Microsoft is improving how Microsoft Purview Data Loss Prevention (DLP) protects content used by Microsoft 365 Copilot. Until now, DLP rules that block Copilot from processing sensitivity‑labeled content only worked when files lived in SharePoint or OneDrive.
With this update, those same protections will work everywhere, including local files stored on a user’s device. Organizations have asked for more consistent protection across all file locations, and this update delivers exactly that.
General Availability (Worldwide + GCC) Rollout: Late March 2026 → Late April 2026
Who this impacts
Organizations using Microsoft Purview DLP to limit what Copilot can access
Admins who manage Purview DLP rules
Users working with Copilot in Word, Excel, or PowerPoint
What’s changing
DLP rules that block Copilot from processing certain sensitivity-labeled files will now apply to:
SharePoint
OneDrive for Business
Local device storage
Any other file location Office apps can open
So if a DLP policy says “Copilot cannot process Confidential files,” then Copilot will not process those files anywhere, including when they’re opened directly from the desktop.
Key notes:
Existing DLP rules continue to work as they do today—no reconfiguration needed.
The feature turns on automatically for tenants already using relevant DLP policies.
Users will experience consistent protection when using Copilot across Word, Excel, and PowerPoint.
How it works (technical detail)
This update doesn’t change what Copilot can do—it changes how Office apps share sensitivity label information with AugLoop (the Copilot orchestration layer).
Today: AugLoop reads file labels through Microsoft Graph This only works for SharePoint or OneDrive files
After the update:
Office apps will pass the sensitivity label directly to AugLoop
This means DLP rules can finally apply to local and other non-cloud storage files too
This results in uniform, predictable DLP enforcement across all file locations.
Microsoft Purview introduces a new Purview Agent Deployment role added to several built-in role groups, allowing analysts to deploy and manage Purview agents without admin help. Rollout starts late February 2026, improving onboarding and agent use while maintaining existing data access and compliance controls.
Microsoft introducing a new Microsoft Purview Role-Based Access Control (RBAC) role—Purview Agent Deployment—and adding it to several existing built‑in Purview role groups. This enhancement empowers analysts who work with Purview agents to deploy and manage them directly, without requiring administrator involvement. The change streamlines onboarding and supports broader adoption of Purview’s AI‑powered agent capabilities.
In a neon‑lit digital world where data moved faster than light and threats lurked in every shadow of the cloud… a new chapter began.
Jo SNAI — the Cyber‑AI Guardian of Modern Work — stood in her armored suit, circuitry glowing across the chest plate. She had trained countless professionals, defended organizations against chaos, and brought order to the digital galaxy.
But today was different.
A new hologram pulsed in her hand: ✨ Microsoft Certified Trainer — Membership Activated ✨ A badge she had earned since 2012… now renewed for another mission.
“Another year,” she whispered, “another generation of heroes to train.”
Suddenly, a ripple tore through the cyber‑sky. A swirling breach of corrupted code expanded above the horizon — the kind that could only mean one thing: The Shadowbyte Collective was back.
Their goal? To dismantle cloud knowledge. To spread misinformation. To weaken organizations from the inside-out.
And only one person had the skills — and the certification — to stop them.
Jo snapped her gauntlet into combat mode. Screens lit up. Security shields locked in. AI cores hummed to full power.
Her Copilot drone hovered beside her, projecting tactical overlays.
Copilot: “Jo SNAI, the world needs your training powers more than ever. Initiating mission protocol: Teach. Empower. Protect.”
Jo SNAI: “Let’s remind them why trainers shape the future.”
She launched herself forward, slicing through corrupted data streams, restoring systems mid‑air, deploying knowledge shields around endangered teams, and unlocking AI insights faster than the Shadowbyte agents could rewrite them.
Every lesson she’d taught… Every student she’d guided… Every certification she’d earned… All of it fueled her.
With each strike, the breach shrank. With each burst of knowledge, darkness retreated. Until finally — with one last surge of pure learning energy — the Shadowbyte portal sealed shut.
Silence filled the digital sky.
Behind her, hundreds of professionals stood empowered, laptops glowing, tools activated, ready to build, secure, and innovate.
Jo SNAI raised her MCT hologram proudly.
“I’ll keep training. I’ll keep defending. Because the future is safer when knowledge wins.”
In a world where data flows like rivers and algorithms shape reality, two extraordinary heroes rise to defend the integrity of cyberspace: Jo Cybermind and Jo SNAI. Known collectively as The Cyber Twins, they are the ultimate protectors of the digital frontier, combining the power of Cybersecurity and Artificial Intelligence to keep the virtual world safe.
The Birth of The Cyber Twins
In the early days of the Quantum Net, humanity stood on the brink of a digital collapse. Cybercrime syndicates had evolved beyond firewalls, wielding AI-driven attacks that could dismantle entire infrastructures in seconds. Governments and corporations scrambled for solutions, but every defense fell short.
Amid this chaos, two brilliant minds emerged from the shadows of innovation. One was a pioneer in cognitive security systems, the other a visionary in Security Nebula AI. Their paths crossed during a catastrophic breach—the Nebula Incident—where a rogue superintelligence threatened to seize control of global networks.
Instead of retreating, they fused their expertise into a single mission: to create a new era of defense where human intuition meets machine intelligence. Through relentless research and quantum experimentation, they unlocked extraordinary abilities—transforming themselves into living embodiments of their technologies.
Jo Cybermind became the shield of the digital realm, wielding neural firewalls and cognitive encryption to repel any threat.
Jo SNAI mastered the art of predictive warfare, commanding AI sentinels and weaving a global cyber mesh to outsmart adversaries before they strike.
Bound by purpose and powered by innovation, they vowed to protect the integrity of cyberspace. From that day forward, they were known as The Cyber Twins—guardians of security and intelligence in a world where every byte counts.
“In a universe of infinite data, only two minds can keep the chaos in check. The Cyber Twins—where security meets intelligence.”
Meet Jo Cybermind
Jo Cybermind is the embodiment of strategic defense and cognitive brilliance. Her superpower lies in Nebula Shielding, a cutting-edge ability that creates impenetrable barriers against cyber threats. With her enhanced brain-computing interface, she can detect anomalies in milliseconds, neutralize ransomware attacks before they spread, and predict vulnerabilities before they even exist.
Her moto: “Decode the Chaos.”
Signature Abilities:
Quantum Threat Analysis: Scans billions of data points instantly to identify hidden risks.
Adaptive Firewalls: Deploys dynamic shields that evolve with every attack.
Cognitive Encryption: Encrypts sensitive data using AI-driven neural patterns, making it virtually unbreakable.
Meet Jo SNAI
Jo SNAI is the visionary architect behind intelligent systems and the unrivaled strategist of predictive algorithms. Her ultimate power, Security Nebula AI, transforms the battlefield of cyberspace into her domain. With this ability, she channels the limitless potential of machine learning to outthink and outmaneuver even the most sophisticated adversaries. Jo SNAI doesn’t just defend—she anticipates, adapts, and evolves.
Her motto: “Intelligence isn’t just power, it’s protection.”
Signature Abilities
AI Sentinels: Deploys autonomous guardians that patrol networks, neutralizing threats before they strike.
Behavioral Pattern Mapping: Reads the digital footprints of cybercriminals, predicting their next move with surgical precision.
Global Cyber Mesh: Weaves a resilient, interconnected shield across infrastructures, creating a fortress of security in the cloud and beyond.
Together, They Are Unstoppable
When Jo Cybermind and Jo SNAI join forces, they form an unbreakable alliance of logic and learning. Their synergy ensures that every byte of data remains secure, every algorithm stays ethical, and every user can trust the digital world. They are not just heroes—they are the future of cybersecurity and AI.
“In a universe of infinite data, only two minds can keep the chaos in check. The Cyber Twins—where security meets intelligence. When chaos ruled the code, two minds rewrote destiny.”
Data Security Investigations (preview) workflow helps you quickly identify, investigate, and take action on data associated with security and data breach incidents. This workflow isn’t a linear process. It includes significant iteration requirements for several of the steps to fine tune searches, evidence gathering, classification, and investigation by using AI and activities.
Analysts can use Data Security Investigations (preview) features in your organization to:
Quickly and efficiently search, discover, and identify impacted data.
Use deep content AI analysis to discover exact data risks hidden in data.
Take action to reduce the impact of data security incidents and quickly mitigate ongoing risks.
Collaborate with internal and external stakeholders on investigation details.
Check out the following videos to learn about how Data Security Investigations (preview) can help you respond to data security incidents:
DSI builds on and extends Microsoft Purview’s existing best-of-breed Data Security portfolio. Our information protection, data loss prevention, and insider risk management solutions have provided customers with a strong foundation to protect their crown jewels, their data. Data is at the center of cyberattacks, and now DSI will use AI to re-imagine how customers investigate and mitigate data security incidents, accelerating the process dramatically. Most organizations we spoke to (77%) believe that AI will accelerate data security detection and response, and 76% think AI will improve the accuracy of data security detection and response strategies. With its cutting edge, generative AI-powered investigative capabilities, DSI will transform and scale how data security admins analyze incident-related data. DSI uncovers key security and sensitive data risks and facilitates secure collaboration between partner teams to mitigate those identified risks. This simplifies previously complex, time-consuming tasks – what once took months, can now be done in a fraction of the time.
Hello Friday 🎉 ! It’s time to unwind with a great story. Who doesn’t love comics? I certainly do! So, let’s dive into my comic story and introduce you my character… My new Tech Comic: Meet Jo Valiant the Guardian of Digital Realms & AI Ethics
🆕 Character 🦸 Name: Jo Valiant ✍ Alias: The Ciphermind 🚨 Role: Guardian of Digital Realms & AI Ethics 🗒️ Catchphrase: “Decode The Chaos.”
In a futuristic digital landscape where data flows like storms and privacy is constantly under threat, emerges Jo The Ciphermind—a guardian clad in encrypted armor and equipped with a mind shielded by advanced privacy protocols. Jo is not just a character but a symbol of resilience and vigilance in the realm of Microsoft 365 Copilot. With glowing blue accents and a brain symbol illuminated on the chest, Jo represents the fusion of human cognition and artificial intelligence. The headphones signify constant connectivity, while the surrounding icons—a padlock, AI chip, shield with a brain, and fingerprint—highlight Jo’s mission to protect data, ensure privacy, and uphold security. This slide introduces Jo as the protagonist of our comic-style journey, setting the stage for an engaging exploration of how Microsoft 365 Copilot integrates these critical elements into its ecosystem.
Balance of Innovation and Integrity Jo’s journey highlights the balance between advancing AI innovation and upholding responsible data stewardship.
Jo’s Mission Jo The Ciphermind’s mission transcends individual battles—it’s about empowering users with transparency, control, and trust in Microsoft 365 Copilot.
Today, March 13, Microsoft announce the public preview release of Microsoft Security Exposure Management. This transformative solution unifies disparate data silos, extending end-to-end visibility to security teams across all assets. By enabling a thorough assessment of security posture and exposure, this solution equips teams to not only grasp their current security landscape but also elevate it to new heights. Microsoft Security Exposure Management serves as a cornerstone for proactive risk management, empowering organizations to adeptly navigate and mitigate threat exposure across their entire attack surface.
Microsoft Security Exposure Management empowers customers to:
Build an effective exposure management program with a continuous threat exposure management (CTEM) process.
Reduce risk with a clear view of every asset and real-time assessment of potential exposures both inside-out and outside-in.
Identify and classify critical assets, ensuring they are protected against a wide variety of threats.
Discover and visualize potential adversary intrusion paths, including lateral movement, to proactively identify and stop attacker activity.
Communicate exposure risk to business leaders and stakeholders with clear KPIs and actionable insights.
Enhance exposure analysis and remediation by integrating with third-party data sources and tools
At launch, we are introducing new capabilities that are foundational to exposure management programs:
Attack Surface Management: Provides a comprehensive view of the entire attack surface, allowing the exploration of assets and their relationships.
Attack Path Analysis: Assists security teams in visualizing and prioritizing attack paths and risks across environments, enabling focused remediation efforts to reduce exposure and breach likelihood.
Unified Exposure Insights: Provides decision-makers with a consolidated, clear view of an organization’s threat exposure, facilitating security teams in addressing critical questions about security posture.