Message Center
Microsoft Purview DLP event details will be integrated into Microsoft Graph Security APIs alongside Defender alerts, simplifying correlation, reporting, and SIEM integration. Public preview starts late May 2026; general availability begins late June 2026. This affects admins using these APIs for DLP-related alert data.
Introduction
To help security and compliance teams more easily correlate Microsoft Purview Data Loss Prevention (DLP) activity with Microsoft Defender alerts, we’re enriching Microsoft Graph security APIs so DLP event (rule match) details can be retrieved alongside Defender alert data. This simplifies exporting data to SIEM tools, building automated workflows, and generating custom reports without needing to stitch together data from multiple APIs.
This message is associated with Microsoft 365 Roadmap ID 558681.
When this will happen:
How this affects your organization:
Who is affected:
What will happen:
Before this update:
Alert data is available through Microsoft Graph Security APIs, while DLP rule match event details are available through the Management API. Customers who need to correlate alerts with underlying DLP activity must retrieve data from multiple APIs and manually join the results.
With this update:
The following table shows the combined data available through this enhancement:
| Common Alert Data (Already present in Graph API) | Common Event Data (Present in all events) |
|---|---|
| Alert ID | Event ID |
| Incident ID | User ID |
| Status | Workload |
| Severity | Event time |
| Classification | Operation |
| Assigned to | Policy details (ID, name, rule, action) |
| Creation time | Sensitive info types (ID, counts, confidence, values) |
| Last update time | Trainable classifier |
| Resolve date time | User override |
| First activity time / Last activity time |
Admin experience (high level flow):
Step 1: Fetch Defender alerts using the alerts_v2 Graph API. Learn more: List alerts_v2 | Microsoft Learn.Endpoint: https://graph.microsoft.com/beta/security/alerts_v2/{alert-id}
From the response, capture:
alertCorrelationId (DetectorId)startDateTime (firstActivityDateTime)endDateTime (lastActivityDateTime)Note: Alert must be a DLP alert.
Screenshot: Example response from the alerts_v2 Graph API showing a Defender DLP alert and correlation details:
Step 2: Query DLP event data using the correlation details.
Endpoint: https://graph.microsoft.com/beta/security/dlpAlertEvent
Example filter: $filter=alertCorrelationId eq '{alertCorrelationId}'
and startDateTime ge {startDateTime}
and endDateTime le {endDateTime}
The response returns events where auditRecord contains the event JSON.
What you can do to prepare:
No action is required if you don’t use Graph APIs for alert/event export or automation.
If you do use these APIs, we recommend the following:
Prerequisites
Baseline access: Users must have the Security Reader role to access alerts and events via the API.
Note:
Compliance considerations:
| Area | Explanation |
|---|---|
| Alters how existing customer data is accessed | Introduces a new Microsoft Graph API method to retrieve DLP event (rule match) data alongside Defender alerts, provided simpler way of accessing and correlating existing data. |
| Alters admin monitoring/reporting capabilities | Enables simplified export and correlation of DLP alert and event data, improving SIEM integration and compliance reporting workflows. |
| Supports third-party integrations | The enriched API is designed to integrate with SIEM and other external tools, enabling automated workflows and data export to third-party systems. |
| Admin control and access governance | Access is governed by Graph permissions and Purview RBAC roles; while configurable, no new dedicated admin toggle is introduced. |