Skip to content

Commit df78586

Browse files
committed
update typos
1 parent 36bfce7 commit df78586

File tree

1 file changed

+3
-3
lines changed
  • learn-pr/wwl-sci/purview-review-analyze-data-classification/includes

1 file changed

+3
-3
lines changed

learn-pr/wwl-sci/purview-review-analyze-data-classification/includes/introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Organizations store and share sensitive data across cloud services, collaboration platforms, and on-premises environments. As data moves across multiple systems, security teams face challenges in ensuring proper classification, protection, and policy enforcement. To address these challenges, organizations need visibility into where sensitive data resides, how it's labeled, and how it's accessed. Without it, they struggle to enforce security policies, increasing the risk of data leaks, compliance violations, and unauthorized access.
22

3-
Microsoft Purview provides tools that help security and compliance teams track classified data, enforce protection policies, and detect potential risks. Information Protection Reports, Data Explorer, Content Explorer, and Activity Explorer provide real-time insights into data security, enabling organizations to monitor labeling adoption, investigate policy effectiveness, and analyze user activity trends.
3+
Microsoft Purview provides tools that help security and compliance teams track classified data, enforce protection policies, and detect potential risks. Information Protection Reports, Data explorer, Content explorer, and Activity explorer provide real-time insights into data security, enabling organizations to monitor labeling adoption, investigate policy effectiveness, and analyze user activity trends.
44

55
By using these tools, organizations can:
66

@@ -14,7 +14,7 @@ By using these tools, organizations can:
1414
By the end of this module, you'll be able to:
1515

1616
- Interpret Information Protection Reports to assess classification and protection trends.
17-
- Investigate labeled content using Data Explorer and Content Explorer to identify classification patterns.
18-
- Analyze user activity in Activity Explorer to detect policy violations and potential security risks.
17+
- Investigate labeled content using Data explorer and Content explorer to identify classification patterns.
18+
- Analyze user activity in Activity explorer to detect policy violations and potential security risks.
1919

2020
Use this knowledge to improve data security, maintain compliance, and respond to risks with confidence.

0 commit comments

Comments
 (0)