A unified data governance solution that helps manage, protect, and discover data across your organization
Hi @Sarathprasath Krishnaswamy
At present, Microsoft Graph does not publish any service-specific throttling limits for the following Purview endpoints:
-
/dataSecurityAndGovernance/protectionScopes/compute -
/dataSecurityAndGovernance/processContent
Since these endpoints are not listed in the service-specific throttling documentation, there is no dedicated quota documented for them today. However, that does not mean they are unthrottled. They are still governed by the standard Microsoft Graph throttling model, where requests can be evaluated against multiple limits (such as global, per-app, or per-user), and the first limit reached will trigger throttling.
In practice, you should expect normal Graph behavior. If your request rate is high or bursty, you may receive responses such as 429 Too Many Requests or 503 Service Unavailable, along with a Retry-After header indicating when to retry. This applies even though there is no service-specific entry for these APIs.
From an implementation perspective, the safest approach is to design your solution to handle throttling gracefully. This means honoring the Retry-After header, implementing exponential backoff for retries, and avoiding tight polling loops especially repeated calls to processContent or compute when the policy state has not changed. Where possible, reuse results (for example, caching compute responses) and distribute requests more evenly instead of sending large bursts.
While there are no published service-specific throttling limits for these Purview APIs, they still follow standard Microsoft Graph throttling behavior, and your application should be designed accordingly.
Hope this helps, Please let us know if you have any questions and concerns.