Architectural Case Study | Extending Microsoft Purview with Fortra (Digital Guardian) DLP via the MIP SDK

Architectural Case Study | Extending Microsoft Purview with Fortra (Digital Guardian) DLP via the MIP SDK
guess what, we're baaack 😊

This post is a continuation of a series. See part 1, here.


Most enterprises already live in dual worlds. On one side, Microsoft Purview governs information inside Microsoft 365. But on the other, dedicated DLP platforms like Digital Guardian DLP control endpoints, networks, and file movement.

So what's the problem...?

These two worlds traditionally don’t share context.

→ Purview knows the label and where it was applied, but not the path the file takes once it leaves Microsoft’s visibility boundary.

→ 3rd Party DLP knows the path, but not the label or user intent.

And this is exactly where data is most vulnerable; between cloud policy and user behavior.

Discovery, meet enforcement...

This is where the Microsoft Information Protection SDK (MIP SDK) enters. It lets third-party products call the same framework that Microsoft itself uses to classify, label, and protect files. In practical terms, this can look like:

→ Digital Guardian detects and classifies sensitive content (PII, HIPAA, financials).

→ The DG Agent calls the MIP SDK File API to apply the correct Microsoft sensitivity label.

→ Once labeled, that file becomes a "first-class citizen" inside Purview.

The file’s metadata now flows through:

→ Microsoft DLP in SharePoint, Exchange, and Teams

→ Microsoft 365 audit logs

→ Insider Risk Management

With this, you’ve turned two disparate ecosystems into one continuous protection fabric. How neat is that?

How can we demonstrate this model using Fortra and the MIP SDK?

Phase 1 (DG eDLP 7.7)
DG agents gained the ability to inspect MIP-protected files, decrypt them securely using SDK authentication, and classify or control them without breaking encryption. This closed a major DLP visibility gap into protected content:

Phase 2 (DG eDLP 7.8–7.9)
DG could now apply MIP labels automatically, with or without user interaction.
Rule actions in DG could be mapped directly to Microsoft labels, ensuring consistent taxonomy and unified reporting in Purview:

When DG detects sensitive data, it tags it with the same label Microsoft uses. When Microsoft sees that label later in SharePoint (for example), it enforces the same policy again. True end-to-end continuity!

What's the architecture behind it?

The integration uses standard MIP SDK authentication flows to obtain tokens for labeling operations. In plain language, the DG agent authenticates to Microsoft just like a Microsoft app would, which means it doesn’t sidestep any of your configured governance. Once authorized, the agent can:

→ Read and apply MIP labels.

→ Append label metadata to the Alternate Data Stream (ADS) for tracking.

→ Decrypt and inspect encrypted files without user friction.

DG even supports both cloud and on-prem deployment models, which is a key advantage for regulated industries that can’t rely on full-cloud enforcement. Purview, of course, has the On-Prem Information Protection Scanner, but it's not always the best tool for the job.

The Combined Power of Content, Context, and User-Based Classification...

Fortra’s classification model is content-based, context-based, and user-based. This aligns perfectly with Microsoft Purview’s signal hierarchy:

Fortra Classification SignalMicrosoft EquivalentIntegration Benefit
Content (file inspection, regex, fingerprints)Standard SITs & EDM classifiersDeep inspection and validation before labeling
Context (user, network, app, operation)Purview activity and exfiltration signalsEnriches Purview’s visibility beyond Microsoft 365
User-based (manual classification)End-user label selectionSeamless UX between DG agent and Purview label picker

Users classify once and both ecosystems honor it.

What does the integration enable?

→ Inspection and enforcement of policies on MIP-protected content without breaking encryption.

→ Generation of unified audit events when labels are applied or changed.

→ Ability to display MIP labels directly in DG consoles, ensuring analysts see Purview classifications inside their standard dashboard.

→ Blocking or warning based on label mismatches.

→ Adds visibility and control over removable media, FTP, webmail, and unmanaged endpoints, areas where native Purview coverage technically exists but can be limited.

Once DG and Purview share a label taxonomy, you multiply your options:

→ Inspection continuity...

    • DG can read, decrypt, and inspect MIP-protected content without breaking encryption.

→ Audit unification...

    • Label changes trigger Purview audit events visible to compliance teams.

→ Policy correlation...

    • DG can enforce rules when labels mismatch, e.g., "Public" files leaving via Gmail.
analysts can triage Microsoft-classified incidents inside a single console

Architect’s Takeaways (or, "design via principle")...

  1. Unify policy sources...
    1. Maintain one label taxonomy that drives both Microsoft 365 and endpoint enforcement.
  2. Preserve telemetry...
    1. Treat every label application, no matter where it occurs, as an auditable Purview event.
  3. Delegate strengths...
    1. Let Microsoft handle encryption and governance.
    2. Let third-party DLP handle deep inspection and control.
  4. Design governance early...
    1. Shared labeling means shared accountability.
    2. Shared accountability allows you to coordinate taxonomy and versioning across teams.
This is how you advance from vendor compatibility discussions to actually architecting a single system. A single system that expresses data identity consistently from endpoint to cloud.
user attempts to upload file without MIP label set
user attempts file action that conflicts with MIP label settings

The Fortra integration with Microsoft Purview is, I believe, a preview of where enterprise data protection is heading. Together, when unified by the MIP SDK, these products become a self-reinforcing control system. No single "best-in-class" data security platform is truly complete in isolation. Together, they become a true Data Security Superpower.


📑
Sources used for this research can be found below. Questions? Anything I should write about next? Let me know!

Automatically Extend DLP Coverage With Digital Guardian and Microsoft Purview Information Protection (MPIP)
Fortra’s Digital Guardian integrates with Microsoft Purview Information Protection (MPIP) to deliver data protection for the modern enterprise.
Extending Microsoft Purview Information Protection Through DLP
In this webinar, our experts discuss extending Microsoft purview information protection through DLP and the latest integration updates during a live demo.
Digital Guardian Expands Microsoft Information Protection
Learn how the Microsoft and Digital Guardian integration gives you data protection for the modern enterprise.

https://dataclassification.fortra.com/resources/datasheets/enhancing-microsoft-aip

Read more