Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Microsoft Purview provides integrated solutions and features that complement each other. For new Purview administrators, it can be overwhelming to know where to start. But even existing administrators may be unfamiliar with how some Purview features can enhance their data security.
To address the need for shorter, actionable, and prescriptive guidance, the Product Engineering team is releasing a new series: Purview Deployment Models. Deployment models are scenario-based and use the following materials:
- Purview deployment blueprint - Single page visual with high-level activities and outcomes
- Presentation - Storyboard describing the model
- Guide - Comprehensive guide to jumpstart your deployment (optional)
Audience
Deployment models are designed for IT professionals, security professionals, and compliance officers who are responsible for deploying and managing Purview in their organization. They don't provide detailed technical guidance but rather a high-level overview of the deployment process for a configuration that meets a specific business need. If you're new to Purview technologies, concepts, and planning, deployment and administration, see Learn about Microsoft Purview.
Deployment models are from our engineering teams. They're based on proven deployments with organizations. The objective of deployment models is to enable organizations to accelerate securing content and deploy faster.
Deployment model | Description |
---|---|
Secure by default with Microsoft Purview![]() |
Use this deployment model to help rapidly implement a secure by default configuration with Microsoft Purview Information Protection, Data Loss Prevention, and Insider Risk Management. This model includes
|
Address oversharing concerns in Microsoft 365 Copilot![]() |
Use this deployment model to prepare for a Microsoft 365 Copilot by identifying and mitigating potential oversharing risks. This model includes
|