πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 4
Domain 4 β€” Module 7 of 7 100%
28 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 4: Microsoft Compliance Solutions Premium ⏱ ~10 min read

eDiscovery & Audit

When legal comes knocking, eDiscovery finds and preserves the evidence. Audit tracks who did what and when. Together they are the compliance team's investigation toolkit.

What is eDiscovery?

β˜• Simple explanation

Imagine a police investigation, but for emails and documents instead of physical evidence.

When a company faces a lawsuit or a regulatory investigation, the legal team needs to find every relevant email, document, and chat message β€” and make sure nothing gets deleted before the case is resolved.

eDiscovery (electronic discovery) is the process of searching, preserving, and exporting electronic data so it can be used as evidence. Think of it as a search warrant for your Microsoft 365 environment.

eDiscovery is the legal and technical process of identifying, preserving, collecting, and producing electronically stored information (ESI) in response to litigation, regulatory investigations, or internal inquiries.

Microsoft Purview provides three tiers of eDiscovery capability: Content search, eDiscovery Standard, and eDiscovery Premium β€” each adding more sophisticated features for complex legal matters.

The eDiscovery workflow

Every eDiscovery investigation follows the same logical steps, whether the case is simple or complex:

StepWhat happensExample at MedGuard
1. IdentifyDetermine what data is relevant and who the key people (custodians) areNadia identifies 5 clinicians involved in a patient complaint investigation
2. PreservePlace a legal hold on relevant content so it cannot be deleted or modifiedLegal hold placed on the 5 clinicians’ mailboxes and OneDrive accounts
3. CollectGather the preserved content into a manageable setSearch across Exchange, SharePoint, and Teams for messages mentioning the patient
4. ProcessRemove duplicates, extract metadata, prepare for reviewSystem de-duplicates 12,000 items down to 3,400 unique documents
5. ReviewLegal team reviews content for relevance and privilegeLawyers review the 3,400 documents, tag relevant and privileged items
6. ExportPackage reviewed content for submission to regulators or opposing counselExport 800 relevant documents in a standard legal format

Three tiers of eDiscovery

Microsoft Purview offers three levels β€” each building on the one below:

Content search

The simplest tool. Search across Exchange, SharePoint, OneDrive, and Teams for specific content using keywords, date ranges, and senders. You can preview results and export them. No case management, no legal hold β€” just search and export.

eDiscovery Standard

Adds case management on top of content search:

  • Create cases β€” organise searches and holds into named investigations
  • Legal hold β€” preserve content so users cannot delete it (even if they try)
  • Export results β€” package content for legal review

eDiscovery Premium

The full-featured tier for complex litigation and regulatory matters:

CapabilityWhat it does
Custodian managementTrack and manage the people (custodians) whose data is relevant to the case
Review setsLoad collected content into a dedicated workspace for legal review and tagging
Near-duplicate detectionIdentifies documents that are almost identical, reducing review time
Email threadingGroups email chains together so reviewers see conversations, not fragments
ThemesUses analytics to identify key topics across thousands of documents
Predictive coding (ML)Machine learning that predicts which documents are relevant based on reviewer decisions
πŸ’‘ Scenario: MedGuard faces a patient data complaint

A former patient files a complaint alleging that MedGuard staff improperly accessed their medical records. The health authority demands all relevant communications within 30 days.

Nadia’s response using eDiscovery Premium:

  1. Identify: Works with legal to identify 5 clinicians and 2 administrative staff as custodians
  2. Preserve: Places legal holds on all 7 custodians’ mailboxes, OneDrive, and Teams data
  3. Collect: Searches for the patient’s name, medical record number, and related terms across all locations
  4. Process: The system collects 15,000 items, de-duplicates to 4,200, and applies email threading
  5. Review: Legal team uses the review set to tag documents as relevant, privileged, or not responsive
  6. Export: 1,100 relevant documents are exported and submitted to the health authority

Without legal hold, those 7 users could have deleted emails and files during the investigation. Legal hold ensures nothing disappears.

Legal hold: the preservation lock

Legal hold is one of the most important eDiscovery concepts for the exam. When content is placed on legal hold:

  • Users can still work normally β€” they can read, edit, and even β€œdelete” items
  • Deleted items are preserved in a hidden location β€” the user thinks they deleted it, but eDiscovery can still find it
  • The hold stays until explicitly removed β€” it survives retention policy expiration, user deletion, and even account deactivation
πŸ’‘ Exam tip: legal hold vs retention

The exam may try to confuse legal hold with retention policies. They are different tools for different purposes:

  • Retention policy: Keeps data for a defined period based on compliance rules. Applies broadly.
  • Legal hold: Preserves specific content indefinitely because of a legal investigation. Applied to custodians.

Legal hold overrides retention. If a retention policy says β€œdelete after 3 years” but a legal hold is active, the content is preserved until the hold is lifted.

eDiscovery tiers compared

Each tier adds capabilities on top of the previous one
FeatureContent SearcheDiscovery StandardeDiscovery Premium
Search across M365YesYesYes
Case managementNoYesYes
Legal holdNoYesYes
ExportYesYesYes
Custodian managementNoNoYes
Review setsNoNoYes
Analytics (threading, themes)NoNoYes
Predictive coding (machine learning)NoNoYes
Licence requiredE3/E5E3/E5E5 or E5 Compliance add-on

What is Audit?

β˜• Simple explanation

Think of Audit as the security camera footage for your Microsoft 365 environment.

Every time someone opens a file, changes a setting, accesses a mailbox, or signs in β€” it gets recorded. Audit is the log of β€œwho did what, when, and where.”

eDiscovery finds the content. Audit finds the activity. They answer different questions: eDiscovery asks β€œwhat does the document say?” Audit asks β€œwho accessed the document and when?”

Microsoft Purview Audit provides a unified audit log that captures user and administrator activities across Microsoft 365 services. It enables compliance teams to search for specific activities, investigate incidents, and meet regulatory requirements for activity logging.

Audit comes in two tiers: Audit Standard (included with E3/E5) and Audit Premium (E5 or E5 Compliance add-on), which adds longer retention, high-value events, and higher API bandwidth.

What gets audited?

The unified audit log captures activities from across Microsoft 365:

ServiceWhat is logged
Exchange OnlineMailbox access, email sent/received, delegate actions, admin changes
SharePoint OnlineFile views, edits, downloads, sharing, permission changes
OneDriveFile sync, uploads, downloads, sharing events
TeamsChannel creation, membership changes, meeting events
Microsoft Entra IDSign-ins, password changes, role assignments, Conditional Access outcomes
Admin activitiesConfiguration changes, policy updates, user management across all services

Audit Standard vs Audit Premium

Audit Premium adds retention, high-value events, and API bandwidth for serious investigations
FeatureAudit StandardAudit Premium
Log retention180 days (default)Up to 10 years (configurable)
High-value eventsBasic activity logsIncludes critical events like MailItemsAccessed (tracks every time a mailbox item is read)
API bandwidthStandard throttling limitsHigher bandwidth for large-scale log retrieval
LicenceE3 / E5E5 or E5 Compliance add-on
Use caseGeneral compliance and troubleshootingForensic investigations, breach analysis, long-term regulatory requirements

MailItemsAccessed: the high-value event

MailItemsAccessed is the most important Audit Premium event for the exam. It logs every time a mailbox item is accessed β€” whether the user reads it through Outlook, a mobile app, or a script.

Why it matters: if a mailbox is compromised, MailItemsAccessed tells investigators exactly which emails the attacker read. Without it, you know the attacker signed in, but not what they saw.

πŸ’‘ Scenario: investigating a breach at SecureBank

Alex at SecureBank discovers that an employee’s mailbox was compromised through a phishing attack. The attacker had access for 3 days before the password was reset.

Using Audit Premium, Alex can:

  1. Search MailItemsAccessed for the compromised mailbox during the 3-day window
  2. See exactly which emails the attacker read β€” including customer account details and internal communications
  3. Determine the scope of the breach β€” was it 5 emails or 5,000?
  4. Meet regulatory notification requirements β€” accurately report which customer data was accessed

Without Audit Premium, Alex would only know the attacker signed in. With it, Alex knows exactly what was compromised.

Searching the audit log

Compliance teams search the audit log using filters:

  • Date range β€” when did the activity happen?
  • User β€” who performed the activity?
  • Activity type β€” what did they do? (file accessed, mailbox read, setting changed)
  • Service β€” which Microsoft 365 service was involved?

The search returns detailed records showing the user, the action, the target item, the IP address, and the timestamp.

eDiscovery vs Audit: different questions, different tools

eDiscovery finds the evidence; Audit finds the trail of activity
FeatureeDiscoveryAudit
Primary questionWhat does the content say?Who did what, and when?
What it findsEmails, documents, chat messages, filesActivity logs β€” sign-ins, file access, admin changes
Used forLegal investigations, regulatory requests, litigationSecurity investigations, compliance monitoring, troubleshooting
OutputPreserved and exported documents for legal reviewActivity records showing actions, users, timestamps, and IP addresses
Key featureLegal hold β€” preserves content from deletionMailItemsAccessed β€” tracks exactly what was read in a mailbox

🎬 Video walkthrough

🎬 Video coming soon

eDiscovery & Audit β€” SC-900 Module 7

eDiscovery & Audit β€” SC-900 Module 7

~10 min

Flashcards

Question

What are the three tiers of eDiscovery in Microsoft Purview?

Click or press Enter to reveal answer

Answer

1) Content search β€” search and export across M365, no case management. 2) eDiscovery Standard β€” adds cases, legal hold, and structured exports. 3) eDiscovery Premium β€” adds custodian management, review sets, analytics (near-duplicate detection, email threading, themes), and Predictive coding (machine learning).

Click to flip back

Question

What is a legal hold, and what happens when a user deletes an item under hold?

Click or press Enter to reveal answer

Answer

A legal hold preserves content for a legal investigation. If a user deletes an item under legal hold, the item is secretly preserved in a hidden location. The user thinks it is gone, but eDiscovery can still find and recover it.

Click to flip back

Question

What is the MailItemsAccessed event in Audit Premium?

Click or press Enter to reveal answer

Answer

MailItemsAccessed logs every time a mailbox item is read β€” by the user, an app, or an attacker. It is critical for breach investigations because it shows exactly which emails were accessed during a compromise, not just that a sign-in occurred.

Click to flip back

Question

What is the difference between Audit Standard and Audit Premium?

Click or press Enter to reveal answer

Answer

Audit Standard: 180-day log retention, basic activity logs. Audit Premium: up to 10-year retention, high-value events (MailItemsAccessed), and higher API bandwidth for large-scale searches. Premium requires E5 or E5 Compliance add-on.

Click to flip back

Question

What is the six-step eDiscovery workflow?

Click or press Enter to reveal answer

Answer

1) Identify β€” determine relevant data and custodians. 2) Preserve β€” place legal holds. 3) Collect β€” gather content. 4) Process β€” de-duplicate and prepare. 5) Review β€” legal team tags content. 6) Export β€” package for submission.

Click to flip back

Knowledge check

Knowledge Check

MedGuard Health receives a legal demand to preserve all communications involving 5 clinicians while a patient complaint is investigated. Nadia needs to ensure these users cannot delete relevant emails or files. What should Nadia use?

Knowledge Check

Alex at SecureBank needs to determine exactly which emails an attacker read after compromising an employee's mailbox. The attacker had access for 48 hours. Which feature provides this information?

Knowledge Check

A MedGuard compliance officer needs to find all Teams messages and emails that mention a specific patient's name for a regulatory audit. They do not need legal hold or case management. Which tool is the simplest fit?

← Previous

Insider Risk Management

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.