Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Microsoft Purview provides integrated solutions and features that complement each other. For new Purview administrators, it can be overwhelming to know where to start. But even existing administrators may be unfamiliar with how some Purview features can enhance their data security.
To address the need for shorter, actionable, and prescriptive guidance, the Product Engineering team is releasing a new series: Purview Deployment Models. Deployment models are scenario-based and use the following materials:
- Purview deployment blueprint - Single page visual with high-level activities and outcomes
- Presentation - Storyboard describing the model
- Guide - Comprehensive guide to jumpstart your deployment (optional)
Audience
Deployment models are designed for IT professionals, security professionals, and compliance officers who are responsible for deploying and managing Purview in their organization. They don't provide detailed technical guidance but rather a high-level overview of the deployment process for a configuration that meets a specific business need. If you're new to Purview technologies, concepts, and planning, deployment and administration, see Learn about Microsoft Purview.
Deployment models are from our engineering teams. They're based on proven deployments with organizations. The objective of deployment models is to enable organizations to accelerate securing content and deploy faster.
| Deployment model | Description |
|---|---|
| Secure by default with Microsoft Purview |
Use this deployment model to help rapidly implement a secure by default configuration with Microsoft Purview Information Protection, Data Loss Prevention, and Insider Risk Management. This model includes
|
Address oversharing concerns in Microsoft 365 Copilot![]() |
Use this deployment model to prepare for a Microsoft 365 Copilot by identifying and mitigating potential oversharing risks. This model includes
|
| Prevent data leak to shadow AI |
Use this deployment model to assist organizations in identifying and preventing data leak to shadow AI. This model includes
|
Lightweight guide to mitigate data leakage![]() |
Use this deployment model to enable core data security capabilities with minimal configuration, focusing on essential steps to get started quickly. This model includes |
Secure and govern Microsoft 365 Copilot agents![]() |
Use this deployment model for Microsoft 365 Copilot agents by securing both the grounding data and interactions. This model includes
|
Deploy and use Data Security Posture Management![]() |
Use this deployment model to prepare for a DSPM deployment with step-by-step guidance. This model includes
|



