{"id":16383,"date":"2026-05-19T08:01:13","date_gmt":"2026-05-18T23:01:13","guid":{"rendered":"https:\/\/m365jp.net\/?p=16383"},"modified":"2026-05-19T08:02:05","modified_gmt":"2026-05-18T23:02:05","slug":"mc1258000-updated-microsoft-purview-data-security-investigations-analyze-files-tied-to-endpoint-dlp-alerts","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-05-19-mc1258000-updated-microsoft-purview-data-security-investigations-analyze-files-tied-to-endpoint-dlp-alerts","title":{"rendered":"MC1258000 | (Updated) Microsoft Purview: Data Security Investigations \u2013 analyze files tied to endpoint DLP alerts"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1258000 | (Updated) Microsoft Purview: Data Security Investigations \u2013 analyze files tied to endpoint DLP alerts<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>stayInformed<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>05\/18\/2026 22:43:48<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>03\/21\/2026 16:18:41<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>07\/20\/2026 07:00:00<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<p>Updated May 18, 2026: We have updated the timeline. Thank you for your patience.&nbsp;<\/p>\n<p><b>[Introduction]<\/b><\/p>\n<p>We\u2019re introducing <b>endpoint Data Loss Prevention (DLP) events<\/b> as a <b>queryable data source<\/b> in  <i>Data Security Investigations (DSI) in Microsoft Purview<\/i>. With this update, administrators can build endpoint DLP queries directly in DSI using filters such as date range, and DSI will automatically pull files associated with those events into the investigation   for analysis. This integration helps security teams examine endpoint DLP activity at scale, reducing time and effort spent triaging individual alerts and improving the ability to identify patterns and potential data exfiltration scenarios.<\/p>\n<p>This message is associated with <b>Microsoft 365 Roadmap ID <a href=\"https:\/\/www.microsoft.com\/microsoft-365\/roadmap?filters=&amp;searchterms=558547\" target=\"_blank\">  558547<\/a><\/b>.<\/p>\n<p><b>[When this will happen]<\/b><\/p>\n<ul>\n<li><b>Public Preview:<\/b> Rollout begins in <b>early June 2026<\/b> (previously&nbsp;late April)&nbsp;and completes in<b> early June 2026<\/b> (previously&nbsp;mid\u2011May)<b>.<\/b><\/li>\n<li><b>General Availability (Worldwide): <\/b>Rollout begins in <b>mid-June 2026<\/b> (previously&nbsp;mid\u2011May)<b>&nbsp;<\/b>and completes in  <b>mid-June 2026<\/b> (previously&nbsp;mid\u2011May).<\/li>\n<\/ul>\n<p><b>[How this will affect your organization]<\/b><\/p>\n<p><i>Who is affected<\/i><\/p>\n<p>Admins and security investigators using<b> Data Security Investigations (DSI) <\/b>  and<b> endpoint Data Loss Prevention (DLP)<\/b> in the <i>Microsoft Purview compliance portal<\/i>.<\/p>\n<p><i>What will happen<\/i><\/p>\n<ul>\n<li>A<b> new Endpoint DLP tab<\/b> will appear in the <i>DSI search experience<\/i>, alongside the existing Query Builder and Audit tabs.  <\/li>\n<li>Admins and investigators can query endpoint DLP events using date range filters (additional filters coming soon).  <\/li>\n<li>Files associated with matching endpoint DLP events will be automatically added to the investigation scope for analysis using DSI\u2019s AI\u2011powered tools.  <\/li>\n<li>This feature will appear automatically for eligible tenants when rollout completes. No admin action is required to enable it.<\/li>\n<li>There is no user impact.<\/li>\n<\/ul>\n<p><b>[What you can do to prepare]<\/b><\/p>\n<p>No action is required. Optionally, you may:<\/p>\n<ul>\n<li>Review how endpoint DLP query capabilities work within DSI.<\/li>\n<li>Update internal documentation for alert triage and investigation workflows, if applicable.<\/li>\n<li>Inform security teams and endpoint DLP administrators about this new capability.<\/li>\n<\/ul>\n<p><b>Learn more:&nbsp;<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/data-security-investigations\" target=\"_blank\">Learn about Data Security Investigations | Microsoft Purview | Microsoft Learn<\/a>  <\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/endpoint-dlp-learn-about\" target=\"_blank\">Learn about Endpoint data loss prevention | Microsoft Purview | Microsoft Learn<\/a><\/li>\n<\/ul>\n<p><b>[Compliance considerations]<\/b><\/p>\n<table class=\"table table-bordered\">\n<tbody>\n<tr>\n<td><b>Question<\/b><\/td>\n<td><b>Answer<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Does the change alter how existing customer data is processed, stored, or accessed?<\/b><\/td>\n<td><b>Yes. <\/b>Endpoint DLP event data becomes queryable in DSI, and associated files are automatically collected into investigations for analysis.<\/td>\n<\/tr>\n<tr>\n<td><b>Does the change introduce or significantly modify AI\/ML capabilities that interact with customer data?<\/b><\/td>\n<td><b>Yes. <\/b>DSI\u2019s existing AI\u2011assisted investigation tools will now analyze files gathered through endpoint DLP queries.<\/td>\n<\/tr>\n<tr>\n<td><b>Does the change modify how admins can monitor, report on, or demonstrate compliance activities?<\/b><\/td>\n<td><b>Yes. <\/b>Admins gain new ways to surface, query, and analyze endpoint DLP signals within DSI.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><\/b><\/p>\n<\/p>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<p>2026\u5e745\u670818\u65e5\u66f4\u65b0:\u30bf\u30a4\u30e0\u30e9\u30a4\u30f3\u3092\u66f4\u65b0\u3057\u307e\u3057\u305f\u3002\u3054\u8f9b\u62b1\u3044\u305f\u3060\u304d\u3042\u308a\u304c\u3068\u3046\u3054\u3056\u3044\u307e\u3059\u3002&nbsp;<\/p>\n<p><b>[\u306f\u3058\u3081\u306b]<\/b><\/p>\n<p><i>Microsoft Purview\u306eData Security Investigations(DSI)<\/i>\u306b\u304a\u3044\u3066\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306e\u30c7\u30fc\u30bf\u640d\u5931<b>\u9632\u6b62(DLP)\u30a4\u30d9\u30f3\u30c8<\/b>\u3092<b>\u30af\u30a8\u30ea\u53ef\u80fd\u306a\u30c7\u30fc\u30bf\u30bd\u30fc\u30b9<\/b>\u3068\u3057\u3066\u5c0e\u5165\u3057\u307e\u3059\u3002\u3053\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306b\u3088\u308a\u3001\u7ba1\u7406\u8005\u306f\u65e5\u4ed8\u7bc4\u56f2\u306a\u3069\u306e\u30d5\u30a3\u30eb\u30bf\u30fc\u3092\u4f7f\u3063\u3066DSI\u5185\u3067\u76f4\u63a5\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8DLP\u30af\u30a8\u30ea\u3092\u4f5c\u6210\u3067\u304d\u3001DSI\u306f\u305d\u308c\u3089\u306e\u30a4\u30d9\u30f3\u30c8\u306b\u95a2\u9023\u3059\u308b\u30d5\u30a1\u30a4\u30eb\u3092\u81ea\u52d5\u7684\u306b\u8abf\u67fb\u306b\u5f15\u304d\u5bc4\u305b\u3066\u5206\u6790\u3057\u307e\u3059\u3002\u3053\u306e\u7d71\u5408\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u306f\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u6d3b\u52d5\u3092\u5927\u898f\u6a21\u306b\u8abf\u67fb\u3057\u3001\u500b\u5225\u30a2\u30e9\u30fc\u30c8\u306e\u30c8\u30ea\u30a2\u30fc\u30b8\u306b\u304b\u304b\u308b\u6642\u9593\u3068\u52b4\u529b\u3092\u524a\u6e1b\u3057\u3001\u30d1\u30bf\u30fc\u30f3\u3084\u30c7\u30fc\u30bf\u6d41\u51fa\u30b7\u30ca\u30ea\u30aa\u306e\u7279\u5b9a\u80fd\u529b\u3092\u5411\u4e0a\u3055\u305b\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30e1\u30c3\u30bb\u30fc\u30b8\u306f <b>Microsoft 365 Roadmap ID <a href=\"https:\/\/www.microsoft.com\/microsoft-365\/roadmap?filters=&amp;searchterms=558547\" target=\"_blank\">  558547<\/a><\/b>\u306b\u95a2\u9023\u4ed8\u3051\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><b>[\u3044\u3064\u8d77\u3053\u308b\u304b]<\/b><\/p>\n<ul>\n<li><b>\u516c\u958b\u30d7\u30ec\u30d3\u30e5\u30fc:<\/b> \u5c55\u958b\u306f <b>2026\u5e746\u6708\u521d\u65ec<\/b> (\u4ee5\u524d&nbsp;\u306f&nbsp;4\u6708\u4e0b\u65ec)\u306b\u59cb\u307e\u308a\u3001<b> 2026\u5e746\u6708\u521d<\/b> \u65ec(\u4ee5\u524d&nbsp;\u306f5\u6708\u4e2d\u65ec)\u306b\u5b8c\u4e86<b>\u3057\u307e\u3059\u3002<\/b><\/li>\n<li><b>\u4e00\u822c\u516c\u958b(\u4e16\u754c): <\/b>\u5c55\u958b\u306f<b>2026\u5e746\u6708\u4e2d\u65ec<\/b>(\u4ee5\u524d&nbsp;\u306f5\u6708<b><\/b>\u4e2d\u65ec)\u306b\u59cb\u307e\u308a<b>\u30012026\u5e746\u6708\u4e2d\u65ec(\u4ee5\u524d\u306f5\u6708\u4e2d\u65ec)\u306b\u5b8c\u4e86\u3057\u307e\u3059\u3002&nbsp;<\/b>&nbsp;<\/li>\n<\/ul>\n<p><b>\u3010\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\u3011<\/b><\/p>\n<p><i>\u5f71\u97ff\u3092\u53d7\u3051\u308b\u4eba\u7269<\/i><\/p>\n<p>\u7ba1\u7406\u8005\u304a\u3088\u3073\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u5b98\u306f<i>\u3001Microsoft Purview\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30dd\u30fc\u30bf\u30eb<\/i>\u3067<b>Data Security Investigations(DSI)<\/b>\u304a\u3088\u3073<b>\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP<\/b>)\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><i>\u4f55\u304c\u8d77\u3053\u308b\u306e\u304b<\/i><\/p>\n<ul>\n<li><i>DSI\u691c\u7d22\u4f53\u9a13<\/i>\u306b\u306f\u3001\u65e2\u5b58\u306e\u30af\u30a8\u30ea\u30d3\u30eb\u30c0\u30fc\u304a\u3088\u3073\u76e3\u67fb\u30bf\u30d6\u3068\u3068\u3082\u306b<b>\u65b0\u3057\u3044\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8DLP\u30bf\u30d6<\/b>\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u7ba1\u7406\u8005\u3084\u8abf\u67fb\u8005\u306f\u3001\u65e5\u4ed8\u7bc4\u56f2\u30d5\u30a3\u30eb\u30bf\u30fc(\u8ffd\u52a0\u306e\u30d5\u30a3\u30eb\u30bf\u30fc\u3082\u8fd1\u65e5\u516c\u958b\u4e88\u5b9a)\u3092\u4f7f\u3063\u3066\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u30a4\u30d9\u30f3\u30c8\u3092\u30af\u30a8\u30ea\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u30a4\u30d9\u30f3\u30c8\u306b\u95a2\u9023\u3057\u305f\u30d5\u30a1\u30a4\u30eb\u306f\u3001DSI\u306eAI\u642d\u8f09\u30c4\u30fc\u30eb\u3092\u7528\u3044\u305f\u5206\u6790\u306e\u305f\u3081\u306b\u81ea\u52d5\u7684\u306b\u8abf\u67fb\u7bc4\u56f2\u306b\u8ffd\u52a0\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u3053\u306e\u6a5f\u80fd\u306f\u3001\u5c55\u958b\u5b8c\u4e86\u6642\u306b\u5bfe\u8c61\u30c6\u30ca\u30f3\u30c8\u306b\u81ea\u52d5\u7684\u306b\u8868\u793a\u3055\u308c\u307e\u3059\u3002\u6709\u52b9\u5316\u306b\u7ba1\u7406\u8005\u306e\u64cd\u4f5c\u306f\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002<\/li>\n<li>\u30e6\u30fc\u30b6\u30fc\u3078\u306e\u5f71\u97ff\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/li>\n<\/ul>\n<p><b>\u3010\u6e96\u5099\u306e\u305f\u3081\u306b\u3067\u304d\u308b\u3053\u3068\u3011<\/b><\/p>\n<p>\u4f55\u306e\u5bfe\u5fdc\u3082\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002\u30aa\u30d7\u30b7\u30e7\u30f3\u3068\u3057\u3066\u3001\u4ee5\u4e0b\u3082\u53ef\u80fd\u3067\u3059:<\/p>\n<ul>\n<li>DSI\u5185\u3067\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8DLP\u30af\u30a8\u30ea\u6a5f\u80fd\u304c\u3069\u306e\u3088\u3046\u306b\u6a5f\u80fd\u3059\u308b\u304b\u3092\u78ba\u8a8d\u3057\u307e\u3057\u3087\u3046\u3002<\/li>\n<li>\u8a72\u5f53\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30e9\u30fc\u30c8\u30c8\u30ea\u30a2\u30fc\u30b8\u3084\u8abf\u67fb\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u306e\u5185\u90e8\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u66f4\u65b0\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u3053\u306e\u65b0\u3057\u3044\u6a5f\u80fd\u306b\u3064\u3044\u3066\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u3084\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u7ba1\u7406\u8005\u306b\u77e5\u3089\u305b\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<\/ul>\n<p><b>\u8a73\u3057\u304f\u306f\u3053\u3061\u3089:&nbsp;<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/data-security-investigations\" target=\"_blank\">\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8abf\u67fb\u306b\u3064\u3044\u3066\u5b66\u3076 |Microsoft Purview |Microsoft Learn<\/a>  <\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/purview\/endpoint-dlp-learn-about\" target=\"_blank\">\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306e\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62\u306b\u3064\u3044\u3066\u5b66\u3073\u307e\u3057\u3087\u3046 |Microsoft Purview |Microsoft Learn<\/a><\/li>\n<\/ul>\n<p><b>[\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8003\u616e\u4e8b\u9805]<\/b><\/p>\n<table class=\"table table-bordered\">\n<tbody>\n<tr>\n<td><b>\u8cea\u554f<\/b><\/td>\n<td><b>\u56de\u7b54<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>\u3053\u306e\u5909\u66f4\u306f\u65e2\u5b58\u306e\u9867\u5ba2\u30c7\u30fc\u30bf\u306e\u51e6\u7406\u3001\u4fdd\u5b58\u3001\u30a2\u30af\u30bb\u30b9\u65b9\u6cd5\u3092\u5909\u3048\u307e\u3059\u304b?<\/b><\/td>\n<td><b>\u306f\u3044\u3002 <\/b>\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u30a4\u30d9\u30f3\u30c8\u30c7\u30fc\u30bf\u306fDSI\u3067\u30af\u30a8\u30ea\u53ef\u80fd\u306b\u306a\u308a\u3001\u95a2\u9023\u3059\u308b\u30d5\u30a1\u30a4\u30eb\u306f\u81ea\u52d5\u7684\u306b\u8abf\u67fb\u306b\u53ce\u96c6\u3055\u308c\u3066\u5206\u6790\u3055\u308c\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td><b>\u3053\u306e\u5909\u66f4\u306f\u9867\u5ba2\u30c7\u30fc\u30bf\u3068\u9023\u643a\u3059\u308bAI\/ML\u6a5f\u80fd\u3092\u5c0e\u5165\u307e\u305f\u306f\u5927\u5e45\u306b\u5909\u66f4\u3059\u308b\u3082\u306e\u304b?<\/b><\/td>\n<td><b>\u306f\u3044\u3002 <\/b>DSI\u306e\u65e2\u5b58\u306eAI\u652f\u63f4\u8abf\u67fb\u30c4\u30fc\u30eb\u306f\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u30af\u30a8\u30ea\u3092\u901a\u3058\u3066\u53ce\u96c6\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u3092\u5206\u6790\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td><b>\u3053\u306e\u5909\u66f4\u306f\u7ba1\u7406\u8005\u304c\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u6d3b\u52d5\u306e\u76e3\u8996\u3001\u5831\u544a\u3001\u307e\u305f\u306f\u793a\u305b\u308b\u65b9\u6cd5\u3092\u5909\u3048\u308b\u306e\u3067\u3057\u3087\u3046\u304b?<\/b><\/td>\n<td><b>\u306f\u3044\u3002 <\/b>\u7ba1\u7406\u8005\u306fDSI\u5185\u3067\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eDLP\u4fe1\u53f7\u3092\u8868\u9762\u5316\u3001\u30af\u30a8\u30ea\u3001\u5206\u6790\u3059\u308b\u65b0\u305f\u306a\u65b9\u6cd5\u3092\u5f97\u3089\u308c\u307e\u3059\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><\/b><\/p>\n<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1258000 | (Updated) Microsoft Purview: Data Security Investigations \u2013 analyze files tied to endpoint DLP ale [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16383","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=16383"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16383\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=16383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=16383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=16383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}