Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderM365 ReportPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderM365 ReportPortfolio

Connect

© 2026 M365 Message Center. Created with ❤ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1289726

Microsoft Purview: eDiscovery - CMK (Customer managed key) for eDiscovery direct export

Plan for Change

Message ID

MC1289726
View in Admin Center

Roadmap ID

557684
View in Roadmap

Services

Microsoft Purview

Affected Platforms

Web

Summary

Microsoft Purview eDiscovery Direct Export will support Customer-managed key (CMK) encryption for tenants with Data Encryption Policies via MDEP. Starting May 2026, export packages will be automatically encrypted with tenant-owned keys without changing the user experience. Enablement requires Microsoft Support assistance and proper CMK setup.

Details

Introduction

To strengthen customer control over sensitive investigation data, Microsoft is extending Customer-managed key (CMK) protection to Microsoft Purview eDiscovery Direct Export. For tenants that have configured Data Encryption Policies (DEPs) using the Microsoft 365 Data-at-Rest Encryption Platform (MDEP), eDiscovery export packages will now be automatically encrypted using your organization’s CMK. This helps ensure exported investigation data remains protected under customer-controlled encryption policies throughout the export lifecycle, without changing the existing eDiscovery user experience.

This message is associated with Microsoft 365 Roadmap ID 557684.

When this will happen:

  • Public Preview: We will begin rolling out early May 2026 and expect to complete by early June 2026.
  • General Availability (Worldwide):  We will begin rolling out mid-June 2026 and expect to complete by mid-July 2026.

How this affects your organization:

Who is affected:

  • Microsoft 365 tenants with Customer-managed keys enabled through Data Encryption Policies (DEPs), and request that Microsoft Support enable this feature for Purview eDiscovery Direct Export in their tenant
  • Admins and investigators using Microsoft Purview eDiscovery Direct Export

What will happen:

  • eDiscovery Direct Export packages for CMK‑enabled tenants will be encrypted at rest using tenant‑owned keys.
  • Encryption is applied automatically based on existing DEP configuration.
  • CMK configuration is dynamically validated through MDEP at export time.
  • No change to the eDiscovery user experience.
  • Only enabled for specific tenants by request to Microsoft Support 

What you can do to prepare:

To use CMK encryption for eDiscovery Direct Export, your organization must complete the following steps:

  1. Configure Customer Key (self-service) Your Microsoft 365 administrator must have Customer Key enabled through the Microsoft 365 Data-at-Rest Encryption Platform (MDEP) with a DEP in PolicyAssigned status.
    • This requires:
      • Two Azure subscriptions dedicated to Customer Key
      • Azure Key Vault(s) with RSA keys provisioned
      • A DEP created and assigned to your tenant
      • Follow the setup guidance here: Create two new Azure subscriptions | Microsoft Learn
  2. Request feature enablement (contact Microsoft Support)
    • After Customer Key is configured, your organization must contact Microsoft Support to request that CMK for eDiscovery Direct Export be enabled for your tenant. This feature requires Microsoft-side service configuration that is not automatically applied. Work with your Microsoft Support contact or Customer Success Account Manager (CSAM) to complete enablement.

Important:

  • If your tenant does not have CMK properly configured through MDEP at export time, direct export jobs will proceed without CMK encryption.
  • No changes to the eDiscovery user experience are required — CMK encryption is applied transparently to export packages.
  • Encryption scopes, storage accounts, and containers are managed automatically by the service; no additional storage configuration is needed.
  • Exported data retention remains 14 days, unchanged by CMK.

Learn more: Export search results in eDiscovery | Microsoft Learn

Compliance considerations:

Compliance area Impact
Encryption methods or key management eDiscovery Direct Export packages are encrypted at rest using tenant‑owned customer‑managed keys defined in Data Encryption Policies through MDEP.
eDiscovery or Content Search Direct Export behavior is enhanced to automatically apply tenant‑specific encryption scopes to exported investigation data.
How customer data is processed or stored Exported investigation data is stored in eDiscovery storage accounts encrypted with customer‑managed keys rather than Microsoft‑managed keys.
Admin controlsBehavior is governed by existing Data Encryption Policies; no new toggle is introduced, but encryption is controlled through CMK configuration.

Timeline

Published
Apr 23, 2026
Message published to Message Center
Updated
Apr 23, 2026
Message content updated
End Date
Aug 16, 2026
Message timeline ends

Tags

#New feature#Admin impact

Category

Plan for Change

Related Messages

Similar updates

MC1288527â—Ź

Microsoft Purview: Data Loss Prevention – File Quarantine action for SharePoint and OneDrive

Apr 22, 2026
MC1266016â—Ź

Microsoft Purview | Data Security Investigations – Introducing new personal data examination

Mar 30, 2026
MC1261587â—Ź

Microsoft Purview | Data Lifecycle Management - Hard delete OneDrive and SharePoint files with priority cleanup workflow

Mar 25, 2026
MC1257999â—Ź

Microsoft Purview DLP: Unmanaged cloud app discovery and protection with Microsoft Purview and Palo Alto Prisma Access

Mar 21, 2026
MC1255406â—Ź

Microsoft Purview | Data Security Triage Agent Summaries for DLP Alerts in Microsoft Defender XDR

Mar 18, 2026