Share via


Microsoft Purview deployment models

Microsoft Purview provides integrated solutions and features that complement each other. For new Purview administrators, it can be overwhelming to know where to start. But even existing administrators may be unfamiliar with how some Purview features can enhance their data security.

To address the need for shorter, actionable, and prescriptive guidance, the Product Engineering team is releasing a new series: Purview Deployment Models. Deployment models are scenario-based and use the following materials:

  • Purview deployment blueprint - Single page visual with high-level activities and outcomes
  • Presentation - Storyboard describing the model
  • Guide - Comprehensive guide to jumpstart your deployment (optional)

Audience

Deployment models are designed for IT professionals, security professionals, and compliance officers who are responsible for deploying and managing Purview in their organization. They don't provide detailed technical guidance but rather a high-level overview of the deployment process for a configuration that meets a specific business need. If you're new to Purview technologies, concepts, and planning, deployment and administration, see Learn about Microsoft Purview.

Deployment models are from our engineering teams. They're based on proven deployments with organizations. The objective of deployment models is to enable organizations to accelerate securing content and deploy faster.

Deployment model Description
Secure by default with Microsoft Purview

Secure by default with Microsoft Purview
Use this deployment model to help rapidly implement a secure by default configuration with Microsoft Purview Information Protection, Data Loss Prevention, and Insider Risk Management.

This model includes
Address oversharing concerns in Microsoft 365 Copilot

Address oversharing concerns in Microsoft 365 Copilot
Use this deployment model to prepare for a Microsoft 365 Copilot by identifying and mitigating potential oversharing risks.

This model includes
Prevent data leak to shadow AI

Prevent data leak to shadow AI with Microsoft.
Use this deployment model to assist organizations in identifying and preventing data leak to shadow AI.

This model includes
Lightweight guide to mitigate data leakageLightweight guide to mitigate data leakage Use this deployment model to enable core data security capabilities with minimal configuration, focusing on essential steps to get started quickly.

This model includes
  • Blueprint with high level activities and presentation in PPTX and PDF
Secure and govern Microsoft 365 Copilot agents

The image shows the deployment model to secure and govern Microsoft 365 Copilot agents with Microsoft Purview in four phases, the first phase is to discover the risks and identify gaps, the second is to protect the grounding data, the third is to protect the interactions, and finally the fourth phase is to govern the interactions.
Use this deployment model for Microsoft 365 Copilot agents by securing both the grounding data and interactions.

This model includes
Deploy and use Data Security Posture Management

The image shows the deployment model to deploy and use Microsoft Purview Data Security and Posture Management (DSPM) in four phases, the first phase is to establish the recommended foundational elemets, the second is to perform the basic configuration, the third is to review the reports on unprotected and protected assests and risky user activities, and finally the fourth phase is to take actions based on the recommendations from step 3.
Use this deployment model to prepare for a DSPM deployment with step-by-step guidance.

This model includes
  • Blueprint with high level activities and presentation PDF, PowerPoint