Reduce data exposure risk with Data Security Posture Management in Microsoft Purview
At a glance
-
Level
-
Skill
-
Product
-
Subject
Data Security Posture Management (DSPM) in Microsoft Purview helps you understand where sensitive data is exposed and how risk is distributed across your environment. You start by exploring DSPM as a unified posture layer, then assess your organization's data security posture. Finally, you protect sensitive data with security objectives and investigate risks when they arise.
Prerequisites
- Familiar with the Microsoft Purview portal and its navigation
- Working knowledge of sensitivity labels and information protection policies
- Working knowledge of data loss prevention (DLP) policies and concepts
- Working knowledge of Insider Risk Management concepts
- Basic understanding of data classification with sensitive information types and trainable classifiers
Achievement Code
Would you like to request an achievement code?
Modules in this learning path
Data security posture management (DSPM) helps organizations understand where sensitive data is exposed and how risk is distributed across the environment. Data security posture is evaluated over time to reflect changing conditions. Objectives organize risk into outcomes, and DSPM helps guide decisions before controls are configured or investigations are launched.
Assess your organization's data security posture using Data Security Posture Management (DSPM) in Microsoft Purview. Interpret posture metrics and security objectives on the DSPM dashboard, then discover where specific gaps exist across the data estate using AI observability, asset explorer, and reports.
Use Data Security Posture Management (DSPM) objectives and remediation workflows to protect sensitive data across the data estate. Select appropriate protection approaches, configure one-click policies for DLP, sensitivity labels, and Insider Risk Management, and assess and remediate oversharing risks.
Investigate data security risks by using DSPM to analyze activity signals, identify risky user and AI agent behavior, and use Security Copilot to prioritize critical data security events.