🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided DP-700 Domain 1
Domain 1 — Module 6 of 8 75%
6 of 26 overall

DP-700 Study Guide

Domain 1: Implement and Manage an Analytics Solution

  • Workspace Settings: Your Fabric Foundation
  • Version Control: Git in Fabric
  • Deployment Pipelines: Dev to Production
  • Access Controls: Who Gets In
  • Data Security: Control Who Sees What
  • Governance: Labels, Endorsement & Audit
  • Orchestration: Pick the Right Tool
  • Pipeline Patterns: Parameters & Expressions

Domain 2: Ingest and Transform Data

  • Delta Lake: The Heart of Fabric Free
  • Loading Patterns: Full, Incremental & Streaming Free
  • Dimensional Modeling: Prep for Analytics Free
  • Data Stores & Tools: Make the Right Choice Free
  • OneLake Shortcuts: Data Without Duplication
  • Mirroring: Real-Time Database Replication
  • PySpark Transformations: Code Your Pipeline
  • Transform Data with SQL & KQL
  • Eventstreams & Spark Streaming: Real-Time Ingestion
  • Real-Time Intelligence: KQL & Windowing

Domain 3: Monitor and Optimize an Analytics Solution

  • Monitoring & Alerts: Catch Problems Early
  • Troubleshoot Pipelines & Dataflows
  • Troubleshoot Notebooks & SQL
  • Troubleshoot Streaming & Shortcuts
  • Optimize Lakehouse Tables: Delta Tuning
  • Optimize Spark: Speed Up Your Code
  • Optimize Pipelines & Warehouses
  • Optimize Streaming: Real-Time Performance

DP-700 Study Guide

Domain 1: Implement and Manage an Analytics Solution

  • Workspace Settings: Your Fabric Foundation
  • Version Control: Git in Fabric
  • Deployment Pipelines: Dev to Production
  • Access Controls: Who Gets In
  • Data Security: Control Who Sees What
  • Governance: Labels, Endorsement & Audit
  • Orchestration: Pick the Right Tool
  • Pipeline Patterns: Parameters & Expressions

Domain 2: Ingest and Transform Data

  • Delta Lake: The Heart of Fabric Free
  • Loading Patterns: Full, Incremental & Streaming Free
  • Dimensional Modeling: Prep for Analytics Free
  • Data Stores & Tools: Make the Right Choice Free
  • OneLake Shortcuts: Data Without Duplication
  • Mirroring: Real-Time Database Replication
  • PySpark Transformations: Code Your Pipeline
  • Transform Data with SQL & KQL
  • Eventstreams & Spark Streaming: Real-Time Ingestion
  • Real-Time Intelligence: KQL & Windowing

Domain 3: Monitor and Optimize an Analytics Solution

  • Monitoring & Alerts: Catch Problems Early
  • Troubleshoot Pipelines & Dataflows
  • Troubleshoot Notebooks & SQL
  • Troubleshoot Streaming & Shortcuts
  • Optimize Lakehouse Tables: Delta Tuning
  • Optimize Spark: Speed Up Your Code
  • Optimize Pipelines & Warehouses
  • Optimize Streaming: Real-Time Performance
Domain 1: Implement and Manage an Analytics Solution Premium ⏱ ~12 min read

Governance: Labels, Endorsement & Audit

Apply sensitivity labels, endorse trusted items, track activity with audit logs, and configure OneLake security for enterprise governance.

What is Fabric governance?

☕ Simple explanation

Think of a library’s classification system.

Every book has a label (fiction, reference, restricted). Some books get a “Staff Pick” sticker (endorsed). The library keeps a log of who borrowed what (audit trail). And the reading room has rules about who can photocopy which sections (data access policy).

Fabric governance is that system for your data platform. Sensitivity labels classify items by confidentiality. Endorsement marks items as trusted. Audit logs track who did what. And OneLake security controls data access at the storage layer.

Governance in Microsoft Fabric spans four interconnected capabilities: sensitivity labels from Microsoft Purview classify items and optionally apply encryption and access restrictions. Endorsement (promoted/certified) signals data quality and trust to consumers. Audit logs capture detailed activity records for compliance and forensic analysis. OneLake security provides storage-layer access controls that complement workspace and item permissions.

Sensitivity labels

Sensitivity labels from Microsoft Purview can be applied to Fabric items — lakehouses, warehouses, reports, notebooks, pipelines, and more.

What labels do in Fabric

CapabilityHow It Works
ClassificationVisual tag showing the sensitivity level (Public, General, Confidential, Highly Confidential)
Downstream inheritanceWhen a labeled lakehouse feeds a report, the report inherits the label automatically
Export protectionLabeled data exported to Excel or PDF retains its sensitivity label and encryption
Mandatory labelingTenant setting requires a label on every item — no unlabeled content allowed
Default labelsNew items automatically receive a default label (e.g., “General”)

Label hierarchy and inheritance

Lakehouse (Confidential)
  → Pipeline reads from it (inherits Confidential)
    → Report built on it (inherits Confidential)
      → Export to Excel (encrypted, Confidential label in file)

Labels flow downstream — from data source to consumer. The highest label in the chain applies.

💡 Scenario: Ibrahim enforces mandatory labeling

Ibrahim enables mandatory labeling for all Nexus Financial workspaces. Every new item must have a sensitivity label before it can be saved. He sets the default label to “Internal” — engineers can upgrade to “Confidential” or “Highly Confidential” but can never go below “Internal.”

When the compliance team creates a lakehouse with trading data, they apply “Highly Confidential.” Every report, notebook, and pipeline that touches this data automatically inherits the label.

Endorsement

Endorsement is Fabric’s trust signal. It tells consumers: “this item has been vetted.”

Two endorsement levels — promoted for teams, certified for organisation-wide trust
LevelPromotedCertified
Who can applyWorkspace Members and AdminsOnly designated certifiers (set by tenant admin)
Visual indicatorBlue badgeGreen badge with checkmark
Trust levelGood quality, ready for useVerified, authoritative — the gold standard
Typical useTeam-level — this dataset is ready for our teamOrg-level — this is the official source of truth
DiscoverabilityAppears in endorsed filter in data hubAppears at the top of endorsed results
💡 Exam tip: Who can certify?

Only users designated as certifiers by the Fabric tenant admin can apply the “Certified” badge. This is an explicit permission, not inherited from any workspace role. Even a workspace Admin cannot certify items unless they’re on the certifiers list.

Promoted is more democratic — any workspace Member or Admin can promote items.

Audit logs

Fabric generates detailed audit logs that flow into the Microsoft 365 unified audit log and can be accessed through the Microsoft Purview compliance portal or via the Office 365 Management API.

What’s logged

CategoryExamples
Item operationsCreate, update, delete items (lakehouses, pipelines, notebooks)
Data accessSQL queries, Spark reads, OneLake API access
Admin actionsWorkspace settings changes, capacity assignments, role changes
Security eventsPermission grants/revokes, sensitivity label changes, sharing
Pipeline runsStart, complete, fail — including activity-level details

Accessing audit logs

MethodBest For
Purview compliance portalManual investigation — search by user, date, activity
PowerShell (Search-UnifiedAuditLog)Scripted searches and exports
Microsoft 365 Management Activity APIAutomated ingestion into SIEM tools (Sentinel, Splunk)
Fabric Monitoring HubQuick view of recent workspace activity (not full audit depth)
ℹ️ Scenario: Ibrahim investigates a data export

The compliance team at Nexus Financial detects that a large dataset was exported from the trading lakehouse. Ibrahim searches the audit log:

  • Activity: Export to CSV
  • User: david@nexusfinancial.com
  • Item: FactTrades lakehouse
  • Timestamp: Saturday 2:14 AM
  • Sensitivity label: Highly Confidential

The Saturday timing and the sensitivity level trigger an investigation. Ibrahim pulls the full audit trail for David’s account over the past 30 days using PowerShell.

OneLake security posture

OneLake security is the storage-layer complement to workspace and item permissions. It controls:

SettingScope
OneLake data accessWhether external tools can read workspace data via ADLS Gen2 endpoints
External data sharingWhether shortcuts from other tenants can access this workspace’s OneLake data
Folder-level securityPer-folder read restrictions within a lakehouse (covered in the previous module)
💡 Exam tip: OneLake security vs workspace permissions

Workspace permissions control who can access Fabric items. OneLake security controls who can access the underlying storage. A user might have Viewer access to a lakehouse item but be blocked from reading OneLake files directly if OneLake data access is disabled.

Think of it as two doors: workspace permission opens the Fabric portal door; OneLake security opens the storage API door.


Question

What happens when a Confidential lakehouse feeds a Power BI report?

Click or press Enter to reveal answer

Answer

The report inherits the Confidential sensitivity label through downstream inheritance. If the report is exported to Excel, the Excel file also carries the Confidential label and any associated encryption.

Click to flip back

Question

What is the difference between Promoted and Certified endorsement?

Click or press Enter to reveal answer

Answer

Promoted: any workspace Member or Admin can apply — signals team-level quality (blue badge). Certified: only designated certifiers can apply — signals org-level authoritative source (green badge with checkmark).

Click to flip back

Question

Where do Fabric audit logs go?

Click or press Enter to reveal answer

Answer

Fabric audit logs flow into the Microsoft 365 unified audit log. Access them via the Purview compliance portal (manual search), PowerShell (Search-UnifiedAuditLog), or the Office 365 Management API (SIEM integration).

Click to flip back


Knowledge Check

A workspace Member wants to certify a lakehouse as the official source of truth for the organisation. They apply the Certified badge but get an error. Why?

Knowledge Check

Ibrahim needs to investigate who accessed a Highly Confidential lakehouse over the past 30 days and export the results for the legal team. Which approach is most appropriate?

🎬 Video coming soon

Next up: Orchestration: Pick the Right Tool — when to use Dataflows Gen2, pipelines, or notebooks for your data workflow.

← Previous

Data Security: Control Who Sees What

Next →

Orchestration: Pick the Right Tool

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.