WWL Tenants - Terms of use

If you are being provided with a tenant as a part of an instructor-led training delivery, please note that the tenant is made available for the purpose of supporting the hands-on labs in the instructor-led training.

Tenants should not be shared or used for purposes outside of hands-on labs. The tenant used in this course is a trial tenant and cannot be used or accessed after the class is over and are not eligible for extension.

Tenants must not be converted to a paid subscription. Tenants obtained as a part of this course remain the property of Microsoft Corporation and we reserve the right to obtain access and repossess at any time.

Lab 6 - Exercise 2 - Perform a content search

You are Joni Sherman, an Information Security Administrator at Contoso Ltd. The organization has received an alert that sensitive financial data may have been exposed. You’ve been asked to use Microsoft Purview to search for content containing key financial terms across Microsoft 365 services. Your goal is to determine whether any sensitive content was shared inappropriately and support the investigation.

Tasks:

  1. Assign eDiscovery permissions
  2. Search for content using sensitive financial terms

Task 1 – Assign eDiscovery permissions

In this task, you’ll assign eDiscovery permissions to Joni Sherman so she can perform a content search in Microsoft Purview.

  1. Sign into Client 1 VM (SC-401-CL1) as the SC-401-CL1\admin account.

  2. Open Microsoft Edge in an InPrivate window by right clicking Microsoft Edge from the task bar and selecting New InPrivate window.

  3. Navigate to https://purview.microsoft.com, and sign in as MOD Administrator, admin@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant prefix provided by your lab hosting provider). Admin’s password should be provided by your lab hosting provider.

  4. In the left sidebar, select Settings > Roles and Scopes > Role groups.

  5. On the Role groups for Microsoft Purview solutions page, search for eDiscovery, then select eDiscovery Manager.

  6. On the eDiscovery Manager flyout panel, select Edit.

  7. On the Manage eDiscovery Manager page, select Choose users.

  8. On the Choose users flyout page, search for Joni, then select the checkbox for Joni Sherman. Select the Select button at the bottom of the panel.

  9. Back on the Manage eDiscovery Manager page, select Next.

  10. On the Manage eDiscovery Administrator page, select Next.

  11. On the Review the role group and finish page, select Save.

  12. On the You successfully updated the role group page, select Done.

  13. Close the InPrivate window.

You’ve assigned eDiscovery permissions to Joni Sherman, enabling her to search for sensitive content as part of the investigation.

Task 2 – Search for content using sensitive financial terms

  1. Return to the Microsoft Edge window where you’re signed in as Joni Sherman.

  2. In Microsoft Purview, navigate to Solutions > eDiscovery.

  3. On the Cases page, select the dropdown next to Create case, then select Create search.

    Screenshot showing where to create a search in eDiscovery.

  4. On the Enter details to get started dialogue, enter:

    • Case name: Financial Data Exposure Review
    • Search name: Financial Data Leak Investigation
    • Case description: Case opened to support security investigation efforts by identifying potential exposure of sensitive financial terms in Microsoft 365 content.
    • Search description: Search targets common high-risk financial keywords to support data security monitoring and policy validation.
  5. Select Create to create the search.

  6. On the Financial Data Leak Investigation page, under Data sources select + (plus sign) > Add data sources.

    Screenshot showing add data sources in Content Search.

  7. On the Search for sources flyout, select the Finance team group, then select Save and close.

  8. In the Condition builder pane, add the keywords bank account and credit card, then select Run query.

    Screenshot showing the condition builder in Content Search.

  9. In the Choose search results flyout under Statistics, select the checkboxes for Include categories and Include query keywords report, then select Run Query.

  10. Review the results of the search by:

    • Select the Statistics tab to view a summary of search metrics.
    • Select the Sample tab to preview matched content.

You’ve performed a keyword-based content search to help identify whether sensitive financial data was shared inappropriately. These results support security investigations and help guide risk response.