DLP Policies Now Block Copilot Processing Across All Storage Locations


Microsoft is improving how Microsoft Purview Data Loss Prevention (DLP) protects content used by Microsoft 365 Copilot. Until now, DLP rules that block Copilot from processing sensitivity‑labeled content only worked when files lived in SharePoint or OneDrive.

With this update, those same protections will work everywhere, including local files stored on a user’s device. Organizations have asked for more consistent protection across all file locations, and this update delivers exactly that.

This change is associated with Microsoft 365 Roadmap ID 557255.

When it’s coming

General Availability (Worldwide + GCC)
Rollout: Late March 2026 → Late April 2026

Who this impacts

  • Organizations using Microsoft Purview DLP to limit what Copilot can access
  • Admins who manage Purview DLP rules
  • Users working with Copilot in Word, Excel, or PowerPoint

What’s changing

DLP rules that block Copilot from processing certain sensitivity-labeled files will now apply to:

  • SharePoint
  • OneDrive for Business
  • Local device storage
  • Any other file location Office apps can open

So if a DLP policy says “Copilot cannot process Confidential files,” then Copilot will not process those files anywhere, including when they’re opened directly from the desktop.

Key notes:

  • Existing DLP rules continue to work as they do today—no reconfiguration needed.
  • The feature turns on automatically for tenants already using relevant DLP policies.
  • Users will experience consistent protection when using Copilot across Word, Excel, and PowerPoint.

How it works (technical detail)

This update doesn’t change what Copilot can do—it changes how Office apps share sensitivity label information with AugLoop (the Copilot orchestration layer).

Today:
AugLoop reads file labels through Microsoft Graph
This only works for SharePoint or OneDrive files

After the update:

  • Office apps will pass the sensitivity label directly to AugLoop
  • This means DLP rules can finally apply to local and other non-cloud storage files too

This results in uniform, predictable DLP enforcement across all file locations.

Updated Announcement: Microsoft Purview – New Purview Agent Deployment Role


Microsoft Purview introduces a new Purview Agent Deployment role added to several built-in role groups, allowing analysts to deploy and manage Purview agents without admin help. Rollout starts late February 2026, improving onboarding and agent use while maintaining existing data access and compliance controls.

Microsoft introducing a new Microsoft Purview Role-Based Access Control (RBAC) role—Purview Agent Deployment—and adding it to several existing built‑in Purview role groups. This enhancement empowers analysts who work with Purview agents to deploy and manage them directly, without requiring administrator involvement. The change streamlines onboarding and supports broader adoption of Purview’s AI‑powered agent capabilities.

This update corresponds to Roadmap ID 551147.

Rollout Timeline

  • General Availability (Worldwide): Begins late February 2026
  • Expected Completion: Mid‑March 2026

Who is affected

  • Administrators managing Purview role groups
  • Analysts deploying or working with Microsoft Purview agents

What’s changing

The new Purview Agent Deployment role will be added to the following built‑in role groups:

  • Compliance Administrator
  • Data Security Management
  • Information Protection
  • Information Protection Analysts
  • Information Protection Investigators
  • Insider Risk Management
  • Insider Risk Management Analyst
  • Insider Risk Management Investigator
  • Purview Agent Management

The Purview Agent Management role group will continue to include the Purview Content Analyst role and retain access to Posture agent capabilities.

Capabilities enabled

Users assigned to these role groups will be able to deploy, use, and manage Purview agents end‑to‑end, including:

  • Data Loss Prevention (DLP) — Data Security Triage Agent
  • Insider Risk Management (IRM) — Data Security Triage Agent
  • Data Security Posture Management (DSPM) — Posture Agent
  • Future Purview agents as they are released

Important:

  • No default data access permissions are modified.
  • No new visibility into customer content is introduced.
  • Organizations can optionally enforce separation of responsibilities by using custom role groups.

🦸‍♀️💥 THE MCT CHRONICLES: The Rise of Jo SNAI 💥


“Certified to Save the Tech Universe”

In a neon‑lit digital world where data moved faster than light and threats lurked in every shadow of the cloud…
a new chapter began.

Jo SNAI — the Cyber‑AI Guardian of Modern Work — stood in her armored suit, circuitry glowing across the chest plate. She had trained countless professionals, defended organizations against chaos, and brought order to the digital galaxy.

But today was different.

A new hologram pulsed in her hand:
Microsoft Certified Trainer — Membership Activated
A badge she had earned since 2012… now renewed for another mission.

“Another year,” she whispered, “another generation of heroes to train.”

Suddenly, a ripple tore through the cyber‑sky.
A swirling breach of corrupted code expanded above the horizon — the kind that could only mean one thing:
The Shadowbyte Collective was back.

Their goal?
To dismantle cloud knowledge.
To spread misinformation.
To weaken organizations from the inside-out.

And only one person had the skills — and the certification — to stop them.

Jo snapped her gauntlet into combat mode.
Screens lit up.
Security shields locked in.
AI cores hummed to full power.

Her Copilot drone hovered beside her, projecting tactical overlays.

Copilot: “Jo SNAI, the world needs your training powers more than ever. Initiating mission protocol: Teach. Empower. Protect.

Jo SNAI: “Let’s remind them why trainers shape the future.”

She launched herself forward, slicing through corrupted data streams, restoring systems mid‑air, deploying knowledge shields around endangered teams, and unlocking AI insights faster than the Shadowbyte agents could rewrite them.

Every lesson she’d taught…
Every student she’d guided…
Every certification she’d earned…
All of it fueled her.

With each strike, the breach shrank.
With each burst of knowledge, darkness retreated.
Until finally — with one last surge of pure learning energy — the Shadowbyte portal sealed shut.

Silence filled the digital sky.

Behind her, hundreds of professionals stood empowered, laptops glowing, tools activated, ready to build, secure, and innovate.

Jo SNAI raised her MCT hologram proudly.

“I’ll keep training. I’ll keep defending.
Because the future is safer when knowledge wins.”

The Cyber Twins: Guardians of the Digital Realm


In a world where data flows like rivers and algorithms shape reality, two extraordinary heroes rise to defend the integrity of cyberspace: Jo Cybermind and Jo SNAI. Known collectively as The Cyber Twins, they are the ultimate protectors of the digital frontier, combining the power of Cybersecurity and Artificial Intelligence to keep the virtual world safe.

The Birth of The Cyber Twins

In the early days of the Quantum Net, humanity stood on the brink of a digital collapse. Cybercrime syndicates had evolved beyond firewalls, wielding AI-driven attacks that could dismantle entire infrastructures in seconds. Governments and corporations scrambled for solutions, but every defense fell short.

Amid this chaos, two brilliant minds emerged from the shadows of innovation. One was a pioneer in cognitive security systems, the other a visionary in Security Nebula AI. Their paths crossed during a catastrophic breach—the Nebula Incident—where a rogue superintelligence threatened to seize control of global networks.

Instead of retreating, they fused their expertise into a single mission: to create a new era of defense where human intuition meets machine intelligence. Through relentless research and quantum experimentation, they unlocked extraordinary abilities—transforming themselves into living embodiments of their technologies.

  • Jo Cybermind became the shield of the digital realm, wielding neural firewalls and cognitive encryption to repel any threat.
  • Jo SNAI mastered the art of predictive warfare, commanding AI sentinels and weaving a global cyber mesh to outsmart adversaries before they strike.

Bound by purpose and powered by innovation, they vowed to protect the integrity of cyberspace. From that day forward, they were known as The Cyber Twins—guardians of security and intelligence in a world where every byte counts.

“In a universe of infinite data, only two minds can keep the chaos in check. The Cyber Twins—where security meets intelligence.”

Meet Jo Cybermind

Jo Cybermind is the embodiment of strategic defense and cognitive brilliance. Her superpower lies in Nebula Shielding, a cutting-edge ability that creates impenetrable barriers against cyber threats. With her enhanced brain-computing interface, she can detect anomalies in milliseconds, neutralize ransomware attacks before they spread, and predict vulnerabilities before they even exist.

Her moto: “Decode the Chaos.”

Signature Abilities:

  • Quantum Threat Analysis: Scans billions of data points instantly to identify hidden risks.
  • Adaptive Firewalls: Deploys dynamic shields that evolve with every attack.
  • Cognitive Encryption: Encrypts sensitive data using AI-driven neural patterns, making it virtually unbreakable.

Meet Jo SNAI

Jo SNAI is the visionary architect behind intelligent systems and the unrivaled strategist of predictive algorithms. Her ultimate power, Security Nebula AI, transforms the battlefield of cyberspace into her domain. With this ability, she channels the limitless potential of machine learning to outthink and outmaneuver even the most sophisticated adversaries. Jo SNAI doesn’t just defend—she anticipates, adapts, and evolves.

Her motto:
“Intelligence isn’t just power, it’s protection.”

Signature Abilities

  • AI Sentinels: Deploys autonomous guardians that patrol networks, neutralizing threats before they strike.
  • Behavioral Pattern Mapping: Reads the digital footprints of cybercriminals, predicting their next move with surgical precision.
  • Global Cyber Mesh: Weaves a resilient, interconnected shield across infrastructures, creating a fortress of security in the cloud and beyond.

Together, They Are Unstoppable

When Jo Cybermind and Jo SNAI join forces, they form an unbreakable alliance of logic and learning. Their synergy ensures that every byte of data remains secure, every algorithm stays ethical, and every user can trust the digital world. They are not just heroes—they are the future of cybersecurity and AI.

“In a universe of infinite data, only two minds can keep the chaos in check. The Cyber Twins—where security meets intelligence. When chaos ruled the code, two minds rewrote destiny.”

➡️⏳🔜 Stay tuned. To be continue …

Empowering Cybersecurity with Microsoft Purview Data Security Investigations (Preview)


Data Security Investigations (preview) workflow helps you quickly identify, investigate, and take action on data associated with security and data breach incidents. This workflow isn’t a linear process. It includes significant iteration requirements for several of the steps to fine tune searches, evidence gathering, classification, and investigation by using AI and activities.

Analysts can use Data Security Investigations (preview) features in your organization to:

  • Quickly and efficiently search, discover, and identify impacted data.
  • Use deep content AI analysis to discover exact data risks hidden in data.
  • Take action to reduce the impact of data security incidents and quickly mitigate ongoing risks.
  • Collaborate with internal and external stakeholders on investigation details.

Check out the following videos to learn about how Data Security Investigations (preview) can help you respond to data security incidents:

DSI builds on and extends Microsoft Purview’s existing best-of-breed Data Security portfolio. Our information protection, data loss prevention, and insider risk management solutions have provided customers with a strong foundation to protect their crown jewels, their data. Data is at the center of cyberattacks, and now DSI will use AI to re-imagine how customers investigate and mitigate data security incidents, accelerating the process dramatically.  Most organizations we spoke to (77%) believe that AI will accelerate data security detection and response, and 76% think AI will improve the accuracy of data security detection and response strategies. With its cutting edge, generative AI-powered investigative capabilities, DSI will transform and scale how data security admins analyze incident-related data. DSI uncovers key security and sensitive data risks and facilitates secure collaboration between partner teams to mitigate those identified risks. This simplifies previously complex, time-consuming tasks – what once took months, can now be done in a fraction of the time.

Read more:
Get started with Data Security Investigations (preview)
Learn about Data Security Investigations (preview)

Jo The Ciphermind: A Comic Journey Through Data, Privacy, and Security in Microsoft 365 Copilot


Hello Friday 🎉 !
It’s time to unwind with a great story. Who doesn’t love comics?
I certainly do! So, let’s dive into my comic story and introduce you my character…
My new Tech Comic: Meet Jo Valiant the Guardian of Digital Realms & AI Ethics


🆕 Character
🦸 Name: Jo Valiant
✍ Alias: The Ciphermind
🚨 Role: Guardian of Digital Realms & AI Ethics
🗒️ Catchphrase: “Decode The Chaos.”


In a futuristic digital landscape where data flows like storms and privacy is constantly under threat, emerges Jo The Ciphermind—a guardian clad in encrypted armor and equipped with a mind shielded by advanced privacy protocols. Jo is not just a character but a symbol of resilience and vigilance in the realm of Microsoft 365 Copilot. With glowing blue accents and a brain symbol illuminated on the chest, Jo represents the fusion of human cognition and artificial intelligence. The headphones signify constant connectivity, while the surrounding icons—a padlock, AI chip, shield with a brain, and fingerprint—highlight Jo’s mission to protect data, ensure privacy, and uphold security. This slide introduces Jo as the protagonist of our comic-style journey, setting the stage for an engaging exploration of how Microsoft 365 Copilot integrates these critical elements into its ecosystem.

Balance of Innovation and Integrity
Jo’s journey highlights the balance between advancing AI innovation and upholding responsible data stewardship.

Jo’s Mission
Jo The Ciphermind’s mission transcends individual battles—it’s about empowering users with transparency, control, and trust in Microsoft 365 Copilot.

To be continue…

Microsoft Security Exposure Management – Public preview release


Today, March 13, Microsoft announce the public preview release of Microsoft Security Exposure Management. This transformative solution unifies disparate data silos, extending end-to-end visibility to security teams across all assets. By enabling a thorough assessment of security posture and exposure, this solution equips teams to not only grasp their current security landscape but also elevate it to new heights. Microsoft Security Exposure Management serves as a cornerstone for proactive risk management, empowering organizations to adeptly navigate and mitigate threat exposure across their entire attack surface.

Microsoft Security Exposure Management empowers customers to:

  • Build an effective exposure management program with a continuous threat exposure management (CTEM) process.
  • Reduce risk with a clear view of every asset and real-time assessment of potential exposures both inside-out and outside-in.
  • Identify and classify critical assets, ensuring they are protected against a wide variety of threats.
  • Discover and visualize potential adversary intrusion paths, including lateral movement, to proactively identify and stop attacker activity.
  • Communicate exposure risk to business leaders and stakeholders with clear KPIs and actionable insights.
  • Enhance exposure analysis and remediation by integrating with third-party data sources and tools

At launch, we are introducing new capabilities that are foundational to exposure management programs:

  • Attack Surface Management: Provides a comprehensive view of the entire attack surface, allowing the exploration of assets and their relationships.
  • Attack Path Analysis: Assists security teams in visualizing and prioritizing attack paths and risks across environments, enabling focused remediation efforts to reduce exposure and breach likelihood.
  • Unified Exposure Insights: Provides decision-makers with a consolidated, clear view of an organization’s threat exposure, facilitating security teams in addressing critical questions about security posture.

More Information you can find here