Step-by-Step Guide to Configure Microsoft Purview
This “A-to-Z” guide covers the entire Microsoft Purview life-cycle—from license activation to automating reports in Power BI. You’ll find PowerShell commands, GUI paths, sample scripts, regulatory templates (GDPR, PCI-DSS, ENS, HIPAA) and best practices we’ve applied in real projects across banking, healthcare and the public sector.
Quick Navigation
- Prerequisites, Architecture and Licensing
- Creating and Distributing Labels (Information Protection)
- Data Loss Prevention: Exchange, Teams, SharePoint and Devices
- Endpoint DLP: Windows 11, macOS and Servers
- AIP / Purview On-Prem Scanner (File Servers & SharePoint 2013)
- Insider Risk Management: Policies, Signals and Workflows
- eDiscovery Premium: Hold, Review and AI Relevance
- Audit Standard & Premium + Sentinel Ingest
- Data Governance: Data Map, Glossary & Lineage
- Monitoring, Reporting and Automation
- Advanced Use Cases
- 30-60-90-Day Checklist
1. Prerequisites, Architecture and Licensing
1.1 Technical dependencies
- Microsoft 365 tenant with verified domains.
- “Compliance Administrator” and “Global Administrator” roles for setup.
- Intune (or ConfigMgr + co-management) if you plan to use Endpoint DLP.
- Microsoft Defender for Cloud Apps to enforce DLP on third-party SaaS (Shadow IT).
- Hybrid network if you want to scan on-prem data with the AIP Scanner.
1.2 Recommended PowerShell modules
Install-Module ExchangeOnlineManagement # EXO + DLP commands
Install-Module AzureAD # Role management
Install-Module AzureInformationProtection # AIP / Scanner
Install-Module Microsoft.Graph.Compliance # Purview Graph (beta)
Install-Module Az.Purview # Multi-cloud scanner (Data Map)
1.3 Granular licensing
If budget is tight you can mix licenses:
- E3 + E5 Compliance Add-on: unlocks Auto-labeling, Endpoint DLP, IRM and Audit Premium.
- Business Premium + AIP P1 Add-on: good starting point for SMBs needing manual encryption and Exchange DLP only.
- Purview Governance SKU: billed by “capacity units” (scans/hour) for the Data Map.
2. Creating and Distributing Labels (Information Protection)
2.1 Classification methodology
- Inventory data: use “Content Explorer” to detect PII, PCI and secrets.
- Design taxonomy: no more than 5–7 easy-to-grasp levels.
- Map controls: Confidential ≡ encryption + external restriction; Public ≡ no encryption.
2.2 Quick creation via Portal
- Purview ▸ Information Protection ▸ + Create sensitivity label.
- Set the Scope (File & Email / Site / Group / Teams).
- Tick Encryption: “Only people in your organization.”
- Configure Content Marking: header + watermark.
2.3 Full PowerShell example (double-key label)
# Requires AzureInformationProtection module
Import-Module AzureInformationProtection
$rights = New-AipServiceRightsDefinition -Rights "VIEW,EDIT" -Users "user@company.com"
New-AipServiceTemplate -Name "Ultra-Secret" -Description "Strategic data" `
-ProtectionLevel "DoubleKeyEncryption" `
-RightsDefinitions $rights `
-Domain "company.com"
2.4 Implement Auto-labeling with custom rules
Sensitive Pattern | Threshold | Applied Label |
---|---|---|
Credit-card + CVV + customer name | >= 1 match | Confidential-PCI |
IBAN number and word “Transfer” | >= 1 match | Confidential-Finance |
Regex “(secret|token)=” | >= 2 matches | Secret-Key |
3. Data Loss Prevention: Exchange, Teams, SharePoint and Devices
3.1 Out-of-the-box regulatory templates
- PCI DSS v4.0
- GDPR – Article 32 (EU)
- ENS High (Spain)
- HIPAA (US Health)
These templates ship with pre-configured rules you can deploy in just three clicks—then customize.
3.2 DLP policy with exceptions (real example)
# Goal: allow sending encrypted PDF contracts
New-DlpCompliancePolicy -Name "Block External PII" `
-SharePointLocation All -OneDriveLocation All -Mode Enforced
# Main rule
$r = New-DlpComplianceRule -Policy "Block External PII" `
-Name "Block PII*" -BlockAccess $true `
-ContentContainsSensitiveInformation @{Name="EU PII"; minCount=1}
# Exception: files labeled "Contracts-Encrypted"
Set-DlpComplianceRule $r.Identity -ExceptIfContentContainsSensitivityLabelIds `
(Get-Label -Name "Contracts-Encrypted").Guid
3.3 Enable notifications and user coaching
In the same rule, enable User notifications with a template in your corporate language and include a link to the internal policy (SharePoint intranet).
4. Endpoint DLP: Windows 11, macOS and Servers
4.1 Workflow
- Onboard the device to Defender for Endpoint.
- Intune ▸ Endpoint Security ▸ Data Loss Prevention ▸ Create policy.
- Select scenario: “Block copying to clipboard data labeled Confidential.”
- Enable File Activity Exploder to inspect ZIP and ChatGPT-generated files.
4.2 Granular control by process
E.g., block Microsoft Edge uploading to *://*.mega.nz/*
but allow Edge to sharepoint.com
.
4.3 Real-time monitoring
- Security Portal ▸ Activity explorer → filter by Endpoint DLP.
- Create an automated alert “>10 blocks in 5 minutes” → Logic Apps → Teams SecOps.
5. AIP / Purview On-Prem Scanner (File Servers)
- Install the Azure Information Protection Unified Labeling client.
- Register the scanner:
Install-AIPScanner Set-AIPAuthentication -AppId <GUID> -AppSecret <Secret>
- Define repositories:
Set-AIPScannerRepository -Path "\\fileserver\legal"
- Add an incremental scan schedule every 6 h.
- View results in “Content Explorer ▸ On-premises scanner.”
Tip: If you scan very large PDFs, tweak MaxConsecutiveErrors
and thread pool settings to avoid timeouts.
6. Insider Risk Management (IRM)
6.1 Available signals
Category | Examples | Source |
---|---|---|
File activity | Mass copies, printing, USB | Endpoint DLP |
Email & Chat | Toxic language, resignation intent | Defender for Office 365 |
Identity | Impossible travel, MFA removal | Entra ID Protection |
6.2 Recommended policies
- Data theft by departing users: active 45 days before / 30 days after.
- VPN / RDP anomalies: correlate with Sentinel via the “Advanced Hunting” connector.
6.3 Workflows
Integrate with Communication Compliance to review toxic language and send corrective plans to HR. Add Teams approvals.
7. eDiscovery Premium: Hold, Review and AI
7.1 Script to create a legal hold for ten custodians
$custodians = "alice@corp.com","bob@corp.com" …
New-ComplianceCase -Name "Litigation-2024"
$custodians | % { Add-ComplianceCaseCustodian -Case "Litigation-2024" -User $_ }
Enable-CaseHoldPolicy "Litigation-2024" -Query "label:Confidential"
7.2 Review with “Themes” and “Near duplicates”
Cuts review volume by 40 %. Enable “Conversation thread” for Teams.
8. Audit Standard & Premium + Sentinel Ingest
8.1 Continuous export to Sentinel (Azure Monitor Agent)
Set-MailboxAuditBypassAssociation -Identity "AzureSentinelCollector" -AuditEnabled $true
New-DataConnector -Name "PurviewAudit" -Kind Office365
8.2 Sample KQL queries
// Massive downloads >500 MB
OfficeActivity
| where Operation == "FileDownloaded"
| summarize TotalMB = sum(FileSize)/1024/1024 by UserId
| where TotalMB > 500
9. Data Governance: Data Map, Glossary & Lineage
9.1 Scan S3 and SQL Server
az purview account show --name corp-purview
az purview scan rule-set create --account-name corp-purview \
--scan-ruleset-name "S3_GDPR" --data-source-type AmazonS3
az purview scan run --account-name corp-purview --name "S3_GDPR_Scan"
9.2 Create an enterprise glossary
Define terms (CustomerID, MRN, IBAN) and link them to discovered columns; this simplifies search for analysts and avoids duplication.
10. Monitoring, Reporting and Automation
10.1 Power BI Dashboard
- Use the “Microsoft 365 Compliance” connector (OData).
- Import tables
LabelActivity
,DLPIncidents
,IRMAlerts
. - Visualize PII-leak trends vs. previous quarter.
10.2 Logic Apps → executive email
Send a weekly email to the CISO with Audit events “MailboxPermissionChanged.”
10.3 Azure Functions for auto-remediation
If OfficeActivity.DeviceName
contains “Kiosk-” and Endpoint DLP detects a print blocked event, instantly revoke Entra ID access.
11. Advanced Use Cases
11.1 Generative AI and Confidential Data
Block users from uploading classified code to ChatGPT web using Endpoint DLP + the “AI services” URL category.
11.2 Multicloud – DLP in Box and Google Drive
Defender for Cloud Apps applies the same DLP policy as OneDrive via session proxy—no agents needed.
11.3 Secret control in Git repositories
GitHub Advanced Security alerts feed Purview Classification, achieving a unified inventory.
12. 30-60-90-Day Checklist
Phase | Key Objectives |
---|---|
0-30 d | Labels published, DLP Test, Endpoint pilot, Audit Std |
31-60 d | DLP Enforced, IRM “Departing” policy, On-prem Scanner |
61-90 d | Audit Premium, eDiscovery live, Data Map three sources |
Conclusion
Microsoft Purview isn’t “just another security product”—it’s the backbone connecting data classification, protection, detection and governance. By following this guide—from PowerShell scripts to GUI portals, Sentinel integration and Power BI—you can deploy Purview robustly, gain measurable insights and meet regulations without stifling innovation.
Need to speed up your project? Contact Cloud Fighters for mentoring, implementation or managed services.