- Understand data security posture management in Microsoft Purview.
In this module you learn to:
- Explain what data security posture management is and the problem it's designed to solve
- Describe how data security posture is evaluated using continuous assessment
- Explain how data security objectives organize risk into outcome-driven workflows
- Understand the role of AI in supporting analysis and prioritization without taking action
- Describe how DSPM fits with data loss prevention (DLP), Insider Risk Management, audit, and investigations
- Assess your organization's data security posture by interpreting posture metrics and security objectives on the DSPM dashboard, then discovering where specific gaps exist across the data estate.
After completing this module, you'll be able to:
- Describe how Data Security Posture Management (DSPM) consolidates DLP, information protection, Insider Risk Management, and Data Security Investigations into a unified posture view
- Interpret key posture metrics and trending data on the DSPM dashboard
- Evaluate data security objectives to prioritize the gaps that pose the most risk
- Discover AI apps and agents with sensitive interactions using AI observability
- Assess classification and labeling coverage using asset explorer
- Track posture changes over time using DSPM reports
- Use Data Security Posture Management (DSPM) objectives and remediation workflows to select protection approaches, configure one-click policies, and assess and remediate oversharing risks across the data estate.
After completing this module, you'll be able to:
- Select appropriate remediation approaches based on DSPM data security objective risk indicators
- Configure and apply one-click policies for DLP, sensitivity labels, and Insider Risk Management through DSPM objective workflows
- Measure remediation progress and manage independent remediation actions
- Assess and remediate oversharing risks using default and custom data risk assessments
- Investigate data security risks by using Purview Data Security Posture Management (DSPM) to analyze activity signals, identify risky user and AI agent behavior, and use Security Copilot to prioritize the most critical data security events.
After completing this module, you'll be able to:
- Analyze sensitive data activity across activity explorer, audit logs, and DSPM reports
- Investigate data security events using Security Copilot in DSPM
- Investigate risky AI agent behavior through AI observability
Launch Your Cybersecurity Career in 6 Months
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Understand data security posture management in Microsoft Purview
- Introduction
- Understand the role of data security posture management (DSPM)
- How DSPM evaluates data risk and posture
- Data security objectives as the organizing model
- How AI is used inside DSPM
- Where DSPM fits in the broader data security workflow
- Module assessment
- Summary
- Assess data security posture in Microsoft Purview
- Introduction
- How Data Security Posture Management (DSPM) works and what to enable
- Interpret posture metrics on the dashboard
- Evaluate data security objectives and prioritize gaps
- Discover AI apps and agents with AI observability
- Assess data classification and labeling with asset explorer
- Use reports to analyze posture changes
- Module assessment
- Summary
- Protect and remediate sensitive data in Microsoft Purview
- Introduction
- Select remediation approaches from Data Security Posture Management (DSPM) data security objectives
- Apply one-click policies through DSPM objective workflows
- Measure remediation progress
- Assess and remediate oversharing with data risk assessments
- Module assessment
- Summary
- Investigate data security risks with Microsoft Purview Data Security Posture Management
- Introduction
- Analyze sensitive data activity with DSPM investigation surfaces
- Investigate data security events with Security Copilot
- Investigate risky AI agent behavior through AI observability
- Module assessment
- Summary