Set up Microsoft Purview forensic evidence for Windows 365

Microsoft Purview forensic evidence helps you get better insights into potentially risky security-related user activities. With customizable event triggers and built-in user privacy protection controls, forensic evidence lets you customize visual activity capturing across devices. Forensic evidence helps your organization better mitigate, understand, and respond to potential data risks like unauthorized data exfiltration of sensitive data.

You set the right policies for your organization, like:

  • What risky events are the highest priority for capturing forensic evidence.
  • What data is most sensitive.
  • Whether users are notified when forensic capturing is activated.

Forensic evidence capturing is off by default and policy creation requires dual authorization.

Requirements

If the following requirements aren't met, you might run into Microsoft Purview client issues and the quality of forensic captures might not be reliable.

To set up Microsoft Purview forensic evidence, your environment must meet the following requirements:

Device configuration requirements

Role requirements

  • Account must have at least one of these roles:
    • Microsoft Entra ID Global Administrator role
    • Microsoft Entra ID Compliance Administrator role
    • Microsoft Purview Organization Management role group
    • Microsoft Purview Compliance Administrator role group
    • Insider Risk Management role group
    • Insider Risk Management Admins role group

For more information about insider risk management roles, see Enable permissions for insider risk management.

Turn on device onboarding

  1. Open the Microsoft Purview portal. Choose Settings > Device onboarding > Devices > Onboarding.

  2. Select which Deployment method to use to deploy the configuration package:

Deploy the configuration package using Intune

  1. Sign in to the Microsoft Intune admin center > Endpoint security > Microsoft Defender for Endpoint > Open the Microsoft Defender Security Center.

  2. Set Microsoft Intune connection to On and then Save preferences.

  3. Return to the Microsoft Defender for Endpoint and set the following options:

    • Allow Microsoft for Endpoint to enforce Endpoint Security Configurations: On
    • Connect Windows devices version 10.0.15063 and above to Microsoft Defender for Endpoint: On
  4. Select Save.

  5. Select Endpoint security > Endpoint detection and response > Create policy.

  6. Select the following options:

    • Platform: Windows 10, Windows 11, and Windows Server
    • Profile type: Endpoint detection and response
  7. Select Create.

  8. Provide a Name and Description > Next.

  9. On the Configuration settings page, for Microsoft Defender for Endpoint client configuration package type, select Auto from connector > Next.

  10. On the Scope tags page, select Next.

  11. On the Assignments page, select the group that includes the primary user of the Cloud PC > Next.

  12. On the Review and create page, when you're done, select Create.

After you create the policy, a user must sign in to their device before the policy is applied and the device is onboarded to Microsoft Defender for Endpoint.

Use a local script to deploy configuration package

Follow the instructions in Onboard Windows 10 and Windows 11 devices using a local script. This can be helpful when testing a subset of Cloud PCs before proceeding to onboard all your Cloud PCs.

View onboarding devices list

  1. Open the Microsoft Purview portal > Settings > Device onboarding > Devices.

  2. Check the following columns:

    • Configuration status: Shows if the device is configured correctly.
    • Policy sync status: Shows if the device updated to the latest policy version. Devices must be on to update to the latest policy.

Next steps

For more information about Microsoft Purview, see Learn about Microsoft Purview.