Message Center
Published Dec 18, 2025
Updated April 16,February 17, 2026: We have updated the timeline and content. Thank you for your patience.
Introduction
To strengthen security when Microsoft Purview interacts with Microsoft 365 services (Exchange, SharePoint, OneDrive, and Teams), we’re updating how roles are managed in Microsoft Purview. Certain admin roles in Purview will now be mapped to three newly created roles in Microsoft Entra. Role assignments will be synchronized between Purview roles and Entra roles without any customer action. This ensures that user permissions and identity flow securely from Purview to Microsoft 365. M365 services will only allow high-privileged operations like search/export to Purview users with the correct level of permissions in Entra, further protecting customer data.
When this will happen:
How this affects your organization:
Who is affected: All customers with admins assigned to high-privileged roles in Purview that access Microsoft 365 data. These admins will have their assignments synced to Entra, meaning they will be assigned membership to mapped Entra roles.
What will happen:
Role Mapping Table:
| Purview Role(s) | Mapped Entra Role |
|---|---|
Insider Risk Management Analysis | Purview Workload Content Reader |
| Hold Privacy Management Investigation Data Security Investigation Investigator | Purview Workload Content Writer |
| Search and Purge Data Security Investigation Admin Data Security Investigation Analyst (New Role) | Purview Workload Content Administrator |
Example: If you have both Export and Search and Purge roles, you’ll get the Purview Workload Content Administrator role in Entra.
Audit logs:
The Audit logs will look like below, with Display Name always shown as “PurviewRoleAssignmentMigrator”.

New Value for Role would always be one of the 3 new Entra roles created in Entra for protecting Purview customers

What you can do to prepare:
Compliance considerations:
No compliance considerations identified; review as appropriate for your organization.