Azure DocumentDB auth key


If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.


The string DocumentDb followed by the characters and strings outlined in the pattern below.


  • The string DocumentDb
  • Any combination of between 3-200 lower- or uppercase letters, digits, symbols, special characters, or spaces
  • A greater than symbol (>), an equal sign (=), a quotation mark ("), or an apostrophe (')
  • Any combination of 86 lower- or uppercase letters, digits, forward slash (/), or plus sign (+)
  • Two equal signs (=)



Keyword Highlighting


When keyword highlighting is supported in the contextual summary for a sensitive information type or a trainable classifier, in the Contextual Summary view of activity explorer, the keywords in a document that were matched to a policy are highlighted.


A DLP policy has high confidence that it's detected this type of sensitive information if, within a proximity of 300 characters:

  • The regular expression CEP_Regex_AzureDocumentDBAuthKey finds content that matches the pattern.
  • The regular expression CEP_CommonExampleKeywords doesn't find content that matches the pattern.
<!-- Azure Document DB Auth Key -->
<Entity id="0f587d92-eb28-44a9-bd1c-90f2892b47aa" patternsProximity="300" recommendedConfidence="85">
  <Pattern confidenceLevel="85">
        <IdMatch idRef="CEP_Regex_AzureDocumentDBAuthKey" />
        <Any minMatches="0" maxMatches="0">
            <Match idRef="CEP_CommonExampleKeywords" />



This sensitive information type identifies these keywords by using a regular expression, not a keyword list.

  • contoso
  • fabrikam
  • northwind
  • sandbox
  • onebox
  • localhost