Microsoft Purview Integration
Synchronize Noxys classification data with Microsoft Purview sensitivity labels to enforce consistent data protection policies across your organization.
Overview
This integration enables:
- Classify interactions using Purview sensitivity labels
- Enforce label-based policies in Noxys
- Unified data classification across Office 365 and AI services
- Compliance reporting with label metadata
Data Flow:
AI Interaction → Noxys Classification → Purview Label → Policy Enforcement
Prerequisites
- Microsoft Purview Information Protection subscription
- Sensitivity labels configured in Purview
- Azure AD / Entra ID tenant
- Admin role in Noxys
- Information Protection admin role in Azure
Step 1: Create Sensitivity Labels in Purview
Define labels that correspond to your data classification levels.
- Microsoft Purview Compliance Portal → Information Protection → Labels
- Click Create a label
- Configure label:
- Name:
Public - Description:
Non-sensitive data, shareable - Color: Green
- Name:
- Save
- Repeat for:
Internal(Yellow)Confidential(Orange)Restricted(Red)
Step 2: Register Noxys in Azure
Create an app registration for Noxys to access Purview APIs.
- Azure Portal → App registrations → New registration
- Configure:
- Name:
Noxys Purview Integration - Supported account types:
Single tenant
- Name:
- Register
- Note Client ID and Tenant ID
Step 3: Create Client Secret
Generate credentials for Noxys to authenticate.
- Certificates & secrets → New client secret
- Configure:
- Description:
Purview API - Expires: 24 months
- Description:
- Copy secret value
Step 4: Configure API Permissions
Grant Purview API permissions.
- API permissions → Add a permission
- Select Microsoft Graph
- Choose Application permissions:
InformationProtectionPolicy.Read.AllSecurityEvents.Read.All
- Grant admin consent
Step 5: Enable in Noxys
Configure Purview integration in Noxys admin panel.
- Noxys Admin Panel → Integrations → Microsoft Purview
- Click Enable Integration
- Configure:
| Field | Value |
|---|---|
| Tenant ID | Your Azure tenant ID |
| Client ID | App registration Client ID |
| Client Secret | Client secret from step 3 |
- Click Test Connection
- Should show: "✓ Successfully connected to Purview"
- Click Save
Step 6: Configure Label Mapping
Map Noxys classifications to Purview labels.
- Settings → Classification Mapping
- Configure mappings:
| Noxys Classification | Purview Label | Justification |
|---|---|---|
| No PII | Public | No sensitive data |
| Low risk | Internal | Internal use only |
| Medium risk (EMAIL, PHONE) | Confidential | Contains PII |
| High risk (CREDIT_CARD, NIR) | Restricted | Financial/Identity data |
- Save
Step 7: Create Policies Using Labels
Define Noxys policies that enforce Purview labels.
- Admin Panel → Policies → Create Policy
- Configure:
- Name: "Block Restricted label data on unauthorized platforms"
- Rules:
Condition: Purview label = Restricted
AND platform_id in [perplexity, deepseek, grok]
Action: Block
- Save and Enable
Step 8: Verification
Verify integration is working.
- In Noxys: Create interaction with high-risk PII
- Expected: Automatically labeled as
Restrictedbased on mapping - Policy: Should trigger block or coach based on policy
- In Purview: (Optional) View classification data in compliance reports
Supported Sensitivity Labels
Noxys supports all Purview sensitivity labels:
- Public — No protection needed
- Internal — For internal use only
- Confidential — Restricted access required
- Restricted — Maximum protection, limited access
- Custom labels — Any custom label you create
Advanced: Dynamic Label Assignment
Automatically assign labels based on interaction characteristics.
Configuration:
{
"rules": [
{
"condition": {
"classifications": "contains",
"value": "CREDIT_CARD"
},
"label": "Restricted"
},
{
"condition": {
"risk_score": "gte",
"value": 0.8
},
"label": "Confidential"
},
{
"condition": {
"risk_score": "lt",
"value": 0.5
},
"label": "Public"
}
]
}
Compliance Reporting
Generate reports with label data for compliance audits.
- Admin Panel → Reports → Classification Report
- Filter by:
- Date range
- Sensitivity label
- Platform
- Export as CSV/PDF for audits
Sample report:
Label | Count | % of Total | High Risk | Blocked
--------------|-------|-----------|-----------|--------
Public | 45,230| 19% | 0 | 0
Internal | 123,400| 52% | 234 | 12
Confidential | 56,780| 24% | 2,345 | 89
Restricted | 8,900 | 3% | 7,800 | 4,200
Troubleshooting
Labels Not Syncing
- Verify integration is Enabled
- Settings → Integrations → Microsoft Purview → Status
- Check permissions in Azure
- InformationProtectionPolicy.Read.All granted
- Test connection again
- Click Test Connection button
Classifications Not Labeled
- Verify label mapping is configured
- Settings → Classification Mapping
- Check if interaction matches mapping criteria
- Review Noxys logs for classification errors
Policy Not Triggering
- Verify policy is Enabled
- Check policy conditions match interaction data
- Test policy with manual interaction creation
- Review audit log for policy evaluation
Cost Considerations
- Purview subscription: Required (included with E5 or standalone)
- API calls: Included in Purview subscription
- No additional cost for Noxys Purview integration
Best Practices
-
Keep labels aligned
- Update Purview labels when classification schemes change
- Update Noxys label mapping to match
-
Use label hierarchy
- Parent label: "Sensitive Data"
- Sub-labels: "Financial", "Medical", "Personal"
-
Enable conditional access
- In Purview, set restrictions based on labels
- E.g., Restricted label → Block unmanaged devices
-
Audit regularly
- Export classification reports monthly
- Review for false positives
-
Document label meanings
- Create organization wiki documenting each label
- Share with security and compliance teams
Integration with Other Microsoft Services
Purview integrations extend to:
- Microsoft 365: Apply labels to files, emails
- Microsoft Defender: Use labels for threat response
- Microsoft Sentinel: Include labels in security events
Data Retention
- Noxys classification data: 90 days (default)
- Purview labels: Retained indefinitely with your sensitivity labels
- To extend Noxys retention, upgrade plan or contact support
Disabling Integration
If you need to disable Purview integration:
- Integrations → Microsoft Purview → Disable
- Existing classifications remain in Noxys
- Policies still enforce using Noxys classifications
- Label metadata is no longer synced
To re-enable:
- Follow configuration steps again
- Classifications will be re-labeled based on current mapping
Compliance Notes
- GDPR: Classifications contain no raw personal data
- HIPAA: Supported for HIPAA-regulated data
- SOC 2: Purview integration is SOC 2 Type II compliant
Support
- Purview Docs: https://learn.microsoft.com/en-us/purview/
- Sensitivity Labels: https://learn.microsoft.com/en-us/purview/sensitivity-labels
- Noxys Support: support@noxys.eu
Related Integrations
- Microsoft Sentinel — SIEM integration
- Microsoft Entra ID — Identity integration
- Policies API — Create enforcement policies