in these solutions: |
| 40 | + |
| 41 | + - Communication compliance |
| 42 | + |
| 43 | + - Data lifecycle management |
| 44 | + |
| 45 | + - Data loss prevention (DLP) |
| 46 | + |
| 47 | + - Information protection |
| 48 | + |
| 49 | + - Records management |
| 50 | + |
| 51 | +1. Select the drop-down for **Explorers**, then select **Data explorer** or **Content explorer (classic)**. |
| 52 | + |
| 53 | + :::image type="content" source="../media/data-explorer-content-explorer.png" alt-text="Screenshot showing the top level filter for the Reports page within Information Protection." lightbox="../media/data-explorer-content-explorer.png"::: |
| 54 | + |
| 55 | +## Analyze sensitive data with data explorer |
| 56 | + |
| 57 | +### Data types displayed in data explorer |
| 58 | + |
| 59 | +Data explorer provides a snapshot of classified items based on: |
| 60 | + |
| 61 | +- **Sensitive information types (SITs)**: Identifies data like credit card numbers, Social Security numbers, and medical data. |
| 62 | +- **Sensitivity labels**: Shows how items are labeled based on organizational policies. |
| 63 | +- **Retention labels**: Displays how long labeled data is retained. |
| 64 | +- **Trainable classifiers**: Uses AI to identify sensitive content based on examples. |
| 65 | + |
| 66 | +### Use the data explorer |
| 67 | + |
| 68 | +1. Search or filter data by label, classifier, or SIT. |
| 69 | + |
| 70 | +1. Drill down into specific data sources like Exchange, OneDrive, or SharePoint. |
| 71 | + |
| 72 | +1. Export results to a CSV file for further analysis. |
| 73 | + |
| 74 | + :::image type="content" source="../media/data-explorer.png" alt-text="Screenshot showing the Data explorer." lightbox="../media/data-explorer.png"::: |
| 75 | + |
| 76 | +## Analyze classified data with content explorer (classic) |
| 77 | + |
| 78 | +### How content explorer differs from data explorer |
| 79 | + |
| 80 | +| Feature | Data explorer | Content explorer | |
| 81 | +|-----|-----|-----| |
| 82 | +| Data organization and visibility | Shows sensitive information types, sensitivity labels, trainable classifiers, and retention labels in a single table for quick analysis. | Requires navigating into each location to view classification details, rather than displaying them in a consolidated table. | |
| 83 | +| Integration with Information Protection Reports | Links directly from information protection reports, allowing users to drill into classification details. | Not linked from reports, so users must navigate to content explorer manually. | |
| 84 | +| Copilot data visibility | Includes Copilot as a data source when applicable. | Doesn't list Copilot as a distinct source. | |
| 85 | + |
| 86 | +### Use content explorer |
| 87 | + |
| 88 | +1. Filter data by classification labels, retention labels, or SITs. |
| 89 | + |
| 90 | +1. Browse by location to find labeled content. |
| 91 | + |
| 92 | + :::image type="content" source="../media/content-explorer.png" alt-text="Screenshot showing the Content explorer." lightbox="../media/content-explorer.png"::: |
| 93 | + |
| 94 | +## Export and refine data insights |
| 95 | + |
| 96 | +Both data explorer and content explorer allow users to: |
| 97 | + |
| 98 | +- **Export** data insights as a CSV file. |
| 99 | + |
| 100 | +- **Use filters** to refine searches by location, sensitivity label, or SIT. |
| 101 | + |
| 102 | +- **Analyze trends** to improve data classification policies. |
| 103 | + |
| 104 | +### Example search filters |
| 105 | + |
| 106 | +| Filter type | Example | |
| 107 | +|-----|-----| |
| 108 | +| Site URL | `https://contoso.onmicrosoft.com/sites/finance` | |
| 109 | +| File name | `HR_policy_2024.docx` | |
| 110 | +| File extension | `.pdf`, `.csv`, `.txt` | |
| 111 | +| Sensitive data | Credit card numbers, PII | |
| 112 | + |
| 113 | +**Data explorer** and **content explorer** provide visibility into classified and sensitive data across an organization. Security teams use these tools to track classified data, enforce compliance, and mitigate risks. Data explorer is the new experience that offers deeper insights, while content explorer remains available for organizations using the classic view. |
0 commit comments