Texas A&M UniversityWork In Progress

Extend Purview to on-premises systems, Azure data sources, Information Barriers, and regulatory-specific configurations.

Extensions & Advanced Scenarios

With core implementation complete, this section extends Purview capabilities to additional environments and advanced scenarios that may not be immediate priorities.


On-Premises Integration {#on-premises}

Objective

Extend Purview protection to on-premises file servers and SharePoint Server.

On-Premises Scanner

The Microsoft Purview Information Protection scanner can:

  • Discover sensitive data on file shares
  • Apply sensitivity labels automatically
  • Report findings to Content Explorer
Deploy Information Protection Scanner

Prerequisites:

  • Windows Server with scanner service
  • SQL Server for scanner database
  • Network access to file shares

High-Level Steps:

  1. Install AIP Unified Labeling client
  2. Configure scanner cluster in Azure
  3. Create content scan jobs
  4. Run discovery scan
  5. Enable enforcement (labeling)

Azure Purview Integration {#azure-purview}

Objective

Integrate Microsoft Purview (M365) with Azure Purview Data Map for unified data governance across cloud and on-premises.

Azure Purview Capabilities

FeaturePurpose
Data MapUnified catalog across Azure, M365, on-prem
Data LineageTrack data flow through systems
Data GovernancePolicies across hybrid environment
Data SharingSecure cross-organization data sharing

Information Barriers {#information-barriers}

Objective

Create "ethical walls" between user groups that should not communicate or collaborate.

Use Cases

ScenarioSegmentsBarrier
Audit committeeAudit FinanceBlock communication
Competing researchLab A Lab BBlock collaboration
Legal separationLegal General staffBlock during M&A
Faculty with dual rolesResearch AdminPrevent conflicts of interest

Implementation Considerations


Regulatory Focus {#regulatory}

FERPA Protection

FERPA Objective

Implement specific protections for student educational records.

FERPA Label Configuration:

LabelEncryptionSharingMarking
Confidential - FERPARequiredInternal onlyHeader: "FERPA Protected"

FERPA DLP Policy:

ConditionAction
FERPA SITs detectedWarn with policy tip
FERPA + External recipientBlock with override
FERPA + Bulk accessBlock

HIPAA Protection

HIPAA Objective

Implement specific protections for protected health information (PHI).

HIPAA Label Configuration:

LabelEncryptionRightsAudit
Confidential - HIPAARequiredNo forwardingRequired

NIST 800-171 / CMMC for Research

CUI Objective

Implement controls for Controlled Unclassified Information in research settings.

Required Controls:

NIST ControlPurview Implementation
3.1.1 Limit accessSensitivity labels with encryption
3.3.1 Audit logsAudit Premium with 1-year retention
3.4.5 Change controlPAM for admin changes
3.8.1 Protect CUIDLP blocking external sharing

Microsoft Priva (PAYG) {#priva}

Objective

Implement privacy risk management using Microsoft Priva (pay-per-request licensing).

Priva Capabilities

FeaturePurpose
Subject Rights RequestsAutomate GDPR/CCPA data subject requests
Privacy Risk ManagementIdentify privacy risks proactively
Consent ManagementTrack and manage user consent

Validation Checklist

#ItemSuccess Criteria
1On-prem scannerDeployed and scanning
2Azure PurviewConnected to M365 Purview
3FERPA labelsPublished and in use
4HIPAA labelsPublished and in use
5CUI controlsImplemented for research

Next Steps

With extensions complete, proceed to Validation for final testing and rollout.

Continue to Validation →