Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register
Home » Microsoft Taps Power of AI To Expand Breadth, Depth of Security Investigations
AI and Copilots

Microsoft Taps Power of AI To Expand Breadth, Depth of Security Investigations

Tom SmithBy Tom SmithJanuary 30, 20264 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

Microsoft is expanding its use of AI technology to protect corporate data estates and, more specifically, make security investigations more scalable and efficient.

The latest example of the company pushing AI deeper into its security portfolio is Microsoft Purview Data Security Investigations, which identifies data about risks, uses AI to conduct deep content analysis, and empowers security admins to mitigate risk. The software is intended to help customers address risks such as exposed credentials in files and systems across their software stack and sensitive documents being shared to a large group of users.

How It Works

Using Purview Data Security Investigations, data security admins can search their Microsoft 365 data estate to locate data from a range of apps and systems — emails, Teams messages, Copilot prompts — for data that could pose risk. They can also launch pre-scoped investigations from a Microsoft Defender XDR incident, a Microsoft Purview Insider Risk Management case, or from Microsoft Purview Data Security Posture Management.

Once that data or risk is identified, GenAI built into Purview Data Security Investigations conducts analysis across nearly 100 languages. Security teams can use this insight to determine what security risks exist, the specific level of risk they pose, and steps that can be taken to mitigate them. The objective: enable analysts to quickly analyze large volumes of data while saving critical time for triage, review, and mitigation.

Specific features designed to accelerate investigative results include:

AI Search that finds risks using keywords and metadata to locate content that’s relevant to an investigation across the data estate.

Categorization for automatically classifying investigation data to enable understanding of incident severity, types of content and risk, and trends. Data is automatically sorted into default, custom, or AI-suggested categories. Categorized items are grouped by subject matter and risk level.

Vector search to find and retrieve contextually related content even in the absence of matching keywords.

Risk examination that leverages deep content analysis to isolate sensitive data and security risk, assigns a risk score, and recommends mitigation steps. Analysts can find compromised credentials, network risks, or evidence of threat actor discussions associated with security incidents.

AI context input to add investigation-specific content before analysis for high-quality insights tailored to the specific incident.

Security teams can leverage Data Security Investigations’ integration with the Microsoft Sentinel graph to visualize correlations between investigation data, users, and their activities. It automatically combines unified audit logs, Entra (identity and access management) audit logs, and threat intelligence, which would otherwise need to be manually correlated. One specific mitigation action, known as purge, can be used to quickly delete sensitive or overshared content directly within the investigation workflow to keep incidents from escalating or recurring.

The software also includes a cost estimator to help analysts model and forecast both storage and compute unit costs based on their use cases for more accurate budget planning. A usage dashboard breaks down billed storage and compute unit usage, so admins can identify cost-saving opportunities and optimize resource allocation.

Where It Works

Data Security Investigations can be applied for activities ranging from reactive incident response to proactive risk assessment. While the product is now generally available, top use cases that emerged from customers in preview mode included:

  • Understanding the severity and sensitivity of data breaches and leaks
  • Scanning large SharePoint installations to identify files containing credentials such as passwords
  • Uncovering suspicious communications tied to vendor payments or client interactions that could indicate internal fraud or bribery
  • Determining who accessed classified documents after accidental sharing — and whether sensitive data was further distributed.
  • Executing investigations into inappropriate content to find what was posted, where, and by whom.

Customers can learn more about Data Security Investigations here.

More Microsoft Security and AI Insights:

  • Microsoft Outlines Way to Fight AI-Powered Attacks — With AI
  • With Agent 365 and Security Tools, Microsoft Equips Customers to Govern AI Agent Estates
  • With Agentic AI Infusion, Microsoft Positions Sentinel as Unifying Security Platform
  • Microsoft Advances AI Agents to Address the Scale of Phishing, Malware Threats

Ask Cloud Wars AI Agent about this analysis

ai Cloud Wars featured Microsoft SaaS
Share. Facebook Twitter LinkedIn Email
Analystuser

Tom Smith

Editor in Chief, analyst, Cloud Wars

Areas of Expertise
  • AI/ML
  • Business Apps
  • Cloud
  • Digital Business

Tom Smith analyzes AI, copilots, cloud companies, and tech innovations for Cloud Wars. He has worked as an analyst tracking technology and tech companies for more than 20 years.

  Contact Tom Smith ...

Related Posts

Oracle Expands Fusion Cloud with 29 Prebuilt AI Agents for SCM and CX

February 20, 2026

AI Agent and Copilot Podcast: Microsoft AI Model ‘Self Sufficiency’ Requires Customers to Hedge Bets

February 20, 2026

Enterprise AI in 2026: Scaling AI Agents with Autonomy, Orchestration, and Accountability

February 20, 2026

OpenClaw Founder Peter Steinberger Joins OpenAI in Major AI Talent Coup

February 20, 2026
Add A Comment

Comments are closed.

Recent Posts
  • Oracle Expands Fusion Cloud with 29 Prebuilt AI Agents for SCM and CX
  • AI Agent and Copilot Podcast: Microsoft AI Model ‘Self Sufficiency’ Requires Customers to Hedge Bets
  • Enterprise AI in 2026: Scaling AI Agents with Autonomy, Orchestration, and Accountability
  • OpenClaw Founder Peter Steinberger Joins OpenAI in Major AI Talent Coup
  • Amazon Sets World Record for CapEx Spending, and CEO Andy Jassy Is Delighted

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

Driving Business Transformation with Agentic AI and ServiceNow

January 9, 2026

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }