{"id":16299,"date":"2026-05-06T09:01:28","date_gmt":"2026-05-06T00:01:28","guid":{"rendered":"https:\/\/m365jp.net\/?p=16299"},"modified":"2026-05-06T09:02:13","modified_gmt":"2026-05-06T00:02:13","slug":"mc1301831-microsoft-purview-data-security-investigations-introducing-optical-character-recognition-ocr-support","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-05-06-mc1301831-microsoft-purview-data-security-investigations-introducing-optical-character-recognition-ocr-support","title":{"rendered":"MC1301831 | Microsoft Purview: Data Security Investigations \u2013 Introducing optical character recognition (OCR) support"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1301831 | Microsoft Purview: Data Security Investigations \u2013 Introducing optical character recognition (OCR) support<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>planForChange<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>05\/05\/2026 23:32:21<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>05\/05\/2026 23:32:03<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>08\/27\/2026 07:00:00<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<p><b>[Introduction]<\/b><\/p>\n<p>  Microsoft Purview <b>Data Security Investigations (DSI) <\/b>is expanding its AI-powered investigation capabilities by adding<b> optical character recognition (OCR)<\/b>. This enhancement enables DSI to extract and analyze text from images, helping organizations   identify sensitive information embedded in visual content. This improves the accuracy and depth of data security investigations.<\/p>\n<p>This message is associated with Microsoft 365 Roadmap ID <a href=\"https:\/\/www.microsoft.com\/microsoft-365\/roadmap?filters=&amp;searchterms=561489\" target=\"_blank\">  561489<\/a>.<\/p>\n<p><b>[When this will happen:]<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>Public Preview (Worldwide): We will begin rolling out in<b> late May 2026<\/b> and expect to complete by  <b>early June 2026<\/b>.<\/li>\n<p>  <\/p>\n<li>General Availability (Worldwide): We will begin rolling out in <b>mid-July 2026<\/b> and expect to complete by<b> late July 2026<\/b>.<\/li>\n<p>  <\/ul>\n<p><b>[How this affects your organization:]<\/b><\/p>\n<p><b>Who is affected:<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>Admins and analysts using <b>Microsoft Purview Data Security Investigations (DSI)<\/b><\/li>\n<p>  <\/p>\n<li>Organizations investigating data security risks using Purview<\/li>\n<p>  <\/ul>\n<p><b>What will happen:<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>OCR will be <b>enabled by default<\/b> in Data Security Investigations.<\/li>\n<p>  <\/p>\n<li>DSI will automatically extract text from image-based content (for example: images, screenshots, embedded visuals in files).<\/li>\n<li>Extracted text will be incorporated into investigation datasets to improve search, analysis, and risk detection.<\/li>\n<li>Existing investigation workflows will require no changes.<\/li>\n<li>This can help improve detection of sensitive information that may be embedded in visual content.<\/li>\n<li>Existing Purview policies and controls (such as sensitivity labels and DLP) continue to be respected.<\/li>\n<p>  <\/ul>\n<p><b>[What you can do to prepare:]<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/ul>\n<p>No action is required prior to rollout.<\/p>\n<p>You may consider the following:<\/p>\n<ul>\n<li>Inform your security and compliance teams about improved detection capabilities involving image-based content.<\/li>\n<li>Review internal investigation procedures to account for insights derived from OCR.<\/li>\n<li>Update any internal documentation or training materials that reference Data Security Investigations capabilities.<\/li>\n<\/ul>\n<p><b>Learn more:<\/b><\/p>\n<ul>  <\/p>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/data-security-investigations-ai-analysis\" target=\"_blank\">Use AI analysis in Data Security Investigations | Microsoft Learn<\/a><\/li>\n<p>  <\/p>\n<li><a href=\"http:\/\/aka.ms\/dsidocs\" target=\"_blank\">Learn about Data Security Investigations | Microsoft Learn  <\/a><\/li>\n<\/ul>\n<p><b>[Compliance considerations:]<\/b><\/p>\n<p>  <\/p>\n<table>  <\/p>\n<tbody>\n<tr>  <\/p>\n<td><b>Consideration<\/b><\/td>\n<p>  <\/p>\n<td><b>Explanation<\/b><\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>Alters how existing customer data is processed<\/td>\n<p>  <\/p>\n<td>OCR introduces additional processing of image-based content in Data Security Investigations by extracting text for analysis.<\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>Introduces or modifies AI\/ML capabilities<\/td>\n<p>  <\/p>\n<td>AI-powered OCR is added to analyze visual content and enhance investigation insights.<\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>Alters admin monitoring, reporting, or compliance visibility<\/td>\n<p>  <\/p>\n<td>OCR-enriched data improves investigation depth, which may impact reporting and how compliance activities are reviewed.<\/td>\n<p>  <\/tr>\n<p>  <\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<p><b>[\u306f\u3058\u3081\u306b]<\/b><\/p>\n<p>Microsoft Purview <b>Data Security Investigations(DSI)\u306f <\/b><b>\u3001\u5149\u5b66\u6587\u5b57\u8a8d\u8b58(OCR)<\/b>\u3092\u8ffd\u52a0\u3059\u308b\u3053\u3068\u3067AI\u642d\u8f09\u306e\u8abf\u67fb\u80fd\u529b\u3092\u62e1\u5927\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u6a5f\u80fd\u306b\u3088\u308a\u3001DSI\u306f\u753b\u50cf\u304b\u3089\u30c6\u30ad\u30b9\u30c8\u3092\u62bd\u51fa\u30fb\u5206\u6790\u3057\u3001\u7d44\u7e54\u304c\u8996\u899a\u30b3\u30f3\u30c6\u30f3\u30c4\u306b\u57cb\u3081\u8fbc\u307e\u308c\u305f\u6a5f\u5bc6\u60c5\u5831\u3092\u7279\u5b9a\u3059\u308b\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306e\u6b63\u78ba\u6027\u3068\u6df1\u3055\u304c\u5411\u4e0a\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30e1\u30c3\u30bb\u30fc\u30b8\u306fMicrosoft 365 Roadmap ID <a href=\"https:\/\/www.microsoft.com\/microsoft-365\/roadmap?filters=&amp;searchterms=561489\" target=\"_blank\">  561489<\/a>\u306b\u95a2\u9023\u4ed8\u3051\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><b>[\u3044\u3064\u8d77\u3053\u308b\u304b:]<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>\u30d1\u30d6\u30ea\u30c3\u30af\u30d7\u30ec\u30d3\u30e5\u30fc(\u4e16\u754c\u516c\u958b):<b> 2026\u5e745\u6708\u4e0b\u65ec<\/b> \u306b\u5c55\u958b\u3092\u958b\u59cb\u3057\u3001 <b>6\u6708\u521d<\/b>\u65ec\u307e\u3067\u306b\u5b8c\u4e86\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002<\/li>\n<p>  <\/p>\n<li>\u4e00\u822c\u516c\u958b(\u4e16\u754c): <b>2026\u5e747\u6708\u4e2d\u65ec<\/b> \u304b\u3089\u5c55\u958b\u3092\u958b\u59cb\u3057\u3001<b> 7\u6708\u4e0b\u65ec<\/b>\u307e\u3067\u306b\u5b8c\u4e86\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002<\/li>\n<p>  <\/ul>\n<p><b>[\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b:]<\/b><\/p>\n<p><b>\u5f71\u97ff\u3092\u53d7\u3051\u308b\u4eba\u7269:<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li><b>Microsoft Purview\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb(DSI<\/b>)\u3092\u5229\u7528\u3059\u308b\u7ba1\u7406\u8005\u304a\u3088\u3073\u30a2\u30ca\u30ea\u30b9\u30c8<\/li>\n<p>  <\/p>\n<li>Purview\u3092\u6d3b\u7528\u3057\u305f\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3092\u8abf\u67fb\u3059\u308b\u7d44\u7e54<\/li>\n<p>  <\/ul>\n<p><b>\u4eca\u5f8c\u306e\u5c55\u958b:<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>Data Security Investigations\u3067\u306f <b>OCR\u304c\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u6709\u52b9\u306b\u306a\u308a\u307e\u3059<\/b> \u3002<\/li>\n<p>  <\/p>\n<li>DSI\u306f\u753b\u50cf\u30d9\u30fc\u30b9\u306e\u30b3\u30f3\u30c6\u30f3\u30c4(\u4f8b:\u753b\u50cf\u3001\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8\u3001\u30d5\u30a1\u30a4\u30eb\u5185\u306e\u57cb\u3081\u8fbc\u307f\u30d3\u30b8\u30e5\u30a2\u30eb)\u304b\u3089\u81ea\u52d5\u7684\u306b\u30c6\u30ad\u30b9\u30c8\u3092\u62bd\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u62bd\u51fa\u3057\u305f\u30c6\u30ad\u30b9\u30c8\u306f\u8abf\u67fb\u30c7\u30fc\u30bf\u30bb\u30c3\u30c8\u306b\u7d44\u307f\u8fbc\u307e\u308c\u3001\u691c\u7d22\u3001\u5206\u6790\u3001\u30ea\u30b9\u30af\u691c\u51fa\u306e\u5411\u4e0a\u3092\u76ee\u6307\u3057\u307e\u3059\u3002<\/li>\n<li>\u65e2\u5b58\u306e\u8abf\u67fb\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u306f\u5909\u66f4\u3092\u5fc5\u8981\u3068\u3057\u307e\u305b\u3093\u3002<\/li>\n<li>\u3053\u308c\u306b\u3088\u308a\u3001\u8996\u899a\u30b3\u30f3\u30c6\u30f3\u30c4\u306b\u57cb\u3081\u8fbc\u307e\u308c\u3066\u3044\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u654f\u611f\u306a\u60c5\u5831\u306e\u691c\u51fa\u304c\u6539\u5584\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u65e2\u5b58\u306ePurview\u306e\u30dd\u30ea\u30b7\u30fc\u3084\u7ba1\u7406(\u30bb\u30f3\u30b7\u30c6\u30a3\u30d6\u30e9\u30d9\u30eb\u3084DLP\u306a\u3069)\u306f\u5f15\u304d\u7d9a\u304d\u5c0a\u91cd\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/li>\n<p>  <\/ul>\n<p><b>[\u6e96\u5099\u306e\u305f\u3081\u306b\u3067\u304d\u308b\u3053\u3068:]<\/b><\/p>\n<p>  <\/p>\n<ul>  <\/ul>\n<p>\u5c55\u958b\u524d\u306b\u4f55\u306e\u5bfe\u5fdc\u3082\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u4ee5\u4e0b\u306e\u3053\u3068\u3092\u691c\u8a0e\u3057\u3066\u304f\u3060\u3055\u3044:<\/p>\n<ul>\n<li>\u753b\u50cf\u30d9\u30fc\u30b9\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u306b\u95a2\u3059\u308b\u691c\u51fa\u80fd\u529b\u306e\u5411\u4e0a\u306b\u3064\u3044\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304a\u3088\u3073\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30c1\u30fc\u30e0\u306b\u901a\u77e5\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>OCR\u304b\u3089\u5f97\u3089\u308c\u305f\u6d1e\u5bdf\u3092\u8003\u616e\u3057\u3001\u5185\u90e8\u8abf\u67fb\u624b\u9806\u3092\u898b\u76f4\u3057\u307e\u3057\u3087\u3046\u3002<\/li>\n<li>\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306e\u80fd\u529b\u306b\u95a2\u3059\u308b\u5185\u90e8\u6587\u66f8\u3084\u7814\u4fee\u8cc7\u6599\u306f\u66f4\u65b0\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<\/ul>\n<p><b>\u8a73\u3057\u304f\u306f\u3053\u3061\u3089:<\/b><\/p>\n<ul>  <\/p>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/data-security-investigations-ai-analysis\" target=\"_blank\">\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306b\u304a\u3051\u308bAI\u5206\u6790\u306e\u6d3b\u7528 |Microsoft Learn<\/a><\/li>\n<p>  <\/p>\n<li><a href=\"http:\/\/aka.ms\/dsidocs\" target=\"_blank\">\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306b\u3064\u3044\u3066\u5b66\u3076 |Microsoft Learn  <\/a><\/li>\n<\/ul>\n<p><b>[\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u4e0a\u306e\u8003\u616e\u4e8b\u9805:]<\/b><\/p>\n<p>  <\/p>\n<table>  <\/p>\n<tbody>\n<tr>  <\/p>\n<td><b>\u8003\u616e<\/b><\/td>\n<p>  <\/p>\n<td><b>\u8aac\u660e<\/b><\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>\u65e2\u5b58\u306e\u9867\u5ba2\u30c7\u30fc\u30bf\u306e\u51e6\u7406\u65b9\u6cd5\u3092\u5909\u3048\u308b<\/td>\n<p>  <\/p>\n<td>OCR\u306f\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306b\u304a\u3044\u3066\u3001\u753b\u50cf\u30d9\u30fc\u30b9\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u8ffd\u52a0\u51e6\u7406\u3092\u5c0e\u5165\u3057\u3001\u5206\u6790\u7528\u306e\u30c6\u30ad\u30b9\u30c8\u3092\u62bd\u51fa\u3057\u307e\u3059\u3002<\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>AI\/ML\u306e\u6a5f\u80fd\u3092\u5c0e\u5165\u307e\u305f\u306f\u4fee\u6b63\u3059\u308b<\/td>\n<p>  <\/p>\n<td>AI\u642d\u8f09\u306eOCR\u304c\u8ffd\u52a0\u3055\u308c\u3001\u8996\u899a\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u89e3\u6790\u3057\u8abf\u67fb\u306e\u6d1e\u5bdf\u3092\u5f37\u5316\u3057\u307e\u3059\u3002<\/td>\n<p>  <\/tr>\n<p>  <\/p>\n<tr>  <\/p>\n<td>\u7ba1\u7406\u8005\u306e\u76e3\u8996\u3001\u5831\u544a\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u53ef\u8996\u6027\u3092\u5909\u66f4\u3059\u308b<\/td>\n<p>  <\/p>\n<td>OCR\u3067\u5f37\u5316\u3055\u308c\u305f\u30c7\u30fc\u30bf\u306f\u8abf\u67fb\u306e\u6df1\u3055\u3092\u5411\u4e0a\u3055\u305b\u3001\u5831\u544a\u3084\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u6d3b\u52d5\u306e\u898b\u76f4\u3057\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/td>\n<p>  <\/tr>\n<p>  <\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1301831 | Microsoft Purview: Data Security Investigations \u2013 Introducing optical character recognition (OCR)  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16299","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=16299"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16299\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=16299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=16299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=16299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}