Tutorial: Integrate Microsoft Sentinel and Microsoft Purview (Public Preview)


The Microsoft Purview solution is in PREVIEW. See the Supplemental Terms of Use for Microsoft Azure Previews for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Microsoft Purview provides organizations with visibility into where sensitive information is stored, helping prioritize at-risk data for protection.

Integrate Microsoft Purview with Microsoft Sentinel to help narrow down the high volume of incidents and threats surfaced in Microsoft Sentinel, and understand the most critical areas to start.

Start by ingesting your Microsoft Purview logs into Microsoft Sentinel through a data connector. Then use a Microsoft Sentinel workbook to view data such as assets scanned, classifications found, and labels applied by Microsoft Purview. Use analytics rules to create alerts for changes within data sensitivity.

Customize the Microsoft Purview workbook and analytics rules to best suit the needs of your organization, and combine Microsoft Purview logs with data ingested from other sources to create enriched insights within Microsoft Sentinel.

In this tutorial, you:

  • Install the Microsoft Sentinel solution for Microsoft Purview
  • Enable your Microsoft Purview data connector
  • Learn about the workbook and analytics rules deployed to your Microsoft Sentinel workspace with the Microsoft Purview solution


Before you start, make sure you have both a Microsoft Sentinel workspace and Microsoft Purview onboarded, and that your user has the following roles:

  • An Microsoft Purview account Owner or Contributor role, to set up diagnostic settings and configure the data connector.

  • A Microsoft Sentinel Contributor role, with write permissions to enable data connector, view the workbook, and create analytic rules.

Install the Microsoft Purview solution

The Microsoft Purview solution is a set of bundled content, including a data connector, workbook, and analytics rules configured specifically for Microsoft Purview data.


Microsoft Sentinel solutions can help you onboard Microsoft Sentinel security content for a specific data connector using a single process.

To install the solution

  1. In Microsoft Sentinel, under Content management, select Content hub and then locate the Microsoft Purview solution.

  2. At the bottom right, select View details, and then Create. Select the subscription, resource group, and workspace where you want to install the solution, and then review the data connector and related security content that will be deployed.

    When you're done, select Review + Create to install the solution.

For more information, see About Microsoft Sentinel content and solutions and Centrally discover and deploy out-of-the-box content and solutions.

Start ingesting Microsoft Purview data in Microsoft Sentinel

Configure diagnostic settings to have Microsoft Purview data sensitivity logs flow into Microsoft Sentinel, and then run a Microsoft Purview scan to start ingesting your data.

Diagnostics settings send log events only after a full scan is run, or when a change is detected during an incremental scan. It typically takes about 10-15 minutes for the logs to start appearing in Microsoft Sentinel.


Instructions for enabling your data connector also available in Microsoft Sentinel, on the Microsoft Purview data connector page.

To enable data sensitivity logs to flow into Microsoft Sentinel:

  1. Navigate to your Microsoft Purview account in the Azure portal and select Diagnostic settings.

    Screenshot of a Microsoft Purview account Diagnostics settings page.

  2. Select + Add diagnostic setting and configure the new setting to send logs from Microsoft Purview to Microsoft Sentinel:

    • Enter a meaningful name for your setting.
    • Under Logs, select DataSensitivityLogEvent.
    • Under Destination details, select Send to Log Analytics workspace, and select the subscription and workspace details used for Microsoft Sentinel.
  3. Select Save.

For more information, see Connect Microsoft Sentinel to Azure, Windows, Microsoft, and Amazon services.

To run a Microsoft Purview scan and view data in Microsoft Sentinel:

  1. In Microsoft Purview, run a full scan of your resources. For more information, see Manage data sources in Microsoft Purview.

  2. After your Microsoft Purview scans have completed, go back to the Microsoft Purview data connector in Microsoft Sentinel and confirm that data has been received.

View recent data discovered by Microsoft Purview

The Microsoft Purview solution provides two analytics rule templates out-of-the-box that you can enable, including a generic rule and a customized rule.

  • The generic version, Sensitive Data Discovered in the Last 24 Hours, monitors for the detection of any classifications found across your data estate during a Microsoft Purview scan.
  • The customized version, Sensitive Data Discovered in the Last 24 Hours - Customized, monitors and generates alerts each time the specified classification, such as Social Security Number, has been detected.

Use this procedure to customize the Microsoft Purview analytics rules' queries to detect assets with specific classification, sensitivity label, source region, and more. Combine the data generated with other data in Microsoft Sentinel to enrich your detections and alerts.


Microsoft Sentinel analytics rules are KQL queries that trigger alerts when suspicious activity has been detected. Customize and group your rules together to create incidents for your SOC team to investigate.

Modify the Microsoft Purview analytics rule templates

  1. In Microsoft Sentinel, under Configuration select Analytics > Active rules, and search for a rule named Sensitive Data Discovered in the Last 24 Hours - Customized.

    By default, analytics rules created by Microsoft Sentinel solutions are set to disabled. Make sure to enable the rule for your workspace before continuing:

    1. Select the rule, and then at the bottom right, select Edit.

    2. In the analytics rule wizard, at the bottom of the General tab, toggle the Status to Enabled.

  2. On the Set rule logic tab, adjust the Rule query to query for the data fields and classifications you want to generate alerts for. For more information on what can be included in your query, see:

    Formatted queries have the following syntax: | where {data-field} contains {specified-string}.

    For example:

    | where Classification contains “Social Security Number”
    | where SourceRegion contains “westeurope”
    | where SourceType contains “Amazon”
    | where TimeGenerated > ago (24h)
  3. Under Query scheduling, define settings so that the rules show data discovered in the last 24 hours. We also recommend that you set Event grouping to group all events into a single alert.

    Screenshot of the analytics rule wizard defined to show data detected in the last 24 hours.

  4. If needed, customize the Incident settings and Automated response tabs. For example, in the Incidents settings tab, verify that Create incidents from alerts triggered by this analytics rule is selected.

  5. On the Review and update tab, select Save.

For more information, see Create custom analytics rules to detect threats.

View Microsoft Purview data in Microsoft Sentinel workbooks

In Microsoft Sentinel, under Threat management, select Workbooks > My workbooks, and locate the Microsoft Purview workbook deployed with the Microsoft Purview solution. Open the workbook and customize any parameters as needed.

Screenshot of the Microsoft Purview workbook.

The Microsoft Purview workbook displays the following tabs:

  • Overview: Displays the regions and resource types where the data is located.
  • Classifications: Displays assets that contain specified classifications, like Credit Card Numbers.
  • Sensitivity labels: Displays the assets that have confidential labels, and the assets that currently have no labels.

To drill down in the Microsoft Purview workbook:

  • Select a specific data source to jump to that resource in Azure.
  • Select an asset path link to show more details, with all the data fields shared in the ingested logs.
  • Select a row in the Data Source, Classification, or Sensitivity Label tables to filter the Asset Level data as configured.

Investigate incidents triggered by Microsoft Purview events

When investigating incidents triggered by the Microsoft Purview analytics rules, find detailed information on the assets and classifications found in the incident's Events.

For example:

Screenshot of an incident triggered by Purview events.

Next steps

For more information, see: