Protect sensitive information with Microsoft Purview in the AI era (SC-401T00)
Course Length: 4 days
The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services.

Register or Request Training
- Private class for your team
- Live expert instructor
- Online or on‑location
- Customizable agenda
- Proposal turnaround within 1–2 business days
Course Overview
The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.
As an Information Security Administrator, you plan and implement information security for sensitive data using Microsoft Purview and related services. You're responsible for mitigating risks by protecting data within Microsoft 365 collaboration environments from internal and external threats, as well as safeguarding data used by AI services. Your role involves implementing information protection, data loss prevention (DLP), retention, and insider risk management. You also manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. In this role, you collaborate with other roles responsible for governance, data, and security to develop policies that address your organization's information security and risk reduction goals. You work with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support these policies and controls.
Course Benefits
- Organizations need effective information protection to prevent data exposure, ensure compliance, and maintain security across cloud and on-premises environments. Microsoft Purview enables classification, labeling, and encryption to safeguard sensitive data across Microsoft 365 services, Exchange, and on-premises storage.
- Discover how Microsoft Purview helps organizations classify, protect, and monitor sensitive data across cloud, endpoint, and AI environments. This module explores strategies for securing data through classification, labeling, encryption, and proactive risk management.
- Learn about the information available to help you understand your data landscape and know your data.
- Discover how Microsoft Purview helps organizations monitor and analyze data classification and protection. This module explores how security teams can track classification trends, investigate labeled content, and assess policy effectiveness using Information Protection Reports, Data explorer, Content explorer, and Activity explorer.
- Learn how to use sensitive information types to support your information protection strategy.
- Microsoft Purview sensitivity labels enable you to classify and protect sensitive data throughout your organization, including in the cloud and on devices. This module covers how to classify and protect sensitive information to ensure its security and compliance.
- Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate aren't hindered.
- Learn how to classify and protect sensitive data stored on-premises using Microsoft Purview. This module guides you through deploying the Information Protection scanner, applying sensitivity labels, and enforcing DLP policies to reduce data exposure risks.
- Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
- Learn how to configure Microsoft Purview Message Encryption to protect sensitive email, apply encryption with mail flow rules, and customize the recipient experience with branded templates.
Delivery Methods
Delivered for your team at your site or online.
Microsoft Certified Partner
Webucator is a Microsoft Certified Partner. This class uses official Microsoft courseware and will be delivered by a Microsoft Certified Trainer (MCT).

Course Outline
- Protect sensitive data in a digital world
- The growing need for data protection
- The challenges of managing sensitive data
- Protect data in a Zero Trust world
- Understand data classification and protection
- Prevent data leaks and insider threats
- Manage security alerts and respond to threats
- Protect AI-generated and AI-processed data
- Classify data for protection and governance
- Data classification overview
- Classify data using sensitive information types
- Classify data using trainable classifiers
- Create a custom trainable classifier
- Review and analyze data classification and protection
- Review classification and protection insights
- Analyze classified data with data and content explorer
- Create and manage sensitive information types
- Sensitive information type overview
- Compare built-in versus custom sensitive information types
- Create and manage custom sensitive information types
- Create and manage exact data match sensitive info types
- Implement document fingerprinting
- Describe named entities
- Create a keyword dictionary
- Create and configure sensitivity labels with Microsoft Purview
- Apply sensitivity labels for data protection
- Classify and protect on-premises data with Microsoft Purview
- Protect on-premises files with Microsoft Purview
- Prepare your environment for the Microsoft Purview Information Protection scanner
- Configure and install the Microsoft Purview Information Protection scanner
- Run and manage the scanner
- Enforce data loss prevention policies on on-premises files
- Understand Microsoft 365 encryption
- Learn how Microsoft 365 data is encrypted at rest
- Understand service encryption in Microsoft Purview
- Explore customer key management using Customer Key
- Learn how data is encrypted in-transit
- Protect email with Microsoft Purview Message Encryption
- Understand message encryption
- Plan for Microsoft Purview Message Encryption
- Configure Microsoft Purview Message Encryption
- Customize encrypted email branding with Microsoft Purview
- Control encrypted email access with Advanced Message Encryption
- Use Microsoft Purview Message Encryption templates in mail flow rules
- Understand and plan data loss prevention
- Understand the role of data loss prevention (DLP)
- Understand how DLP applies protection
- Plan and design DLP policies
- Understand DLP deployment and simulation mode
- Evaluate advanced DLP controls for your environment
- Create and manage data loss prevention policies
- Understand how DLP policy decisions fit together
- Choose a template or create a custom policy
- Define what the policy detects
- Align policy scope to risk
- Define how the policy responds
- Validate policy behavior using simulation mode
- Manage DLP policies
- Adjust enforcement dynamically based on risk
- Guided walkthrough: Create a DLP policy
- Implement endpoint data loss prevention (DLP) with Microsoft Purview
- Endpoint data loss prevention (DLP) overview
- Understand the endpoint DLP implementation workflow
- Onboard devices for endpoint DLP
- Configure settings for endpoint DLP
- Create and manage endpoint DLP policies
- Deploy the Microsoft Purview browser extension
- Configure just-in-time (JIT) protection
- Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
- Configure data loss prevention policies for Power Platform
- Integrate data loss prevention in Microsoft Defender for Cloud Apps
- Configure policies in Microsoft Defender for Cloud Apps
- Manage data loss prevention violations in Microsoft Defender for Cloud Apps
- Investigate and respond to Microsoft Purview Data Loss Prevention alerts
- Understand data loss prevention (DLP) alerts
- Understand the DLP alert lifecycle
- Configure DLP policies to generate alerts
- Investigate DLP alerts in Microsoft Purview
- Investigate DLP alerts in Microsoft Defender XDR
- Investigate DLP alerts with Security Copilot and AI agents
- Respond to DLP alerts
- Understand retention in Microsoft Purview
- Overview of retention and the data lifecycle
- Decide when to apply retention
- Implement and manage Microsoft 365 retention and recovery
- Create and configure adaptive scopes
- Create and configure retention policies
- Recover content in Microsoft 365 workloads
- Understand Microsoft Purview Insider Risk Management
- What is an insider risk?
- Microsoft Purview Insider Risk Management overview
- Microsoft Purview Insider Risk Management features
- Case study: Protect sensitive data with Insider Risk Management
- Prepare for Microsoft Purview Insider Risk Management
- Plan for Insider Risk Management
- Prepare your organization for Insider Risk Management
- Configure settings for Insider Risk Management
- Integrate Insider Risk Management with data sources and tools
- Create and manage Insider Risk Management policies
- Understand Insider Risk Management policy templates
- Compare quick and custom insider risk policies
- Create a custom Insider Risk Management policy
- Manage policies in Insider Risk Management
- Investigate insider risk alerts and related activity
- Understand insider risk alerts and investigations
- Manage alert volume in insider risk management
- Investigate and triage insider risk alerts in Microsoft Purview
- Investigate insider risk alerts with Security Copilot and AI agents
- Analyze alert context with the All risk factors tab
- Investigate activity details with the Activity explorer tab
- Review patterns over time with the User activity tab
- Investigate insider risk alerts in Microsoft Defender XDR
- Manage and take action on insider risk cases
- Implement Adaptive Protection in Insider Risk Management
- Adaptive Protection overview
- Understand and configure risk levels in Adaptive Protection
- Configure Adaptive Protection
- Manage Adaptive Protection
- Search and investigate with Microsoft Purview Audit
- Microsoft Purview Audit overview
- Configure and manage Microsoft Purview Audit
- Conduct searches with Audit (Standard)
- Audit Microsoft Copilot for Microsoft 365 interactions
- Investigate activities with Audit (Premium)
- Export audit log data
- Configure audit retention with Audit (Premium)
- Search for content with Microsoft Purview eDiscovery
- Understand eDiscovery and content search capabilities
- Prerequisites for using eDiscovery in Microsoft Purview
- Create an eDiscovery search
- Conduct an eDiscovery search
- Export eDiscovery search results
- Understand How to Secure AI Data with Microsoft Purview
- Understand AI data security risks
- Understand how Microsoft Purview secures AI data
- Evaluate compliance risks for AI usage
- Identify AI-related data exposure risks
- Understand how Microsoft Purview controls AI data access
- Detect and respond to risky AI activity
- Retain and search Copilot prompts and responses
- Secure Microsoft 365 Copilot interactions with Microsoft Purview
- Understand how Microsoft 365 Copilot changes data protection needs
- Assess Copilot regulatory compliance with Compliance Manager
- Audit Copilot interactions with Microsoft Purview
- Analyze Copilot interactions with Communication Compliance
- Apply DLP policies to Microsoft 365 Copilot
- Apply retention policies to Copilot prompts and responses
- Investigate and delete Copilot activity with eDiscovery
- Secure enterprise and browser-based AI apps with Microsoft Purview
- Understand risks from enterprise and non-Microsoft AI tools
- Assess AI usage for security and compliance
- Identify policy violations with Communication Compliance
- Detect risky AI usage with Insider Risk Management
- Protect sensitive data in AI apps with Microsoft Purview DLP
- Case study: Use Adaptive Protection to respond to AI-related risk
- Apply retention policies to AI app prompts and responses
- Secure developer AI environments with Microsoft Purview
- Understand risks and responsibilities in AI development environments
- Discover and assess AI apps with DSPM for AI
- Classify, restrict, and retain AI prompt data
- Enforce protections in Microsoft Foundry and Foundry Tools
- Apply controls for Microsoft Entra-registered custom AI apps
- Secure AI agents built in Copilot Studio
- Manage data risks in Copilot in Fabric
- Investigate and respond to risky AI activity
Class Materials
Each student receives a comprehensive set of materials, including course notes and all class examples.
Have questions about this course?
We can help with curriculum details, delivery options, pricing, or anything else. Reach out and we’ll point you in the right direction.
