{"id":32386,"date":"2019-12-18T17:00:04","date_gmt":"2019-12-18T17:00:04","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90353"},"modified":"2019-12-18T17:00:04","modified_gmt":"2019-12-18T17:00:04","slug":"data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/","title":{"rendered":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution"},"content":{"rendered":"<p>Data governance has relied on transferring data to a third-party for hosting an archive service. Emails, documents, chat logs, and third-party data (Bloomberg, Facebook, LinkedIn, etc.) must be saved in a way that it can\u2019t be changed and won\u2019t be lost. Data governance is part of IT at the enterprise level. It serves regulatory compliance, can facilitate eDiscovery, and is part of a business strategy to protect the integrity of the data estate.<\/p>\n<p>However, there are downsides.<\/p>\n<p>In addition to acquisition costs, the archive is one more system that needs ongoing maintenance. When data is moved to another system, the risk footprint is increased, and data can be compromised in transit. An at-rest archive can become another target of attack.<\/p>\n<p>When you take the data to the archive, you miss the opportunity to reason over it with machine learning to extract additional business value and insights to improve the governance program.<\/p>\n<p>The game changer is to have reliable, auditable retention inside the Microsoft 365 tenant. This way, all the security controls and visibility in Microsoft 365 and Azure remain in effect. There is no additional archive to be attacked, protected, or monitored. In addition, there is no third-party archiving system to be purchased or maintained.<\/p>\n<p>All the machine learning and correlation tools\u2014always on and native to Microsoft 365\u2014are reasoning over your data estate. Dark data can be illuminated.<\/p>\n<h3>Microsoft 365 tenant dashboards<\/h3>\n<p>Microsoft 365 dashboards are created automatically. Tiles allow you to drill down to the file level and locate sensitive data. Retention, disposition review, and deletion policies can be visualized, and compliance verified. Audit-ready governance reports can be generated.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90355 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1.png\" alt=\"Screenshot of label analytics in the Microsoft 365 compliance tenant dashboard.\" width=\"1922\" height=\"1202\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1.png 1922w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1-300x188.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1-768x480.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-1-1024x640.png 1024w\" sizes=\"auto, (max-width: 1922px) 100vw, 1922px\"><\/a><\/p>\n<p>Your data governance program becomes measurable, manageable, and useable. It adds value to your business rather than being just a compliance tool.<\/p>\n<p>Data governance is more than retention for Microsoft 365. Businesses rely on non-Microsoft solutions as well. There are built-in connectors for Bloomberg, Facebook, LinkedIn, and other popular third-party applications that allow this data to be brought into Microsoft 365 for retention.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90356 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2.png\" alt=\"Screenshot of a connector being added in the Office 365 Security &amp; Compliance dashboard.\" width=\"1908\" height=\"927\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2.png 1908w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2-300x146.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2-768x373.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-2-1024x498.png 1024w\" sizes=\"auto, (max-width: 1908px) 100vw, 1908px\"><\/a><\/p>\n<p>Where we don\u2019t yet have a connector for your solution, Microsoft Partners can provide a wide range of pre-built connectors or the ability to build custom connectors using our software development toolkit. To learn more, read <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/work-with-partner-to-archive-third-party-data\" target=\"_blank\" rel=\"noopener noreferrer\">Work with a partner to archive third-party data in Office 365<\/a>.<\/p>\n<p>In some cases, particularly where regulatory compliance\u2014such as with the CFTC Rule 1.31(c)-(d), FINRA Rule 4511, and SEC Rule 17a-4\u2014is needed, immutability of records must be maintained. These rules have specific requirements for electronic data storage, including many aspects of records management, such as the duration, format, quality, availability, and accountability of records retention. Microsoft provides the admin this ability in the Label settings. To do this, under Classify content as a \u201cRecord\u201d with this label, select the <strong>Yes, classify as a regulatory \u201cRecord\u201d<\/strong> dropdown option, and then under Retain this content, set the duration.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90357 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3.png\" alt=\"Screenshot of a label setting in the Office 365 Security &amp; Compliance dashboard.\" width=\"3004\" height=\"1654\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3.png 3004w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3-300x165.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3-768x423.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/12\/Data-governance-and-retention-in-your-Microsoft-365-tenant-3-1024x564.png 1024w\" sizes=\"auto, (max-width: 3004px) 100vw, 3004px\"><\/a><\/p>\n<p>Once set, this option cannot be changed. Even admins are not able to change or delete the records.<\/p>\n<p>Microsoft engaged Cohasset Associates to review this capability and provide an assessment document for consideration of our customers and their regulators. The assessment is available at: <a href=\"https:\/\/servicetrust.microsoft.com\/ViewPage\/TrustDocuments?command=Download&amp;downloadType=Document&amp;downloadId=9fa8349d-a0c9-47d9-93ad-472aa0fa44ec&amp;docTab=6d000410-c9e9-11e7-9a91-892aae8839ad_FAQ_and_White_Papers\" target=\"_blank\" rel=\"noopener noreferrer\">Data Protection Resources<\/a>. Currently the assessment includes Exchange Online and will be extended to include SharePoint Online in mid-2020.<\/p>\n<p>The ability to archive data inside the Microsoft 365 tenant with security controls intact and all the visibility and machine learning features of Microsoft 365 available is an advantage that many organizations can use, some with their existing licenses.<\/p>\n<h3>Learn more<\/h3>\n<p>To find out more about other advanced compliance features, check out <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 compliance documentation<\/a>. Also, bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/12\/18\/data-governance-retention-microsoft-365-tenant-secure-highly-capable-solution\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft 365 has a built in secure, highly capable data governance and retention capability.<br \/>\nThe post Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32387,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6871,6420],"class_list":["post-32386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-data-governance","tag-microsoft-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-18T17:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1922\" \/>\n\t<meta property=\"og:image:height\" content=\"1202\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution\",\"datePublished\":\"2019-12-18T17:00:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png\",\"keywords\":[\"Data governance\",\"Microsoft 365\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\",\"name\":\"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png\",\"datePublished\":\"2019-12-18T17:00:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png\",\"width\":1922,\"height\":1202},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data governance\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/data-governance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/","og_locale":"en_US","og_type":"article","og_title":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-18T17:00:04+00:00","og_image":[{"width":1922,"height":1202,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution","datePublished":"2019-12-18T17:00:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png","keywords":["Data governance","Microsoft 365"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/","url":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/","name":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png","datePublished":"2019-12-18T17:00:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution.png","width":1922,"height":1202},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/data-governance-and-retention-in-your-microsoft-365-tenant-a-secure-and-highly-capable-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data governance","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-governance\/"},{"@type":"ListItem","position":3,"name":"Data governance and retention in your Microsoft 365 tenant\u2014a secure and highly capable solution"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32386"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32387"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}