Skip to content

Commit 363b067

Browse files
authored
Merge pull request #49505 from MicrosoftDocs/NEW-purview-review-analyze-data-classification
New purview review analyze data classification
2 parents bf4d4cb + 4494ffc commit 363b067

19 files changed

+539
-0
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-review-analyze-data-classification.analyze-classified-data
3+
title: Analyze classified data with data and content explorer
4+
metadata:
5+
title: Analyze classified data with data and content explorer
6+
description: "Analyze classified data with data and content explorer"
7+
ms.date: 03/13/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 7
14+
content: |
15+
[!include[](includes/analyze-classified-data.md)]
Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
Understanding where sensitive data is stored and how it's accessed is essential for data security and compliance. **Data explorer** and **content explorer (classic)** in Microsoft Purview provide visibility into classified data across your organization.
2+
3+
- **Data explorer** provides a consolidated view of classified data, making it easier to analyze multiple classification types at once.
4+
- **Content explorer** offers similar insights but requires more navigation to see classification details.
5+
6+
These tools help security and compliance teams:
7+
8+
- **Identify sensitive data** across Microsoft 365 and connected environments.
9+
- **Analyze data classification trends** based on sensitivity labels, retention labels, and sensitive information types (SITs).
10+
- **Review access patterns** to detect potential security risks.
11+
- **Validate compliance policies** by verifying encryption, classification, and retention settings.
12+
13+
## Access data explorer and content explorer
14+
15+
To use data explorer or content explorer, you need the correct permissions in Microsoft Purview.
16+
17+
### Permissions
18+
19+
Access to these tools is highly restricted because they allow visibility into sensitive data. Permissions override local file access settings.
20+
21+
| Role | Access level |
22+
|-----|-----|
23+
| Data Explorer List Viewer | View file metadata and classification labels but not content. |
24+
| Data Explorer Content Viewer | View file contents in addition to metadata. |
25+
| Content Explorer List Viewer | View a list of items with classification details. |
26+
| Content Explorer Content Viewer | View file contents in addition to metadata. |
27+
28+
> [!NOTE]
29+
> Users with a **List Viewer** role can see classification details but can't open or preview file contents. The **Content Viewer** role is required to access file contents.
30+
31+
### Navigate to data explorer and content explorer
32+
33+
You can access data explorer and content explorer from multiple Microsoft Purview solutions, based on the area you're working in:
34+
35+
1. Navigate to the [Microsoft Purview portal](https://purview.microsoft.com/).
36+
37+
1. Select **Solutions**.
38+
39+
1. **Data explorer** and **Content explorer (classic)** can be found in these solutions:
40+
41+
- Communication compliance
42+
43+
- Data lifecycle management
44+
45+
- Data loss prevention (DLP)
46+
47+
- Information protection
48+
49+
- Records management
50+
51+
1. Select the drop-down for **Explorers**, then select **Data explorer** or **Content explorer (classic)**.
52+
53+
:::image type="content" source="../media/data-explorer-content-explorer.png" alt-text="Screenshot showing the top level filter for the Reports page within Information Protection." lightbox="../media/data-explorer-content-explorer.png":::
54+
55+
## Analyze sensitive data with data explorer
56+
57+
### Data types displayed in data explorer
58+
59+
Data explorer provides a snapshot of classified items based on:
60+
61+
- **Sensitive information types (SITs)**: Identifies data like credit card numbers, Social Security numbers, and medical data.
62+
- **Sensitivity labels**: Shows how items are labeled based on organizational policies.
63+
- **Retention labels**: Displays how long labeled data is retained.
64+
- **Trainable classifiers**: Uses AI to identify sensitive content based on examples.
65+
66+
### Use the data explorer
67+
68+
1. Search or filter data by label, classifier, or SIT.
69+
70+
1. Drill down into specific data sources like Exchange, OneDrive, or SharePoint.
71+
72+
1. Export results to a CSV file for further analysis.
73+
74+
:::image type="content" source="../media/data-explorer.png" alt-text="Screenshot showing the Data explorer." lightbox="../media/data-explorer.png":::
75+
76+
## Analyze classified data with content explorer (classic)
77+
78+
### How content explorer differs from data explorer
79+
80+
| Feature | Data explorer | Content explorer |
81+
|-----|-----|-----|
82+
| Data organization and visibility | Shows sensitive information types, sensitivity labels, trainable classifiers, and retention labels in a single table for quick analysis. | Requires navigating into each location to view classification details, rather than displaying them in a consolidated table. |
83+
| Integration with Information Protection Reports | Links directly from information protection reports, allowing users to drill into classification details. | Not linked from reports, so users must navigate to content explorer manually. |
84+
| Copilot data visibility | Includes Copilot as a data source when applicable. | Doesn't list Copilot as a distinct source. |
85+
86+
### Use content explorer
87+
88+
1. Filter data by classification labels, retention labels, or SITs.
89+
90+
1. Browse by location to find labeled content.
91+
92+
:::image type="content" source="../media/content-explorer.png" alt-text="Screenshot showing the Content explorer." lightbox="../media/content-explorer.png":::
93+
94+
## Export and refine data insights
95+
96+
Both data explorer and content explorer allow users to:
97+
98+
- **Export** data insights as a CSV file.
99+
100+
- **Use filters** to refine searches by location, sensitivity label, or SIT.
101+
102+
- **Analyze trends** to improve data classification policies.
103+
104+
### Example search filters
105+
106+
| Filter type | Example |
107+
|-----|-----|
108+
| Site URL | `https://contoso.onmicrosoft.com/sites/finance` |
109+
| File name | `HR_policy_2024.docx` |
110+
| File extension | `.pdf`, `.csv`, `.txt` |
111+
| Sensitive data | Credit card numbers, PII |
112+
113+
**Data explorer** and **content explorer** provide visibility into classified and sensitive data across an organization. Security teams use these tools to track classified data, enforce compliance, and mitigate risks. Data explorer is the new experience that offers deeper insights, while content explorer remains available for organizations using the classic view.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
The **Information Protection Reports** in Microsoft Purview provide a centralized view of data classification, protection policies, encryption, and security activities across Microsoft 365, Azure, AWS, on-premises storage, and Microsoft Fabric.
2+
3+
Security and compliance teams use these reports to:
4+
5+
- **Monitor sensitivity label adoption**: Identify how labels are applied across cloud and on-premises data.
6+
- **Assess protection coverage**: Detect unprotected data across multicloud environments.
7+
- **Analyze user interactions with labeled content**: Track data access, movement, and policy violations.
8+
- **Review encryption trends**: Verify email and file encryption across multiple platforms.
9+
- **Gain insights into Microsoft Purview Data Governance sources**: Track sensitive data within governed data estates.
10+
- **Monitor findings from the Microsoft Purview Information Protection (MIP) scanner**: Identify sensitive data in on-premises file shares and SharePoint.
11+
12+
## Access the Reports page
13+
14+
To access Information Protection Reports in Microsoft Purview:
15+
16+
1. Navigate to the [Microsoft Purview portal](https://purview.microsoft.com/).
17+
18+
1. Select **Solutions** > **Information Protection** from the left navigation pane.
19+
20+
1. On the **Information Protection** page, select **Reports**.
21+
22+
On the **Reports** page, use the filter at the top to view classification and protection insights by data source:
23+
24+
:::image type="content" source="../media/information-protection-reports-top-filter.png" alt-text="Screenshot showing the top level filter for the Reports page within Information Protection." lightbox="../media/information-protection-reports-top-filter.png":::
25+
26+
This allows you to view specific classification and protection insights based on where data is stored.
27+
28+
## Explore deeper insights
29+
30+
Reports provide an overview of classification, labeling, and protection. Many reports include links to explore specific data in depth. The reports also allow you to hover over data points to reveal additional details, such as exact label counts, encryption metrics, or detected sensitive information types. This provides quick insights without needing to open a separate report.
31+
32+
For deeper analysis, these reports link to:
33+
34+
- **Data explorer**: Provides detailed visibility into labeled and sensitive content.
35+
- **Activity explorer**: Shows how users interact with labeled data.
36+
- **Protection policies (preview)**: Helps assess and adjust protection settings.
37+
- **Scan reports**: Displays details of scanned content across cloud and on-premises storage.
38+
- **Encryption reports**: Tracks email encryption and protection trends.
39+
40+
:::image type="content" source="../media/report-link-to-data-explorer.png" alt-text="Screenshot showing the Explore applied labels button linking to Data explorer in Information Protection reports." lightbox="../media/report-link-to-data-explorer.png":::
41+
42+
These linked insights allow administrators to investigate specific areas of risk, ensuring data security policies are properly implemented.
43+
44+
### Information Protection Reports
45+
46+
Each report provides insights into classification, protection, and security activities. Administrators can drill into specific data sources to investigate trends and risks more effectively.
47+
48+
| Report | Details | Purpose | Links to |
49+
|-----|-----|-----|-----|
50+
| **Protection coverage** | Percentage of encrypted and access-controlled data across cloud and on-premises sources. | Identifies gaps in encryption and access control policies. | Protection policies (preview) |
51+
| **Sensitivity label coverage** | Percentage of labeled vs. unlabeled items across Microsoft 365, Azure, AWS, and on-premises. | Ensures sensitive data is labeled for proper protection and governance. | Data Explorer |
52+
| **Data scanning summary** | Percentage of scanned data sources across cloud and on-premises. | Detects unscanned areas that might pose compliance risks. | Scan reports |
53+
| **Sensitivity label usage** | Top sensitivity labels applied to files across all connected environments. | Helps track label adoption trends and identify policy gaps. | Data Explorer |
54+
| **Email encryption summary** | Number of emails encrypted manually or by policy. | Ensures confidential emails are properly protected. | Encryption reports |
55+
| **Top activities detected** | Logs of file access, labeling changes, DLP matches, and encryption actions. | Detects unauthorized modifications or suspicious access patterns. | Activity Explorer |
56+
| **Sensitive information types (SITs)** | Most commonly detected sensitive data types (for example, credit card numbers, SSNs, medical data). | Helps identify high-risk data needing protection. | Data Explorer |
57+
| **Data sources with sensitive info** | Top locations where labeled or sensitive data is stored (for example, SharePoint, OneDrive, Exchange, Azure). | Identifies data concentration areas to enhance security controls. | Data Explorer |
58+
| **Trainable classifiers** | Most-used AI classifiers for autolabeling (for example, threat intelligence, HR records). | Supports automated classification for large-scale data protection. | Data Explorer |
59+
60+
The **Information Protection Reports** in Microsoft Purview offer a centralized way to track data classification and protection across Microsoft 365, Azure, AWS, on-premises, and Microsoft Fabric. By filtering reports and using linked insights, security and compliance teams can monitor how data is labeled, protected, and accessed to enforce security policies effectively.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
Organizations store and share sensitive data across cloud services, collaboration platforms, and on-premises environments. As data moves across multiple systems, security teams face challenges in ensuring proper classification, protection, and policy enforcement. To address these challenges, organizations need visibility into where sensitive data resides, how it's labeled, and how it's accessed. Without it, they struggle to enforce security policies, increasing the risk of data leaks, compliance violations, and unauthorized access.
2+
3+
Microsoft Purview provides tools that help security and compliance teams track classified data, enforce protection policies, and detect potential risks. Information Protection Reports, Data explorer, Content explorer, and Activity explorer provide real-time insights into data security, enabling organizations to monitor labeling adoption, investigate policy effectiveness, and analyze user activity trends.
4+
5+
By using these tools, organizations can:
6+
7+
- Track data classification and protection across Microsoft 365, Azure, Amazon Web Services (AWS), and on-premises storage.
8+
- Analyze label usage and policy compliance to ensure sensitive information is properly secured.
9+
- Investigate user interactions with classified content to detect unauthorized access or policy violations.
10+
- Apply AI-driven insights through Microsoft Security Copilot to identify risks and refine security strategies.
11+
12+
## Learning objectives
13+
14+
By the end of this module, you'll be able to:
15+
16+
- Interpret Information Protection Reports to assess classification and protection trends.
17+
- Investigate labeled content using Data explorer and Content explorer to identify classification patterns.
18+
- Analyze user activity in Activity explorer to detect policy violations and potential security risks.
19+
20+
Use this knowledge to improve data security, maintain compliance, and respond to risks with confidence.

0 commit comments

Comments
 (0)