The interface is reasonable for administration given what limited cability the product has. Review collected by and hosted on G2.com.
There is a great deal to dislike. External Authentication Mechanisms doesn't support primary factors so MSFT forces me to try and go Passwordless "their way" -their implimentation of passkeys is not appropriate for enterprise use, it appears more consumer oriented. SAML integration is done through "federation" which is not granular the way Okta and every other SAML SSO is. In general the product is painful to set up, use and maintain. I haven't even started on the "hybrid" aspects with on Prem AD. It's like a sequel to a bad horror movie. Review collected by and hosted on G2.com.
We use Microsoft Defender for Endpoint on a very large deployment and most of the endpoints were previously running Cortex XDR. Defender provides high level of protections against cyber treats. Our GSOC team investigates incidents and deploys security policies via the Microsoft Defender portal. We were able to detect and stop cyber attacks in the very early stages and this helps us keep the environment clean. So far we haven't had any major incidents. Review collected by and hosted on G2.com.
It takes a lot of training and constant learning, managing the security policies for all protection modules is a complex process. There is no Linux support at this time. Review collected by and hosted on G2.com.
Data Loss Prevention (DLP), Compliance Manager, Insider Risk Management, Advanced eDiscovery and Privileged Access Management. Review collected by and hosted on G2.com.
It is complex to set up and manage by ordinary person, required well trained staff and also complex to manage license. Review collected by and hosted on G2.com.
Entertaining when using. For all levels of computer skill users. I think the qualities are standard but still fun. The games to learn are the best. I have not used other ones. I use this frequently on a daily basis. The easy of implementing made it easy for all users. Review collected by and hosted on G2.com.
The question is not good because all the experiences were positive, and I had not encountered any adverse occurrences. no improvements I can provide at this time. Customer support is easy and not issues. Review collected by and hosted on G2.com.
The best part about using Microsoft Purview with Information Protection is how it strengthens organizational security while helping end users avoid accidental mistakes that could compromise valuable data. In our organization, it has become an essential safeguard. Plus, when integrated with the Microsoft 365 suite, it truly showcases the power of the Microsoft ecosystem, delivering seamless, end-to-end services. Review collected by and hosted on G2.com.
The challenging part of Microsoft Purview Information Protection is that while they offer baseline labeling, which we can set up to fit our organization's processes and workflows, auto-labeling and automated processes—like tagging documents with financial or critical data, or detecting credentials in email bodies—require additional licenses. Also, during the initial setup, we faced challenges understanding the internal process for naming labels, determining the impact of actions, and rolling out the solution to users. Without proper internal exercises and thorough discovery of requirements, it can be difficult to implement smoothly. Review collected by and hosted on G2.com.
The best part of Microsoft 365 E5 Compliance Suite is to have everything you need in one place and to be able to intergrade it all together without a problem. Review collected by and hosted on G2.com.
It took me a little time to be able to understand all the features and use it to its max potential Review collected by and hosted on G2.com.
Purview Communication Compliance helped our organization to promote a positive and respectful workplace environment by detecting and addressing inappropriate behavior and communication among employees. Review collected by and hosted on G2.com.
Automated actions need some improvements. MS shouldn't assume these products will only be used by big enterprises. we have a small security team and we focus more on automations. Review collected by and hosted on G2.com.
Microsoft Purview has a host of tools that can be used to monitor and maintain information protection on a M365 Tenenat. It can be used to identify and manage highly sensitive data and encourage good informationn practises within the company. The use of labels to identify, educate and enforce company standards is particularly useful, as well as enforcing retention settings to ensure data is kept within a regional compliance law. Review collected by and hosted on G2.com.
It is a complicated tool and requires trained personnel to navigate the Purview portal. If it is accessed and managed by personnel not adequatly trainined in can have serious consequences with users prodictivity at risk. If I was to make one change it would be to ensure more safeguards around potential collaboration risks, with more warning about what the consequences of Actions that can be alligned with identified sensitive data. The other point I find with this is dealing with Microsoft Support can be painful, with the majority of the time the support person does not have the subject knowledge to effectively deal with complex issues that can arrise with this product. I have found Microsoft premium support to be better however that is not available to everyone who uses this product. Review collected by and hosted on G2.com.
The best thing which i liked the most in Microsoft Defender XDR is the Unified Security across Endpoints, Email, cloud and other sources. Another feature is Automated response and remediation. I like the treat intelligence and analytics. The customer support is quick and respponsive. We use this solution daily and it has a lot of features with the ease of using the tool. Review collected by and hosted on G2.com.
Implementation was a bit slower than expected but it can depend user to user. High Licensing cost, Complex setup and management. Review collected by and hosted on G2.com.