Our approach to delivering results focuses on a three-phase process that includes designing, implementing, and managing each solution. We'll work with you to integrate our teams so that where your team stops, our team begins.
OUR APPROACHDesign modern IT architectures and implement market-leading technologies with a team of IT professionals and project managers that cross various areas of expertise and that can engage directly with your team under various models.
OUR PROJECTSWith our round-the-clock Service Desk, state-of-the-art Technical Operations Center (TOC), vigilant Security Operations Center (SOC), and highly skilled Advanced Systems Management team, we are dedicated to providing comprehensive support to keep your operations running smoothly and securely at all times.
OUR SERVICESWith regulators continuing to level up their expectations, and consumers increasingly aware of the importance of data privacy and security, it’s becoming more and more important for enterprises to forge robust data governance strategies. For many Microsoft customers, deploying Microsoft Purview, the technology giant’s full-featured Microsoft Purview data governance solution suite, is a vital step in building a robust information protection strategy—one that will satisfy regulators, board members, third-party partners, and customers alike.
Purview is a complex solution, and mastering the deployment process isn’t easy. But if you want to go from newbie to master with Microsoft Purview here’s how to do it.
We guide our clients through a time-tested, four-step deployment process, one that we’ve honed through our experience deploying Microsoft Purview and following Microsoft Purview best practices as well as Microsoft sanctioned best practices. This process is built to deliver the most amount of value with the most effective use of time, budget, and resources, and consists of the following four steps:
Requirements gathering
Building out policies and foundational components
Validation testing and Pilot
Production deployment
Let’s take a closer look at each of these steps.
Every organization’s reasons for deploying Microsoft Purview are unique, but it’s common for regulatory requirements—or overall corporate strategy—to drive the process. Any organization that holds or handles sensitive customer data may benefit from the visibility and control that Purview provides, but knowing exactly which regulatory requirements are in play, and which important data assets are at hand, will determine what you need from your Purview deployment. This early analysis helps organizations understand their broader data landscape and identify where governance and protection controls are most critical.
A best practices-guided Microsoft Purview deployment process begins with an in-depth discussion of the full scope of your needs and requirements and well-defined use cases for various data security scenarios.
Next, we’ll embark upon a quest to discover your sensitive data. What constitutes “sensitive data” or other sensitive information is largely dependent upon your industry, the data types you handle, and how you aim to secure sensitive files. If, for instance, you’re in healthcare, data that’s protected under the Health Insurance Portability and Accountability Act (HIPAA) includes patient medical information, so healthcare organizations can use data discovery tools to search for medical records, social security numbers, and specific keywords across on-premises and cloud data sources, as well as other critical data resources.
Data discovery is the key to a successful Microsoft Purview deployment and the foundation for building an accurate Microsoft Purview data map that remains an up to date map as new systems and data sources are introduced. It is also the key to gaining visibility into Microsoft Purview data across the organization. The process can be complex and very involved, but it’s the foundation upon which the rest of the implementation process is built. The more stakeholders are involved at this early stage (such as legal teams, risk management, and corporate leadership—including the CEO), the stronger your long-term data management and governance practices will be, leading to fewer problems later on.
Deploying Microsoft Purview tends to be a design-heavy process. While the initial stages of the project, which include discussion, data discovery, and design sessions, can last a month or longer, an experienced partner like Netrix can expedite these processes and deliver the value of Purview faster. Additionally, the client will come away from these conversations with a thorough understanding of what’s possible, as well as a set of approved design documents. These designs often define a collections hierarchy that supports governance across multiple accounts and business units.
Once an organization’s sensitive data has been discovered, and its goals and objectives translated into a design for its Microsoft Purview implementation, it’s time to start creating policies within the Microsoft Purview governance portal, using Azure Purview capabilities and relevant Purview extensions where applicable. Typically, data sensitivity labels are applied automatically, enabling effective data classification as Purview Information Protection recommends and helps apply sensitivity labels based on what it discovers within documents.
It’s possible to configure the tool to auto-enforce labeling or allow users to choose their own content labels. This supports more granular access management and secure data access controls that help organizations manage access and restrict access to sensitive information. Policies can also be configured to restrict access based on user role, location, or risk profile, including scenarios involving external users.
We recommend that our clients first create minimum viable product (MVP) versions of their data loss prevention (DLP) policies—including endpoint DLP controls—in audit mode to evaluate potential data exfiltration risks. This way, they can observe how the policies would behave in real-world use without actively blocking users from sending data or performing other actions until administrators are confident that the policies will work as intended.
During this phase, organizations often validate permissions by assigning roles such as data reader and data source admin to ensure appropriate visibility and control. Additional roles, such as collection admin, data curator, and other data plane roles, help enforce governance boundaries, credential management, and collaboration between governance team and the security team.
Microsoft Purview includes extensive Insider Risk Management capabilities and integrates closely with Microsoft Defender to enhance threat detection. This integration strengthens overall threat protection and supports broader network security objectives. These enable organizations to quickly identify, investigate, and take action on insider risks. You can set policies to track higher-risk users (such as an employee who recently gave their two-week notice), and monitor data access on activities like downloading sensitive data or deleting large volumes of email. Insider Risk Management can automatically recommend or create policies, or assign user risk scores based on individualized factors. All of these capabilities can be configured during the foundational component build phase.
This phase is what we think of as the “learn and adapt” phase. We test data labels, features, and policy enforcement thoroughly before putting them in front of production users. This often includes validating supporting components such as Azure Integration Runtime connectivity, including self hosted integration runtime configurations, and ensuring Network Security Group rules align with security requirements. In more advanced environments, organizations may also route traffic through a network virtual appliance and use private endpoints, including those managed by Purview, to limit exposure. This way, we’re able to fix issues early on.
The initial steps for Validation testing will be to deploy policies and labels within a Microsoft Purview account, often provisioned as an Azure Purview account and managed as an Azure resource through Azure Resource Manager. This is done to a few test accounts or specific users so that Purview administrators can prove the tools are working as intended in a small scale and controlled environment before moving into pilot.
After validation testing, alpha and beta pilots are run, involving a small number of users—perhaps as many as 50 or 100. This process enables us to gather real-time feedback: do the data labels we’ve created make sense to the employees who will be using them? Do people understand how and why policies will be enforced?
Communication is key, and end user training—often aligned with identity controls in the Microsoft Entra tenant, including conditional access policies applied to cloud apps—should be conducted simultaneously with the pilot phase of the Microsoft Purview deployment process. In addition to the normal pilot practices, organizations should begin sending out policy notifications to all real-world users letting them know which actions would trigger an alert or be blocked. This is an important part of end user training that runs in conjunction with formalized training.
Different organizations use various strategies to teach their employees the whys and hows of working with Purview. These might include web pages, email announcements, user guides, or in-person communications. Regardless of the means of conveying the information, the goals are always the same: to help end users understand what Microsoft Purview will do, what they can expect to see once it’s in production, and what they’ll need to do in response.
A successful employee training program often includes focus groups and champions, so that real-world user experience can be taken into account in planning communications and setting up resources. When this is done well, it should reduce the number of support tickets that service desk teams will have to field after the deployment goes into production.
If the pilot process has gone well, your deployment should be ready for production, and you probably won’t encounter any major issues as you scale it out. Providing high-quality end user support can smooth and streamline the rollout process, as can ensuring that employees with questions can easily find the answers they need.
Organizations will need to incorporate data governance processes into their employee training and new hire onboarding processes going forwards. Ongoing oversight through the Microsoft compliance portal supports both network security visibility and regulatory alignment. They’ll also need to ensure that they’re making appropriate use of Purview’s extensive reporting capabilities, and that they have resources on hand to keep up with the new features that Microsoft will continue to release on an ongoing basis. This is especially important as Microsoft Purview continues to evolve as a software as a service platform. After all, Purview’s ability to help organizations secure and manage their data estates will only grow stronger over the coming months and years.
Want to learn more about how Netrix’s team of experts can help you deploy Microsoft Purview with all the success and none of the stress? If so, get in touch with us today.