<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Purview eDiscovery Blog - Mitch King]]></title><description><![CDATA[Navigating the technical and legal friction of Purview eDiscovery. Real-world insights on driving adoption and overcoming compliance and technical roadblocks in]]></description><link>https://purviewediscovery.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1769521830066/ffdc22fc-ad1c-44ca-9437-f05adf54c1c7.png</url><title>Purview eDiscovery Blog - Mitch King</title><link>https://purviewediscovery.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 22:31:38 GMT</lastBuildDate><atom:link href="https://purviewediscovery.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Simplifying Microsoft Purview eDiscovery: Turn Messy CSVs into Actionable Insights!]]></title><description><![CDATA[If you work with Microsoft Purview eDiscovery, you know the drill: you run a "Download" or "Add to review set" process, and you’re handed a massive Items_...csv file.
While these reports contain all the data you need, they aren't exactly "human-reada...]]></description><link>https://purviewediscovery.com/simplifying-microsoft-purview-ediscovery-turn-messy-csvs-into-actionable-insights</link><guid isPermaLink="true">https://purviewediscovery.com/simplifying-microsoft-purview-ediscovery-turn-messy-csvs-into-actionable-insights</guid><category><![CDATA[Microsoft Purview]]></category><category><![CDATA[ediscovery ]]></category><category><![CDATA[#reporting]]></category><dc:creator><![CDATA[Mitch King]]></dc:creator><pubDate>Tue, 10 Feb 2026 22:14:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1770760808122/83733af1-028e-4f85-9051-d72f5daf167d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you work with Microsoft Purview eDiscovery, you know the drill: you run a "Download" or "Add to review set" process, and you’re handed a massive Items_...csv file.</p>
<p>While these reports contain all the data you need, they aren't exactly "human-readable." Trying to find out why 5% of your items failed or which custodian is driving the most volume involves a lot of Excel filtering, pivot tables, and wasted time.</p>
<p>That’s why I built the <strong>Purview eDiscovery Items Report Aggregator</strong>.</p>
<h2 id="heading-the-problem-the-csv-headache">The Problem: The "CSV Headache"</h2>
<p>The standard Purview Items report is a goldmine of metadata, but it’s hard to digest quickly. When a legal team asks for a status update, they want to know:</p>
<ul>
<li><p>What percentage of the collection was successful?</p>
</li>
<li><p>What are the specific reasons for the failures (exceptions)?</p>
</li>
<li><p>What is the total data volume and which file types are the biggest?</p>
</li>
<li><p>Is there searchable text for most of the items?</p>
</li>
</ul>
<p>Answering these questions manually takes time you don't have.</p>
<h2 id="heading-the-solution-a-privacy-first-local-summary-tool">The Solution: A Privacy-First, Local Summary Tool</h2>
<p>I created a lightweight, offline-friendly web app that processes these CSVs entirely in your browser.</p>
<p><a target="_blank" href="https://purview-ediscovery.github.io/Purview-Items-Report/"><strong>🚀 Try the Purview eDiscovery Items Report Aggregator here!</strong></a></p>
<h3 id="heading-why-this-tool-is-different">Why this tool is different:</h3>
<ol>
<li><p><strong>Zero Data Uploads (Privacy First):</strong> In the legal world, data privacy is non-negotiable. This tool uses a Content Security Policy (CSP) to block all network requests. Your CSV never leaves your computer; it is processed locally in your browser's memory.</p>
</li>
<li><p><strong>Instant Summarization:</strong> Drop your Items_...csv file in, and within seconds, you get a beautiful dashboard of your data.</p>
</li>
<li><p><strong>Exception Deep-Dives:</strong> It automatically groups errors—like "Operation timed out" or "Access denied"—so you can troubleshoot your collection immediately.</p>
</li>
<li><p><strong>Offline Capability:</strong> You can download the tool as a single HTML file and run it locally too!</p>
</li>
</ol>
<hr />
<h2 id="heading-what-insights-can-you-get">What Insights Can You Get?</h2>
<p>Based on a typical report, here is the kind of data the tool extracts for you:</p>
<h3 id="heading-1-high-level-success-metrics">1. High-Level Success Metrics</h3>
<p>See your "Success vs. Non-Success" ratio instantly. If you have a 9.17% failure rate (as seen in our demo data), you can immediately identify if that’s a "Retrieval Error" or a "Throttling" issue.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770760862870/a6a52bc4-8e30-46d9-8f04-111228ce7f77.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-2-workload-amp-scope-breakdown">2. Workload &amp; Scope Breakdown</h3>
<p>The tool categorizes data by <strong>Effective Workload</strong>. Even if the CSV labels everything as "Exchange," the tool identifies Teams-specific rows, SharePoint sites, and OneDrive accounts so you know exactly where your data is coming from.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770760917315/e5b9d98e-e8ff-4697-8b03-1d7f3091b168.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-3-volume-drivers">3. Volume Drivers</h3>
<p>Ever wondered what's eating up your storage? The tool breaks down:</p>
<ul>
<li><p><strong>Size Bands:</strong> How many files are over 100MB?</p>
</li>
<li><p><strong>Extensions:</strong> Are .msg files or .zip files driving your volume?</p>
</li>
<li><p><strong>Text Readiness:</strong> What percentage of your items actually have searchable text?</p>
</li>
</ul>
<h3 id="heading-4-errors-failures-amp-processing-readiness">4. Errors, Failures &amp; Processing Readiness</h3>
<p>Quickly sanity check the export, the tool gives guidance on:</p>
<ul>
<li><p><strong>Errors:</strong> Failures/Errors &amp; How to Resolve!</p>
</li>
<li><p><strong>Readiness:</strong> What % Are Text Searchable?</p>
</li>
<li><p><strong>Defensibility:</strong> Are There Parent Items Missing From Child?</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770761196251/fa7acc2b-1898-4d5b-bc78-594cb7a98648.png" alt class="image--center mx-auto" /></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770761356010/c952cc1e-62b0-430e-bcc9-eadf89f45a4c.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-5-shareable-html-reports">5. Shareable HTML Reports</h3>
<p>Once the analysis is done, you can download a <strong>one-page HTML report</strong>. This is a standalone snapshot you can email to stakeholders or save as part of your case documentation.</p>
<hr />
<h2 id="heading-how-to-use-it">How to use it</h2>
<ol>
<li><p><strong>Export from Purview:</strong> In your eDiscovery case, go to <strong>Process manager</strong>, select your process, and click <strong>Download report</strong>.</p>
</li>
<li><p><strong>Download Tool Locally</strong>: Simply download the HTML file and open in the browser <strong>OR</strong></p>
</li>
<li><p><strong>Process In Browser:</strong> Open the aggregator tool and it processes locally in your browser (NO UPLOAD).</p>
</li>
<li><p><strong>Analyse &amp; Save:</strong> Review the dashboard and download your summary report.</p>
</li>
</ol>
<h2 id="heading-open-source-amp-transparent">Open Source &amp; Transparent</h2>
<p>As an eDiscovery professional, I value transparency. The SHA-256 fingerprint is provided for every version, and the tool is designed to be as "no-footprint" as possible.</p>
<p>Check it out, and let me know how it changes your workflow!</p>
]]></content:encoded></item><item><title><![CDATA[Purview Targeted eDiscovery Shortcut: Why “DisplayName” is the King of Sent Items]]></title><description><![CDATA[When performing a search on a specific custodian’s mailbox within Purview, the goal is often to produce a comprehensive record of everything that person sent. However, users frequently have secondary aliases, departmental "Send As" addresses, or lega...]]></description><link>https://purviewediscovery.com/purview-targeted-ediscovery-shortcut-why-displayname-is-the-king-of-sent-items</link><guid isPermaLink="true">https://purviewediscovery.com/purview-targeted-ediscovery-shortcut-why-displayname-is-the-king-of-sent-items</guid><category><![CDATA[ediscovery ]]></category><category><![CDATA[Microsoft Purview]]></category><category><![CDATA[Entra ID]]></category><category><![CDATA[KQL]]></category><dc:creator><![CDATA[Mitch King]]></dc:creator><pubDate>Thu, 29 Jan 2026 18:12:23 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1769710236123/5a666aa3-895a-4eb2-91a3-c09409fb5f33.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When performing a search on a specific custodian’s mailbox within Purview, the goal is often to produce a comprehensive record of everything that person sent. However, users frequently have secondary aliases, departmental "Send As" addresses, or legacy SMTPs from before a merger or rebrand.</p>
<p>If you rely on a single SMTP address, you will miss data. If you use the <strong>DisplayName</strong>, you let the Microsoft 365 Substrate do the heavy lifting for you.</p>
<h3 id="heading-how-it-works-the-stamping-of-identity">How it Works: The "Stamping" of Identity</h3>
<p>The effectiveness of this search relies on how the Microsoft 365 Substrate (the data layer for Purview) indexes mail.</p>
<p>When an email is sent, it passes through the Exchange Transport pipeline. During this "ingestion" phase, the system performs Metadata Enrichment. It doesn't just look at the email address; it resolves the sender against the Global Address List (GAL).</p>
<p>Even if a user sends an email using a secondary alias (e.g., <a target="_blank" href="mailto:marketing@company.com">marketing@company.com</a>) or a legacy X500 address, the Substrate "stamps" the user's official DisplayName (e.g., "Joe Blogs") onto the item in the index. This creates a permanent, searchable "human-readable" tag that is baked into the item's metadata at the moment of creation.</p>
<h3 id="heading-bypassing-the-alias-trap">Bypassing the "Alias Trap"</h3>
<p>In Microsoft Purview, "Recipient Expansion" is the feature meant to find a user's aliases. However, it has a significant limitation: it often fails to expand secondary proxy addresses.</p>
<p>If you search for sender:<a target="_blank" href="mailto:joe.blogs@company.com">joe.blogs@company.com</a>, the system may not automatically look for mail sent from <a target="_blank" href="mailto:j.blogs@company.com">j.blogs@company.com</a>. But because the Substrate stamped "Joe Blogs" on <em>both</em> emails when they were sent, a search for sender:"Joe Blogs" will catch both. For a regulatory production where "missing data" is a compliance risk, this name-based approach ensures you capture the user's entire output across all their technical identities.</p>
<h3 id="heading-important-targeted-searches-only">Important: Targeted Searches Only</h3>
<p>It is critical to understand that this is a targeted mailbox strategy, not a tenant-wide strategy.</p>
<ul>
<li><p><strong>Why it works in a targeted search:</strong> If you have already narrowed your "Data Sources" to Joe Blogs's mailbox, searching for sender:"Joe Blogs" is incredibly accurate. You’ve already defined the "Where" (the specific mailbox); the name search simply ensures the "What" is comprehensive.</p>
</li>
<li><p><strong>Why it fails tenant-wide:</strong> If you search your entire organization for sender:"Joe Blogs", you will return every "Joe Blogs" in the directory and potentially unrelated external hits. This strategy is for capturing the full history of a specific custodian.</p>
</li>
</ul>
<h3 id="heading-sender-vs-participants-which-is-better">Sender vs. Participants: Which is better?</h3>
<p>When you are looking for what a custodian <em>sent</em> from their own mailbox, you should use the sender property rather than participants.</p>
<ul>
<li><p><strong>Sender="Joe Blogs":</strong> This is a precision tool. It targets only the items where the custodian is the author. This is the superior property for producing a user's "sent history."</p>
</li>
<li><p><strong>Participants="Joe Blogs":</strong> This is a "wide net" tool that searches the Sender, To, Cc, and Bcc fields simultaneously. Using this within a custodian's mailbox would clutter your results with every email they <em>received</em>, making it difficult to isolate their outbound correspondence.</p>
</li>
</ul>
<h3 id="heading-the-name-change-caveat">The "Name Change" Caveat</h3>
<p>Because the display name is "stamped" on the item at the moment it is sent, it represents the user's identity <em>at that point in time</em>.</p>
<p>If a custodian has had a name change (for example, due to marriage or a preference change from "Joseph" to "Joe"), searching for their current name will not return items sent under their previous name. To ensure a truly defensible and comprehensive production, you must include any previous display names as "OR" terms in your query.</p>
<p><em>(For Purview prerequisites on tracking and identifying these historical name changes,</em> <a target="_blank" href="https://purviewediscovery.com/the-identity-crisis-in-microsoft-purview-ediscovery-why-youre-likely-under-collecting"><em>please refer to this article</em></a><em>)</em></p>
<h3 id="heading-summary-for-ediscovery-managers">Summary for eDiscovery Managers</h3>
<ol>
<li><p><strong>Scope the search:</strong> Target the specific custodian mailbox as the data source.</p>
</li>
<li><p><strong>Use the Name:</strong> Use sender:"Display Name" to bypass the "Proxy Address" gap and catch all aliases.</p>
</li>
<li><p><strong>Include History:</strong> Add previous display names to the query to ensure you catch items sent before a name change.</p>
</li>
<li><p><strong>Avoid SMTP-only:</strong> Don't rely on a single SMTP address, as Purview’s expansion may miss departmental or legacy aliases.</p>
</li>
</ol>
<p>By leveraging the way the Substrate "stamps" names at the point of ingestion, you can produce a more accurate and defensible set of sent items with significantly less manual configuration.</p>
]]></content:encoded></item><item><title><![CDATA[The Identity Crisis in Microsoft Purview eDiscovery: Why You’re Likely Under-Collecting]]></title><description><![CDATA[If you’ve spent any time managing eDiscovery in a large organisation, you’ll know that an investigator is only as good as the information they have at the start of a case. In Microsoft Purview, there is a growing challenge that I’ve started calling t...]]></description><link>https://purviewediscovery.com/the-identity-crisis-in-microsoft-purview-ediscovery-why-youre-likely-under-collecting</link><guid isPermaLink="true">https://purviewediscovery.com/the-identity-crisis-in-microsoft-purview-ediscovery-why-youre-likely-under-collecting</guid><category><![CDATA[Microsoft Purview]]></category><category><![CDATA[Entra ID]]></category><category><![CDATA[ediscovery ]]></category><category><![CDATA[KQL]]></category><dc:creator><![CDATA[Mitch King]]></dc:creator><pubDate>Thu, 29 Jan 2026 13:02:06 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1769595421793/f11ecb69-4aad-4e05-9ff5-500cf3badbe0.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you’ve spent any time managing eDiscovery in a large organisation, you’ll know that an investigator is only as good as the information they have at the start of a case. In Microsoft Purview, there is a growing challenge that I’ve started calling the "Identity Crisis."</p>
<p>The problem is simple: Purview is heavily reliant on what is currently present in Microsoft Entra ID (formerly Azure AD). While this works fine for active employees who have never changed roles or names, it creates a significant risk of under-collection for everyone else.</p>
<h4 id="heading-1-the-ghost-custodian-employees-who-have-left">1. The "Ghost" Custodian: Employees Who Have Left</h4>
<p>When an investigator needs to search the mailbox of someone who left the organisation two years ago, they hit an immediate roadblock. KQL searches require exact matches for identifiers like SMTP addresses or UPNs to pull data accurately from the index.</p>
<p>However, once an employee leaves, their Entra ID record is often stripped back or deleted entirely. Finding a comprehensive list of every SMTP address that person ever used during their tenure becomes a manual, often impossible, task. If you don't have those historical identifiers to include in your sender: or recipient: KQL queries, those emails will stay hidden in the index.</p>
<h4 id="heading-2-the-name-change-trap">2. The Name Change Trap</h4>
<p>This issue isn't limited to leavers. We see it constantly with active employees who have changed their names—due to marriage, for example. When a name change occurs, the UPN, primary email address, and display name are typically updated.</p>
<p>Microsoft Purview has a "Recipient Expansion" feature designed to help, but it is notoriously focused on the "here and now." It often only returns the current identifiers. If you search using the current identity, the index may not map that back to items stamped with the previous identity from three years ago. The result? You only collect half the story, and often, you won't even realise the earlier data is missing until the case is well underway.</p>
<h4 id="heading-the-risk-defensibility-and-under-collection">The Risk: Defensibility and Under-Collection</h4>
<p>In a legal context, this is a major red flag. If you are relying on KQL to be inclusive, but your query only looks for the custodian’s current "identity," you are effectively self-selecting a subset of the data. This isn't just a technical glitch; it’s a defensibility risk.</p>
<h4 id="heading-the-solutions-how-to-solve-the-identity-crisis">The Solutions: How to Solve the Identity Crisis</h4>
<p>So, how do we fix this? There are two main paths, depending on your setup and your budget.</p>
<p><strong>Solution A: Build a Bespoke Identity Tool</strong><br />If KQL is your preferred method of searching, you need to be better informed before you even open Purview. The most effective way to do this is to build a custom tool or dashboard that pulls historical identity information from your HR systems or take a feed from Active Directory to gather identifiers as they change over time.</p>
<p>This tool should provide investigators with a "Full Identity Map" for any custodian, including:</p>
<ul>
<li><p>Every SMTP address ever assigned to them.</p>
</li>
<li><p>Previous UPNs and Display Names.</p>
</li>
<li><p>Tenure dates.</p>
</li>
</ul>
<p>By surfacing this information up front, investigators can build KQL queries that include every identifier the custodian has ever used, ensuring the index returns a complete set of results.</p>
<p><strong>Solution B: The "Premium" Approach (E5/Review Sets)</strong><br />If you have eDiscovery Premium (E5), there is a much more robust way to handle this: Stop using inclusive KQL at the search stage.</p>
<p>Instead of trying to match specific identifiers up front, you should target the custodian’s mailbox directly as a data source. Run a broad search—using only date ranges or specific keywords—and move those results directly into a Review Set.</p>
<p>By targeting the mailbox (the container) rather than trying to match the person (the identity) via KQL, you bypass the identity crisis entirely. The Review Set will pull in all data that matches your keywords or dates, regardless of which version of the custodian's name or email address was stamped on the metadata at the time the email was sent.</p>
<h4 id="heading-summary">Summary</h4>
<p>We have to accept that Microsoft Purview isn’t a time machine; it’s a reflection of your current Entra ID state. To avoid the trap of under-collection, you either need to arm your investigators with a complete historical map of custodian identities or shift your workflow toward targeted mailbox collections in eDiscovery Premium.</p>
<p>In eDiscovery, what you don't know <em>can</em> hurt you—and usually, it's the identifiers you didn't know existed that cause the most trouble.</p>
]]></content:encoded></item><item><title><![CDATA[Efficiently Collect BCC and Distribution List Emails with Microsoft Purview eDiscovery]]></title><description><![CDATA[If you’ve been working with Microsoft Purview eDiscovery for any length of time, you’ve likely run into a bit of a headache regarding BCC and Distribution List (DL) emails. It’s a common scenario: you]]></description><link>https://purviewediscovery.com/efficiently-collect-bcc-and-distribution-list-emails-with-microsoft-purview-ediscovery</link><guid isPermaLink="true">https://purviewediscovery.com/efficiently-collect-bcc-and-distribution-list-emails-with-microsoft-purview-ediscovery</guid><category><![CDATA[Microsoft Purview]]></category><category><![CDATA[KQL]]></category><category><![CDATA[ediscovery ]]></category><dc:creator><![CDATA[Mitch King]]></dc:creator><pubDate>Thu, 29 Jan 2026 12:38:09 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69789d492c442870a6c547c0/0fe84880-0a8c-444c-9d2f-2cbeb74c2090.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you’ve been working with Microsoft Purview eDiscovery for any length of time, you’ve likely run into a bit of a headache regarding BCC and Distribution List (DL) emails. It’s a common scenario: you’ve set up your search, added your custodian’s email address into the ‘Participants’ or ‘Recipient’ condition in KQL, and assumed you’ve captured everything.</p>
<p>Unfortunately, because of how Microsoft 365 is built, you are almost certainly missing data.</p>
<h4>The Problem with Modern Indexing</h4>
<p>For those who have spent years working with legacy on-premises eDiscovery solutions—like Enterprise Vault or Relativity—this wasn’t an issue. Those systems typically used "Envelope Journaling." When an email was sent, it was wrapped in a P1 envelope that contained every single recipient's details. Even if a user was hidden in the BCC field or was just one name in a 500-person Distribution List, the index saw them because the envelope expanded that data.</p>
<p>Microsoft Purview works differently. It searches "in-situ" within the Substrate (the underlying data layer for M365). When an email lands in a recipient's mailbox, Purview indexes the actual headers of that item.</p>
<p>The issue is that:</p>
<ol>
<li><p><strong>BCC details</strong> are stripped from the recipient’s copy of the email for privacy.</p>
</li>
<li><p><strong>Distribution Lists</strong> aren’t expanded in the header; the "To" field simply shows the group address, not the individuals within it.</p>
</li>
</ol>
<p>Because the custodian’s individual email address isn't physically in the header of the item in their mailbox, a KQL search for their name or email address will simply fail to find a match.</p>
<h4>Sender vs. Recipient Context</h4>
<p>It’s worth noting that if you happen to be searching the sender’s mailbox, you’ll see those BCC and DL details perfectly fine in their "Sent Items." But in eDiscovery, we are often working in a recipient context. If the sender is an external party, or if you only have access to the recipient's mailbox, that metadata simply doesn’t exist in a searchable format within those headers.</p>
<p>Because this is a fundamental part of the Exchange Online architecture, it’s unlikely that Microsoft will be able to "fix" this. The data items in the Substrate simply don't contain the recipient expansion required for a traditional header match.</p>
<h4>A More Reliable Solution</h4>
<p>Rather than trying to force an "Include" query that relies on missing header information, I’ve found that we need to change our approach. We need to stop searching for <em>who</em> the email was sent to and instead focus on the container (the mailbox) and the received context.</p>
<p>The strategy is simple:</p>
<ol>
<li><p>Target the specific user's mailbox.</p>
</li>
<li><p>Query for everything in that mailbox.</p>
</li>
<li><p>Filter for email items only.</p>
</li>
<li><p>Filter out the items the user sent to others (to remove the noise of their Sent Items).</p>
</li>
<li><p>Keep items the user sent to themselves (self-notes/reminders).</p>
</li>
</ol>
<h3><strong><mark class="bg-yellow-200 dark:bg-yellow-500/30">kind:email AND (NOT from:<a href="mailto:user@contoso.com">user@contoso.com</a> OR recipients:<a href="mailto:user@contoso.com">user@contoso.com</a>)</mark></strong></h3>
<img src="https://cdn.hashnode.com/uploads/covers/69789d492c442870a6c547c0/58c7541c-593d-4dec-a4ca-e4895d3c3235.png" alt="Scenario's" style="display:block;margin:0 auto" />

<h4>Why this works</h4>
<ul>
<li><p><strong>Captures BCC/DL Traffic:</strong> By ignoring the recipient headers and focusing on the fact that the item was delivered to the mailbox(es), you catch everything.</p>
</li>
<li><p><strong>Filters Out the "Noise":</strong> Using kind:email ensures you aren’t bloating your data set with calendar invites, tasks, or system notifications.</p>
</li>
<li><p><strong>Isolates Incoming Mail:</strong> We filter out anything sent by the mailbox owner unless they sent to themselves (we want to capture that)</p>
</li>
</ul>
<h4>One Vital Pro-Tip</h4>
<p>A word of caution: <strong>You must target specific custodian mailboxes for this to work.</strong></p>
<p>Do not try to run this as a tenant-wide search. Because this query doesn't specify a person's name, running a search across your entire organisation would return every single email received by every single employee during that timeframe.</p>
<p>By targeting the specific mailboxes and using this method, you bypass the architectural limitations of Purview and ensure your collection is both thorough and defensible. It’s a much safer way to ensure those "invisible" BCC and DL emails don't slip through the cracks.</p>
]]></content:encoded></item></channel></rss>