check before: 2024-11-01
Product:
Fabric, Microsoft 365 Apps, Purview, Purview Communication Compliance, Purview compliance portal, Purview Data Loss Prevention
Platform:
Online, Web, World tenant
Status:
In development
Change type:
Admin impact, New feature, Updated message
Links:
Details:
Summary:
Microsoft Purview DLP now allows restricting access to Microsoft Fabric semantic models and lakehouses. Public preview for semantic models began November 2024; lakehouse preview starts April 2025. General availability is planned for June 2026. Admins can configure DLP policies to block or restrict access to sensitive data automatically.
Details:
Updated December 3, 2025: We have updated the timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners
This message is associated with Microsoft 365 Roadmap ID 422501.
[When this will happen:]
Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025.
General Availability: We will begin rolling out June 2026.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
General Availability, Preview
Created:
2024-11-20
updated:
2025-12-04
Public Preview Start Date
XXXXXXX ... free basic plan only
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS How does it affect me
XXXXXXX ... free basic plan only
MS Preperations
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
linked item details
XXXXXXX ... free basic plan only
Pictures
XXXXXXX ... free basic plan only
summary for non-techies**
XXXXXXX ... free basic plan only
Direct effects for Operations**
Access Restrictions
Unprepared implementation of DLP policies may lead to unintended access restrictions for users who require access to sensitive data for their roles, potentially disrupting workflows.
- roles: Data Analysts, Business Users
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=422501
User Experience
Users may experience confusion and frustration due to sudden changes in access permissions without prior notification or training, leading to decreased productivity.
- roles: End Users, Compliance Officers
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://aka.ms/DLPblog
Policy Compliance
Failure to prepare for the new DLP policies may result in non-compliance with data protection regulations, risking legal repercussions and damage to the organization's reputation.
- roles: Compliance Managers, IT Security Officers
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=422501
Configutation Options**
XXXXXXX ... paid membership only
Opportunities**
Enhanced Data Security Management
By implementing DLP policies that restrict access to sensitive data in Fabric semantic models and lakehouses, organizations can significantly enhance their data security posture. This will prevent unauthorized access to sensitive information, especially from guest users, thus mitigating risks associated with data breaches.
- next-steps: Review and update current DLP policies to include the new Restrict access action. Conduct training sessions for compliance and security teams on how to configure and manage these policies effectively.
- roles: Compliance Officer, Security Administrator, Data Governance Manager
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://aka.ms/DLPblog
Improved User Experience through Policy Tips
The ability to audit and notify users via Policy Tips based on sensitive content can lead to a better user experience. Users will be informed about potential risks when accessing sensitive data, enabling them to make more informed decisions and adhere to compliance requirements.
- next-steps: Communicate the availability of Policy Tips to all users and provide documentation on how to interpret and respond to these notifications. Gather user feedback to improve the effectiveness of these tips.
- roles: IT Support, End Users, Compliance Officer
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=422501
Streamlined Compliance Audits
With the implementation of DLP policies that restrict access based on sensitive information, organizations can streamline their compliance audits. This allows for easier tracking of data access and ensures that sensitive data is only accessed by authorized personnel, thus simplifying compliance reporting.
- next-steps: Develop a compliance audit framework that incorporates the new DLP policies. Train compliance teams on how to leverage these policies during audits and ensure documentation is maintained for review.
- roles: Compliance Officer, Data Protection Officer, IT Auditor
- references: https://learn.microsoft.com/en-us/fabric/governance/data-loss-prevention-overview, https://aka.ms/DLPblog
Potentional Risks**
XXXXXXX ... paid membership only
Data Protection**
XXXXXXX ... paid membership only
IT Security**
XXXXXXX ... paid membership only
Hypothetical Work Council Statement**
XXXXXXX ... paid membership only
DPIA Draft**
XXXXXXX ... paid membership only
explanation for non-techies**
XXXXXXX ... free basic plan only
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
change history
| Date | Property | old | new |
| 2025-12-04 | MC Last Updated | 07/01/2025 22:19:44 | 2025-12-03T21:06:05Z |
| 2025-12-04 | MC Messages | Updated July 1, 2025: We have updated the timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025. General Availability: We will begin rolling out late October 2025 and expect to complete by late November 2025. | Updated December 3, 2025: We have updated the timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025. General Availability: We will begin rolling out June 2026. |
| 2025-12-04 | MC End Time | 02/02/2026 08:00:00 | 2026-07-30T09:00:00Z |
| 2025-12-04 | MC Summary | Microsoft Purview Data Loss Prevention (DLP) will soon allow restricting access to Fabric semantic models and lakehouses. Public preview for semantic models is available, and for lakehouses, it will start mid-April 2025. General availability begins late October 2025. Admins can configure DLP policies to restrict access to sensitive data. | Microsoft Purview DLP now allows restricting access to Microsoft Fabric semantic models and lakehouses. Public preview for semantic models began November 2024; lakehouse preview starts April 2025. General availability is planned for June 2026. Admins can configure DLP policies to block or restrict access to sensitive data automatically. |
| 2025-07-02 | MC Last Updated | 03/26/2025 20:38:55 | 2025-07-01T22:19:44Z |
| 2025-07-02 | MC Messages | Updated March 26, 2025: We have updated the content and rollout timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025. We will update this message later to add the plan for General Availability | Updated July 1, 2025: We have updated the timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025. General Availability: We will begin rolling out late October 2025 and expect to complete by late November 2025. |
| 2025-07-02 | MC Summary | Microsoft Purview Data Loss Prevention (DLP) will soon allow restricting access to Fabric semantic models and lakehouses. This feature, available in public preview, will enable admins to configure DLP policies to detect sensitive information and restrict access to internal users or data owners. No admin action is required before the rollout. | Microsoft Purview Data Loss Prevention (DLP) will soon allow restricting access to Fabric semantic models and lakehouses. Public preview for semantic models is available, and for lakehouses, it will start mid-April 2025. General availability begins late October 2025. Admins can configure DLP policies to restrict access to sensitive data. |
| 2025-07-02 | MC MessageTagNames | New feature, Admin impact | Updated message, New feature, Admin impact |
| 2025-07-02 | MC End Time | 06/30/2025 09:00:00 | 2026-02-02T08:00:00Z |
| 2025-03-27 | MC Messages | Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and then restrict access to this data to internal users or data owners.
This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: We will begin rolling out late November 2024 and expect to complete by mid-December 2024. We will update this message later to add the plan for General Availability | Updated March 26, 2025: We have updated the content and rollout timeline below. Thank you for your patience.
Your organization can already apply Microsoft Purview Data Loss Prevention (DLP) policies to Microsoft Fabric, but soon you will also be able to restrict access to Fabric sematic models and lakehouses by applying DLP policies. After this rollout, admins will be able to configure DLP policies that automatically detect sensitive information in sematic models and lakehouses and then restrict access to this data to internal users or data owners This message is associated with Microsoft 365 Roadmap ID 422501. [When this will happen:] Public Preview: DLP restrict access for sematic models is already available in Public Preview as of November 2024. For Fabric lakehouse, public preview of restrict access will begin rollout mid-April 2025 and is expected to complete by late April 2025. We will update this message later to add the plan for General Availability |
| 2025-03-27 | MC Last Updated | 11/20/2024 00:41:43 | 2025-03-26T20:38:55Z |
| 2025-03-27 | MC Summary | Microsoft Purview Data Loss Prevention (DLP) will soon allow restricting access to Fabric semantic models and lakehouses. This feature, available in public preview, will enable admins to configure DLP policies to detect sensitive information and restrict access to internal users or data owners. No admin action is required before the rollout. |
Last updated 3 days ago ago