*For this entry exists the more relevant or more recent entry MC1106875
check before: 2025-11-01
Product:
Purview, Purview Communication Compliance, Purview compliance portal, Purview Information Protection, Windows
Platform:
Web, World tenant
Status:
Launched
Change type:
Links:
Details:
This capability will enable organizations to scan files on Windows devices for sensitive information to meet data discovery requirements for regulatory purposes and inform data security posture accordingly.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
General Availability, Preview
Created:
2025-06-13
updated:
2025-12-18
Public Preview Start Date
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
summary for non-techies**
XXXXXXX ... free basic plan only
Direct effects for Operations**
Please, look at the most relevant linked item for details
explanation for non-techies**
Imagine you have a large library filled with thousands of books, and you need to ensure that none of these books contain sensitive information that shouldn't be shared publicly. In the past, you might have hired a team of librarians to manually go through each book, page by page, to check for any sensitive content. This process would be time-consuming and prone to human error.
Now, think of Microsoft Purview's new capability as a highly efficient, automated librarian. This tool can quickly scan through all the files on Windows devices, much like a librarian who can read and analyze books at lightning speed. It identifies files that contain sensitive information, such as personal data or confidential business details, which helps organizations comply with regulatory requirements and maintain a secure data environment.
For managers and HR staff, this means that instead of worrying about whether sensitive information is being properly protected, the system does the heavy lifting. It provides a clear overview of where sensitive data is located and how it is being handled, allowing you to make informed decisions about data security policies and practices.
This capability is like having a security guard who not only monitors the library but also provides insights into how to improve security measures. It ensures that sensitive information is properly classified and protected, reducing the risk of data breaches and helping organizations maintain compliance with various regulations.
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
change history
| Date | Property | old | new |
| 2025-12-18 | RM Status | Rolling out | Launched |
| 2025-11-27 | RM Status | In development | Rolling out |
| 2025-08-29 | RM Preview | August CY2025 | September CY2025 |
| 2025-07-31 | RM Preview | July CY2025 | August CY2025 |
Last updated 3 weeks ago ago