Share via

Graph API Throttling limits for/dataSecurityAndGovernance/protectionScopes/compute and /processContent API's

Sarathprasath Krishnaswamy 25 Reputation points
2026-04-08T14:22:19.6933333+00:00

Currently I can see there are API's for https://dotnet.territoriali.olinfo.it/en-us/graph/api/userprotectionscopecontainer-compute?view=graph-rest-1.0 & the processing the content https://dotnet.territoriali.olinfo.it/en-us/graph/api/userdatasecurityandgovernance-processcontent?view=graph-rest-1.0&tabs=http

But in the graph throttling limits page - for security these were only mentioned - https://dotnet.territoriali.olinfo.it/en-us/graph/throttling-limits#security-detections-and-incidents-service-limits

So, can I safely assume that only the Global limit will only apply - https://dotnet.territoriali.olinfo.it/en-us/graph/throttling-limits#assignment-service-limits:~:text=The%20following%20table%20indicates,Expand%20table

Or is there any other Graph API limits I should know of, before I use these (/dataSecurityAndGovernance/processContent & dataSecurityAndGovernance/protectionScopes/compute) API's to restrict or block the content in our Entra Registered Custom App

Microsoft Security | Microsoft Purview
0 comments No comments

2 answers

Sort by: Most helpful
  1. Manoj Kumar Boyini 11,440 Reputation points Microsoft External Staff Moderator
    2026-04-08T20:27:56.2933333+00:00

    Hi @Sarathprasath Krishnaswamy

    At present, Microsoft Graph does not publish any service-specific throttling limits for the following Purview endpoints:

    • /dataSecurityAndGovernance/protectionScopes/compute
    • /dataSecurityAndGovernance/processContent

    Since these endpoints are not listed in the service-specific throttling documentation, there is no dedicated quota documented for them today. However, that does not mean they are unthrottled. They are still governed by the standard Microsoft Graph throttling model, where requests can be evaluated against multiple limits (such as global, per-app, or per-user), and the first limit reached will trigger throttling.

    In practice, you should expect normal Graph behavior. If your request rate is high or bursty, you may receive responses such as 429 Too Many Requests or 503 Service Unavailable, along with a Retry-After header indicating when to retry. This applies even though there is no service-specific entry for these APIs.

    From an implementation perspective, the safest approach is to design your solution to handle throttling gracefully. This means honoring the Retry-After header, implementing exponential backoff for retries, and avoiding tight polling loops especially repeated calls to processContent or compute when the policy state has not changed. Where possible, reuse results (for example, caching compute responses) and distribute requests more evenly instead of sending large bursts.

    While there are no published service-specific throttling limits for these Purview APIs, they still follow standard Microsoft Graph throttling behavior, and your application should be designed accordingly.

    Hope this helps, Please let us know if you have any questions and concerns.

    0 comments No comments

  2. Q&A Assist
    2026-04-08T14:22:41.8733333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    For the /dataSecurityAndGovernance/protectionScopes/compute and /dataSecurityAndGovernance/processContent APIs, there are no additional, service‑specific throttling limits documented in the provided material.

    From the available throttling documentation:

    • Service‑specific limits are explicitly listed for several areas (for example, Security detections and incidents under /security, Identity and access, Identity and access reports, Excel, Subscription, Service Communications).
    • The security section only documents limits for operations on alert, securityActions, secureScore, secureScorecontrolProfile, tiIndicator, and eDiscovery cases under /security/eDiscoveryCases.
    • No separate limits are listed for the dataSecurityAndGovernance endpoints in the provided context.

    Given this, only the general/global Microsoft Graph throttling model and any applicable high‑level limits (such as application, tenant, or application+tenant resource unit quotas where relevant) should be assumed to apply. There is no evidence in the provided documentation of stricter, dedicated limits for /dataSecurityAndGovernance/protectionScopes/compute or /dataSecurityAndGovernance/processContent beyond those global mechanisms.

    When designing the custom app, plan for:

    • Standard Graph throttling behavior (HTTP 429 responses) and backoff/retry logic as described in the general throttling guidance.
    • The possibility that some resource types can have stricter limits for security reasons, as noted for Microsoft Entra External ID and some Graph APIs; if these endpoints are critical and high‑volume, be prepared to monitor for 429s and adjust throughput or open a support ticket if needed.

    No additional, specific numeric limits for these two APIs are present in the supplied documentation.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.