Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
compliance | Communication Compliance Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md | The following table explains more about each condition. |:--|:--| | **Content matches any of these classifiers** | Apply to the policy when any classifiers are included or excluded in a message. Some classifiers are pre-defined in your organization, and custom classifiers must be configured separately before they're available for this condition. Only one classifier can be defined as a condition in a policy. For more information about configuring classifiers, see [Learn about trainable classifiers](/microsoft-365/compliance/classifier-learn-about). | | **Content contains any of these sensitive info types** | Apply to the policy when any sensitive information types are included or excluded in a message. Some classifiers are pre-defined in your tenant, and custom classifiers can be configured separately or as part of the condition assignment process. Each sensitive information type you choose is applied separately and only one of these sensitive information types must apply for the policy to apply to the message. For more information about custom sensitive information types, see [Learn about sensitive information types](/microsoft-365/compliance/sensitive-information-type-learn-about). |-| **Message is received from any of these domains** <br><br> **Message is not received from any of these domains** | Apply the policy to include or exclude specific domains in received messages. Enter each domain and separate multiple domains with a comma. Do not include spaces between items separated by a comma. Each domain entered is applied separately, only one domain must apply for the policy to apply to the message. If you want to use **Message is received from any of these domains** to look for messages from specific emails address you need to combine this with another condition like **Message contains any of these words** or **Content matches any of these classifiers** or you might get unexpected results. <br><br> If you want to scan all email from a specific domain, but want to exclude messages that don't need review (newsletters, announcements, and so on), you must configure a **Message is not received from any of these domains** condition that excludes the email address (example newsletter@contoso.com). | +| **Message is received from any of these domains** <br><br> **Message is not received from any of these domains** | Apply the policy to include or exclude specific domains in received messages.<br><br> Make sure to use the following syntax when entering conditional text: <br><br>-Enter each domain and separate multiple domains with a comma.<br> -Do not include spaces between items separated by a comma.<br> -Remove all leading and trailing spaces.<br><br> Each domain entered is applied separately, only one domain must apply for the policy to apply to the message. If you want to use **Message is received from any of these domains** to look for messages from specific emails address you need to combine this with another condition like **Message contains any of these words** or **Content matches any of these classifiers** or you might get unexpected results. <br><br> If you want to scan all email from a specific domain, but want to exclude messages that don't need review (newsletters, announcements, and so on), you must configure a **Message is not received from any of these domains** condition that excludes the email address (example newsletter@contoso.com). | | **Message is sent to any of these domains** <br><br> **Message is not sent to any of these domains** | Apply the policy to include or exclude specific domains in sent messages.<br><br> Make sure to use the following syntax when entering conditional text: <br><br>-Enter each domain and separate multiple domains with a comma.<br> -Do not include spaces between items separated by a comma.<br> -Remove all leading and trailing spaces.<br><br>Each domain is applied separately; only one domain must apply for the policy to apply to the message. <br><br> If you want to exclude all emails sent to two specific domains, configure the **Message is not sent to any of these domains** condition with the two domains (example 'contoso.com,wingtiptoys.com'). | | **Message is classified with any of these labels** <br><br> **Message is not classified with any of these labels** | To apply the policy when certain retention labels are included or excluded in a message. Retention labels must be configured separately and configured labels are chosen as part of this condition. Each label you choose is applied separately (only one of these labels must apply for the policy to apply to the message). For more information about retention labels, see [Learn about retention policies and retention labels](/microsoft-365/compliance/retention).| | **Message contains any of these words** <br><br> **Message contains none of these words** | To apply the policy when certain words or phrases are included or excluded in a message.<br><br> Make sure to use the following syntax when entering conditional text: <br><br>- Remove all leading and trailing spaces.<br>- Add quotation marks before and after each keyword or key phrase.<br>- Separate each keyword or key phrase with a comma.<br>- Do not include spaces between items separated by a comma. <br><br>**Example:** "banker","insider trading","confidential 123"<br><br>Each word or phrase you enter is applied separately (only one word must apply for the policy to apply to the message). For more information about entering words or phrases, see the next section [Matching words and phrases to emails or attachments](#matching-words-and-phrases-to-emails-or-attachments).| |
compliance | Dlp Configure Endpoint Settings | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md | The following table describes the supported endpoint settings for Windows 10/11 |Always audit file activity for devices |Supported |Supported | | |Printer groups| Supported |Not Supported| | |Removable USB device groups| Supported | Not Supported | |-|Autoquarantine file from unallowed apps | Supported | Supported (preview)| | +|Auto-quarantine file from unallowed apps | Supported | Supported (preview)| | |Network share groups | Supported | Not Supported | | |VPN settings | Supported | Not Supported | | |Business justification in policy tips | Supported | Supported (preview)| | To prevent sensitive items from being synced to the cloud by cloud sync apps suc > [!NOTE] > When an unallowed cloud-sync app tries to access an item that is protected by a blocking DLP policy, DLP may generate repeated notifications. You can avoid these repeated notifications by enabling the **Auto-quarantine** option under **Restricted apps**. -#### Autoquarantine +#### Auto-quarantine -When enabled, Autoquarantine is triggered when a restricted app attempts to access a DLP-protected sensitive item. Autoquarantine moves the sensitive item to an admin-configured folder. If configured to do so, autoquarrantine can leave a placeholder (**.txt**) file in place of the original. You can configure the text in the placeholder file to tell users the new location of the item, and other pertinent information. +When enabled, Auto-quarantine is triggered when a restricted app attempts to access a DLP-protected sensitive item. Auto-quarantine moves the sensitive item to an admin-configured folder. If configured to do so, autoquarrantine can leave a placeholder (**.txt**) file in place of the original. You can configure the text in the placeholder file to tell users the new location of the item, and other pertinent information. -You can use also autoquarantine to prevent an endless chain of DLP notifications for the user and admins. For more information, see [Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with autoquarantine](endpoint-dlp-using.md#scenario-4-avoid-looping-dlp-notifications-from-cloud-synchronization-apps-with-autoquarantine). +You can use also auto-quarantine to prevent an endless chain of DLP notifications for the user and admins. For more information, see [Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with auto-quarantine](endpoint-dlp-using.md#scenario-4-avoid-looping-dlp-notifications-from-cloud-synchronization-apps-with-auto-quarantine) ## Unallowed (Restricted) Bluetooth apps |
compliance | Dlp Microsoft Teams | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-microsoft-teams.md | f1.keywords: Previously updated : 09/17/2019 Last updated : 06/15/2023 audience: ITPro If your organization has Microsoft Purview Data Loss Prevention (DLP), you can d - **Example 1: Protecting sensitive information in messages**. Suppose that someone attempts to share sensitive information in a Teams chat or channel with guests (external users). If you have a DLP policy defined to prevent this, messages with sensitive information that are sent to external users are deleted. This happens automatically, and within seconds, according to how your DLP policy is configured. - > [!NOTE] - > DLP for Microsoft Teams blocks sensitive content when shared with Microsoft Teams users who have:<br/>- [guest access](/MicrosoftTeams/guest-access) in teams and channels; or<br/>- [external access](/MicrosoftTeams/manage-external-access) in meetings and chat sessions. <p>DLP for external chat sessions will only work if both the sender and the receiver are in Teams Only mode and using [Microsoft Teams native federation](/microsoftteams/manage-external-access). DLP for Teams does not block messages in [interop](/microsoftteams/teams-and-skypeforbusiness-coexistence-and-interoperability#interoperability-of-teams-and-skype-for-business) with Skype for Business or non-native federated chat sessions. --- **Example 2: Protecting sensitive information in documents**. Suppose that someone attempts to share a document with guests in a Microsoft Teams channel or chat, and the document contains sensitive information. If you have a DLP policy defined to prevent this, the document won't open for those users. Your DLP policy must include SharePoint and OneDrive in order for protection to be in place. This is an example of DLP for SharePoint that shows up in Microsoft Teams, and therefore requires that users are licensed for Office 365 DLP (included in Office 365 E3), but does not require users to be licensed for Office 365 Advanced Compliance. - -You can extend the Teams DLP policy to cover SharePoint Online and OneDrive for Business by selecting **Automatic file protection** from the banner in **DLP** > **Policies**. This will enable DLP protection for all the files shared in Teams chats and channels with the same rules that apply to Teams messages. Once enabled, the extension will apply to all existing as well as future Teams DLP policies, so you don't have to create separate policies for SharePoint and OneDrive for file protection. - > [!NOTE]-> Only those Teams policies that have rules with conditions of **content contains** or **content is shared from Microsoft 365** can be extended for automatic file protection. If the condition or exception configuration has **Sender is**, **sender domain is**, **recipient is**, and **recipient domain is** present, the extension action will fail because these conditions donΓÇÖt apply to SharePoint and OneDrive. +> DLP for Microsoft Teams blocks sensitive content when shared with Microsoft Teams users who have: +> - [guest access](/MicrosoftTeams/guest-access) in teams and channels, or +> - [external access](/MicrosoftTeams/manage-external-access) in meetings and chat sessions. +> +> DLP for external chat sessions will only work if both the sender and the receiver are in Teams Only mode and using [Microsoft Teams native federation](/microsoftteams/manage-external-access). DLP for Teams does not block messages in [interop](/microsoftteams/teams-and-skypeforbusiness-coexistence-and-interoperability#interoperability-of-teams-and-skype-for-business) with Skype or non-native federated chat sessions. -- **Example 3: Protecting communications in Teams Shared Channels**. For shared channels, the host Teams team DLP policy is applied. For example letΓÇÖs say there's a shared channel owned by TeamA of Contoso. Team A has a DLP policy P1. There are 3 ways to share a channel:+- **Example 2: Protecting sensitive information in documents**. Suppose that someone attempts to share a document with guests in a Microsoft Teams channel or chat, and the document contains sensitive information. If you have a DLP policy defined to prevent this, the document won't open for those users. Your DLP policy must include SharePoint and OneDrive in order for protection to be in place. This is an example of DLP for SharePoint that shows up in Microsoft Teams, and therefore requires that users are licensed for Office 365 DLP (included in Office 365 E3), but does not require that users be licensed for Office 365 Advanced Compliance. ++- **Example 3: Protecting communications in Teams Shared Channels**. For shared channels, the host Teams team DLP policy is applied. For example letΓÇÖs say there's a shared channel owned by Team A of Contoso. Team A has a DLP policy P1. There are three ways to share a channel: - **Share with member**: You invite User1 from Contoso to join the shared channel without making him a member of Team A. Everyone in this shared channel, including User1, will be covered by P1.- - **Share with team (internally)**: You share the channel with another team Team B in Contoso. That another team may have a different DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A and Team B users. - - **Share with team (cross tenant)**: You share the channel with a team Team F in Fabrikam. Fabrikam may have its own DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A (Contoso) and Team F (Fabrikam) users. + - **Share with team (internally)**: You share the channel with another team within Contoso, Team B. That other team may have a different DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A and Team B users. + - **Share with team (cross tenant)**: You share the channel with a team, Team F, in Fabrikam. Fabrikam may have its own DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A (Contoso) and Team F (Fabrikam) users. - **Example 4: Protecting communications when chatting with external users in Microsoft Teams**. When using the *external access* feature in Microsoft Teams, people from different Microsoft 365 organizations can all join the same chat session. Each user is subject to the DLP policies of their own organization. For instance, say that UserA, UserB and UserC, all from Contoso, and UserX, UserY, and UserZ, all from Fabrikam, are in the same Teams chat. Contoso's DLP policies with regard to sharing information in Teams apply to UserA, UserB and UserC, while Fabrikam's DLP policies apply to UserX, UserY, and UserZ. For more information on using Microsoft Teams to chat with people external to your organization, see [Manage external meetings and chat with people and organizations using Microsoft identities](/microsoftteams/trusted-organizations-external-meetings-chat) You can extend the Teams DLP policy to cover SharePoint Online and OneDrive for - Microsoft 365 E5/A5/G5 Information Protection and Governance - Microsoft 365 E5/A5/G5/F5 Compliance and F5 Security & Compliance -Office 365 and Microsoft 365 E3 include DLP protection for SharePoint Online, OneDrive, and Exchange Online. This also includes files that are shared through Teams because Teams uses SharePoint Online and OneDrive to share files. +Office 365 and Microsoft 365 E3 include DLP protection for SharePoint, OneDrive, and Exchange. This also includes files that are shared through Teams because Teams uses SharePoint and OneDrive to share files. -Support for DLP protection in Teams Chat requires E5. +Support for DLP protection in Teams Chat requires an E5 license. To learn more about licensing requirements, see [Microsoft 365 Tenant-Level Services Licensing Guidance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance). > [!IMPORTANT]-> DLP applies only to the actual messages in the chat or channel thread. Activity notificationsΓÇöwhich include a short message preview and appear based on a user's notification settingsΓÇöare **not** included in Teams DLP. Any sensitive information present in the part of the message that appears in the preview will remain visible in the notification even after the DLP policy has been applied and removed sensitive information the message itself. +> DLP applies only to the actual messages in the chat or channel thread. Activity notifications,which include a short message preview and appear based on a user's notification settings, are **not** included in Teams DLP. Any sensitive information present in the part of the message that appears in the preview will remain visible in the notification, even after the DLP policy has been applied and removed sensitive information from the message itself. ## Scope of DLP protection DLP protection is applied differently to Teams entities. ## Policy tips help educate users -Similar to how DLP works in [Exchange, Outlook, Outlook on the web](dlp-learn-about-dlp.md), [SharePoint Online, OneDrive for Business sites](dlp-learn-about-dlp.md), and [Office desktop clients](dlp-learn-about-dlp.md), policy tips appear when an action triggers with a DLP policy. Here's an example of a policy tip: +Similar to how DLP works in other locations ([Exchange, Outlook, SharePoint, OneDrive, and on Windows Devices](dlp-learn-about-dlp.md), policy tips appear when an action triggers with a DLP policy. Here's an example of a policy tip:  -Here, the sender attempted to share a social security number in a Microsoft Teams channel. The **What can I do?** link opens a dialog box that provides options for the sender to resolve the issue. Notice that, the sender can opt to override the policy, or notify an admin to review and resolve it. +Here, the sender attempted to share a social security number in a Microsoft Teams channel. The **What can I do?** link opens a dialog box that provides options for the sender to resolve the issue. Notice that the sender can opt to override the policy or notify an admin to review and resolve the issue.  -In your organization, you can choose to allow users to override a DLP policy. When you configure your DLP policies, you can use the default policy tips, or [customize policy tips](#to-customize-policy-tips) for your organization. +You can choose to allow users in your organization to override a DLP policy. When you configure your DLP policies, you can use the default policy tips, or [customize policy tips](#to-customize-policy-tips) for your organization. -Returning to our example, where a sender shared a social security number in a Teams channel, here's what the recipient saw: +Returning to our example, wherein a sender shared a social security number in a Teams channel, here's what the recipient saw: > [!div class="mx-imgBorder"] >  Returning to our example, where a sender shared a social security number in a Te To perform this task, you must be assigned a role that has permissions to edit DLP policies. To learn more, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). -1. Go to the Purview Compliance Center ([https://compliance.microsoft.com](https://compliance.microsoft.com)) and sign in. +1. Go to the Microsoft Purview compliance portal ([https://compliance.microsoft.com](https://compliance.microsoft.com)) and sign in. 2. Choose **Data loss prevention** > **Policies**. To perform this task, you must be assigned a role that has permissions to edit D 5. Either create a new rule, or edit an existing rule for the policy. -6. Scroll down to **User notifications** and select **Customize the email text** and/or **Customize the policy tip text** options. +6. Scroll down to **User notifications** and select **Notify users in Office 365 service with a policy tip** and then **Customize the policy tip text**. 7. Specify the text you want to use for email notifications and/or policy tips, and then choose **Save**. To perform this task, you must be assigned a role that has permissions to edit D 9. Finish working through the wizard. On the last screen, choose **Submit**. Allow approximately one hour for your changes to work their way through your data center and sync to user accounts.- <!-- why are these syncing to user accounts? --> ## Add Microsoft Teams as a location to existing DLP policies To perform this task, you must be assigned a role that has permissions to edit DLP policies. To learn more, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md).md#permissions). -1. Go to the Compliance Center ([https://compliance.microsoft.com](https://compliance.microsoft.com)) and sign in. +1. Go to the Microsoft Purview compliance portal ([https://compliance.microsoft.com](https://compliance.microsoft.com)) and sign in. 2. Choose **Data loss prevention** > **Policies**. -3. Select a policy, and then choose **Extend to Teams**. +3. Select a policy, and then choose **Edit policy**. -4. In the **Update Options** window, choose **Extend to Teams**. +4. Navigate through the wizard until you arrive at the **Choose locations to apply the policy** page. -5. Choose **Close**. +5. Toggle the **Teams chat and channel messages** option to **On**. ++6. Choose **Next** and work your way through to the end of the wizard. + +7. Choose **Submit**. Allow approximately one hour for your changes to work their way through your data center and sync to user accounts.-<!-- again, why user accounts? --> ## Define a new DLP policy for Microsoft Teams For information about how to create and implement a new DLP policy, see [Create ## Prevent external access to sensitive documents -To ensure that SharePoint documents that contain sensitive information cannot be accessed by external guests either from SharePoint or Teams by default, select the following: --- You can ensure that documents are protected until DLP scans and marks them as safe to share by [marking new files as sensitive by default](/sharepoint/sensitive-by-default).+You can ensure that documents are protected until DLP scans and marks them as safe to share by [marking new files as sensitive by default](/sharepoint/sensitive-by-default). -- Recommended DLP policy structure+### Recommended DLP policy structure - - **Conditions** - - Content contains any of these sensitive information types: [Select all that apply] - - - Content is shared from Microsoft 365 with people outside my organization +- **Conditions** + - **Content contains any of these sensitive information types**: [Select all that apply] + + - **Content is shared from Microsoft 365** > **with people outside my organization** - > [!div class="mx-imgBorder"] - >  + > [!div class="mx-imgBorder"] + >  - - **Actions** - - Restrict access to the content for external users - - - Notify users with email and policy tips - - - Send incident reports to the Administrator - +- **Actions** + - **Add an action** ++ - **Restrict access or encrypt the content in Microsoft 365 locations** > **Block only people outside your organization** > [!div class="mx-imgBorder"] >  + - **Use notifications to inform your users and help educate them on the proper use of sensitive info** > **Notify users in Office 365 with a policy tip** ++ - **Notify these people** [Select all that apply] ++ - **Policy tips** [Select all that apply] + + > [!div class="mx-imgBorder"] + >  + DLP policy in action when attempting to share a document in SharePoint that contains sensitive information with an external guest: > [!div class="mx-imgBorder"] |
compliance | Dlp Migrate Exo Policy To Unified Dlp | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migrate-exo-policy-to-unified-dlp.md | f1.keywords: Previously updated : 01/22/2021 Last updated : 06/15/2023 audience: ITPro f1_keywords: search.appverid: description: "Learn how to plan for and migrate your Exchange online data loss prevention policies into DLP." -# Migrate Exchange Online data loss prevention policies to Microsoft Purview compliance portal +# Migrate Exchange data loss prevention policies to Microsoft Purview compliance portal -[Exchange Online data loss prevention (DLP) policies](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) are being deprecated. [Much richer DLP functionality](dlp-learn-about-dlp.md), including Exchange Online DLP, is offered in the [Microsoft Purview compliance portal](https://compliance.microsoft.com/datalossprevention?viewid=policies). You can use the DLP policy migration wizard to help you bring your Exchange Online DLP policies over to the compliance portal where you'll manage them. +[Exchange data loss prevention (DLP) policies](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) are being deprecated. [Much richer DLP functionality](dlp-learn-about-dlp.md), including Exchange DLP, is offered in the [Microsoft Purview compliance portal](https://compliance.microsoft.com/datalossprevention?viewid=policies). You can use the DLP policy migration wizard to help you bring your Exchange DLP policies over to the compliance portal where you'll manage them. The migration wizard works by reading the configuration of your DLP policies in Exchange and then creating duplicate policies in the compliance portal. By default the wizard creates the new versions of the policies in **Test** mode, so you can see what impact they'd have in your environment without enforcing any of the actions. Once you're ready to fully transition to the compliance portal versions, ***you must***: The migration wizard works by reading the configuration of your DLP policies in > [!WARNING] > If you do not delete or deactivate the source policy in the EAC before you set the Compliance center version to **Enforce** both sets of policies will be attempting to enforce actions and you will receive duplicate events. ***This is an unsupported configuration.*** -The migration wizard only migrates EXO policies and associated mail flow rules. Standalone Exchange mail flow rules aren't migrated. +The migration wizard only migrates Exchange DLP policies and associated mail flow rules. Standalone Exchange mail flow rules aren't migrated. [!INCLUDE [purview-preview](../includes/purview-preview.md)] The account that you use to run the migration wizard must have access to both th ## Migration After you've evaluated all your Exchange and compliance portal DLP policies for need and compatibility, you can use the migration wizard.+<!-- 6/15/23: No Exch. policies to migrate available. Can't validate this procedure --> 1. Open the [Microsoft Purview compliance portal](https://compliance.microsoft.com/datalossprevention?viewid=policies) DLP console. 2. If there are Exchange DLP policies that can be migrated, a banner will appear at the top of the page letting you know. After you've evaluated all your Exchange and compliance portal DLP policies for 4. Select the policies you want to migrate. You can migrate them individually, or in groups using a phased approach or all at once. Select **Next**. 5. Review the flyout pane for any warnings or messages. Resolve any issues before proceeding. 6. Select the mode you want the new compliance portal policy created in, **Active**, **Test**, or **Disabled**. The default is **Test**. Select **Next**.-7. If desired, you can create more policies that are based on the Exchange DLP policies for other unified DLP locations. This will result in one new unified DLP policy for the migrated Exchange policy and one new unified DLP policy for any other locations that you pick here. +7. You can create more policies that are based on the Exchange DLP policies for other unified DLP locations. This will result in one new unified DLP policy for the migrated Exchange policy and one new unified DLP policy for any other locations that you select here. > [!IMPORTANT] > Any Exchange DLP policy conditions and actions that are not supported by other DLP locations, like Devices, SharePoint, OneDrive, On-premises, MCAS or Teams chat and channel messages will be dropped from the additional policy. Also, there is pre-work that must be done for the other locations. See: The migrated policies will now appear in the list of DLP policies in the complia |Error message|Reason|Mitigation/Recommended steps| ||||-|A compliance policy with name `<Name of the policy>` already exists in scenario(s) `Dlp`.|It's likely that this policy migration was done earlier and then reattempted in the same session|Refresh the session to update the list of policies available for migration. All previously migrated policies should be in the `Already migrated` state.| -|A compliance policy with name `<Name of the policy>` already exists in scenario(s) `Hold`.|A retention policy with the same name exists in the same tenant.|- Rename the DLP policy in EAC to a different name. </br> - Retry the migration for the impacted policy.| -|`DLP-group@contoso.com` can't be used as a value for the Shared By condition because it's a distribution group or mail-enabled security group. Use Shared by Member of predicate to detect activities by members of certain groups.|Transport rules allow groups to be used in the `sender is` condition but unified DLP doesn't allow it.|Update the transport rule to remove all group email addresses from the `sender is` condition and add the group to the `sender is a member of` condition if necessary. Retry the migration for the impacted policy| -|Couldn't find recipient `DLP-group@contoso.com`. If newly created, retry the operation after sometime. If deleted or expired please reset with valid values and try again.|It's likely that the group address used in `sender is a member of` or `recipient is a member of` condition is expired or invalid.|- Remove/replace all the invalid group email addresses in the transport rule in Exchange admin center. </br> - Retry the migration for the impacted policy.| -|The value specified in `FromMemberOf` predicate must be mail enabled security group.|Transport rules allow individual users to be used in the `sender is a member of` condition but unified DLP doesn't allow it.|- Update the transport rule to remove all individual user email addresses from the `sender is a member of` condition and add the users to the `sender is` condition if necessary. </br> - Retry the migration for the impacted policy.| -|The value specified in `SentToMemberOf` predicate must be mail enabled security group.|Transport rules allow individual users to be used under the `recipient is a member of` condition but unified DLP doesn't allow it.|- Update the transport rule to remove all individual user email addresses from the `recipient is a member of` condition and add the users to the `recipient is` condition if necessary. </br> - Retry the migration for the impacted policy.| +|A compliance policy with name `<Name of the policy>` already exists in scenario(s) `Dlp`. |It's likely that this policy migration was done earlier and then reattempted in the same session. | Refresh the session to update the list of policies available for migration. All previously migrated policies should be in the `Already migrated` state.| +|A compliance policy with name `<Name of the policy>` already exists in scenario(s) `Hold`. | A retention policy with the same name exists in the same tenant. | - Rename the DLP policy in EAC to a different name. </br> - Retry the migration for the affected policy.| +|`DLP-group@contoso.com` can't be used as a value for the `Shared By` condition because it's a distribution group or mail-enabled security group. Use `Shared by Member of` predicate to detect activities by members of certain groups. | Transport rules allow groups to be used in the `sender is` condition but unified DLP doesn't allow it. | Update the transport rule to remove all group email addresses from the `sender is` condition and add the group to the `sender is a member of` condition if necessary. Retry the migration for the affected policy| +|Couldn't find recipient `DLP-group@contoso.com`. If newly created, retry the operation after some time. If deleted or expired, reset it with valid values and try again.|It's likely that the group address used in `sender is a member of` or `recipient is a member of` condition is expired or invalid.|- Remove/replace all the invalid group email addresses in the transport rule in the Exchange admin center. </br> - Retry the migration for the affected policy.| +|The value specified in `FromMemberOf` predicate must be a mail-enabled security group. | Transport rules allow individual users to be used in the `sender is a member of` condition; however, unified DLP doesn't allow it.|- Update the transport rule to remove all individual user email addresses from the `sender is a member of` condition and add the users to the `sender is` condition if necessary. </br> - Retry the migration for the affected policy.| +|The value specified in `SentToMemberOf` predicate must be a mail-enabled security group. | Transport rules allow individual users to be used under the `recipient is a member of` condition but unified DLP doesn't allow it. | - Update the transport rule to remove all individual user email addresses from the `recipient is a member of` condition and add the users to the `recipient is` condition if necessary. </br> - Retry the migration for the affected policy.| |Using the `<Name of condition>` parameter is supported only for Exchange. Either remove this parameter or turn on only Exchange location.|It's likely that another policy with the same name exists in compliance portal with other locations like SPO/ODB/Teams for which the mentioned condition isn't supported.|Rename the DLP policy in Exchange admin center and retry the migration.| ## Testing and validation <!--PRATEEK AND AAKASH TO PROVIDE A LIST OF SUPPORTED PREDICATES AND KNOWN ISSUES BEFORE PUBLISHING--> |
compliance | Dlp Migration Assistant For Symantec Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migration-assistant-for-symantec-get-started.md | f1.keywords: Previously updated : 11/25/2022 Last updated : 06/02/2023 audience: ITPro If you're using the Microsoft Purview Data Loss Prevention migration assistant f > [!TIP] > If the application won't launch after completing all the steps in this article, refer to [Troubleshooting](dlp-migration-assistant-for-symantec-use.md#troubleshooting). -### 1. Have appropriate Microsoft 365 subscription +### 1. Have an appropriate Microsoft 365 subscription You'll need the appropriate DLP licensing for the locations that the migrated policies are scoped to. Check [here](https://aka.ms/dlplicensing). ### 2. Have appropriate user role and privileges -You need to have a *Global Administrator or Compliance Administrator* role to be able to use the migration assistant. +You need to have either the *Global Administrator or Compliance Administrator* role to be able to use the migration assistant. ### 3. Check your Operating System |
compliance | Dlp Migration Assistant For Symantec Learn | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migration-assistant-for-symantec-learn.md | f1.keywords: Previously updated : 11/25/2022 Last updated : 06/02/2023 audience: ITPro description: "The migration assistant is a Windows based desktop application tha This article helps you to learn about the Microsoft Purview Data Loss Prevention migration assistant for Symantec. -The migration assistant is a Windows-based desktop application that will migrate your Symantec data loss prevention (DLP) policies to Microsoft Purview Data Loss Prevention. This takes you through the five-step migration process. It accepts Symantec DLP policy XML exports, performs mapping, and creates equivalent DLP policies through PowerShell scripts. You can use the migration assistant to create DLP policies in test mode. Policies in test mode won't impact your live data or impact your existing business processes. +The migration assistant is a Windows-based desktop application for migrating your Symantec data loss prevention (DLP) policies to Microsoft Purview Data Loss Prevention. This article takes you through the five-step migration process. The migration assistant accepts Symantec DLP policy XML exports, performs mapping, and creates equivalent DLP policies through PowerShell scripts. You can use the migration assistant to create DLP policies in test mode. Policies in test mode won't affect your live data or impact your existing business processes. ## What can the migration assistant help with? The migration assistant helps with some of the tasks involved in a Data Loss Pre - In a manual migration scenario, you need to perform a feasibility analysis between the source and target DLP platforms, map the features, migrate policies manually, and test and tweak DLP policies. With the migration assistant, your migrated DLP policies can be up and running within minutes of starting the migration assistant process. - With migration assistant, you can quickly scale up your migration project. You can start by moving a single policy manually to multiple policies at the same time. - The migration assistant automatically identifies sensitive information types (SITs) or Data Identifiers in source policies and creates custom SITs in your Microsoft tenant. It also moves all of your custom regular expressions and keywords in a few clicks.-- The migration assistant detects which conditions, exclusions and actions are currently being used in source policies and automatically creates new rules with the same conditions, and actions.+- The migration assistant detects which conditions, exclusions, and actions are currently used in source policies and automatically creates new rules with the same conditions and actions. - The migration assistant provides you with a detailed migration report that includes the migration status and recommendations at the policy level. - The migration assistant ensures that your DLP policy migration project is private and takes place within the boundaries of your organization. Here's how the migration process works: :::image type="content" source="../media/migration-assistant-for-dlp-process.png" alt-text="Process diagram of Microsoft Purview Data Loss Prevention migration assistant for Symantec."::: -Each time the migration assistant runs, it runs the following steps: +Each time the migration assistant runs, it performs the following steps: - **Input:** The migration assistant ingests one or more Symantec DLP policy XML files. - **Analyze:** The migration assistant interprets the files and identifies Symantec DLP policy constructs. |
compliance | Dlp Migration Assistant For Symantec Use | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migration-assistant-for-symantec-use.md | f1.keywords: Previously updated : 11/25/2022 Last updated : 06/02/2023 audience: ITPro Use these steps to perform a DLP policy migration: ## Interactive guide -Check out this [interactive guide](https://mslearn.cloudguides.com/guides/Use%20the%20Microsoft%20Purview%20DLP%20migration%20assistant) for a visual walk through of the migration process. +Check out this [interactive guide](https://mslearn.cloudguides.com/guides/Use%20the%20Microsoft%20Purview%20DLP%20migration%20assistant) for a visual walkthrough of the migration process. ### Step 1: Log in to your account After you've installed and launched the migration assistant, you need to log in. 1. Select **Get Started** and the migration assistant will check if your environment is set up correctly. 2. Select **Next**. 2. Enter your username and select **Login**.- 1. Enter your password in the browser window that opens and select **Sign in**. + - Enter your password in the browser window that opens and select **Sign in**. > [!NOTE] > This application uses the Exchange Online PowerShell module. Basic authentication must be enabled in WinRM on the local computer. For more information, see [Prerequisites for the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#prerequisites-for-the-exchange-online-powershell-module).-3. You need to wait until your login is validated. Simultaneously, the migration assistant fetches information that will be required in later stages of the migration process. +3. Wait until your login is validated. Simultaneously, the migration assistant fetches information that will be required in later stages of the migration process. :::image type="content" source="../media/login-fetching-details.png" alt-text="Screenshot of the screen fetching details."::: 4. Once you're logged in, choose **Next**. ### Step 2: Upload your Symantec policy -You need to upload your Symantec DLP policy exports, which act as input for the migration assistant. The policies you upload will be the ones that will be migrated to the Microsoft Purview DLP platform. +You need to upload your Symantec DLP policy exports, which act as input for the migration assistant. The policies you upload will be migrated to the Microsoft Purview DLP platform. 1. To upload the files, select **Browse**. 2. Select the required policy files in the File Explorer pop-up window and choose **Open**. You need to upload your Symantec DLP policy exports, which act as input for the Once you input the policies you want to migrate, the migration assistant will process those files and map Symantec DLP policy elements to Microsoft DLP elements. > [!IMPORTANT]-> There may be some items that may need your review and will be marked with 'warning symbol'. +> There may be some items that may need your review and will be marked with 'Needs review' warning symbol. :::image type="content" source="../media/edit-policy-settings.png" alt-text="Screenshot of editing DLP policy settings."::: Microsoft Purview Information Protection allows users to define sensitive items The most common ways in which Symantec users specify the types of sensitive information that need to be protected are: -- Use out-of-box (OOB) Data Identifiers-- Customize OOB Data Identifiers-- Define regular expressions and/or keywords in DLP rules+- Using out-of-box (OOB) Data Identifiers +- Customizing OOB Data Identifiers +- Defining regular expressions and/or keywords in DLP rules The migration assistant takes care of each of the above scenarios in one of these two ways: -- **Map to an existing OOB SIT:** For all sensitive data types for which there exists an equivalent SIT in Microsoft DLP, the migration assistant will attempt to create a 1:1 mapping. It automatically maps OOB Symantec Data Identifiers to pre-configured Microsoft SITs, if an equivalent exists. If you want to bring the Symantec Data Identifier over as-is, then you can create a new SIT as described in the next step.+- **Map to an existing OOB SIT:** For each sensitive data type for which there is an equivalent SIT in Microsoft DLP, the migration assistant will attempt to create a 1:1 mapping. It automatically maps OOB Symantec Data Identifiers to pre-configured Microsoft SITs, if an equivalent exists. If you want to bring the Symantec Data Identifier over as-is, then you can create a new SIT as described in the next step. -- **Migrate as a new custom SIT:** For all sensitive data types for which there isn't an equivalent SIT available in Microsoft DLP, the migration assistant will automatically create a new SIT. Similarly, any regular expression(s) or keyword(s) defined directly in rules will be brought over as a new custom SIT.+- **Migrate as a new custom SIT:** For each sensitive data type for which there isn't an equivalent SIT available in Microsoft DLP, the migration assistant will automatically create a new SIT. Similarly, any regular expression(s) or keyword(s) defined directly in rules will be brought over as a new custom SIT. > [!NOTE]-> Regular expressions and/or keywords defined directly at the rule-level of Symantec policies will take on the name of the rule itself and show up in the Source column. In case of multiple regular expressions and/or keywords, it will take the name of the rule name followed by roman numerals. +> Regular expressions and/or keywords defined directly at the rule-level of Symantec policies will take on the name of the rule itself and show up in the **Source** column. In case of multiple regular expressions and/or keywords, it will take the name of the rule name followed by roman numerals. >->Each of these will be migrated separately as a custom SIT. This may lead to confusion and we recommend you review and rename these SITs as soon as possible. +>Each of these will be migrated separately as a custom SIT. This may lead to confusion. We recommend you review and rename these SITs as soon as possible. >->You cannot edit the name of these SITs within the migration assistant. You can edit the names of these custom SITs from Microsoft Purview compliance portal or via PowerShell after the policy migration has been completed. +>You can't edit the name of these SITs within the migration assistant. You can edit the names of these custom SITs from Microsoft Purview compliance portal or via PowerShell after the policy migration has been completed. #### Inclusions, Exclusions and Response Rules Each policy will be divided into two sections: Extend policy coverage to other Microsoft locations. - You can extend your current Symantec policies to other Microsoft locations in addition to the original scope of the policy. -For example: -A Purview DLP policy that's scoped to email can be extended to SharePoint, OneDrive, Teams, and Endpoint Devices. +For example, a Purview DLP policy that's scoped to email can be extended to SharePoint, OneDrive, Teams, and Endpoint Devices. The migration assistant will auto-create a new policy based on the original policy with all supported rules for that given workload. One or more rules may be dropped if not supported for a given workload. -For example: -Email subject is condition may be dropped while extending an email (Exchange) DLP policy to OneDrive. +For example, the **Email subject is** condition may be dropped while extending an email (Exchange) DLP policy to OneDrive. -Some checkboxes may be disabled by default, if there are no supported conditions available in extended locations. +Some checkboxes may be disabled by default if there are no supported conditions available in extended locations. -Editing a row element - When editing one or more row elements, you'll be navigated to an **Edit** screen with more details about that row element. If thereΓÇÖs any issue, it will be reported by a yellow banner at the top of the screen. You may need to make changes to the content in the editable sections, and those changes will be incorporated at the time of migration. Once you resolve the issues in the content, the yellow banner will disappear. +Editing a row element - When editing one or more row elements, you'll be navigated to an **Edit** screen with more details about that row element. If there are any issues, they will be reported via a yellow banner at the top of the screen. You may need to make changes to the content in the editable sections. Those changes will then be incorporated at the time of migration. Once you resolve the issues in the content, the yellow banner will disappear. -Use existing SITs from tenant to auto replace current SIT. You may choose to replace the current SIT (which is being edited) with another SIT from your tenant. +Use existing SITs from tenant to automatically replace the current SIT. You may choose to replace the current SIT (which is being edited) with another SIT from your tenant. :::image type="content" source="../media/sit-content.png" alt-text="Screenshot of editing SIT content."::: -You can manually change any of the mappings if you wish to, by selecting on the corresponding row in the ΓÇÿTargetΓÇÖ column. This will open a drop-down list with all the out-of-box SITs (OOB SITs) and all the custom SITs (if any) that you may have previously created. You can choose the option to which you wish to map to the ΓÇÿSourceΓÇÖ row item. Alternatively, you can also choose the option ΓÇÿNew SITΓÇÖ from the drop-down and the migration assistant will bring over the Source SIT as a new custom SIT. +You can manually change any of the mappings by selecting the corresponding row in the ΓÇÿTargetΓÇÖ column. This opens a drop-down list with all the out-of-box SITs (OOB SITs) and all the custom SITs (if any) that you may have previously created. You can choose the option to which you wish to map to the ΓÇÿSourceΓÇÖ row item. Alternatively, you can also choose the option **New SIT** from the drop-down. The migration assistant will then bring over the Source SIT as a new custom SIT. -We strongly recommend using existing SITs to replace current SITs wherever possible to help reduce creation of duplicate SITs and also reduce effort on optimizing multiple custom SITs of the same kind. Learn more about [sensitive information type entity definitions](sensitive-information-type-entity-definitions.md). +We strongly recommend using existing SITs to replace current SITs wherever possible to help reduce creation of duplicate SITs and also reduce effort of optimizing multiple custom SITs of the same kind. Learn more about [sensitive information type entity definitions](sensitive-information-type-entity-definitions.md). >[!WARNING] > Microsoft DLP platform has a threshold for up to 10 rule packages per tenant. This limit is enough for most customers, but the creation of many duplicate custom SITs may quickly lead you to hitting this threshold without the ability to create any new custom SITs. Once imported, DLP policies can be in one of three states: You can set the state in the migration assistant prior to migrating a policy using these two steps: -1. Choose whether to turn-on or off from the following three options: +1. Choose whether to turn on or off from the following three options: - Turn on policy immediately. - Turn on policy in test mode first. Remove from test mode later manually. - Keep it off. Turn it on later manually. You can select the **Save Technical Report** button to save a more detailed exce ### Next steps: After policy import -You should visit the Compliance portal and validate the policies you just migrated. +You should visit the compliance portal and validate the policies you just migrated. #### Check Sensitive Information Types -1. Validate that the SITs were created by opening **Data Classification** > **Sensitive Information Type** tab and look for the SITS. You can also sort the list on **Publisher** and check for SITs with publisher name as ΓÇ£DLP Migration ToolΓÇ¥. +1. To validate that the SITs were created, navigate to **Data Classification** > **Classifiers** > **Sensitive Info Types** and look for the SITs. You can also sort the list on **Publisher** and check for SITs with a publisher name of ΓÇ£DLP Migration ToolΓÇ¥. -2. Rename SITs as needed. For many SITs, you may notice there are similar names often followed by roman numerals. To avoid confusion and duplication post-migration, you should rename these SITs. This is true for cases where your regular expressions and keywords are defined directly in rules within your input Symantec DLP policies. +2. Rename SITs as needed. For many SITs, you may notice there are similar names, often followed by roman numerals. To avoid confusion and duplication post-migration, you should rename these SITs. This is true for cases where your regular expressions and keywords are defined directly in rules within your input Symantec DLP policies. 3. Test and fine-tune SITs as needed. You should test and fine-tune the migrated SITs. The migration assistant creates new SITs with a few standard settings, which might not be right for your tenant so look out for the following: 1. Regular expressions: Unsupported or deleted regexes (during migration) You should visit the Compliance portal and validate the policies you just migrat 2. **Add any missing policy elements** While most of the input Symantec DLP policy elements (like conditions, exclusions, or actions) will get migrated, often a few elements from your input Symantec DLP policy may get dropped during the migration process. This is a known limitation of the migration assistant. In this scenario, you'll have to manually add these elements to the policy as they're supported by the Microsoft Purview DLP platform. + 3. **Test and fine-tune the policy** You can test the policy and fine-tune it as per the needs of your organization.+ 4. **Turn the policy on** Once tested or fine-tuned, you can turn on this policy or put the policy in production mode.+ 5. **Bring over any remaining policies** You can go back to bring over the next policy or next batch of policies using the migration assistant. You should visit the Compliance portal and validate the policies you just migrat If you see an error on welcome screen after selecting **Get Started**, follow these steps: - 1. Confirm that you've installed all the pre-requisites using the links/versions mentioned in [Before you start](dlp-migration-assistant-for-symantec-get-started.md#before-you-begin). - 2. Ensure that you've restarted the machine after installing the pre-requisites. - 3. Check if you're running the tool in admin mode using **Run as administrator** option while starting the application. - 4. Check if your PowerShell module path is set correctly using these steps: - 1. Go to edit system environment variables. - 2. Add this path in PsModulePath user variable: `C:\Program Files\PowerShell\7\Modules`. - 3. Move this up and keep at top. - 4. Restart the tool in admin mode. + 1. Confirm that you've installed all the prerequisites using the links/versions mentioned in [Before you start](dlp-migration-assistant-for-symantec-get-started.md#before-you-begin). + 2. Ensure that you've restarted the machine after installing the prerequisites. + 3. Ensure that you're running the tool in *admin mode* using the **Run as administrator** option when starting the application. + 4. Ensure that your PowerShell module path is set correctly using these steps: + 1. Go to **Edit system environment variables**. + 2. Add this path in the **PsModulePath** user variable: `C:\Program Files\PowerShell\7\Modules`. + 3. Move this up and keep at the top. + 4. Restart the tool in administrator mode. If you're unable to install/uninstall due to another app/process installation, follow these steps: 1. Right click on the task bar to open Task Manager. If necessary, choose **More Details**.-2. On **Details** tab, look for msiexec.exe and select **End Task**. -3. Try to install or uninstall again or wait until the installation is finished. +2. On the **Details** tab, look for *msiexec.exe* and select **End Task**. +3. Try to install or uninstall again, or, wait until the installation is finished. To report issues to Microsoft: |
compliance | Dlp On Premises Scanner Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-get-started.md | f1.keywords: Previously updated : 02/21/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords: Before you get started with DLP on-premises repositories, you should confirm you For full licensing details, see: [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance) > [!IMPORTANT]-> All users who contribute to the scanned location either by adding files or consuming files need to have a license, not just the scanner user. +> All users who contribute to the scanned location, either by adding files or consuming files, need to have a license, not just the scanner user. ### Permissions -Data from DLP can be viewed in [Activity explorer](data-classification-activity-explorer.md). There are four roles that grant permission to activity explorer, the account you use for accessing the data must be a member of any one of them. +Data from DLP can be viewed in [activity explorer](data-classification-activity-explorer.md). There are four roles that grant permission to activity explorer, the account you use for accessing the data must be a member of any one of them. - Global administrator - Compliance administrator Data from DLP can be viewed in [Activity explorer](data-classification-activity- There are roles and role groups in preview that you can test out to fine tune your access controls. -Here's a list of applicable roles that are in preview. To learn more about them, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). +Here's a list of applicable roles. To learn more about them, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). - Information Protection Admin - Information Protection Analyst - Information Protection Investigator - Information Protection Reader -Here's a list of applicable role groups that are in preview. To learn more about the, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). +Here's a list of applicable role groups. To learn more, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). - Information Protection - Information Protection Admins Here's a list of applicable role groups that are in preview. To learn more about ### DLP on-premises repositories prerequisites -- The Microsoft Purview information protection scanner implements DLP policy matching and policy enforcement. The scanner is installed as part of the AIP client so your installation must meet all the prerequisites for AIP, the AIP client, and the AIP unified labeling scanner.+- The Microsoft Purview information protection scanner implements DLP policy matching and policy enforcement. The scanner is installed as part of the AIP client, so your installation must meet all the prerequisites for AIP, the AIP client, and the AIP unified labeling scanner. - Deploy the AIP client and scanner. For more information, see, [Install the AIP unified labeling client](/azure/information-protection/rms-client/install-unifiedlabelingclient-app) and, [Configuring and installing the information protection scanner](deploy-scanner-configure-install.md). - There must be at least one label and policy published in the tenant, even if all your detection rules are based on sensitive information types only. Here's a list of applicable role groups that are in preview. To learn more about 1. Follow the procedures in [Install the AIP unified labeling client](/azure/information-protection/rms-client/install-unifiedlabelingclient-app). 2. Follow the procedures in [Configuring and installing the information protection scanner](deploy-scanner-configure-install.md) to complete the scanner installation.- 1. You must create content scan job and specify the repositories that host files that need to be evaluated by the DLP engine. - 2. Enable DLP rules in the created Content scan job, and set the **Enforce** option to **Off**, unless you want to proceed directly to the DLP enforcement stage. -3. Verify that your content scan job is assigned to the right cluster. If you still didn't create a content scan job create a new one and assign it to the cluster that contains the scanner nodes. + 1. You must create a content scan job and specify the repositories that host the files to be evaluated by the DLP engine. + 2. Enable DLP rules in the created content scan job, and set the **Enforce** option to **Off** (unless you want to proceed directly to the DLP enforcement stage). +3. Verify that your content scan job is assigned to the right cluster. If you haven't created a content scan job, create a new one and assign it to the cluster that contains the scanner nodes. 4. Connect to the Microsoft Purview compliance portal and add your repositories to the content scan job that will perform the scan. 5. Do one of the following to run your scan:- 1. set the scanner schedule - 1. use the manual **Scan Now** option in the portal - 1. or run **Start-AIPScan** PowerShell cmdlet + 1. Set the scanner schedule + 1. Use the manual **Scan Now** option in the portal + 1. Run **Start-AIPScan** PowerShell cmdlet > [!IMPORTANT]- > Remember that the scanner runs a delta scan of the repository by default and the files that were already scanned in the previous scan cycle will be skipped unless the file was changed or you initiated a full rescan. Full rescan can be initiated by using **Rescan all files** option in the UI or by running **Start-AIPScan-Reset**. + > Remember that the scanner runs a delta scan of the repository by default and files that were scanned in the previous scan cycle will be skipped, unless the file was changed or you initiated a full rescan. A full rescan can be initiated by using the **Rescan all files** option in the UI or by running **Start-AIPScan-Reset**. 6. Open the [Data loss prevention page](https://compliance.microsoft.com/datalossprevention?viewid=policies) in the Microsoft Purview compliance portal. -7. Choose **Create policy** and create a test DLP policy. See [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) if you need help with creating a policy. Be sure to run it in test until you're comfortable with this feature. Use these parameters for your policy: - 1. Scope the DLP on-premises repositories rule to specific locations if needed. If you scope **locations** to **All**, all files scanned by the scanner will be subject to the DLP rule matching and enforcement. +7. Choose **Create policy** and create a test DLP policy. See [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) if you need help with creating a policy. Be sure to run it in test mode until you're comfortable with this feature. Use these parameters for your policy: + 1. Scope the DLP on-premises repositories rule to specific locations if needed. If you scope **locations** to **All**, all files scanned will be subject to the DLP rule matching and enforcement. 1. When specifying the locations, you can use either exclusion or inclusion list. You can either define that the rule is relevant only to paths matching one of the patterns listed in inclusion list or, all files, except the files matching the pattern listed in inclusion list. No local paths are supported. Here are some examples of valid paths: - \\\server\share - \\\server\share\folder1\subfolderabc Here's a list of applicable role groups that are in preview. To learn more about - C:\test > [!IMPORTANT]-> The exclusion list takes precedence over the inclusions list. +> The *exclusion* list takes precedence over the *inclusions* list. ### Viewing DLP alerts in DLP Alerts Management dashboard Here's a list of applicable role groups that are in preview. To learn more about ### Viewing DLP data in activity explorer and audit log > [!NOTE]-> The Information Protection scanner requires that auditing be enabled. In Microsoft 365 auditing is enabled by default. +> The Information Protection scanner requires that auditing be enabled. Auditing is enabled by default in Microsoft 365. 1. Open the [Data classification page](https://compliance.microsoft.com/dataclassification?viewid=overview) for your domain in the Microsoft Purview compliance portal and select Activity explorer. 2. Refer to the procedures in [Get started with Activity explorer](data-classification-activity-explorer.md) to access and filter all the data for your on-premises scanner locations. -3. Open the [Audit log in the Compliance center](https://security.microsoft.com/auditlogsearch). The DLP rule matches are available in Audit log UI or accessible by [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) PowerShell +3. Open the [Audit log in the compliance center](https://security.microsoft.com/auditlogsearch). The DLP rule matches are available in the Audit log UI or accessible by [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) in PowerShell. ## Next steps |
compliance | Dlp On Premises Scanner Learn | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-learn.md | f1.keywords: Previously updated : 02/21/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords: description: "The data loss prevention on-premises location extends monitoring o # Learn about the data loss prevention on-premises repositories -When you select the **On-premises repositories** location Microsoft Purview Data Loss Prevention (DLP) can enforce protective actions on on-premises data-at-rest in file shares and SharePoint document libraries and folders. This gives you the visibility and control you need to ensure that sensitive items are used and protected properly, and to help prevent risky behavior that might compromise them. The DLP detects sensitive information by using [built-in](sensitive-information-type-entity-definitions.md) or [custom sensitive information](create-a-custom-sensitive-information-type.md) types, [sensitivity labels](sensitivity-labels.md) or file properties. The information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-learn-about-dlp.md). +When you select the **On-premises repositories** location, Microsoft Purview Data Loss Prevention (DLP) can enforce protective actions on on-premises data-at-rest in file shares and SharePoint document libraries and folders. This gives you the visibility and control you need to ensure that sensitive items are used and protected properly, and to help prevent risky behavior that might compromise them. The DLP detects sensitive information by using [built-in](sensitive-information-type-entity-definitions.md) or [custom sensitive information](create-a-custom-sensitive-information-type.md) types, [sensitivity labels](sensitivity-labels.md) or file properties. The information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-learn-about-dlp.md). [!INCLUDE [purview-preview](../includes/purview-preview.md)] DLP detects files in on-premises repositories by one of these four methods: - sensitive information types - sensitivity labels - file extension-- custom document properties on Office files only +- custom document properties on Office files only -When a detected file poses a potential risk if leaked or a compliance policy violation, DLP can take one of these four actions. +When a detected file poses a compliance policy violation or potential risk if leaked, DLP can take one of the following four actions. |Action |Description | |||-|**Block people from accessing file stored in on-premises scanner - Block everyone** | When enforced, this action blocks access to all accounts except the content owner, the account that last modified the item and the administrator. It does this by removing all accounts from NTFS/SharePoint permissions at the file level except the file owner, repository owner (set in the [Use a DLP policy](deploy-scanner-configure-install.md#use-a-dlp-policy)) setting in content scan job), last modifier (can be identified in SharePoint only) and admin. The scanner account is also granted FC rights on the file.| -|**Block only people who have access to your on-premises network and users in your organization who weren't granted explicit access to the files from accessing file** |When enforced, this action removes the ***Everyone***, ***NT AUTHORITY\authenticated users***, and ***Domain Users*** SIDs from the file access control list (ACL). Only users and groups that have been explicitly granted rights to the file or parent folder will be able to access the file.| -|**Set permissions on the file (permissions will be inherited from the parent folder)**|When enforced, this action forces the file to inherit the permissions of its parent folder. Be default, this action will only be enforced if the permissions on the parent folder are more restrictive than the permissions that are already on the file. For example, if the ACL on the file is set to only allow ***specific users*** and the parent folder is configured to allow ***Domain Users*** group, the parent folder permissions wouldn't be inherited by the file. You can override this behavior by selecting the **Inherit even if parent permissions are less restrictive** option.| -|**Remove the file from improper location**|When enforced, this action replaces the original file with a stub file with .txt extension and places a copy of the original file in a quarantine folder. +|**Block people from accessing file stored in on-premises scanner - Block everyone** | When enforced, this action blocks access to all accounts except the content owner, the account that last modified the item, and the administrator. It does this by removing all accounts from NTFS/SharePoint permissions at the file level except for the file owner, repository owner (set in the [Use a DLP policy](deploy-scanner-configure-install.md#use-a-dlp-policy) setting in content scan job), last modifier (can be identified in SharePoint only), and admin. The scanner account is also granted FC rights on the file. | +|**Block only people who have access to your on-premises network and users in your organization who weren't granted explicit access to the files from accessing file** | When enforced, this action removes the ***Everyone***, ***NT AUTHORITY\authenticated users***, and ***Domain Users*** SIDs from the file access control list (ACL). Only users and groups that have been explicitly granted rights to the file or parent folder will be able to access the file.| +|**Set permissions on the file (permissions will be inherited from the parent folder)**| When enforced, this action forces the file to inherit the permissions of its parent folder. By default, this action will only be enforced if the permissions on the parent folder are more restrictive than the permissions that are already on the file. For example, if the ACL on the file is set to allow only ***specific users*** and the parent folder is configured to allow the ***Domain Users*** group, the parent folder permissions wouldn't be inherited by the file. You can override this behavior by selecting the **Inherit even if parent permissions are less restrictive** option. | +|**Remove the file from improper location** | When enforced, this action replaces the original file with a stub file with .txt extension and places a copy of the original file in a quarantine folder. ## What's different in the on-premises scanner There are a few extra concepts that you need to be aware of before you dig into ### AIP repositories and content scan jobs -You must create a content scan job in the information protection scanner and identify the repositories that host the files that you want to be evaluated by DLP. Make sure you enable DLP rules in the created AIP content scan job. +You must create a content scan job in the information protection scanner and identify the repositories that host the files that you want to DLP to evaluate. Make sure you enable DLP rules in the created AIP content scan job. ### Policy tips Now that you've learned about the Information Protection on-premises scanner, yo 1. [Get started with the On-premises repositories location](dlp-on-premises-scanner-get-started.md) 2. [Use the DLP on-premises scanner](dlp-on-premises-scanner-use.md)>+ ## See also - [Getting started with the data loss prevention on-premises scanner](dlp-on-premises-scanner-get-started.md) |
compliance | Dlp On Premises Scanner Use | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-use.md | f1.keywords: Previously updated : 02/21/2023 Last updated : 06/16/2023 audience: ITPro f1_keywords: description: "Learn how to use data loss prevention on premises repositories loc # Use the data loss prevention on-premises repositories location -To help familiarize you with Microsoft Purview Data Loss Prevention on-premises features and how they surface in DLP policies, we've put together a scenario for you to follow. +To help familiarize you with Microsoft Purview Data Loss Prevention on-premises features and how they surface in DLP policies, we've put together a couple of scenarios for you to follow. > [!IMPORTANT]-> These DLP on-premises scenarios are not the official procedures for creating and tuning DLP policies. Refer to the below topics when you need to work with DLP policies in general situations: +> These DLP on-premises scenarios are not the official procedures for creating and tuning DLP policies. Refer to the following topics when you need to work with DLP policies in general situations: > > - [Learn about data loss prevention](dlp-learn-about-dlp.md) > - [Get started with the default DLP policy](get-started-with-the-default-dlp-policy.md) > - [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) -### Scenario: Discover files matching DLP rules +## Scenario: Discover files matching DLP rules Data from DLP surfaces in several areas -#### Activity explorer +### Activity explorer DLP reports rule matches in [Activity Explorer](https://compliance.microsoft.com/dataclassification?viewid=activitiesexplorer). -#### Microsoft 365 Audit log +### Microsoft 365 Audit log -The DLP rule matches are also available in Audit log UI, see [Search the audit log in the Microsoft Purview compliance portal](audit-log-search.md) or accessible by [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) PowerShell. +The DLP rule matches are also available in the Audit log UI (see [Search the audit log in the Microsoft Purview compliance portal](audit-log-search.md)) and are accessible via PowerShell through the[Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog). -#### AIP +### AIP -Discovery data is available in a local report in csv format which is stored under: +Discovery data is available in a local report in .csv format and is stored under: **%localappdata%\Microsoft\MSIP\Scanner\Reports\DetailedReport_%timestamp%.csv report**. Discovery data is available in a local report in csv format which is stored unde - Applied NTFS Permissions (SDDL) - NTFS permissions type -### Scenario: Enforce DLP rule +## Scenario: Enforce DLP rule If you want to enforce DLP rules on scanned files, enforcement must be enabled on both the content scan job and at the policy level in DLP. -#### Configure DLP to enforce policy actions +### Configure DLP to enforce policy actions 1. Open the [Data loss prevention page](https://compliance.microsoft.com/datalossprevention?viewid=policies) and select the DLP policy that is targeted to the on-premises location repositories you have configured in AIP. 2. Edit the policy. |
compliance | Dlp Overview Plan For Dlp | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-overview-plan-for-dlp.md | f1.keywords: Previously updated : 04/20/2021 Last updated : 06/02/2023 audience: ITPro description: "Overview of the planning process for data loss prevention" # Plan for data loss prevention (DLP) -Every organization will plan for and implement data loss prevention (DLP) differently, because every organization's business needs, goals, resources, and situation are unique to them. However, there are elements that are common to all successful DLP implementations. This article presents the best practices that are used by organizations in their DLP planning. +Every organization will plan for and implement data loss prevention (DLP) differently because every organization's business needs, goals, resources, and situation are unique to them. However, there are elements that are common to all successful DLP implementations. This article presents the best practices that are used by organizations in DLP planning. [!INCLUDE [purview-preview](../includes/purview-preview.md)] If you are new to Microsoft Purview DLP, here's a list of the core articles you' ## Multiple starting points -Many organizations choose to implement DLP to comply with various governmental or industry regulations. For example, the European Union's General Data Protection Regulation (GDPR), or the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA). They also implement data loss prevention to protect their intellectual property. But the starting place and ultimate destination in the DLP journey vary. +Many organizations choose to implement DLP to comply with various governmental or industry regulations. For example, the European Union's General Data Protection Regulation (GDPR), or the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA). They also implement data loss prevention to protect their intellectual property. However, the starting place and ultimate destination in the DLP journey vary. Organizations can start their DLP journey: -- from a platform focus, like wanting to protect information in Teams Chat and Channel messages or on Windows 10 or 11 devices+- from a platform focus, for instance, if they want to protect information in Teams Chat and Channel messages or on Windows 10 or 11 devices - knowing what sensitive information they want to prioritize protecting, like health care records, and going straight to defining policies to protect it-- without knowing what their sensitive information is, where it is, and who is doing what with it so they start with discovery and categorization and take a more methodical approach-- without knowing what their sensitive information is, or where it is, or who is doing what with it, but they will move straight to defining policies and use those outcomes as a starting place and then refine their policies from there-- knowing that they need to implement the full Microsoft Purview Information Protection stack and so intend to take a longer term, methodical approach+- without knowing what their sensitive information is, where it is, or who is doing what with it; in this case they start with discovery and categorization and take a more methodical approach +- without knowing what their sensitive information is, or where it is, or who is doing what with it, but moving straight to defining policies and using those outcomes as a starting place and then refining their policies from there +- knowing that they need to implement the full Microsoft Purview Information Protection stack and so take a longer term, methodical approach -These are just some examples of how customers can approach DLP and it doesn't matter where you start from, DLP is flexible enough to accommodate various types of information protection journeys from start to a fully realized data loss prevention strategy. +These are just some examples of how customers can approach DLP. It doesn't matter where you start from, DLP is flexible enough to accommodate various types of information protection journeys from start to a fully realized data loss prevention strategy. ## Overview of planning process The [Learn about Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md# ### Identify stakeholders -When implemented, DLP policies can be applied across large portions of your organization. IT can't develop a broad ranging plan on their own without negative consequences. You need to identify the stakeholders who can: +When implemented, DLP policies can be applied across large portions of your organization. Your IT department can't develop a broad ranging plan on their own without negative consequences. You need to identify the stakeholders who can: - describe the regulations, laws, and industry standards your organization is subject to - the categories of sensitive items to be protected - the business processes they are used in - the risky behavior that should be limited-- prioritize which data should be protected first based on the sensitivity of the items and risk involved-- outline the DLP policy match event review and remediation process +- prioritize which data should be protected first, based on the sensitivity of the items and risk involved +- outline the DLP policy match event review and remediation process -In general these needs tend to be 85% regulatory and compliance protection, and 15% intellectual property protection. Here are some suggestions on roles to include in your planning process: +In general, these needs tend to be 85% regulatory and compliance protection, and 15% intellectual property protection. Here are some suggestions on roles to include in your planning process: - Regulatory and compliance officers - Chief risk officer In general these needs tend to be 85% regulatory and compliance protection, and ### Describe the categories of sensitive information to protect -The stakeholders then describe the categories of sensitive information to be protected and the business process that they're used in. For example, DLP defines these categories: +Once identified, the stakeholders then describe the categories of sensitive information to be protected and the business processes that they're used in. For example, DLP defines these categories: -- Financial +- Financial - Medical and health information - Privacy - Custom -The stakeholders might identify the sensitive information as "We are a data processor, so we have to implement privacy protections on data subject information and financial information". +Stakeholders might identify the sensitive information as "We are a data processor, so we have to implement privacy protections on data subject information and financial information". <!-- The business process is important as it informs the ΓÇÿdata at restΓÇÖ, ΓÇÿdata in transitΓÇÖ, ΓÇÿdata in useΓÇÖ aspect of DLP planning and who should be sharing the items and who should not.--> start small and always in test mode. Note that DLP policies can feed into inside Your implementation plan should include: -- Mapping out your starting state and desired end state and the steps to get from one to the other+- Mapping out your starting state, desired end state, and the steps to get from one to the other - how you will address discovery of sensitive items-- policy planning and the order that they will be implemented+- policy planning and the order in which policies will be implemented - how you will address any prerequisites - planning on how policies will first be tested before moving to enforcement - how you will train your end users There are multiple ways to discover what individual sensitive items are and wher As you begin your DLP adoption, you can use these questions to focus your policy design and implementation efforts. -##### What laws, regulations and industry standards must your organization comply with? +##### What laws, regulations, and industry standards must your organization comply with? -Because many organizations come to DLP with the goal of regulatory compliance, answering this question is a natural starting place for planning your DLP implementation. But, as the IT implementer, you're probably not positioned to answer it. It needs to be answered by your legal team and business executives. +Because many organizations come to DLP with the goal of regulatory compliance, answering this question is a natural starting place for planning your DLP implementation. But, as the IT implementer, you're probably not positioned to answer it. It needs to be answered by your legal team and business executives. **Example** Your organization is subject to U.K. financial regulations. ##### What sensitive items does your organization have that must be protected from leakage? -Once your organization knows where it stands in terms of regulatory compliance needs, you'll have some idea of what sensitive items need to be protected from leakage and how you want to prioritize policy implementation to protect them. This will help you choose the most appropriate DLP policy templates. Microsoft Purview comes with pre-configured DLP templates for Financial, Medical and health, Privacy, and you can build your own using the Custom template. As you design and create your actual DLP policies, knowing the answer to this question will also help you choose the right [sensitive information type](sensitive-information-type-learn-about.md#learn-about-sensitive-information-types). +Once your organization knows where it stands in terms of regulatory compliance needs, you'll have some idea of what sensitive items need to be protected from leakage and how you want to prioritize policy implementation to protect them. This will help you choose the most appropriate DLP policy templates. Microsoft Purview comes with pre-configured DLP templates for Financial, Medical and health, Privacy. You can also build your own policies using the Custom template. As you design and create your actual DLP policies, knowing the answer to this question will also help you choose the right [sensitive information type](sensitive-information-type-learn-about.md#learn-about-sensitive-information-types). **Example** To get started quickly, you pick the `U.K. Financial Data` policy template, which includes the `Credit Card Number`, `EU Debit Card Number`, and `SWIFT Code` sensitive information types. ##### How you want your policies scoped -If your organization has implemented [administrative units](microsoft-365-compliance-center-permissions.md#administrative-units-preview) (preview) you can scope your DLP policies by administrative unit or leave the default full directory scoping. See, [Policy Scoping](dlp-policy-reference.md#policy-scoping)(preview) for more details. +If your organization has implemented [administrative units](microsoft-365-compliance-center-permissions.md#administrative-units-preview), you can scope your DLP policies by administrative unit or leave the default full directory scoping. See [Policy Scoping](dlp-policy-reference.md#policy-scoping)(preview) for more details. ##### Where are the sensitive items and what business processes are they involved in? -The items that contain your organizations sensitive information are used every day in the course of doing business. You need to know where instances of that sensitive information may occur and what business processes they are used in. This will help you choose the right locations to apply your DLP policies to. DLP policies are applied to locations: +The items that contain your organization's sensitive information are used every day in the course of doing business. You need to know where instances of that sensitive information may occur and what business processes they are used in. This will help you choose the right locations to apply your DLP policies to. DLP policies are applied to locations: - Exchange email - SharePoint sites - OneDrive accounts - Teams chat and channel messages-- Windows 10, 11 and macOS Devices+- Windows 10, 11, and macOS Devices - Microsoft Defender for Cloud Apps - On-premises repositories -**Example** Your organizations' internal auditors are tracking a set of credit card numbers. They keep a spreadsheet of them in a secure SharePoint site. Several of the employees make copies and save them to their work OneDrive for Business site, which is synced to their Windows 10 device. One of them pastes a list of 14 of them into an email and tries to send it to the outside auditors for review. You'd want to apply the policy to the secure SharePoint site, all the internal auditors OneDrive for Business accounts, their Windows 10 devices, and Exchange email. +**Example** Your organization's internal auditors are tracking a set of credit card numbers. They keep a spreadsheet of them in a secure SharePoint site. Several of the employees make copies and save them to their work OneDrive site, which is synced to their Windows 10 device. One of them pastes a list of 14 of those credit card numbers into an email and tries to send it to the outside auditors for review. You'd want to apply the policy to the secure SharePoint site, all the internal auditors' OneDrive accounts, their Windows 10 devices, and Exchange email. ##### What is your organizations tolerance for leakage? Different groups in your organization may have different views on what's an acceptable level of sensitive item leakage and what's not. Achieving the perfection of zero leakage may come at too high a cost to the business. -**Example** Your organizations' security group, along with the legal team both feel that there should be no sharing of credit card numbers with anyone outside the org and insist on zero leakage. But, as part of regular review of credit card number activity, the internal auditors must share some credit card numbers with third-party auditors. If your DLP policy prohibits all sharing of credit card numbers outside the org, there will be a significant business process disruption and added cost to mitigate the disruption in order for the internal auditors to complete their tracking. This extra cost is unacceptable to the executive leadership. To resolve this, there needs to be an internal conversation to decide an acceptable level of leakage. Once that is decided the policy can provide exceptions for certain individuals to share the information or it can be applied in audit only mode. +**Example** Your organization's security group and legal team both feel that there should be no sharing of credit card numbers with anyone outside the org and insist on zero leakage. But, as part of regular review of credit card number activity, the internal auditors must share some credit card numbers with third-party auditors. If your DLP policy prohibits all sharing of credit card numbers outside the org, there will be a significant business process disruption and added cost to mitigate the disruption in order for the internal auditors to complete their tracking. This extra cost is unacceptable to the executive leadership. To resolve this, there needs to be an internal conversation to decide an acceptable level of leakage. Once that is decided the policy can provide exceptions for certain individuals to share the information or it can be applied in audit only mode. > [!IMPORTANT] > To learn how to create a policy intent statement and map it to policy configurations see, [Design a data loss prevention policy](dlp-policy-design.md#design-a-data-loss-prevention-policy) #### Planning for prerequisites -Before you can monitor some DLP locations, there are prerequisites that must be met. See the **Before you begin** sections of: +Before you can monitor some DLP locations, there are prerequisites that must be met. See the **Before you begin** sections of the following articles: - [Get started with the data loss prevention on-premises scanner (preview)](dlp-on-premises-scanner-get-started.md#before-you-begin) - [Get started with Endpoint data loss prevention](endpoint-dlp-getting-started.md#before-you-begin) If you're creating DLP policies with a large potential impact, we recommend foll 2. **Move to Test mode with notifications and Policy Tips** so that you can begin to teach users about your compliance policies and prepare them for when the policies are applied. It's useful to have a link to an organization policy page that provides more details about the policy in the policy tip. At this stage, you can also ask users to report false positives so that you can further refine the conditions and reduce the number of false positives. Move to this stage once you have confidence that the results of policy application match what they stakeholders had in mind. -3. **Start full enforcement on the policies** so that the actions in the rules are applied and the content's protected. Continue to monitor the DLP reports and any incident reports or notifications to make sure that the results are what you intend. +3. **Start full enforcement on the policies** so that the actions in the rules are applied and the content is protected. Continue to monitor the DLP reports and any incident reports or notifications to make sure that the results are what you intend. -  +  You can turn off a DLP policy at any time, which affects all rules in the policy. However, each rule can also be turned off individually by toggling its status in the rule editor. -  +  - You can also change the priority of multiple rules in a policy. To do that, open a policy for editing. In a row for a rule, choose the ellipses (**...**), and then choose an option, such as **Move down** or **Bring to last**. + You can also change the priority of multiple rules in a policy. To do that, open a policy for editing. In the row for a rule, choose the ellipses (**...**), and then move an item down in the list to the desired position.  #### End-user training -When a DLP policy is triggered, you can configure your policies to [send email notifications and show policy tips for DLP policies](use-notifications-and-policy-tips.md#send-email-notifications-and-show-policy-tips-for-dlp-policies) to admins and end users. While your policies are still in test mode and before they are set to enforce a blocking action, policy tips are useful ways to raise awareness of risky behaviors on sensitive items and train users to avoid those behaviors in the future. + You can configure your policies sot that, when a DLP policy is triggered, an [email notification is sent to admins and policy tips are shown to end users](use-notifications-and-policy-tips.md#send-email-notifications-and-show-policy-tips-for-dlp-policies). While your policies are still in test mode, and before they are set to enforce a blocking action, policy tips are useful ways to raise awareness of risky behaviors on sensitive items and for training users to avoid those behaviors in the future. #### Review DLP requirements and update strategy The regulations, laws, and industry standards that your organization is subject |Customer business needs description | approach | |||-|**Contoso Bank** is in a highly regulated industry and has many different types of sensitive items in many different locations. </br> - knows which types of sensitive information are top priority. </br> - must minimize business disruption as policies are rolled out. </br> - has IT resources and can hire experts to help plan, design, and deploy </br> - has a premier support contract with Microsoft| - Can take the time to understand what regulations they must comply with and how they are going to comply. </br> - Can take the time to understand the better together value of the Microsoft Purview Information Protection stack </br> - Can develop a sensitivity labeling scheme for prioritized items and apply </br> - Has involved business process owners </br>- Design/code policies, deploy in test mode, train users </br>- repeat| -|**TailSpin Toys** doesnΓÇÖt know what they have or where it is, and have little to no resource depth. They use Teams, OneDrive for Business and Exchange extensively. |- Start with simple policies on the prioritized locations. </br>- Monitor what gets identified </br>- Apply sensitivity labels accordingly </br>- Refine policies, train users | -|**Fabrikam** is a small startup and wants to protect its intellectual property, and must move quickly. They are willing to dedicate some resources, but can't afford to hire outside experts. </br>- Sensitive items are all in Microsoft 365 OneDrive for Business/SharePoint </br>- Adoption of OneDrive for Business and SharePoint is slow, employees/shadow IT use DropBox and Google drive to share/store items </br>- Employees value speed of work over data protection discipline </br>- Customer splurged and bought all 18 employees new Windows devices |- Take advantage of the default DLP policy in Teams </br>- Use restricted by default setting for SharePoint items </br>- Deploy policies that prevent external sharing </br>- Deploy policies to prioritized locations </br>- Deploy policies to Windows devices </br>- Block uploads to non-OneDrive for Business cloud storage | +|**Contoso Bank** is in a highly regulated industry and has many different types of sensitive items in many different locations. Contoso </br> - knows which types of sensitive information are top priority. </br> - must minimize business disruption as policies are rolled out. </br> - has IT resources and can hire experts to help plan, design, and deploy </br> - has a premier support contract with Microsoft| - Take the time to understand what regulations they must comply with and how they are going to comply. </br> - Take the time to understand the better together value of the Microsoft Purview Information Protection stack </br> - Develop a sensitivity labeling scheme for prioritized items and apply </br> - Involve business process owners </br>- Design/code policies, deploy in test mode, train users </br>- repeat| +|**TailSpin Toys** doesnΓÇÖt know what they have or where it is, and have little to no resource depth. They use Teams, OneDrive, and Exchange extensively. |- Start with simple policies on the prioritized locations. </br>- Monitor what gets identified </br>- Apply sensitivity labels accordingly </br>- Refine policies and train users | +|**Fabrikam** is a small startup and wants to protect its intellectual property. It must move quickly. They are willing to dedicate some resources, but can't afford to hire outside experts. </br>- Sensitive items are all in OneDrive and SharePoint </br>- Adoption of OneDrive and SharePoint is slow, employees/shadow IT use DropBox and Google Drive to share/store items </br>- Employees value speed of work over disciplined data protection </br>- Customer splurged and bought all 18 employees new Windows devices |- Take advantage of the default DLP policy in Teams </br>- Use the *restricted by default* setting for SharePoint items </br>- Deploy policies that prevent external sharing </br>- Deploy policies to prioritized locations </br>- Deploy policies to Windows devices </br>- Block uploads to non-OneDrive for Business cloud storage | ## Next steps |
compliance | Dlp Owa Policy Tips | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-owa-policy-tips.md | f1.keywords: Previously updated : 06/15/2023 Last updated : 06/02/2023 audience: Admin search.appverid: MET150 description: "DLP policy tip reference for Outlook 2013 for Win32." Yes. > [!IMPORTANT]-> -> - When emails are encrypted with Microsoft Purview Message Encryption and the policy used to detect them uses the detect encryption condition policy tips will not appear. -> - Poicy tips that rely on conditions which evaluate custom X-headers will not display for Outlook on the Web messages because the transport service on the mailbox servers insert custom X-header values after the policy tips are evaluated. +> When emails are encrypted with Microsoft Purview Message Encryption and the policy used to detect them uses the *detect encryption* condition, policy tips will not appear. ## Email notification supported for Outlook on the Web Yes. ## Sensitive information types that support policy tips in Outlook on the Web -These preconfigured sensitive information types (SIT) support policy tips in Outlook on the Web. +These preconfigured sensitive information types (SITs) support policy tips in Outlook on the Web. - [ABA routing number](sit-defn-aba-routing.md) - [Argentina national identity (DNI) number](sit-defn-argentina-national-identity-numbers.md) All exact data match sensitive information types are custom created. For more de Yes. -Custom sensitive information types that use REGEX, functions, keyword lists and keyword dictionaries support policy tips in Outlook on the Web. For more details, see [Create custom sensitive information types in the compliance portal](create-a-custom-sensitive-information-type.md) and [Create a custom sensitive information type using PowerShell](create-a-custom-sensitive-information-type-in-scc-powershell.md). +Custom sensitive information types that use REGEX, functions, keyword lists, and keyword dictionaries support policy tips in Outlook on the Web. For more details, see [Create custom sensitive information types in the compliance portal](create-a-custom-sensitive-information-type.md) and [Create a custom sensitive information type using PowerShell](create-a-custom-sensitive-information-type-in-scc-powershell.md). ## Sensitivity labels support for policy tips in Outlook on the Web |
compliance | Dlp Policy Design | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-design.md | f1.keywords: Previously updated : 12/14/2021 Last updated : 06/02/2023 audience: ITPro description: "Learn how to design a data loss prevention (DLP) policy" # Design a data loss prevention policy -Taking the time to design a policy before you implement it will get you to the desired results faster, and with fewer unintended issues, than creating it and then tuning by trial and error alone. Having your policy designs documented will also help you in communications, policy reviews, troubleshooting, and further tuning. +Taking the time to design a policy before you implement it will get you to the desired results faster, with fewer unintended issues, than creating it and then tuning by trial and error alone. Having your policy designs documented will also help you in communications, policy reviews, troubleshooting, and further tuning. If you are new to Microsoft Purview DLP, it's helpful to work through these articles before you start designing a policy: If you are new to Microsoft Purview DLP, here's a list of the core articles you' ### Define intent for the policy -You should be able to summarize the business intent for every policy you have in a single statement. Developing this statement will drive conversations in your organization and, when fully fleshed out, this statement directly links the policy to a business purpose and provides a roadmap for policy design. The steps in the [Plan for data loss prevention (DLP)](dlp-overview-plan-for-dlp.md#overview-of-planning-process) article will help you get started on your policy intent statement. +You should be able to summarize, in a single statement, the business intent for every policy you have. Developing this statement will drive conversations in your organization and, when fully fleshed out, this statement directly links the policy to a business purpose and provides a roadmap for policy design. The steps in the [Plan for data loss prevention (DLP)](dlp-overview-plan-for-dlp.md#overview-of-planning-process) article will help you get started on your policy intent statement. Remember from [DLP policy configuration overview](dlp-learn-about-dlp.md#dlp-policy-configuration-overview) that all DLP policies require that you: Remember from [DLP policy configuration overview](dlp-learn-about-dlp.md#dlp-pol For example, here's a fictitious first draft of an intent statement that provides answers to all four questions: -*"We are a U.S. based organization, and we need to detect Office documents that contain sensitive health care information covered by HIPPA that are stored in OneDrive/SharePoint and protect against that information being shared in Teams chat and channel messages and restrict everyone from sharing them with unauthorized third parties".* +*"We are a U.S. based organization, and we need to detect Office documents that contain sensitive health care information covered by HIPPA that are stored in OneDrive/SharePoint and to protect against that information being shared in Teams chat and channel messages and restrict everyone from sharing them with unauthorized third parties".* As you develop a policy design, you'll likely modify and extend the statement. Let's break the example draft statement down and map it to DLP policy configurat |...that are stored in OneDrive/SharePoint and protect against that information being shared in Teams chat and channel messages...|- **Where to monitor**: [Location scoping](dlp-policy-reference.md#locations) by including or excluding OneDrive and SharePoint sites and Teams chat/channel accounts or distribution groups. **Policy scoping** (preview): [Full directory](dlp-policy-reference.md#policy-scoping) | |...and restrict everyone from sharing those items with unauthorized third parties."|- **Actions to take**: [You add](dlp-policy-reference.md#actions) *Restrict access or encrypt the content in Microsoft 365 locations* </br> - drives conversation on what actions to take when a policy is triggered including protective actions like sharing restrictions, awareness actions like notifications and alerts, and user empowerment actions like allow user overrides of a blocking action| -This example doesn't cover all the configuration points of a DLP policy, it would need to be expanded. But it should get you thinking in the right direction as you develop your own DLP policy intent statements. +This example doesn't cover all the configuration points of a DLP policy; it would need to be expanded. However, it should get you thinking in the right direction as you develop your own DLP policy intent statements. > [!IMPORTANT]-> Keep in mind that the location(s) you pick impact whether you can use sensitive information types, sensitivity labels and retention labels as well as the actions that are available. See, [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference). +> Keep in mind that the location(s) you pick impact whether you can use sensitive information types, sensitivity labels, and retention labels, as well as the actions that are available. See [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference) for more information. ### Complex rule design The above HIPPA content in SharePoint and OneDrive is a simple example of a DLP > [!IMPORTANT] > - All existing **Exceptions** are replaced with a NOT condition in a nested group inside of the **Conditions**.-> - You need to create groups in order to use multiple operators as shown in the video. +> - You need to create groups in order to use multiple operators. > [!IMPORTANT] > When an action in Office desktop client apps, (Word, Outlook, Excel, and PowerPoint) matches a policy that uses complex conditions, the user will only see policy tips for rules that use the **Content contains sensitive information** condition. -Here's a video that shows how you'd map two complex policy intent statements to policies in the rule builder. - - *Example 1 We need to block emails to all recipients that contain credit card numbers, OR that have the 'highly confidential' sensitivity label applied, but do NOT block the email if it is sent from someone on the finance team to adele.vance@contoso.com* - *Example 2 Contoso needs to block all emails that contain a password protected file OR a zip document file extension ('zip' or '7z'), but do NOT block the email if the recipient is in the contoso.com domain OR the fabrikam.com domain, OR the sender is a member of the Contoso HR group.* -> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE55JXJ] - > [!IMPORTANT]-> - The use of the NOT condition in a nested group replaces the **Exceptions** functionality. -> - You need to create groups in order to use multiple operators as shown in the video. +> - Using the NOT condition in a nested group replaces the **Exceptions** functionality. +> - You need to create groups in order to use multiple operators. > [!IMPORTANT]-> When an action in Office desktop client apps, (Word, Outlook, Excel, and PowerPoint) matches a policy that uses complex conditions, the user will only see policy tips for rules that use the **Content contains sensitive information** condition. +> When an action in Office desktop client apps (Word, Outlook, Excel, and PowerPoint) matches a policy that uses complex conditions, the user will only see policy tips for rules that use the **Content contains sensitive information** condition. ## Policy Design Process Here's a video that shows how you'd map two complex policy intent statements to 5. Determine how this policy fits into your overall DLP policy strategy. > [!IMPORTANT]-> Policies can't be renamed once they are created. If you must rename a policy, you will have to create a new one with the desired name and retire the old one. So decide on the naming structure that all your policies will use now. +> Policies can't be renamed once they are created. If you must rename a policy, you will have to create a new one with the desired name and retire the old one. So, from the outset, decide on the naming structure that all your policies will use. 6. Map the items in your policy intent statement to configuration options. -7. Decide which policy template you will start from, predefined or custom. +7. Decide which policy template you will start from: predefined or custom. 8. Go through the template and assemble all information required before you create the policy. It's likely that you will find that there are some configuration points that aren't covered in your policy intent statement. That's ok. Go back to your stakeholders to iron out the requirements for any missing configuration points. |
compliance | Dlp Policy Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md | f1.keywords: CSH Previously updated : 04/06/2023 Last updated : 06/16/2023 audience: Admin Also, you need to be aware of the following constraints of the platform: ## Policy templates -DLP policy templates are presorted into four categories: +DLP policy templates are sorted into four categories: -- Ones that can detect and protect types of **Financial** information.-- Ones that can detect and protect types of **Medical and health** information.-- Ones that can detect and protect types of **Privacy** information.-- A **Custom** template that you can use to build your own policy if one of the others doesn't meet your organizations needs.+- policies that can detect and protect types of **Financial** information. +- policies that can detect and protect types of **Medical and health** information. +- policies that can detect and protect types of **Privacy** information. +- A **Custom** policy template that you can use to build your own policy if none of the others meet your organization's needs. -This table lists all policy templates and the sensitive information types (SIT) that they cover. +The following table lists all policy templates and the sensitive information types (SIT) that they cover. |Category|Template | SIT | |||| DLP policies are scoped at two different levels. The first level applies unrestr - on-premises repositories - Power BI workspaces -in your organization (depending on the locations that are selected) or to subgroups of your organization called [Administrative Unit restricted policies (preview)](#administrative-unit-restricted-policies-preview). +in your organization (depending on the locations that are selected) or to subgroups of your organization called [Administrative Unit restricted policies (preview)](#administrative-unit-restricted-policies-preview). At this level, an administrative unit restricted admin will only be able to pick from the administrative units that they're assigned to. -The second level of DLP policy scoping is by the [locations](#locations) that DLP supports. At this level, both unrestricted and administrative unit restricted administrators will see only the users, distribution groups, groups, and accounts that were included in the first level of policy scoping and are available in for that location. +The second level of DLP policy scoping is by the [locations](#locations) that DLP supports. At this level, both unrestricted and administrative unit restricted administrators will see only the users, distribution groups, groups, and accounts that were included in the first level of policy scoping and that are available for that location. ### Unrestricted policies A DLP policy can find and protect items that contain sensitive information acros |OneDrive |Yes| - Distribution groups </br> - Security groups </br> - Non-mail enabled security groups </br> - Microsoft 365 groups (Group members only, not the group as an entity) |data-at-rest </br> data-in-use|No| |Teams chat and channel messages|Yes | - Distribution groups </br> - Security groups </br> - Non-mail enabled security groups </br> - Microsoft 365 groups (Group members only, not the group as an entity)|data-in-motion </br> data-in-use | No | |Microsoft Defender for Cloud Apps|No | Cloud app instance |data-at-rest | - [Use data loss prevention policies for non-Microsoft cloud apps](dlp-use-policies-non-microsoft-cloud-apps.md#use-data-loss-prevention-policies-for-non-microsoft-cloud-apps) |-|Devices|Yes |- Distribution groups </br> - Security groups </br> - Non-mail enabled security groups </br> - Microsoft 365 groups (Group members only, not the group as an entity) |data-at-rest </br> data-in-use </br> data-in-motion |- [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md) </br>- [Get started with Endpoint data loss prevention](endpoint-dlp-getting-started.md) </br>- [Configure device proxy and internet connection settings for Information Protection](device-onboarding-configure-proxy.md#configure-device-proxy-and-internet-connection-settings-for-information-protection) | +|Devices|Yes |- Distribution groups </br> - Security groups </br> - Non-mail enabled security groups </br> - Microsoft 365 groups (Group members only, not the group as an entity) | data-in-use </br> data-in-motion |- [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md) </br>- [Get started with Endpoint data loss prevention](endpoint-dlp-getting-started.md) </br>- [Configure device proxy and internet connection settings for Information Protection](device-onboarding-configure-proxy.md#configure-device-proxy-and-internet-connection-settings-for-information-protection) | |On-premises repositories (file shares and SharePoint)|No |Repository | data-at-rest | - [Learn about the data loss prevention on-premises repositories](dlp-on-premises-scanner-learn.md) </br> - [Get started with the data loss prevention on-premises repositories](dlp-on-premises-scanner-get-started.md#get-started-with-the-data-loss-prevention-on-premises-repositories) | |Power BI |No| Workspaces | data-in-use | No| | Third-party apps | None | No | No | No | A DLP policy can find and protect items that contain sensitive information acros #### Exchange location scoping -If you choose to include specific distribution groups in Exchange, the DLP policy is scoped only to the emails sent by members of that group. Similarly excluding a distribution group excludes all the emails sent by the members of that distribution group from policy evaluation. +If you choose to include specific distribution groups in Exchange, the DLP policy is scoped only to the emails sent by members of that group. Similarly, excluding a distribution group excludes all the emails sent by the members of that distribution group from policy evaluation. |Sender is |Recipient is |Resultant behavior | If you choose to include specific distribution groups in Exchange, the DLP polic Here's an example of how Exchange location scope is calculated -Say you have four users in your org, *U1*, *U2*, *U3*, *U4* and, two distribution groups *DG1*, and *DG2* that you'll use for defining Exchange location inclusion and exclusion scopes. Group membership is set up like this: +Say you have four users in your org, *U1*, *U2*, *U3*, *U4* and two distribution groups *DG1*, and *DG2* that you'll use for defining Exchange location inclusion and exclusion scopes. Group membership is set up like this: |Distribution Group |Membership | U4 isn't a member of any group. |All |DG2 |All senders in the Exchange org who aren't members of DG2 (U1, U4) |All senders who are members of DG2 (U2, U3) |When one setting is defined and the other isn't the defined setting is used | |DG1 |DG2 |U1 |U2, U3, U4 |Exclude overrides include| - You can choose to scope a policy to the members of distribution lists, dynamic distribution groups, and security groups. A DLP policy can contain no more than 50 such inclusions and exclusions. #### SharePoint and OneDrive location scoping If you choose to include or exclude specific OneDrive accounts or groups, a DLP ### Location support for how content can be defined -DLP policies detect sensitive items by matching them to a sensitive information type (SIT), or to a sensitivity label, or a retention label. Each location supports different methods of defining sensitive content. When you combine locations in a policy, how the content can be defined can change from how it can be defined by a single location. +DLP policies detect sensitive items by matching them to a sensitive information type (SIT), or to a sensitivity label or a retention label. Each location supports different methods of defining sensitive content. When you combine locations in a policy, how the content can be defined can change from how it can be defined by a single location. > [!IMPORTANT]-> When you select multiple locations for a policy, a "no" value for a content definition category takes precedence over "yes" value. For example, when you select SharePoint sites only, the policy will support detecting sensitive items by one or more of SIT, by sensitivity label, or by retention label. But, when you select SharePoint sites ***and*** Teams chat and channel messages locations, the policy will only support detecting sensitive items by SIT. +> When you select multiple locations for a policy, a "no" value for a content definition category takes precedence over "yes" value. For example, when you select SharePoint sites only, the policy will support detecting sensitive items by one or more of SIT, by sensitivity label or by retention label. But, when you select SharePoint sites ***and*** Teams chat and channel messages locations, the policy will only support detecting sensitive items by SIT. |Location| Content can be defined by SIT| Content can be defined sensitivity label| Content can be defined by retention label| ||||| DLP policies detect sensitive items by matching them to a sensitive information |On-premises repositories| Yes| Yes| No| |Power BI|Yes | Yes| No| -DLP supports using trainable classifiers as a condition to detect sensitive documents. Content can be defined by trainable classifiers in Exchange Online, SharePoint Online sites, OneDrive for Business accounts, Teams Chat and Channels, and Devices. For more information, see [Trainable Classifiers](classifier-learn-about.md). +DLP supports using trainable classifiers as a condition to detect sensitive documents. Content can be defined by trainable classifiers in Exchange, SharePoint sites, OneDrive accounts, Teams Chat and Channels, and Devices. For more information, see [Trainable Classifiers](classifier-learn-about.md). > [!NOTE] > DLP supports detecting sensitivity labels on emails and attachments. For more information, see [Use sensitivity labels as conditions in DLP policies](dlp-sensitivity-label-as-condition.md#use-sensitivity-labels-as-conditions-in-dlp-policies). Rules are the business logic of DLP policies. They consist of: #### Hosted service workloads -For the hosted service workloads, like Exchange Online, SharePoint Online and OneDrive for Business, each rule is assigned a priority in the order in which it's created. That means, the rule created first has first priority, the rule created second has second priority, and so on. +For the hosted service workloads, like Exchange, SharePoint, and OneDrive, each rule is assigned a priority in the order in which it's created. This means that the rule created first has first priority, the rule created second has second priority, and so on.  Rules 1, 2, and 4 would be evaluated, but not applied. In this example, matches You can use a rule to meet a specific protection requirement, and then use a DLP policy to group together common protection requirements, such as all of the rules needed to comply with a specific regulation. -For example, you might have a DLP policy that helps you detect the presence of information subject to the Health Insurance Portability and Accountability Act (HIPAA). This DLP policy could help protect HIPAA data (the what) across all SharePoint Online sites and all OneDrive for Business sites (the where) by finding any document containing this sensitive information that's shared with people outside your organization (the conditions) and then blocking access to the document and sending a notification (the actions). These requirements are stored as individual rules and grouped together as a DLP policy to simplify management and reporting. +For example, you might have a DLP policy that helps you detect the presence of information subject to the Health Insurance Portability and Accountability Act (HIPAA). This DLP policy could help protect HIPAA data (the what) across all SharePoint sites and all OneDrive sites (the where) by finding any document containing this sensitive information that's shared with people outside your organization (the conditions) and then blocking access to the document and sending a notification (the actions). These requirements are stored as individual rules and grouped together as a DLP policy to simplify management and reporting.  An item on a monitored device contains credit card number, so it matches policy ### Conditions -Conditions are where you define what you want the rule to look for and context in which those items are being used. They tell the ruleΓÇöwhen you find an item that looks like *this* and is being used like *thatΓÇöit's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization. +Conditions are where you define what you want the rule to look for and the context in which those items are being used. They tell the rule: when you find an item that looks like *this* and is being used like *that*ΓÇöit's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization. > [!NOTE] > Users who have non-guest accounts in a host organization's Active Directory or Azure Active Directory tenant are considered as people inside the organization. The rule will only look for the presence of any **sensitivity labels** and **ret SITs have a predefined [**confidence level**](https://www.microsoft.com/videoplayer/embed/RE4Hx60) which you can alter if needed. For more information, see [More on confidence levels](sensitive-information-type-learn-about.md#more-on-confidence-levels). > [!IMPORTANT]-> SITs have two different ways of defining the max unique instance count parameters. To learn more, see [Instance count supported values for SIT](sit-limits.md#instance-count-supported-values-for-sit). +> SITs have two different ways of defining the maximum unique instance count parameters. To learn more, see [Instance count supported values for SIT](sit-limits.md#instance-count-supported-values-for-sit). #### Adaptive Protection in Microsoft Purview (preview) The available context options change depending on which location you choose. If #### Condition groups -Sometimes you need a rule to only identify one thing, like all content that contains a U.S. Social Security Number, which is defined by a single SIT. But in many scenarios, where the types of items you're trying to identify are more complex and therefore harder to define, more flexibility in defining conditions is required. +Sometimes you need a rule to identify only one thing, such as all content that contains a U.S. Social Security Number, which is defined by a single SIT. However, in many scenarios where the types of items you're trying to identify are more complex and therefore harder to define, more flexibility in defining conditions is required. For example, to identify content subject to the U.S. Health Insurance Act (HIPAA), you need to look for: For the **U.S. Health Insurance Act (HIPPA)**, conditions are grouped like this: The first group contains the SITs that identify an individual and the second group contains the SITs that identify medical diagnosis. -Conditions can be grouped and joined by boolean operators (AND, OR, NOT) so that you defining a rule by stating what should be included and then define exclusions in a different group joined to the first by a NOT. -To learn more about how Purview DLP implements booleans and nested groups see, [Complex rule design](dlp-policy-design.md#complex-rule-design). +Conditions can be grouped and joined by boolean operators (AND, OR, NOT) so that you define a rule by stating what should be included and then defining exclusions in a different group joined to the first by a NOT. To learn more about how Purview DLP implements booleans and nested groups see, [Complex rule design](dlp-policy-design.md#complex-rule-design). #### DLP Platform Limitations for Conditions To learn more about how Purview DLP implements booleans and nested groups see, [ ### Actions -Any item that makes it through the ***conditions*** <!--and exclusive ***exceptions***--> filter will have any ***actions*** that are defined in the rule applied to it. You'll have to configure the required options to support the action. For example, if you select Exchange with the **Restrict access or encrypt the content in Microsoft 365 locations** action you need to choose from these options: +Any item that makes it through the ***conditions*** <!--and exclusive ***exceptions***--> filter will have any ***actions*** that are defined in the rule applied to it. You'll have to configure the required options to support the action. For example, if you select Exchange with the **Restrict access or encrypt the content in Microsoft 365 locations** action, you need to choose from these options: - Block users from accessing shared SharePoint, OneDrive, and Teams content - Block everyone. Only the content owner, last modifier, and site admin will continue to have access - Block only people from outside your organization. Users inside your organization will continue to have access. - Encrypt email messages (applies only to content in Exchange) -The actions that are available in a rule are dependent on the locations that have been selected. If you select only one location for the policy to be applied to, the available actions are listed below. +The actions that are available in a rule depend on the locations that have been selected. The available actions for each individual location are listed below. > [!IMPORTANT]-> For SharePoint Online and OneDrive for Business locations documents will be proactively blocked right after detection of sensitive information, irrespective of whether the document is shared or not, for all external users, while internal users will continue to have access to the document. +> For SharePoint and OneDrive locations, documents will be proactively blocked right after detection of sensitive information (regardless of whether the document is shared or not) for all external users; internal users will continue to have access to the document. #### Exchange location actions The actions that are available in a rule are dependent on the locations that hav To use `Audit or restrict activities on Windows devices`, you have to configure options in **DLP settings** and in the policy in which you want to use them. See, [Restricted apps and app groups](dlp-configure-endpoint-settings.md#restricted-apps-and-app-groups) for more information. -The devices location provides many subactivities (conditions) and actions. To learn more, see [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on). +The devices location provides many sub-activities (conditions) and actions. To learn more, see [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on). When you select **Audit or restrict activities on Windows devices**, you can restrict the user activities by service domain or browser, and scope the actions that DLP takes by: When you configure the **Allow/Block cloud service domains** and the **Unallowed ##### File activities for all apps -With the **File activities for all apps** option, you select either **Don't restrict file activities** or **Apply restrictions to specific activities**. When you select to apply restrictions to specific activities, the actions that you select here are applied when a user has accessed a DLP protected item. You can tell DLP to `Audit only`, `Block with override`, `Block` (the actions) on these user activities: +With the **File activities for all apps** option, you select either **Don't restrict file activities** or **Apply restrictions to specific activities**. When you select **Apply restrictions to specific activities**, the actions that you select here are applied when a user has accessed a DLP protected item. You can tell DLP to `Audit only`, `Block with override`, or `Block` (the actions) these user activities: - **Copy to clipboard** - **Copy to a USB removable drive** With the **File activities for all apps** option, you select either **Don't rest ##### Restricted app activities -Previously called Unallowed apps, you define a list of apps in Endpoint DLP settings that you want to place restrictions on. When a user attempts to access a DLP protected file using an app that is on the list, you can either `Audit only`, `Block with override`, or `Block` the activity. DLP actions defined in **Restricted app activities** are overridden if the app is a member of restricted app group. Then the actions defined in the restricted app group are applied. +Previously called Unallowed apps, *restricted app activities* are apps that you want to place restrictions on. You define these apps in a list in Endpoint DLP settings. When a user attempts to access a DLP protected file using an app that is on the list, you can either `Audit only`, `Block with override`, or `Block` the activity. DLP actions defined in **Restricted app activities** are overridden if the app is a member of restricted app group. Then the actions defined in the restricted app group are applied. ##### File activities for apps in restricted app groups (preview) See, [Restricted apps and app groups](dlp-configure-endpoint-settings.md#restric If you select Exchange and any other single location for the policy to be applied to, the -- Restrict access or encrypt the content in Microsoft 365 locations--and --- all actions for the non-Exchange location--actions are available. +- Restrict access or encrypt the content in Microsoft 365 locations and all actions for the non-Exchange location actions are available. If you select two or more non-Exchange locations for the policy to be applied to, the -- Restrict access or encrypt the content in Microsoft 365 locations--AND --- all actions for non-Exchange locations+- Restrict access or encrypt the content in Microsoft 365 locations and all actions for non-Exchange locations actions will be available. -actions will be available. --For example, if you select Exchange and Devices as locations, these actions will be available: +For example, if you select the Exchange and Devices locations, these actions will be available: - Restrict access or encrypt the content in Microsoft 365 locations - Audit or restrict activities on Windows devices for where they are used/expected behavior--> <!--You can use notifications and overrides to educate your users about DLP policies and help them remain compliant without blocking their work. For example, if a user tries to share a document containing sensitive information, a DLP policy can both send them an email notification and show them a policy tip in the context of the document library that allows them to override the policy if they have a business justification.--> -When a user attempts an activity on a sensitive item in a context that meets the conditions of a rule, you can let them know about it through user notification emails and in-context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies. --For example, content like an Excel workbook on a OneDrive for Business site that contains personally identifiable information (PII) and is shared with a guest. +When a user attempts an activity on a sensitive item in a context that meets the conditions of a rule (for example, content such as an Excel workbook on a OneDrive site that contains personally identifiable information (PII) and is shared with a guest), you can let them know about it through user notification emails and in-context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies.  For example, content like an Excel workbook on a OneDrive for Business site that You can also give people the option to [override the policy](#user-overrides), so that they're not blocked if they have a valid business need or if the policy is detecting a false positive. -The user notifications and policy tips configuration options vary depending on the monitoring locations you selected. If you selected: +The user notifications and policy tips configuration options vary depending on the monitoring locations you've selected. If you selected: - Exchange - SharePoint and customize the email text, subject, and the policy tip text.  -If you selected Devices only, you'll get all the same options that are available for Exchange, SharePoint, OneDrive, Teams Chat and Channel and Defender for Cloud Apps plus the option to customize the notification title and content that appears on the Windows 10 device. +If you selected Devices only, you'll get all the same options that are available for Exchange, SharePoint, OneDrive, Teams Chat and Channel, and Defender for Cloud Apps, plus the option to customize the notification title and content that appears on the Windows 10/11 device.  This table shows the DLP blocking and notification behavior for policies that ar #### Learn more URL -Users may want to learn why their activity is being blocked. You can configure a site or a page that explains more about your policies. When you select **Provide a compliance URL for the end user to learn more about your organization's policies (available for Exchange workload only)**, and the user receives a policy tip notification in Outlook Win 32, the *Learn more* link will point to the site URL that you provide. -This URL has priority over the global compliance URL configured with [Set-PolicyConfig -ComplainceURL](/powershell/module/exchange/set-policyconfig?view=exchange-ps&preserve-view=true ). +Users may want to learn why their activity is being blocked. You can configure a site or a page that explains more about your policies. When you select **Provide a compliance URL for the end user to learn more about your organization's policies (available for Exchange workload only)**, and the user receives a policy tip notification in Outlook Win 32, the *Learn more* link will point to the site URL that you provide. This URL has priority over the global compliance URL configured with [Set-PolicyConfig -ComplainceURL](/powershell/module/exchange/set-policyconfig?view=exchange-ps&preserve-view=true ). > [!IMPORTANT]-> You must configure the site or page that *Learn more* points to from scratch. Microsoft Purview doesn't provide this funcationality out of the box. +> You must configure the site or page that *Learn more* points to from scratch. Microsoft Purview doesn't provide this functionality out of the box. ### User overrides -The intent of **User overrides** is to give users a way to bypass, with justification, DLP policy blocking actions on sensitive items in Exchange, SharePoint, OneDrive, or Teams so that they can continue their work. User overrides are enabled only when **Notify users in Office 365 services with a policy tip** is enabled, so user overrides go hand-in-hand with Notifications and Policy tips. +The intent of **User overrides** is to give users a way to bypass, with justification, DLP policy blocking actions on sensitive items in Exchange, SharePoint, OneDrive, or Teams, so that they can continue their work. User overrides are enabled only when **Notify users in Office 365 services with a policy tip** is enabled, so user overrides go hand-in-hand with Notifications and Policy tips.  Alerts can be sent every time an activity matches a rule, which can be noisy or  -DLP scans email differently than it does SharePoint Online or OneDrive for Business items. In SharePoint Online and OneDrive for Business, DLP scans existing items as well as new ones and generates an incident report whenever a match is found. In Exchange Online, DLP only scans new email messages and generates a report if there's a policy match. DLP ***does not*** scan or match previously existing email items that are stored in a mailbox or archive. +DLP scans email differently than it does SharePoint or OneDrive items. In SharePoint and OneDrive, DLP scans existing items as well as new ones and generates an incident report whenever a match is found. In Exchange, DLP only scans new email messages and generates a report if there's a policy match. DLP ***does not*** scan or match previously existing email items that are stored in a mailbox or archive. #### Evidence collection for file activities on devices (preview) |
compliance | Dlp Policy Tips Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md | f1.keywords: CSH Previously updated : 06/15/2023 Last updated : 06/02/2023 audience: Admin -Currently, Outlook 2013 and later supports showing policy tips for policies that contain these conditions: +Currently, Outlook 2013 and later support showing policy tips for policies that contain these conditions: For E3 licensed users - Content contains Sensitive information types (preconfigured SITs and custom SITs) For E5 licensed users (preview) - Recipient domain is - Subject contains words -All the conditions work for emails authored in Outlook client app, where they'll match content and enforce protective actions on content. However, showing policy tips to users isn't supported for any conditions that are used apart from the ones mentioned above. +All the conditions work for emails authored in the Outlook client app, where they'll match content and enforce protective actions on content. However, showing policy tips to users isn't supported for any conditions that are used apart from the ones mentioned above. ## Outlook 2013 and later and Office apps on Desktop support showing policy tips for only some sensitive information types For E3 licensed users, DLP policy tips are shown in Outlook 2013 and later for pre-configured SITs and custom SITs. -For E5 licensed users, DLP policy tips will be shown in Outlook 2013 and later, for policies that use: (preview) +For E5 licensed users, DLP policy tips will be shown in Outlook 2013 and later for policies that use: - [Preconfigured sensitive information types](sensitive-information-type-entity-definitions.md) (SITs) - Custom SITs The list of out-of-the-box sensitive information types that will be detected in - Ukraine Passport Number (Domestic) - Ukraine Passport Number (International) -Custom sensitive information types will also be detected in addition to the above out-of-the-box sensitive information types +Custom sensitive information types (SITs) will also be detected in addition to the above out-of-the-box sensitive information types ## Support Matrix for DLP policy tips across Microsoft apps |**App and platform**|**DLP policy tip support**|**Sensitive information types supported**|**Conditions and actions supported**|**Comments**| |:--|:--|:--|:--|:--|-|**Outlook On the Web**|:::image type="icon" source="../medi)| +|**Outlook On the Web**|:::image type="icon" source="../medi)| |**Outlook Win32 (ver. 2105 build 14026.20000 and semi-annual channel ver. 2102 build 13801.20862)**|:::image type="icon" source="../media/rightmrk.png" border="false":::|all SITS are supported for E5 users; pre-configured SITs and customer SITs are supported for E3 users|subset|See [Outlook 2013 and later supports showing policy tips for only some conditions](#outlook-2013-and-later-supports-showing-policy-tips-for-only-some-conditions) and [Outlook 2013 and later and Office apps on Desktop support showing policy tips for only some sensitive information types](#outlook-2013-and-later-and-office-apps-on-desktop-support-showing-policy-tips-for-only-some-sensitive-information-types) for details on support for sensitive information types and DLP conditions and actions supported for showing DLP policy tips on Outlook Win32.| |**Outlook Mobile (iOS, Android)/Outlook Mac**|:::image type="icon" source="../media/crsmrk.png" border="false":::|none|none|DLP policy tips aren't supported on Outlook mobile| |**Outlook Mac**|:::image type="icon" source="../media/crsmrk.png" border="false":::|none|none|DLP policy tips are not supported on Outlook for Mac| |
compliance | Dlp Powerbi Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-powerbi-get-started.md | f1.keywords: Previously updated : 03/15/2022 Last updated : 06/02/2023 audience: ITPro f1_keywords: To help organizations detect and protect their sensitive data, [Microsoft Purvie - DLP dataset evaluation workloads impact capacity. For more information, see [CPU metering for DLP policy evaluation](/power-bi/enterprise/service-security-dlp-policies-for-power-bi-overview#cpu-metering-for-dlp-policy-evaluation) - Both classic and new experience workspaces are supported, as long as they're hosted in Premium Gen2 capacities. - You must create a custom DLP custom policy for Power BI. DLP templates aren't supported.-- DLP policies that are applied to the DLP location support sensitivity labels and sensitive information types as conditions. +- DLP policies that are applied to the DLP location support sensitivity labels and sensitive information types as conditions. - DLP policies for Power BI aren't supported for sample datasets, [streaming datasets](/power-bi/connect-data/service-real-time-streaming), or datasets that connect to their data source via [DirectQuery](/power-bi/connect-data/desktop-use-directquery) or [live connection](/power-bi/connect-data/desktop-directquery-about#live-connections). Before you get started with DLP for Power BI, you should confirm your [Microsoft ### Permissions -Data from DLP for Power BI can be viewed in [Activity explorer](/microsoft-365/compliance/data-classification-activity-explorer). There are four roles that grant permission to activity explorer; the account you use for accessing the data must be a member of any one of them. +Data from DLP for Power BI can be viewed in [Activity explorer](/microsoft-365/compliance/data-classification-activity-explorer). There are four roles that grant permission to activity explorer; the account you use for accessing the data must be a member of any one of them: - Global administrator - Compliance administrator Data from DLP for Power BI can be viewed in [Activity explorer](/microsoft-365/c ## How DLP policies for Power BI work -You define a DLP policy in the data loss prevention section of the compliance portal. See, [Design a data loss prevention policy](dlp-policy-design.md#design-a-data-loss-prevention-policy). In the policy, you specify the sensitivity label(s) and/or sensitive information types that you want to detect. You also specify the action(s) that will happen when the policy detects a dataset that has a specified sensitivity label applied. DLP policies support two actions for Power BI: +You define a DLP policy in the Data Loss Prevention (DLP) section of the compliance portal. See, [Design a data loss prevention policy](dlp-policy-design.md#design-a-data-loss-prevention-policy). In the policy, you specify the sensitivity label(s) and/or sensitive information types that you want to detect. You also specify the action(s) that will occur when the policy detects a dataset that has a specified sensitivity label applied. DLP policies support two actions for Power BI: - User notification via policy tips. - Alerts. Alerts can be sent by email to administrators and users. Additionally, administrators can monitor and manage alerts on the **Alerts** tab in the compliance portal. -When a dataset is evaluated by DLP and matches the conditions in a DLP policy, the actions defined in the policy are applied. A dataset is evaluated occurs when a dataset is: +When a dataset is evaluated by DLP and matches the conditions in a DLP policy, the actions defined in the policy are applied. A dataset is evaluated occurs when it is: -- Publish-- Republish-- On-demand refresh-- Scheduled refresh+- Published +- Republished +- On-demand refreshed +- Scheduled refreshed >[!NOTE] > DLP evaluation of the dataset does not occur if either of the following is true: When a dataset is evaluated by DLP and matches the conditions in a DLP policy, t When a dataset matches a DLP policy: -- If the policy has user notification configured, it will be marked in the Power BI service with a shield icon to indicate that it matches a DLP policy.+- If the policy has user notifications configured, it will be marked in the Power BI service with a shield icon to indicate that it matches a DLP policy.  |
compliance | Dlp Sensitivity Label As Condition | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-sensitivity-label-as-condition.md | f1.keywords: Previously updated : 09/15/2020 Last updated : 06/02/2023 audience: ITPro f1_keywords: description: Learn about the services and item types that you can use sensitivit You can use [sensitivity labels](sensitivity-labels.md) as a condition in DLP policies for these locations: -- Exchange Online email messages-- SharePoint Online-- OneDrive for Business sites+- Exchange email messages +- SharePoint +- OneDrive - Devices - Sensitivity labels appear as an option in the **Content contains** list. > [!div class="mx-imgBorder"] Sensitivity labels appear as an option in the **Content contains** list. ## Supported items, scenarios, and policy tips -You can use sensitivity labels as conditions on these items and in these scenarios. +You can use sensitivity labels as conditions on these items and in the scenarios that follow. ### Supported items You can use sensitivity labels as conditions on these items and in these scenari \* DLP detection of sensitivity labeled email attachments is supported for Open XML-based Office file types only. -\** Attachments sent in Teams over 1:1 chat or channels are automatically uploaded to OneDrive for Business and SharePoint. So if SharePoint Online or OneDrive for Business are included as locations in your DLP policy, then labeled attachments sent in Teams will be automatically included in the scope of this condition. Teams as a location does not need to be selected in the DLP policy. +\** Attachments sent in Teams over 1:1 chat or channels are automatically uploaded to OneDrive and SharePoint. So if SharePoint or OneDrive are included as locations in your DLP policy, then labeled attachments sent in Teams will be automatically included in the scope of this condition. Teams as a location does not need to be selected in the DLP policy. > [!NOTE]-> DLP's ability to detect sensitivity labels in SharePoint and OneDrive for business is limited. For more information, see [Enable sensitivity labels for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md#limitations). +> DLP's ability to detect sensitivity labels in SharePoint and OneDrive is limited. For more information, see [Enable sensitivity labels for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md#limitations). ### Supported scenarios |
compliance | Dlp Share Alerts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-share-alerts.md | f1.keywords: Previously updated : 10/12/2020 Last updated : 06/02/2023 audience: ITPro f1_keywords: description: Learn how to share data loss prevention alerts to users with minima # Share data loss prevention alerts (preview) -Users with the [appropriate permissions](dlp-configure-view-alerts-policies.md#roles) can view Microsoft Purview Data Loss Prevention (DLP) alerts in the DLP Alerts console. But, as alerts are triaged and investigated, you may need to share them with other users who don't, and shouldn't, have full permissions to DLP and the alerts console. +Users with the [appropriate permissions](dlp-configure-view-alerts-policies.md#roles) can view Microsoft Purview Data Loss Prevention (DLP) alerts in the DLP Alerts console. However, as alerts are triaged and investigated, you may need to share them with other users who don't, and shouldn't, have full permissions to DLP and the alerts console. -You can share an alert with users that you give limited permissions to using the procedures in this article. +You can share an alert with users to whom you give limited permissions for using the procedures described in this article. [!INCLUDE [purview-preview](../includes/purview-preview.md)] You can share an alert with users that you give limited permissions to using the If you aren't familiar with DLP Alerts, see [Configure and view alerts for data loss prevention policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies). -In this procedure, you need to create a custom role group for Purview. If you haven't worked with permissions, roles and role groups in Microsoft Purview, see [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions) +In this procedure, you need to create a custom role group for Microsoft Purview. If you haven't worked with permissions, roles, and role groups in Microsoft Purview, see [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions). ## Configure DLP Alert urls for review In this procedure, you need to create a custom role group for Purview. If you ha  -6. The value in the **Time detected** field is the local time. You need to convert that value to UTC time for use in the `creationtime` parameter. There are a number of local to UTC time converters available via an internet search. +6. The value in the **Time detected** field is the local time. You need to convert that value to UTC time for use in the `creationtime` parameter. There are a number of local-to-UTC time converters available via an internet search. 7. Construct the shareable URL in this format: For example: In this example, the **Time detected** value is **August 9, 2022 5:30 PM** Pacific Daylight Time. This converts to **August 10, 12:30 AM** UTC or `2022-08-10T12:30:00Z` -8. You can share this link with people in the group you created, they'll be able to access the alert for review and investigation. +8. You can share this link with people in the group you created. They'll be able to access the alert for review and investigation. |
compliance | Dlp Teams Default Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-teams-default-policy.md | f1.keywords: Previously updated : 01/28/2021 Last updated : 06/02/2023 audience: ITPro |
compliance | Dlp Test Dlp Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-test-dlp-policies.md | f1.keywords: Previously updated : 08/30/2022 Last updated : 06/02/2023 audience: Admin When you deploy a new policy, [you should run it in test mode,](dlp-overview-pla ## Test-DlpPolicies (preview) -**Test-DlpPolicies** is a cmdlet that allows you to see what SharePoint Online and OneDrive for Business scoped DLP policies match/don't match an individual item in SharePoint Online or OneDrive for Business. +**Test-DlpPolicies** is a cmdlet that allows you to see what DLP policies scoped to SharePoint and OneDrive match/don't match an individual item in SharePoint or OneDrive. ### Before you begin When you deploy a new policy, [you should run it in test mode,](dlp-overview-pla > [!IMPORTANT] >-> - Test-DlpPolicies only works for items that are in SharePoint Online (SPO) or OneDrive for Business (ODB). -> - It will only report results for policies that include SharePoint Online alone, OneDrive alone or SharePoint and OneDrive in their scope. +> - Test-DlpPolicies only works for items that are in SharePoint or OneDrive. +> - It will only report results for policies that include SharePoint alone, OneDrive alone, or SharePoint and OneDrive in their scope. > - Test-DlpPolices works only with simple conditions. It doesn't work with complex, grouped, or nested conditions. ### Use Test-DlpPolices To see which DLP policies an item will match, follow these steps: 1. Open the SharePoint or OneDrive folder in a browser. -1. Select the files ellipsis and select **details**. +1. Select the file's ellipsis and select **details**. -1. In the details pane, scroll down and select **Path** (Copy direct link). Save it. +1. In the details pane, scroll down and select **Path**. Copy the direct link and save it. For example: For example: 1. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). -1. For SharePoint use the following syntax to get the site id and save it. +1. For SharePoint, use the following syntax to get the site ID and save it: ```powershell $reportAddress = "email@report.com" $siteName = "SITENAME@TENANT.onmicrosoft.com" $filePath = "https://Contoso.sharepoint.com/sites/SOMESITENAME/Shared%20Documents/TESTFILE.pptx" $r = Get-Mailbox -Identity $siteName -GroupMailbox $e = $r.EmailAddresses | Where-Object {$_ -like '*SPO*'} Test-DlpPolicies -SiteId $e.Substring(8,36) -FileUrl $filePath -Workload SPO -SendReportTo $reportAddress Here's an example of a returned value: #### Run Test-DlpPolicies -1. Run this syntax in the PowerShell window - +1. Run the following syntax in the PowerShell window: ```powershell Test-DlpPolicies -workload <workload> -Fileurl <path/direct link> -SendReportTo <smtpaddress> For detailed syntax and parameter information, see [Test-DlpPolicies](/powershel ### Interpret the report -The report is sent to the smtp address you passed the Test-DlpPolicies PowerShell command. There are multiple fields, here are explanations of the most important ones. +The report is sent to the SMTP address that you passed the Test-DlpPolicies PowerShell command to. There are multiple fields. Here are explanations of the most important ones. |Field name |Means | |
compliance | Dlp Use Policies Non Microsoft Cloud Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-use-policies-non-microsoft-cloud-apps.md | f1.keywords: Previously updated : 10/09/2020 Last updated : 06/02/2023 audience: ITPro f1_keywords: search.appverid: - MET150 - seo-marvel-apr2020-description: Learn how to use dlp policies for non-Microsoft cloud apps. +description: Learn how to use DLP policies for non-Microsoft cloud apps. # Use data loss prevention policies for non-Microsoft cloud apps -You can scope DLP policies to Microsoft Defender for Cloud Apps to monitor, detect and take actions when sensitive items are used and shared via non-Microsoft cloud apps. +You can scope DLP policies to Microsoft Defender for Cloud Apps to monitor, detect, and take actions when sensitive items are used and shared via non-Microsoft cloud apps. [!INCLUDE [purview-preview](../includes/purview-preview.md)] Before you configure DLP policies scoped to Microsoft Defender for Cloud Apps, y ### Connect a non-Microsoft cloud app -To use a DLP policy thats scoped to a specific non-Microsoft cloud app, the app must be connected to Defender for Cloud Apps. For information, see: +To use a DLP policy that's scoped to a specific non-Microsoft cloud app, the app must be connected to Defender for Cloud Apps. For information, see: - [Connect Box](/defender-cloud-apps/connect-box) - [Connect Dropbox](/defender-cloud-apps/connect-dropbox) After you connect your cloud apps to Defender for Cloud Apps, you can create DLP ## Create a DLP policy scoped to a non-Microsoft cloud app -Refer to [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) for the procedures to create a DLP policy. Keep these points in mind as you configure your policy. +Refer to [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) for the procedures to create a DLP policy. Keep these points in mind as you configure your policy: -- Select the turn on the **Microsoft Defender for Cloud Apps** location.+- Turn on the **Microsoft Defender for Cloud Apps** location. - To select a specific app or instance, select **Choose instance**. If you don't select an instance, the policy will be scoped to all connected apps in your Microsoft Defender for Cloud Apps tenant. - You can select from a number of **Actions** to enforce on third party apps. To restrict third-party apps, select **Restrict Third Party Apps** and then select the specific actions. |
compliance | Endpoint Dlp Getting Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-getting-started.md | f1.keywords: Previously updated : 04/03/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords: description: "Set up Endpoint data loss prevention to monitor file activities an Endpoint data loss prevention (Endpoint DLP) is part of the Microsoft Purview Data Loss Prevention (DLP) suite of features you can use to discover and protect sensitive items across Microsoft 365 services. For more information about all of Microsoft's DLP offerings, see [Learn about data loss prevention](dlp-learn-about-dlp.md). To learn more about Endpoint DLP, see [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md) -Microsoft Endpoint DLP allows you to monitor [onboarded Windows 10, and Windows 11](device-onboarding-overview.md) and [onboarded macOS devices](device-onboarding-macos-overview.md) running three latest released versions. Once a device is onboarded, DLP detects when sensitive items are used and shared. This gives you the visibility and control you need to ensure that they're used and protected properly, and to help prevent risky behavior that might compromise them. +Microsoft Endpoint DLP allows you to monitor [onboarded Windows 10, and Windows 11](device-onboarding-overview.md) and [onboarded macOS devices](device-onboarding-macos-overview.md) running any of the three latest released versions. Once a device is onboarded, DLP detects when sensitive items are used and shared. This gives you the visibility and control you need to ensure that they're used and protected properly, and to help prevent risky behavior that might compromise them. [!INCLUDE [purview-preview](../includes/purview-preview.md)] Before you get started with Endpoint DLP, you should confirm your [Microsoft 365 - Microsoft 365 E5 information protection and governance - Microsoft 365 A5 information protection and governance -for full licensing details, see [Microsoft 365 licensing guidance for information protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-loss-prevention-for-exchange-online-sharepoint-online-and-onedrive-for-business) +For full licensing details, see [Microsoft 365 licensing guidance for information protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-loss-prevention-for-exchange-online-sharepoint-online-and-onedrive-for-business) ### Configure proxy on the Windows 10 or Windows 11 device Here are the virtual operating systems that are supported by virtualization envi #### Known issues -1. You can't monitor Copy to Clipboard and Enforcing Endpoint DLP on Azure Virtual Desktop environments via browsers. However the same egress operation will be monitored by Endpoint DLP for actions via Remote Desktop Session (RDP) today. -1. Citrix XenApp doesn't support access by unallowed app monitoring. +1. You can't monitor **Copy to Clipboard** and **Enforcing Endpoint DLP** on Azure Virtual Desktop environments via browsers. However, the same egress operation will be monitored by **Endpoint DLP for actions via Remote Desktop Session (RDP)**. +1. Citrix XenApp doesn't support access by restricted app monitoring. #### Limitations For specific guidance to onboarding macOS devices, see: |[JAMF Pro)](device-onboarding-offboarding-macos-jamfpro.md)|For macOS devices that are managed through JAMF Pro| |[JAMF Pro for Microsoft Defender for Endpoint customers)](device-onboarding-offboarding-macos-jamfpro-mde.md)|For macOS devices that are managed through JAMF Pro and that have Microsoft Defender for Endpoint (MDE) deployed to them| -Once a device is onboarded, it should be visible in the devices list, and also start reporting audit activity to Activity explorer. +Once a device is onboarded, it should be visible in the devices list, and should start reporting audit activity to Activity explorer. ## See also |
compliance | Endpoint Dlp Learn About | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-learn-about.md | f1.keywords: Previously updated : 05/05/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords: description: "Endpoint data loss prevention extends monitoring of file activitie You can use Microsoft Purview Data Loss Prevention (DLP) to monitor the actions that are being taken on items you've determined to be sensitive and to help prevent the unintentional sharing of those items. For more information on DLP, see [Learn about data loss prevention](dlp-learn-about-dlp.md). -**Endpoint data loss prevention** (Endpoint DLP) extends the activity monitoring and protection capabilities of DLP to sensitive items that are physically stored on Windows 10, Windows 11, and macOS (three latest released versions) devices. Once devices are onboarded into the Microsoft Purview solutions, the information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-create-deploy-policy.md). +**Endpoint data loss prevention** (Endpoint DLP) extends the activity monitoring and protection capabilities of DLP to sensitive items that are physically stored on Windows 10, Windows 11, and macOS devices running any of the latest releases. Once devices are onboarded into the Microsoft Purview solutions, the information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-create-deploy-policy.md). > [!TIP] > If you are looking for device control for removable storage, see [Microsoft Defender for Endpoint Device Control Removable Storage Access Control](../security/defender-endpoint/device-control-removable-storage-access-control.md#microsoft-defender-for-endpoint-device-control-removable-storage-access-control). Endpoint DLP enables you to audit and manage the following types of activities u ## Best practice for endpoint DLP policies -Say you want to block all items that contain credit card numbers from leaving endpoints of Finance department users. We recommend: +Say you want to block all items that contain credit card numbers from leaving endpoints of Finance department users. We recommend the following: - Create a policy and scope it to endpoints and to that group of users. - Create a rule in the policy that detects the type of information that you want to protect. In this case, **content contains** set to *Sensitive information type*, and select **Credit Card**. DLP audits the activities for these file types, even if there isn't a policy mat If you only want monitoring data from policy matches, you can turn off the **Always audit file activity for devices** in the endpoint DLP global settings. - If the **Always audit file activity for devices** setting is on, activities on any Word, PowerPoint, Excel, PDF, and .csv file are always audited even if the device isn't targeted by any policy. + If the **Always audit file activity for devices** setting is on, activities on any Word, PowerPoint, Excel, PDF, and .csv files are always audited, even if the device isn't targeted by any policy. To ensure activities are audited for all supported file types, create a [custom DLP policy](dlp-create-deploy-policy.md). Endpoint DLP monitors activity-based on MIME type, so activities are captured, even if the file extension is changed for these files types: -After the extension is changed to any other file extension +After the extension is changed to any other file extension: - doc - docx - xls If the extension is changed only to supported file extensions: ### File types -File types are a grouping of file formats, which are utilized to protect specific workflows or areas of business. You can use one or more File types as conditions in your DLP policies. File types are supported for Windows 10/11 devices. +File types are a grouping of file formats. They are utilized to protect specific workflows or areas of business. You can use one or more file types as conditions in your DLP policies. File types are supported for Windows 10/11 devices. |File Type |App |monitored file extensions | |||| File types are a grouping of file formats, which are utilized to protect specifi If the File types don't cover the file extensions you need to list as a condition in a policy, you can use file extensions separated by comma instead. > [!IMPORTANT]-> The file extensions and file types options cannot be used as conditions in the same rule. If you want to use them as conditions in the same policy, they must be in separate rules. +> The **file extensions** and **file types** options cannot be used as conditions in the same rule. If you want to use them as conditions in the same policy, they must be in separate rules. > [!IMPORTANT]-> These Windows versions support File types and File extension features: +> These Windows versions support **file extensions** and **file types** features: >- Windows 10 versions 20H1/20H2/21H1 (KB 5006738) >- Windows 10 versions 19H1/19H2 (KB 5007189) >- Windows 10 RS5 (KB 5006744) Device management is the functionality that enables the collection of telemetry > [!div class="mx-imgBorder"] >  -Onboarding and offboarding are handled via scripts you download from the Device management center. The center has custom scripts for each of these deployment methods: +Onboarding and offboarding are handled via scripts that you download from the device management center. The device management center has custom scripts for each of the following deployment methods: -- local script (up to 10 machines)+- Local script (up to 10 machines) - Group policy - System Center Configuration Manager (version 1610 or later) - Mobile Device Management/Microsoft Intune For example, if a file is copied to removable USB media, you'd see these attribu ## Just in time protection (preview) > [!IMPORTANT]-> If you want to try out just in time protection, you have to register your tenant at [Endpoint JIT Preview](https://aka.ms/EndpointJITPreview). +> If you want to try out just-in-time protection, you must register your tenant at [Endpoint JIT Preview](https://aka.ms/EndpointJITPreview). Endpoint DLP can use **Just in time protection** once it's enabled in **Microsoft Purview compliance console** > **Settings**. -Just in time protection applies a candidate policy to onboarded Windows 10/11 devices. The candidate policy blocks all egress activities on monitored files until policy evaluation completes successfully. The candidate policy is applied to: +Just-in-time protection applies a candidate policy to onboarded Windows 10/11 devices. The candidate policy blocks all egress activities on monitored files until policy evaluation completes successfully. The candidate policy is applied to: - Items that have never been evaluated. - Items on which the evaluation has gone stale. These are previously evaluated items that haven't been reevaluated by the current, updated cloud versions of the policies. Just in time protection applies a candidate policy to onboarded Windows 10/11 de You can prevent a file from being permanently blocked if policy evaluation starts on a file, but doesn't complete. Use the **Just in time protection configuration** fallback setting to either **Allow** or **Block** egress activities if policy evaluation doesn't complete. You configure fallback settings in **Microsoft Purview compliance console** > **Settings** > **Just in time protection configuration** > **Decide what happens if JIT protection fails**. > [!TIP]-> Because the candidate policy from just in time protection is applied to all files on onboarded devices, it may block user activity on files that won't have a policy applied once evaluation occurs. To prevent this productivity interruption, you should configure and deploy policies to devices before enabling just in time protection. +> Because the candidate policy from just-in-time protection is applied to all files on onboarded devices, it may block user activity on files that won't have a policy applied once evaluation occurs. To prevent this productivity interruption, you should configure and deploy policies to devices before enabling just in time protection. ## Next steps |
compliance | Endpoint Dlp Using | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-using.md | f1.keywords: Previously updated : 05/05/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords: This scenario is for an unrestricted admin creating and full directory policy. 1. Choose **Create policy**. -1. For this scenario, choose **Privacy**, then **U.S. Personally Identifiable Information (PII) Data** and choose **Next**. +1. For this scenario, choose **Privacy**, then **U.S. Personally Identifiable Information (PII) Data Enhanced**, and then choose **Next**. -1. Select **Full directory** under **Admin units**. +1. Give your new policy a **Name** and **Description**. -1. Toggle the **Status** field to off for all locations except **Devices**. Choose **Next**. +1. Under **Admin units**, select **Full directory** and then **Next**. -1. Accept the default **Review and customize settings from the template** selection and choose **Next**. +1. Toggle the **Status** field off for all locations except **Devices**. Choose **Next**. -1. Accept the default **Protection actions** values and choose **Next**. +1. On the **Define policy settings** page, accept the default **Review and customize settings from the template** selection and choose **Next**. -1. Select **Audit or restrict activities on Windows devices** and leave the actions set to **Audit only**. Choose **Next**. +1. On the **Info to protect** page, accept the default values and choose **Next**. -1. Accept the default **I'd like to test it out first** value and choose **Show policy tips while in test mode**. Choose **Next**. +1. Accept the default **Protection actions** and choose **Next**. + +1. On the **Customize access and override settings** page, choose **Audit or restrict activities on Devices**. Accept the remaining default values and choose **Next**. -1. Review your settings and choose **Submit**. +1. On the **Policy mode** page, accept the default **Test it out first** and select **Show policy tips while in test mode**. Choose **Next**. -1. The new DLP policy will appear in the policy list. +1. Review your policy and choose **Submit** to create it, then choose **Done**. The new policy appears in the DLP **Policies** list. -1. Check Activity explorer for data from the monitored endpoints. Set the location filter for devices and add the policy, then filter by policy name to see the effect of this policy; see [Get started with activity explorer](data-classification-activity-explorer.md), if needed. +1. In the left navigation pane, choose **Data loss prevention** and then **Activity explorer**. -1. Attempt to share a test item that contains content that will trigger the U.S. Personally Identifiable Information (PII) Data condition with someone outside your organization. This should trigger the policy. +1. Try to share a test item containing content that will trigger the U.S. Personally Identifiable Information (PII) Data condition. This should trigger the policy. 1. Check Activity explorer for the event. This scenario is for an unrestricted admin creating and full directory policy. This scenario is for an unrestricted admin modifying a full directory scoped policy. -1. Open the [Data loss prevention page](https://compliance.microsoft.com/datalossprevention?viewid=policies). +1. Navigate to the data loss prevention [Policies page](https://compliance.microsoft.com/datalossprevention?viewid=policies). -1. Choose the **U.S. Personally Identifiable Information (PII) Data** policy that you created in scenario 1. +1. Choose the **U.S. Personally Identifiable Information (PII) Data Enhanced** policy that you created in Scenario 1. -1. Choose **edit policy**. +1. Choose **Edit policy**. -1. Go to the **Advanced DLP rules** page and edit the **Low volume of content detected U.S. Personally Identifiable Inf**. +1. Go to the **Customize advanced DLP rules** page and edit the **Low volume of content detected U.S. Personally Identifiable Inf**. -1. Scroll down to the **Incident reports** section and set **Send an alert to admins when a rule match occurs** to **On**. Email alerts will be automatically sent to the administrator and anyone else you add to the list of recipients. +1. Scroll down to the **Incident reports** section and toggle **Send an alert to admins when a rule match occurs** to **On**. Email alerts will be automatically sent to the administrator and anyone else you add to the list of recipients. -  + :::image type="content" alt-text="This screenshot shows the option to turn on incident reports." source="../media/endpoint-dlp-2-using-dlp-incident-reports.png"::: 1. For the purposes of this scenario, choose **Send alert every time an activity matches the rule**. 1. Choose **Save**. -1. Retain all your previous settings by choosing **Next** and then **Submit** the policy changes. +1. Retain all your previous settings by choosing **Next** throughout the rest of the wizard, then **Submit** the policy changes. -1. Attempt to share a test item that contains content that will trigger the U.S. Personally Identifiable Information (PII) Data condition with someone outside your organization. This should trigger the policy. +1. Try to share a test item containing content that will trigger the U.S. Personally Identifiable Information (PII) Data condition. This should trigger the policy. -1. Check Activity explorer for the event. +1. Check the activity explorer for the event. ## Scenario 3: Modify the existing policy, block the action with allow override This scenario is for an unrestricted admin modifying a full directory policy. -1. Open the [Data loss prevention page](https://compliance.microsoft.com/datalossprevention?viewid=policies). +1. Open the data loss prevention [Policies page](https://compliance.microsoft.com/datalossprevention?viewid=policies). 1. Choose the **U.S. Personally Identifiable Information (PII) Data** policy that you created in Scenario 1. -1. Choose **edit policy**. +1. Choose **Edit policy**. 1. Go to the **Advanced DLP rules** page and edit the **Low volume of content detected U.S. Personally Identifiable Inf**. -1. Scroll down to the **Audit or restrict activities on Windows device** section and for each activity set the corresponding action to **Block with override**. +1. Scroll down to the **Audit or restrict activities on Windows device** section and set both options under the **Service domain and browser activities** to **Block with override**. - > [!div class="mx-imgBorder"] - >  + :::image type="content" alt-text="The screenshot shows the set block with override action options." source="../media/endpoint-dlp-6-using-dlp-set-blocked-with-override.png"::: 1. Choose **Save**. -1. Repeat steps 4-7 for the **High volume of content detected U.S. Personally Identifiable Inf**. +1. Repeat steps 4-6 for the **High volume of content detected U.S. Personally Identifiable Inf**. -1. Retain all your previous settings by choosing **Next** and then **Submit** the policy changes. +1. Retain all your previous settings by choosing **Next** through the rest of the wizard,and then **Submit** the policy changes. 1. Attempt to share a test item that contains content that will trigger the U.S. Personally Identifiable Information (PII) Data condition with someone outside your organization. This should trigger the policy. You'll see a popup like this on the client device:+ + :::image type="content" alt-text=" This screenshot shows the endpoint dlp client blocked override notification." source="../media/endpoint-dlp-3-using-dlp-client-blocked-override-notification.png"::: - > [!div class="mx-imgBorder"] - >  --1. Check Activity explorer for the event. +1. Check the activity explorer for the event. -## Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with autoquarantine +## Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with auto-quarantine This scenario is for an unrestricted admin creating a full directory policy. This scenario is for an unrestricted admin creating a full directory policy. In this scenario, synchronizing files with the **Highly Confidential** sensitivity label to OneDrive is blocked. This is a complex scenario with multiple components and procedures. You'll need: -- A Microsoft Azure Active Directory (Azure AD) user account to target and an onboarded Windows 10 computer that is already synchronizing a local OneDrive folder with OneDrive cloud storage.+- A Microsoft Azure Active Directory (Azure AD) user account to target and an onboarded Windows 10/11 computer that is already synchronizing a local OneDrive folder with OneDrive cloud storage. - Sensitivity labels configured and publishedΓÇösee [Get started with sensitivity labels](get-started-with-sensitivity-labels.md#get-started-with-sensitivity-labels) and [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md#create-and-configure-sensitivity-labels-and-their-policies). There are three procedures. -1. Configure the Endpoint DLP Autoquarantine settings. -2. Create a policy that blocks sensitive items that have the **Highly Confidential** sensitivity label. -3. Create a Word document on the Windows 10 device that the policy is targeted to, apply the label, and copy it to the user accounts local OneDrive folder that is being synchronized. +1. Configure the Endpoint DLP Auto-quarantine settings. +1. Create a policy that blocks sensitive items that have the **Highly Confidential** sensitivity label. +1. Create a Word document on the Windows 10/11 device that the policy is targeted to, apply the label, and copy it to the user accounts local OneDrive folder that is being synchronized. -### Configure Endpoint DLP unallowed app and Autoquarantine settings +### Configure Endpoint DLP unallowed app and Auto-quarantine settings 1. Open [Endpoint DLP settings](https://compliance.microsoft.com/datalossprevention?viewid=globalsettings) 1. Expand **Restricted apps and app groups**. -1. Choose **Add restricted app group** under **Restricted app groups**, put group name *Cloud Sync apps*, and add *OneDrive* as a display name and the executable name *onedrive.exe* to disallow onedrive.exe from accessing items the **Highly Confidential** label. +1. Under **Restricted app groups**, choose **Add restricted app group**. Enter *Cloud Sync apps* as the group name. + +1. Select the **Auto-quarantine** box. + +1. For the **App name**, enter *OneDrive*. For the **Executable name**, enter *onedrive.exe*, then choose the **+** button. This will disallow onedrive.exe from accessing items with the **Highly Confidential** label. -1. Select **Auto-quarantine** and **Save**. +1. Choose **Save**. 1. Under **Auto-quarantine settings** choose **Edit auto-quarantine settings**. There are three procedures. 1. Enter the path to the folder on local machines where you want the original sensitive files to be moved to. For example: - **'%homedrive%%homepath%\Microsoft DLP\Quarantine'** for the username *Isaiah Langer* will place the moved items in a folder named: + > **'%homedrive%%homepath%\Microsoft DLP\Quarantine'** for the username *Isaiah Langer* will place the moved items in a folder named: - *C:\Users\IsaiahLanger\Microsoft DLP\Quarantine\OneDrive* + > *C:\Users\IsaiahLanger\Microsoft DLP\Quarantine\OneDrive* - and append a date and time stamp to the original file name. - - > [!NOTE] - > DLP Auto-quarantine will create sub-folders for the files for each unallowed app. So if you have both *Notepad* and *OneDrive* in your unallowed apps list, a sub-folder will be created for **\OneDrive** and another sub-folder for **\Notepad**. +1. Append a date and time stamp to the original file name. + + > [!NOTE] + > DLP auto-quarantine will create sub-folders for the files for each unallowed app. So if you have both *Notepad* and *OneDrive* in your unallowed apps list, a sub-folder will be created for **\OneDrive** and another sub-folder for **\Notepad**. -1. Choose **Replace the files with a .txt file that contains the following text** and enter the text you want in the placeholder file. For example for a file named *auto quar 1.docx*: +1. Choose **Replace the files with a .txt file that contains the following text** and enter the text you want in the placeholder file. For example for a file named *auto quar 1.docx*, you could enter: - > %%FileName%% contains sensitive info that your organization is protecting with the data loss prevention (DLP) policy %%PolicyName%% and was moved to the quarantine folder: %%QuarantinePath%% + > %%FileName%% contains sensitive info that your organization is protecting with the data loss prevention (DLP) policy %%PolicyName%%. It was moved to the quarantine folder: %%QuarantinePath%% - will leave a text file that contains this message: + will leave a text file that contains this message: - > auto quar 1.docx contains sensitive info that your organization is protecting with the data loss prevention (DLP) policy and was moved to the quarantine folder: C:\Users\IsaiahLanger\Microsoft DLP\Quarantine\OneDrive\auto quar 1_20210728_151541.docx. + > auto quar 1.docx contains sensitive info that your organization is protecting with the data loss prevention (DLP) policy. It was moved to the quarantine folder: C:\Users\IsaiahLanger\Microsoft DLP\Quarantine\OneDrive\auto quar 1.docx. -1. Choose **Save** +1. Choose **Save**. -### Configure a policy to block OneDrive synchronization of files with the sensitivity label Highly Confidential +### Configure a policy to block OneDrive synchronization of files with the sensitivity label "Highly Confidential" 1. Open the [Data loss prevention page](https://compliance.microsoft.com/datalossprevention?viewid=policies). -1. Choose **Create policy**. +1. Navigate to **Data loss prevention"** **Policies** > **Create policy**. -1. For this scenario, choose **Custom**, then **Custom policy** and choose **Next**. +1. For this scenario, choose **Custom**, then **Custom policy**. Choose **Next**. 1. Fill in the **Name** and **Description** fields, choose **Next**. There are three procedures. 1. Accept the default **Create or customize advanced DLP rules** selection and choose **Next**. 1. Create a rule with these values:- 1. **Name** > *Scenario 4 Auto-quarantine*. - 1. **Conditions** > **Content contains** > **Sensitivity labels** > **Highly Confidential**. - 1. **Actions** > **Audit or restrict activities on Windows devices** > **File activities for apps in restricted app groups** > **Add restricted app group**, choose created *group Cloud Sync apps* > **Apply a restriction to all activity** > **Block**. For the purposes of this scenario, clear all the other activities. - 1. **User notifications** > **On**. - 1. **Endpoint devices** > Choose **Show users a policy tip notification when an activity** if not already enabled. - + + 1. **Name** > *Scenario 4 Auto-quarantine*. + 1. Under **Conditions** choose **Add condition** and then **Content Contains**. + 1. Enter a group name, for example *Highly-Confidential Sensitivity Labels* and then choose **Add**. + 1. Select **Sensitivity labels** then **Highly Confidential** and choose **Add**. + 1. Under **Actions** choose **Add an action**. + 1. Select **Audit or restrict activities on Windows devices** > **File activities for apps in restricted app groups**. + 1. Choose **Add restricted app group** then choose the *Cloud Sync Apps* group you created previously. + 1. Choose **Apply a restriction to all activity** > **Block**. For the purposes of this scenario, clear all the other activities. + 1. Under **User notifications**, toggle **User notifications** to **On** and under **Endpoint devices** choose **Show users a policy tip notification when an activity** if not already enabled. + 1. Choose **Save** and **Next**. 1. Choose **Turn it on right away**. Choose **Next**. 1. Review your settings and choose **Submit**. - > [!NOTE] - > Allow at least an hour for the new policy to be replicated and applied to the target Windows 10 computer. + > [!NOTE] + > Allow at least an hour for the new policy to be replicated and applied to the target Windows 10 computer. -1. The new DLP policy will appear in the policy list. +1. The new DLP policy appears in the policy list. -### Test Auto-quarantine on the Windows 10 device +### Test Auto-quarantine on the Windows 10/11 device -1. Sign in to the Windows 10 computer with the user account you specified in [Configure a policy to block OneDrive synchronization of files with the sensitivity label Highly Confidential](#configure-a-policy-to-block-onedrive-synchronization-of-files-with-the-sensitivity-label-highly-confidential) step 5. +1. Sign in to the Windows 10/11 computer with the user account you specified in [Configure a policy to block OneDrive synchronization of files with the sensitivity label Highly Confidential](#configure-a-policy-to-block-onedrive-synchronization-of-files-with-the-sensitivity-label-highly-confidential, step 5. 1. Create a folder whose contents won't be synchronized to OneDrive. For example: - *C:\auto-quarantine source folder* + > *C:\auto-quarantine source folder* -1. Open Microsoft Word and create a file in the autoquarantine source folder. Apply the **Highly confidential** sensitivity label; see [Apply sensitivity labels to your files and email in Office](https://support.microsoft.com/topic/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9). +1. Open Microsoft Word and create a file in the auto-quarantine source folder. Apply the **Highly confidential** sensitivity label; see [Apply sensitivity labels to your files and email in Office](https://support.microsoft.com/topic/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9). 1. Copy the file you just created to your OneDrive synchronization folder. A user notification toast should appear telling you that the action is not allowed and that the file will be quarantined. For example, for user name *Isaiah Langer*, and a document titled *auto-quarantine doc 1.docx* you would see this message: -  + :::image type="content" alt-text="This screenshot shows the Data loss prevention user notification message that the OneDrive synchronization action isn't allowed for the specified file and that the file will be quarantined." source="../media/auto-quarantine-user-notification-toast.png"::: - The message reads: - - > Opening auto-quarantine doc 1.docx with this app is not allowed. The file will be quarantined to 'C:\Users\IsaiahLanger\Microsoft DLP\OneDrive' + The message reads: ++ > Opening auto-quarantine doc 1.docx with this app is not allowed. The file will be quarantined to 'C:\Users\IsaiahLanger\Microsoft DLP\OneDrive' 1. Choose **Dismiss**. There are three procedures. 1. Open the quarantine folder and confirm that the original file is there. -1. Check Activity explorer for data from the monitored endpoints. Set the location filter for devices and add the policy, then filter by policy name to see the effect of this policy; see [Get started with activity explorer](data-classification-activity-explorer.md), if needed. +1. Check Activity explorer for data from the monitored endpoints. Set the location filter for devices and add the policy, then filter by policy name to see the effect of this policy. For information on using activity explorer, see [Get started with activity explorer](data-classification-activity-explorer.md). 1. Check Activity explorer for the event. There are three procedures. This scenario is for an unrestricted admin creating a full directory policy. -With Endpoint DLP and Microsoft Edge Web browser, you can restrict unintentional sharing of sensitive items to unallowed cloud apps and services. Microsoft Edge understands when an item is restricted by an Endpoint DLP policy and enforces access restrictions. +With Endpoint DLP and a supported web browser, you can restrict unintentional sharing of sensitive items to unallowed cloud apps and services. Microsoft Edge understands when an item is restricted by an Endpoint DLP policy and enforces access restrictions. -When you select **Devices** as a location in a properly configured DLP policy and use the Microsoft Edge browser, the unallowed browsers that you've defined in these settings will be prevented from accessing the sensitive items that match your DLP policy controls. Instead, users will be redirected to use Microsoft Edge, which, with its understanding of DLP imposed restrictions, can block or restrict activities when the conditions in the DLP policy are met. ++When you select **Devices** as a location in a properly configured DLP policy and use a supported web browser, the unallowed browsers that you've defined in these settings will be prevented from accessing the sensitive items that match your DLP policy controls. Instead, users will be redirected to use Microsoft Edge, which, with its understanding of DLP imposed restrictions, can block or restrict activities when the conditions in the DLP policy are met. To use this restriction, youΓÇÖll need to configure three important pieces: You can continue to add new services, apps, and policies to extend and augment y This configuration will help ensure your data remains safe while also avoiding unnecessary restrictions that prevent or restrict users from accessing and sharing nonsensitive items. -You can also audit, block with override, or block these user upload sensitive items to cloud apps and services through **Sensitive service domains**. +You can also audit, block with override, or block these user-upload sensitive items to cloud apps and services through **Sensitive service domains**. -1. In the Microsoft Purview compliance portal open **Data loss prevention** > **Endpoint DLP settings** > **Browser and domain restrictions to sensitive data** > **Sensitive service domains**. +1. In the Microsoft Purview compliance portal navigate to **Data loss prevention** > **Endpoint DLP settings** > **Browser and domain restrictions to sensitive data** > **Sensitive service domain groups**. -1. Select **Add a new group of sensitive service domains**. +1. Select **Create sensitive service domain group**. 1. Name the group. +1. Enter the **Sensitive service domain** for the group. You can add multiple websites to a group and use wildcards to cover subdomains. For example, `www.contoso.com` for just the top level website, or: \*.contoso.com for corp.contoso.com, hr.contoso.com, fin.contoso.com. + 1. Select the **Match type** you want. You can select from **URL**, **IP address**, **IP address range**. -1. Type in the appropriate value in the **Add new service domains to this group**. You can add multiple websites to a group and use wildcards to cover subdomains. For example, `www.contoso.com` for just the top level website or \*.contoso.com for corp.contoso.com, hr.contoso.com, fin.contoso.com - 1. Select **Save**. -1. Select **Policies**. +1. In the left navigation pane, select **Data loss prevention** \> **Policies**. 1. Create and scope a policy that is applied only to the **Devices** location. For more information on how to create a policy, see [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md). Be sure to scope the **Admin units** to **Full directory**. -1. Create a rule that uses the **The user accessed a sensitive site from Edge**, and the action **Audit or restrict activities on devices**. +1. Create a rule that uses the condition **The user accesses a sensitive site from Edge**. -1. In **Service domain and browser activities** select **Upload to a restricted cloud service domain or access from an unallowed browser** and set the action to **Audit only**. This sets the overall action for all the site groups. +1. Add the action **Audit or restrict activities on devices**. -1. Select the **Sensitive site groups** you want. +1. Under **Service domain and browser activities**, choose **Upload to a restricted cloud service domain or access from an unallowed browser** and set the action to **Audit only**. -1. Select **Add**. +1. Select **Choose different restrictions for sensitive service domains** and then choose **Add group**. + +1. On **the Choose sensitive service domain groups** flyout, select the sensitive service domain group(s) you want, choose **Add** and then choose **Save**. -1. OPTIONAL: If you want to create an exception (usually an allowlist) to the overall action for one or more site groups, select **Configure sensitive service domain exceptions**, add the site group you want the exception for, configure the desired action and **Save** the configuration. +1. On the confirmation page, choose **Done**. -1. Select the user activities you want to monitor or restrict and the actions you DLP to take in response to those activities. +1. Select the user activities you want to monitor or restrict and the actions for DLP to take in response to those activities. -1. Finish configuring the rule and policy and apply it. +1. On the **Policy mode** page, choose **Turn it on right away**. Choose **Next** and then **Submit**. ## Scenario 6: Monitor or restrict user activities on sensitive service domains -This scenario is for an unrestricted admin creating and full directory policy. +This scenario is for an unrestricted admin creating a full directory policy. -Use this scenario when you want to audit or block these user activities on a website. +Use this scenario when you want to audit or block the following user activities on a website. - print from a website - copy data from a website - save a website as local files -The user must be accessing the website through Microsoft Edge. ### Configure Sensitive service domains 1. In the Microsoft Purview compliance portal open **Data loss prevention** > **Endpoint DLP settings** > **Browser and domain restrictions to sensitive data** > **Sensitive service domains**. -1. Select **Add a new group of sensitive service domains**. +1. To control whether sensitive files can be uploaded to specific domains, select **Add cloud service domain**. -1. Name the group. --1. Select the **Match type** you want. You can select from **URL**, **IP address**, **IP address range**. +1. Enter the domain that you want to want to audit or block and choose the **+** button. Repeat for any additional domains. Choose **Save**. + +1. Under **Sensitive service domain groups**, choose **Create sensitive service domain group**. -1. Type in the appropriate value in the **Add new service domains to this group**. You can add multiple websites to a group and use wildcards to cover subdomains. For example, `www.contoso.com` for just the top level website or \*.contoso.com for corp.contoso.com, hr.contoso.com, fin.contoso.com +1. Give the group a name, celect the **Match type** you want (you can select from **URL**, **IP address**, **IP address range**), and enter the URL, IP address, or IP address range to be audited or blocked. When matching a URL, you can add multiple websites to a group and use wildcards to cover subdomains. For example, `www.contoso.com` for just the top level website or \*.contoso.com for corp.contoso.com, hr.contoso.com, fin.contoso.com. 1. Select **Save**. -1. Select **Policies**. +1. In the left navigation pane, select **Data loss prevention** \> **Policies**. 1. Create and scope a policy that is applied only to the **Devices** location. See, [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) for more information on how to create a policy. Be sure to scope the **Admin units** to **Full directory**. -1. Create a rule that uses the **the user accessed a sensitive site from Edge**, and the action **Audit or restrict activities when users access sensitive sites in Microsoft Edge browser on Windows devices**. +1. Create a rule that uses the condition **the user accessed a sensitive site from Edge**, and the action **Audit or restrict activities when users access sensitive sites in Microsoft Edge browser on Windows devices**. -1. In the action, select **Add or remove Sensitive site groups**. +1. In the action, under **Sensitive Site Restrictions**, select **Add or remove Sensitive site groups**. -1. Select the **Sensitive site groups** you want. Any website under the group(s) you select here will be redirected to Microsoft Edge when opened in Chrome browser (with Purview extension installed). +1. Create and/or select the **Sensitive site groups** you want. Any website under the group(s) you select here will be redirected to Microsoft Edge when opened in Chrome or Firefox (so long as the Microsoft Purview extension is installed). 1. Select **Add**. -1. Select the user activities you want to monitor or restrict and the actions you want DLP to take in response to those activities. +1. Select the user activities you want to monitor or restrict and the actions you want Microsoft Purview to take in response to those activities. -1. Finish configuring the rule and policy and apply it. +1. Finish configuring the rule and policy and choose **Submit** and then **Done**. ## Scenario 7: Restrict pasting sensitive content into a browser (preview) This scenario is for restricting users from pasting sensitive content into a browser web form or field. You can set up different levels of enforcement when it comes to blocking data fr **Create a URL group** 1. In Microsoft Purview, open the [compliance portal](https://sip.compliance.microsoft.com/homepage) and navigate to **Data loss prevention** > **Endpoint DLP settings**, and scroll down to **Browser and domain restrictions to sensitive data**. Expand the section.-2. Scroll down to **Sensitive service domain groups**. -3. Choose **Create sensitive service domain group**. - - Enter a **Group name**. - - In the **Sensitive service domain** field, enter the URL for the first website you want to monitor and then choose **Add site**. - - Continue adding URLs for the rest of the websites you want to monitor in this group. - - When you are finished adding all URLs to your group, choose **Save**. -4. Create as many separate groups of URLs as you need. ++1. Scroll down to **Sensitive service domain groups**. ++1. Choose **Create sensitive service domain group**. ++ 1. Enter a **Group name**. + 1. In the **Sensitive service domain** field, enter the URL for the first website you want to monitor and then choose **Add site**. + 1. Continue adding URLs for the rest of the websites you want to monitor in this group. + 1. When you are finished adding all URLs to your group, choose **Save**. ++1. Create as many separate groups of URLs as you need. **Restrict pasting content into a browser**-1. Create a DLP policy as described in [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md#create-and-deploy-data-loss-prevention-policies). -2. On the [Define policy settings page](https://sip.compliance.microsoft.com/datalossprevention/policies) in the DLP policy creation flow, select **Create or customize advanced DLP rules** and then choose **Next**. -3. On the **Customize advanced DLP rules** page, choose **Create rule**. -4. Enter a name and description for the rule, and then add your conditions. -5. Scroll down to the **Actions** section, and choose **Add an action**. -6. Choose **Audit or restrict activities when users access sensitive sites** -7. Choose **Add or remove Sensitive site groups**. -8. Select the group you created in Step 3 that you want this policy to apply to, and then choose **Add**. -9. Expand **Conditions**, choose **Add condition**, and then select the **Sensitive info types**. -10. Under **Content Contains**, scroll down and select the new sensitive information type that you previously chose or created. -11. Under **Actions**, choose **Add or remove Sensitive site groups**, and select the group of sensitive sites you created that you want to monitor with this policy. -12. Choose **Save**. -13. Choose **Next** -14. Choose whether you want to test your policy, turn it on right away, or keep it off, and then choose **Next**. -15. Choose **Submit**. +1. Create a DLP policy scoped to **Devices**. For information on how to create a DLP policy, see [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md#create-and-deploy-data-loss-prevention-policies). ++1. On the [Define policy settings page](https://sip.compliance.microsoft.com/datalossprevention/policies) in the DLP policy creation flow, select **Create or customize advanced DLP rules** and then choose **Next**. ++1. On the **Customize advanced DLP rules** page, choose **Create rule**. ++1. Enter a name and description for the rule. ++1. Expand **Conditions**, choose **Add condition**, and then select the **Sensitive info types**. ++1. Under **Content Contains**, scroll down and select the new sensitive information type that you previously chose or created. ++1. Scroll down to the **Actions** section, and choose **Add an action**. ++1. Choose **Audit or restrict activities on devices** ++1. In the **Actions** section, under **Service domain and browser activities**, select **Paste to supported browsers**.1. ++1. Set the restriction to **Audit**, **Block with override**, or **Block**, and then choose **Add**. ++1. Choose **Save**. ++1. Choose **Next** ++1. Choose whether you want to test your policy, turn it on right away, or keep it off, and then choose **Next**. ++1. Choose **Submit**. ## Scenario 8: Authorization groups In this scenario, we'll define a group of printers that the legal department use 1. In the Microsoft Purview compliance portal open **Data loss prevention** > **Endpoint DLP settings** > **Printer groups**. -1. Select **Create printer group** and give the group a name. In this scenario, we'll use `Legal printers`. +1. Select **Create printer group** and enter a **Group a name**. In this scenario, we'll use `Legal printers`. 1. Select **Add printer** and provide a name. You can define printers by:- 1. Friendly printer name - 1. USB product ID - 1. USB vendor ID - 1. IP range - 1. Print to file - 1. Universal print deployed on a printer - 1. Corporate printer - 1. Print to local ++ 1. Friendly printer name + 1. USB product ID + 1. USB vendor ID + 1. IP range + 1. Print to file + 1. Universal print deployed on a printer + 1. Corporate printer + 1. Print to local 1. Select **Close**. ### Configure policy printing actions -1. Open the **Policies** tab. +1. Navigate to **Data loss prevention** > **Policies**. 1. Select **Create policy** and select the custom policy template. In this scenario, we'll define a group of printers that the legal department use 1. Scope the location to only the **Devices** location. -1. Create a rule where: - 1. **Content contains** = **Trainable classifiers**, **Legal Affairs** - 1. **Actions** = **Audit or restrict activities on devices** - 1. Then pick **File activities on all apps** - 1. The select **Apply restrictions to specific activity** - 1. Select **Print** = **Block** +1. Create a rule with the following values: ++ 1. Add a **Condition**: **Content contains** = **Trainable classifiers**, **Legal Affairs** + 1. **Actions** = **Audit or restrict activities on devices** + 1. Then pick **File activities on all apps** + 1. The select **Apply restrictions to specific activity** + 1. Select **Print** = **Block** 1. Select **Choose different print restrictions** 1. Under **Printer group restrictions**, select **Add group** and select **Legal printers**. 1. Set **Action** = **Allow**.- > [!TIP] - > The **Allow** action wil record and audit event to the audit log, but not generate an alert or notification. -1. Select **Save**. + > [!TIP] + > The **Allow** action wil record and audit event to the audit log, but not generate an alert or notification. ++1. Select **Save** and then **Next**. 1. Accept the default **I'd like to test it out first** value and choose **Show policy tips while in test mode**. Choose **Next**. In this scenario, we'll define a list of VPNs that hybrid workers use for access ### Create and use a Network exception -Network exceptions enable you to configure Allow, Audit only, Block with override, and Block actions to the file activities based on the network that users are accessing the file from. You can select from the [VPN settings](dlp-configure-endpoint-settings.md#vpn-settings) list you defined and **Corporate network** option. The actions can be applied individually or collectively to these user activities: +Network exceptions enable you to configure Allow, Audit only, Block with override, and Block actions to the file activities based on the network that users are accessing the file from. You can select from the [VPN settings](dlp-configure-endpoint-settings.md#vpn-settings) list you've defined and use the **Corporate network** option. The actions can be applied individually or collectively to these user activities: - Copy to clipboard - Copy to a USB removable device Network exceptions enable you to configure Allow, Audit only, Block with overrid 1. On a DLP monitored Windows device, open a **Windows PowerShell** window as an administrator. -1. Run this cmdlet +1. Run this cmdlet: ++ ```powershell-interactive + Get-VpnConnection + ``` -```powershell-interactive -Get-VpnConnection -``` -3. Running this cmdlet returns multiple fields and values. +1. Running this cmdlet returns multiple fields and values. -4. Find the **ServerAddress** field and record that value. You'll use this when you create a VPN entry in the VPN list. +1. Find the **ServerAddress** field and record that value. You'll use this when you create a VPN entry in the VPN list. -5. Find the **Name** field and record that value. The **Name** field maps to the **Network address** field when you create a VPN entry in the VPN list. +1. Find the **Name** field and record that value. The **Name** field maps to the **Network address** field when you create a VPN entry in the VPN list. #### Add a VPN Get-VpnConnection #### Configure policy actions -1. Open the **Policies** tab. +1. Open **Data loss prevention** > **Policies**. 1. Select **Create policy** and select the custom policy template. 1. Select **Full directory** under **Admin units**.- + 1. Scope the location to **Devices** only. 1. Create a rule where:- 1. **Content contains** = **Trainable classifiers**, **Legal Affairs** - 1. **Actions** = **Audit or restrict activities on devices** - 1. Then pick **File activities on all apps** - 1. The select **Apply restrictions to specific activity** - 1. Select the actions that you want to configure **Network exceptions** for. ++ 1. **Content contains** = **Trainable classifiers**, **Legal Affairs** + 1. **Actions** = **Audit or restrict activities on devices** + 1. Then pick **File activities on all apps** + 1. The select **Apply restrictions to specific activity** + 1. Select the actions that you want to configure **Network exceptions** for. 1. Select **Copy to clipboard** and the **Audit only** action Get-VpnConnection 1. Select **VPN** and set the action to **Block with override**. -> [!IMPORTANT] -> When you want to control the activities of a user when they're connected through a VPN *you must* select the VPN and make the VPN the top priority in the **Network exceptions** configuration. Otherwise, if the **Corporate network** option is selected, then that action defined for the **Corporate network** entry will be enforced. + > [!IMPORTANT] + > When you want to control the activities of a user when they're connected through a VPN *you must* select the VPN and make the VPN the top priority in the **Network exceptions** configuration. Otherwise, if the **Corporate network** option is selected, then that action defined for the **Corporate network** entry will be enforced. -> [!CAUTION] -> The **Apply to all activities** option will copy the network exceptions that are defined here and apply them to all the other configured specific activities, like **Print**, and **Copy to a network share**. ***This will overwrite the network exceptions on the other activities The last saved configuration wins.*** + > [!CAUTION] + > The **Apply to all activities** option will copy the network exceptions that are defined here and apply them to all the other configured specific activities, like **Print**, and **Copy to a network share**. ***This will overwrite the network exceptions on the other activities The last saved configuration wins.*** 1. **Save**. 1. Accept the default **I'd like to test it out first** value and choose **Show policy tips while in test mode**. Choose **Next**. -1. Review your settings and choose **Submit**. +1. Review your settings and choose **Submit** and then **Done**. 1. The new DLP policy will appear in the policy list. - ## See also - [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md) |
compliance | Get Started With The Default Dlp Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-the-default-dlp-policy.md | f1.keywords: Previously updated : 09/17/2019 Last updated : 06/02/2023 audience: Admin description: Learn how to use the report to refine your organization's default d # Get started with the default DLP policy -Before you even create your first Microsoft Purview Data Loss Prevention (DLP) policy, DLP is helping to protect your sensitive information with a default policy. This default policy and its recommendation (shown below) help keep your sensitive content secure by notifying you when email or documents containing a credit card number were shared with someone outside your organization. You'll see this recommendation on the **Home** page of the Microsoft Purview compliance portal. +Before you even create your first Microsoft Purview Data Loss Prevention (DLP) policy, DLP helps protect your sensitive information with a default policy. This default policy and its recommendation (shown below) help keep your sensitive content secure by notifying you when email or documents containing a credit card number are shared with someone outside your organization. You'll see this recommendation on the **Home** page of the Microsoft Purview compliance portal. You can use this widget to quickly view when and how much sensitive information was shared, and then refine the default DLP policy in just a click or two. You can also edit the default DLP policy at any time because it's fully customizable. Note that if you don't see the recommendation at first, try clicking **+More** at the bottom of the **Recommended for you** section. The detailed report shows you when and how much content containing credit card n To help protect the sensitive information, the default DLP policy: -- Detects when content in Exchange, SharePoint, and OneDrive that contains at least one of the following sensitive information is shared with people outside your organization.+- Detects when content in Exchange, SharePoint, and OneDrive that contains at least one of the following sensitive information items is shared with people outside your organization. - Credit Card Number - Content containing source code (as matched by our Source Code trainable classifier) - Content matching our U.S HIPAA Enhanced template- - Content containing Intellectual Property (as matched by our IP, Project Documents, M&A Files, Software Product developement files, IT Infra and Network Security Documents, and Strategic planning documents trainable classifiers) + - Content containing Intellectual Property (as matched by our IP, Project Documents, M&A Files, Software Product development files, IT Infra and Network Security Documents, and Strategic planning documents trainable classifiers) - Shows a policy tip and sends an email notification to users when they attempt to share this sensitive information with people outside your organization. For more information on these options, see [Send email notifications and show policy tips for DLP policies](use-notifications-and-policy-tips.md). To quickly refine the default DLP policy, you can choose to have it: For more information on incident reports or restricting access, see [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference). -If you want to change these options later, you can edit the default DLP policy at any time - see the next section. +If you want to change these options later, you can edit the default DLP policy at any time. See the next section for instructions.  ## Edit the default DLP policy -This policy is named **Default DLP policy** and appears under **Data loss prevention** on the **Policy** page of the Microsoft Purview compliance portal. +This policy is named **Default DLP policy** and appears under **Data loss prevention** on the **Policies** page of the Microsoft Purview compliance portal. This policy is fully customizable, the same as any DLP policy that you create yourself from scratch. You can also turn off or delete the policy, so that your users no longer receive policy tips or email notifications. ## When the widget does and does not appear -The widget named **Further protect shared content** appears in the **Recommended for you** section of the **Home** page of the Microsoft Purview compliance portal. +The widget, named **Further protect shared content**, appears in the **Recommended for you** section of the **Home** page of the Microsoft Purview compliance portal. This widget appears only when: |
compliance | How Dlp Works Between Admin Centers | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/how-dlp-works-between-admin-centers.md | f1.keywords: Previously updated : 09/17/2019 Last updated : 06/02/2023 audience: Admin DLP policies created in these admin centers work side by side - this article exp ## How DLP in the Compliance portal works with DLP and mail flow rules in the Exchange admin center -After you create a DLP policy in the Compliance portal, the policy is deployed to all of the locations included in the policy. If the policy includes Exchange Online, the policy's synced there and enforced in exactly the same way as a DLP policy created in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>. +After you create a DLP policy in the Compliance portal, the policy is deployed to all of the locations included in the policy. If the policy includes Exchange, the policy is synced there and enforced in exactly the same way as a DLP policy created in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>. -If you've created DLP policies in the Exchange admin center, those policies will continue to work side by side with any policies for email that you create in the Compliance portal. But note that rules created in the Exchange admin center take precedence. All Exchange mail flow rules are processed first, and then the DLP rules from the Compliance portal are processed. +If you've created DLP policies in the Exchange admin center, those policies will continue to work side by side with any policies for email that you create in the compliance portal. However, rules created in the Exchange admin center take precedence. All Exchange mail flow rules are processed first, and then the DLP rules from the compliance portal are processed. -It means: +This means: -- Messages that are blocked by Exchange mail flow rules won't get scanned by DLP rules created in the Compliance portal.-- Messages that are quarantined by Exchange mail flow rules or any other filters run before DLP won't be scanned by DLP. -- If an Exchange mail flow rule modifies a message in a way that causes it to match a DLP policy in the Compliance portal, such as adding external users, then the DLP rules will detect it and enforce the policy as needed.+- Messages that are blocked by Exchange mail flow rules won't get scanned by DLP rules created in the compliance portal +- Messages that are quarantined by Exchange mail flow rules or any other filters run before DLP won't be scanned by DLP +- If an Exchange mail flow rule modifies a message in a way that causes it to match a DLP policy in the compliance portal, such as adding external users, then the DLP rules will detect it and enforce the policy as needed. -Also note that Exchange mail flow rules that use the "stop processing" action don't affect the processing of DLP rules in the Compliance portal - they'll still be processed. +Also note that Exchange mail flow rules that use the **stop processing** action don't affect the processing of DLP rules in the compliance portal - they'll still be processed. ## Policy tips in the Compliance portal vs. the Exchange admin center -Policy tips can work either with DLP policies and mail flow rules created in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>, or with DLP policies created in the Compliance portal, but not both. It is because these policies are stored in different locations, but policy tips can draw only from a single location. +Policy tips can work either with DLP policies and mail flow rules created in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a> or with DLP policies created in the compliance portal, but not both. The reason for this is that these policies are stored in different locations but policy tips can draw only from a single location. -If you've configured policy tips in the Exchange admin center, any policy tips that you configure in the Compliance portal won't appear to users in Outlook on the web, and Outlook 2013 and later until you turn off the tips in the Exchange admin center. This ensures that your current Exchange mail flow rules will continue to work until you choose to switch over to the Compliance portal. +If you've configured policy tips in the Exchange admin center, any policy tips that you configure in the compliance portal won't appear to users in Outlook on the web or Outlook 2013 and later until you turn off the tips in the Exchange admin center. This ensures that your current Exchange mail flow rules will continue to work until you choose to switch over to the compliance portal. >[!Note]->While policy tips can draw only from a single location, email notifications are always sent, even if you're using DLP policies in both the Compliance portal and the Exchange admin center. +>While policy tips can draw only from a single location, email notifications are always sent, even if you're using DLP policies in both the compliance portal and the Exchange admin center. |
compliance | Inactive Mailboxes In Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/inactive-mailboxes-in-office-365.md | f1.keywords: Previously updated : 03/06/2023 Last updated : 06/16/2023 audience: Admin For more information about the differences between eDiscovery holds and Microsof ## Inactive mailboxes and auto-expanding archives -An inactive mailbox that's configured with an auto-expanding archive can't be recovered or restored. In situations where it's necessary to recover data from an inactive mailbox with an auto-expanding archive, we recommended that you use the content search tool to export the data from the mailbox and then import to another mailbox. For step-by-step instructions to search an inactive mailbox and export the search results, see: +An inactive mailbox that's configured with an auto-expanding archive can't be recovered or restored. If, for compliance reasons, you need to recover data from an inactive mailbox with an auto-expanding archive, use content search to export the data from the mailbox. This action is supported for eDiscovery purposes only, and can't be used as a backup solution. For instructions to use content search for the recovery of data for eDiscovery, see following articles: - [Content search](ediscovery-content-search.md) |
compliance | Information Barriers Edit Segments Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-edit-segments-policies.md | After you have started applying information barriers policies, if you want to st ## Enable or disable user discoverability > [!IMPORTANT]-> Support for enabling or disabling search restrictions is only available when your organization isn't in *Legacy* mode. Organizations in *Legacy* mode cannot enable or disable search restrictions. Enabling or disabling search restrictions requires additional actions to change the information barriers mode for your organization. For more information, see [Use multi-segment support in information barriers)](information-barriers-multi-segment.md) for details.<br><br> Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).. +> Support for enabling or disabling search restrictions is only available when your organization isn't in *Legacy* mode. Organizations in *Legacy* mode cannot enable or disable search restrictions. Enabling or disabling search restrictions requires additional actions to change the information barriers mode for your organization. For more information, see [Use multi-segment support in information barriers)](information-barriers-multi-segment.md) for details.<br><br> Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers). To enable the people picker search restriction using PowerShell, complete the following steps: |
compliance | Information Barriers Sharepoint | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-sharepoint.md | When a site is associated with segment(s) and site's information barriers mode i ## Access control for IB modes -Access to sites by users is based on the IB mode of the site. +IB policy is enforced when opening the SharePoint site or content in the SharePoint site. This is based on the IB mode of the site. ### Open mode For a user to access a SharePoint site that has no segment and site's information barriers mode is set to *Open*: -- The user has site access permissions..+- The user has site access permissions. ### Owner Moderated mode To enable Microsoft 365 group-membership based access and sharing control for al Set-SPOTenant -IBImplicitGroupBased $true ``` ->[!NOTE] ->If you have Microsoft 365 Multi-Geo, you must run this command for each of your geo-locations. - If you installed a previous version of the SharePoint Online Management Shell, complete the following steps: 1. Go to **Add or remove programs** and uninstall *SharePoint Online Management Shell*. Learn more about managing [Microsoft Teams connected teams sites](/sharepoint/te Users will see search results from: -- Sites that have an associated segment that matches the user's segment and the user has access permission to the site.-- Sites that don't have associated segments if they have access to the site.+- **Segment associated sites**: When the site's segment matches the user's segment and the user has site access permission. For example, a site with *Explicit* mode. +- **Non-segmented sites**: When the user has existing access to the content or site. For example, sites with *Open*, *Owner Moderated* or *Implicit* mode. When the user selects the search result to open the content in the site, the user is denied access if they don't match the site's IB policy. ## Effects of changes to user segments |
compliance | Named Entities Use | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-use.md | f1.keywords: Previously updated : 04/25/2023 Last updated : 06/02/2023 audience: Admin search.appverid: MET150 You can use named entity SITs and enhanced policies to detect and protect sensit - SharePoint sites - OneDrive accounts - Teams chat and channel messages-- Devices (Windows 10, and 11 endpoint devices)+- Devices (Windows 10/11 endpoint devices) - Exchange mailboxes - Microsoft Defender for Cloud Apps Named entity SITs and enhanced policies are not supported for: ## Create and edit enhanced policies -To create or edit a DLP policy, use the procedures in [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md)). +To create or edit a DLP policy, use the procedures in [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md). ## Workloads and services that support named entities Here are some practices you can use when you create or edit a policy that uses a - Use low instance counts (three to five) when you're looking for data that's in a spreadsheet and the keyword that's required by the SIT for that data is only in the column header. For example, let's say you're looking for US Social Security numbers, and the keyword `Social Security Number` only occurs in the column header. Since the values (the corroborative evidence) is in the cells below, it's likely that only the first few instances would be in close enough proximity to the keyword to be detected. -- If you are using a named entity SIT, like All Full Names, to help find US Social Security numbers, use larger instance counts such as 10 or 50. Then when both the person names and the SSNs are detected together, you're more likely to get true positives.+- If you are using a named entity SIT, like All Full Names, to help find US Social Security numbers, use larger instance counts such as 10 or 50. Then, when both the person names and the SSNs are detected together, you're more likely to get true positives. -- You can use [Auto-labeling simulations](apply-sensitivity-label-automatically.md#learn-about-simulation-mode) to test the accuracy of named entity SITs. Run a simulation using a named entity SIT to see what items match the policy. With this information you can fine tune accuracy by adjusting the instance counts and confidence levels in your custom policies or the enhanced template conditions. You can iterate simulations until the accuracy is where you want it, before deploying a DLP or auto-labeling policy containing named entities in production. Here's an overview of the flow:+- You can use [Auto-labeling simulations](apply-sensitivity-label-automatically.md#learn-about-simulation-mode) to test the accuracy of named entity SITs. Run a simulation using a named entity SIT to see what items match the policy. With this information, you can fine tune accuracy by adjusting the instance counts and confidence levels in your custom policies or the enhanced template conditions. You can iterate simulations until the accuracy is where you want it before deploying a DLP or auto-labeling policy containing named entities in production. Here's an overview of the flow: -1. Identify the SIT or combination of SITs you want to test in simulation mode, either custom or cloned and edited. -1. Identify or create a sensitivity label to be applied when the auto-labeling policy finds a match in Exchange, SharePoint sites, or OneDrive accounts. +1. Identify the SIT or combination of SITs you want to test in simulation mode, either custom or cloned and edited +1. Identify or create a sensitivity label to be applied when the auto-labeling policy finds a match in Exchange, SharePoint sites, or OneDrive accounts 1. Create a sensitivity auto-labeling policy that uses the SIT from step 1 and with same Conditions and Exceptions that will be used in your DLP policy 1. Run the policy simulation 1. View the results 1. Tune the SIT or policy and the instance count and confidence levels to reduce false positives.-1. Repeat until you get the accuracy results you want. +1. Repeat until you get the accuracy results you want ## For further information |
compliance | Ocr Learn About | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ocr-learn-about.md | description: How to implement this preview of optical character recognition (OCR Optical character recognition (OCR) scanning enables Microsoft Purview to scan content in images for sensitive information. An optional feature, OCR scanning is first enabled at the tenant level. Once enabled, you select the locations where you want to scan images. Image scanning is available for Exchange, SharePoint, OneDrive, Teams, and Windows devices. Once the OCR settings are configured, your existing policies for data loss prevention (DLP), records management, and insider risk management (IRM) are applied to images and text-based content. For example, say that you've configured the DLP condition *content contains sensitive information* and included a data classifier such as the "Credit Card" sensitive information type (SIT). In this case, Microsoft Purview scans for credit card numbers in both text and images at all of the chosen locations. -> [!IMPORTANT] -> By default, Exchange and Teams can be configured for OCR. To enable OCR for SharePoint, OneDrive, and Devices, **[sign up here]( https://forms.office.com/r/vudjYnaUM6)**. - ## Workflow at a glance - | Phase | What's needed| |-|--| |**Phase 1:** Create Azure subscription if needed | If your organization doesn't already have an Azure pay-as-you-go subscription for your tenant, your Global admin needs to start by creating an [Azure account](/azure/cloud-adoption-framework/ready/azure-best-practices/initial-subscriptions). | |
compliance | Protect Documents That Have Fci Or Other Properties | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/protect-documents-that-have-fci-or-other-properties.md | f1.keywords: Previously updated : 09/17/2019 Last updated : 06/02/2023 audience: Admin f1_keywords: Microsoft Purview Data Loss Prevention (DLP) policies can use classification pro  -For example, your organization might use Windows Server FCI to identify items with personal data such as social security numbers, and then classify the document by setting the **Personally Identifiable Information** property to **High**, **Moderate**, **Low**, **Public**, or **Not PII** based on the type and number of occurrences of personal data found in the document. +For example, your organization might use Windows Server FCI to identify items with personal data, such as social security numbers, and then classify those documents by setting the **Personally Identifiable Information** property to **High**, **Moderate**, **Low**, **Public**, or **Not PII** based on the type and number of occurrences of personal data found in each document. -In Microsoft 365, you can create a DLP policy that identifies documents that have that property set to specific values, such as **High** and **Medium**, and then takes an action such as blocking access to those files. The same policy can have another rule that takes a different action if the property is set to **Low**, such as sending an email notification. In this way, DLP integrates with Windows Server FCI and can help protect Office documents uploaded or shared to Microsoft 365 from Windows Server-based file servers. +In Microsoft 365, you can create a DLP policy that identifies documents that have that property set to specific values, such as **High** and **Medium**, and then takes an action such as blocking access to those files. The same policy can have another rule that takes a different action if the property is set to **Low**, such as sending an email notification. This way, DLP integrates with Windows Server FCI and can help protect Office documents uploaded or shared to Microsoft 365 from Windows Server-based file servers. A DLP policy simply looks for a specific property name/value pair. Any document property can be used, as long as the property has a corresponding managed property for SharePoint search. For example, a SharePoint site collection might use a content type named **Trip Report** with a required field named **Customer**. Whenever a person creates a trip report, they must enter the customer name. This property name/value pair can also be used in a DLP policyΓÇöfor example, if you want a rule that blocks access to the document for guests when the **Customer** field contains **Contoso**. -If you want to apply your DLP policy to content with specific Microsoft 365 labels, you should not follow the steps here. Instead, refer to l[Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md#create-and-deploy-data-loss-prevention-policies). +If you want to apply your DLP policy to content with specific Microsoft 365 labels, don't follow the steps here. Instead, refer to l[Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md#create-and-deploy-data-loss-prevention-policies). [!INCLUDE [purview-preview](../includes/purview-preview.md)] If you want to apply your DLP policy to content with specific Microsoft 365 labe Before you can use a Windows Server FCI property or other property in a DLP policy, you need to create a managed property in the <a href="https://go.microsoft.com/fwlink/?linkid=2185219" target="_blank">SharePoint admin center</a>. Here's why. -In SharePoint Online and OneDrive for Business, the search index is built up by crawling the content on your sites. The crawler picks up content and metadata from the documents in the form of crawled properties. The search schema helps the crawler decide what content and metadata to pick up. Examples of metadata are the author and the title of a document. However, to get the content and metadata from the documents into the search index, the crawled properties must be mapped to managed properties. Only managed properties are kept in the index. For example, a crawled property related to author is mapped to a managed property related to author. +In SharePoint and OneDrive, the search index is built up by crawling the content on your sites. The crawler picks up content and metadata from the documents in the form of crawled properties. The search schema helps the crawler decide what content and metadata to pick up. (Examples of metadata are the author and the title of a document.) However, to get the content and metadata from the documents into the search index, the crawled properties must be mapped to managed properties. Only managed properties are kept in the index. For example, a crawled property related to author is mapped to a managed property related to author. > [!NOTE]-> Be sure to use a managed property name and not a crawled property name when creating DLP rules using the `ContentPropertyContainsWords` condition. --This is important because DLP uses the search crawler to identify and classify sensitive information on your sites, and then store that sensitive information in a secure portion of the search index. When you upload a document to Office 365, SharePoint automatically creates crawled properties based on the document properties. But to use an FCI or other property in a DLP policy, that crawled property needs to be mapped to a managed property so that content with that property is kept in the index. +> Be sure to use a managed property name, not a crawled property name, when creating DLP rules using the `ContentPropertyContainsWords` condition. This is important because DLP uses the search crawler to identify and classify sensitive information on your sites, and then stores that sensitive information in a secure portion of the search index. When you upload a document to Office 365, SharePoint automatically creates crawled properties based on the document properties. However, to use an FCI or other property in a DLP policy, that crawled property needs to be mapped to a managed property so that the content with that property is kept in the index. For more information on search and managed properties, see [Manage the search schema in SharePoint Online](/sharepoint/manage-search-schema). ### Step 1: Upload a document with the needed property to Office 365 -You first need to upload a document with the property that you want to reference in your DLP policy. Microsoft 365 will detect the property and automatically create a crawled property from it. In the next step, you'll create a managed property, and then map the managed property to this crawled property. +First, you need to upload a document with the property that you want to reference in your DLP policy. Microsoft 365 will detect the property and automatically create a crawled property from it. In the next step, you'll create a managed property, and then map the managed property to this crawled property. ### Step 2: Create a managed property 1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. -2. In the left navigation, choose **Admin centers** \> **SharePoint**. You're now in the <a href="https://go.microsoft.com/fwlink/?linkid=2185219" target="_blank">SharePoint admin center</a>. +2. In the left navigation pane, choose **Admin centers** \> **SharePoint**. You're now in the <a href="https://go.microsoft.com/fwlink/?linkid=2185219" target="_blank">SharePoint admin center</a>. -3. In the left navigation, choose **search** \> on the **search administration** page \> **Manage Search Schema**. +3. In the left navigation pane, choose **search**. On the **search administration** page, choose **Manage Search Schema**.  You first need to upload a document with the property that you want to reference 7. Under **Main characteristics**, select **Queryable** and **Retrievable**. -8. Under **Mappings to crawled properties** \> **Add a mapping**. +8. Under **Mappings to crawled properties** choose **Add a mapping**. -9. In the **crawled property selection** dialog box \> find and select the crawled property that corresponds to the Windows Server FCI property or other property that you will use in your DLP policy \> **OK**. +9. In the **crawled property selection** dialog box, find and select the crawled property that corresponds to the Windows Server FCI property or other property that you will use in your DLP policy, then choose **OK**.  -10. At the bottom of the page \> **OK**. +10. At the bottom of the page choose **OK**. ## Create a DLP policy that uses an FCI property or other property In this example, an organization is using FCI on its Windows Server-based file servers; specifically, they're using the FCI classification property named **Personally Identifiable Information** with possible values of **High**, **Moderate**, **Low**, **Public**, and **Not PII**. Now they want to use their existing FCI classification in their DLP policies in Office 365. -First, they follow the steps above to create a managed property in SharePoint Online, which maps to the crawled property created automatically from the FCI property. +To begin, they follow the steps above to create a managed property in SharePoint Online, which maps to the crawled property created automatically from the FCI property. Next, they create a DLP policy with two rules that both use the condition **Document properties contain any of these values**: Next, they create a DLP policy with two rules that both use the condition **Docu - **FCI PII content - Low** The second rule sends a notification to the document owner if the FCI classification property **Personally Identifiable Information** equals **Low** and the document is shared with people outside the organization. -### Create the DLP policy by using Security & Compliance PowerShell +<!-- ### Create the DLP policy by using Security & Compliance PowerShell The condition **Document properties contain any of these values** is temporarily not available in the Microsoft Purview compliance portal, but you can still use this condition in Security & Compliance PowerShell. You can use the `New\Set\Get-DlpCompliancePolicy` cmdlets to work with a DLP policy, and use the `New\Set\Get-DlpComplianceRule` cmdlets with the `ContentPropertyContainsWords` parameter to add the condition **Document properties contain any of these values**. One rule blocks access to content where the **Personally Identifiable Informatio  +--> + ## After you create the DLP policy -Doing the steps in the previous sections will create a DLP policy that will quickly detect content with that property, but only if that content is newly uploaded (so that the content's indexed), or if that content is old but just edited (so that the content's re-indexed). +Completing the steps in the previous sections creates a DLP policy that will quickly detect content with that property, but only if that content is newly uploaded (so that the content's indexed), or if that content is old but just edited (so that the content's re-indexed). -To detect content with that property everywhere, you may want to manually request that your library, site, or site collection be re-indexed, so that the DLP policy is aware of all the content with that property. In SharePoint Online, content is automatically crawled when content is edited. Specific SharePoint sites can't be manually re-indexed. +To detect content with that property everywhere, you'll need to have your library, site, or site collection re-indexed, so that the DLP policy is aware of all the content with that property. In SharePoint, content is automatically crawled when content is edited. Specific SharePoint sites can't be manually re-indexed. > [!CAUTION] > Re-indexing a site for DLP scenarios is not possible. |
compliance | Sensitivity Labels Versions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md | The numbers listed are the minimum Office application versions required for each |[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) |Current Channel: 2302+<br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Preview: [Beta](https://support.google.com/googleplay/work/answer/7042126) |Under review | |[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Preview: [Current Channel (Preview)](https://office.com/insider) <sup>\*</sup> |Under review |Preview: [Beta](https://support.google.com/googleplay/work/answer/7042126) |Under review | |[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |-|[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2303+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Rolling out: 16.70+ <sup>\*</sup> | Rolling out: 4.2309+ |Rolling out: 4.2309+ |Yes | -|[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup)|Preview: [Current Channel (Preview)](https://office.com/insider) |Under review |Under review |Under review |Under review | -|[Label inheritance from email attachments](sensitivity-labels-office-apps.md#configure-label-inheritance-from-email-attachments) |Current Channel: 2303+ <br /><br> Monthly Enterprise Channel: 2304+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | +|[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Rolling out: 16.70+ <sup>\*</sup> | Rolling out: 4.2309+ |Rolling out: 4.2309+ |Yes | +|[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup)|Current Channel: 2305+ <br /><br> Monthly Enterprise Channel: 2307+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | +|[Label inheritance from email attachments](sensitivity-labels-office-apps.md#configure-label-inheritance-from-email-attachments) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Double Key Encryption (DKE)](encryption-sensitivity-labels.md#double-key-encryption) |Preview: [Current Channel (Preview)](https://office.com/insider) |Under review |Under review |Under review| Under review | **Footnotes:** |
compliance | Sit Common Scenarios | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-common-scenarios.md | This article describes how to implement some common sensitive information type ( ## Protect credit card numbers -Contoso Bank needs to classify the credit card numbers that they issue as sensitive. Their credit cards start with a set of six-digit patterns. They would like to customize the out of the box credit card definition to only detect the credit card numbers starting with their six-digit patterns. +Contoso Bank needs to classify the credit card numbers that they issue as sensitive. Their credit cards start with a set of six-digit patterns. They would like to customize the out-of-the-box credit card definition to detect only those credit card numbers starting with their six-digit patterns. **Suggested solution** 1. Create a copy of the credit card SIT. Use the steps to [copy and modify a sensitive information type](create-a-custom-sensitive-information-type.md#copy-and-modify-a-sensitive-information-type) to copy the credit card SIT. 1. Edit the high confidence pattern. Follow the steps in [edit or delete the sensitive information type pattern](sit-get-started-exact-data-match-create-rule-package.md#edit-or-delete-the-sensitive-information-type-pattern).-1. Add 'starts with' check and add the list of bin digit (formatted & unformatted). For example to ensure that the SIT only considers credit cards starting with 411111 & 433512 should be considered valid, add the following to the list 4111 11, 4111-11, 411111, 4335 12, 4335-12, 433512. +1. Add teh **starts with** check and add the list of pattern digits (formatted & unformatted). For example to ensure that the SIT only considers credit cards starting with 411111 & 433512 should be considered valid, add the following to the list 4111 11, 4111-11, 411111, 4335 12, 4335-12, 433512. 1. Repeat step 2 & 3 for the low confidence pattern. ## Test numbers similar to Social Security numbers -Contoso has identified a few nine-digit test numbers that trigger false positive matches in the Social Security Number (SSN) Microsoft Purview data loss prevention (DLP) policy. They would like to exclude these numbers from the list of valid matches for SSN. +Contoso has identified a few nine-digit test numbers that trigger false positive matches in the Social Security Number (SSN) Microsoft Purview data loss prevention (DLP) policy. They would like to exclude these numbers from the list of valid matches SSN matches. **Suggested solution** 1. Create a copy of the SSN SIT. Use the steps to [copy and modify a sensitive information type](create-a-custom-sensitive-information-type.md#copy-and-modify-a-sensitive-information-type) to copy the SSN SIT. 1. Edit the high confidence pattern. Follow the steps in [edit or delete the sensitive information type pattern](sit-get-started-exact-data-match-create-rule-package.md#edit-or-delete-the-sensitive-information-type-pattern).-1. Add the numbers you want to exclude in the 'exclude specific values' additional check. For example, to exclude 239-23-532 & 23923532, just adding 23923532 is sufficient. +1. Add the numbers you want to exclude in the **exclude specific values** additional check. For example, to exclude 239-23-532 & 23923532, just adding 23923532 is sufficient. 1. Repeat step 2 & 3 for other confidence patterns as well ## Phone numbers in signature trigger match -Australia based Contoso finds that phone numbers in email signatures are triggering a match for their Australia company number DLP policy. +Australia-based Contoso finds that phone numbers in email signatures are triggering a match for their Australia company number DLP policy. **Suggested solution** -Add a 'not' group in supporting elements using a keyword list containing commonly used keywords in signature of email like ΓÇ£PhoneΓÇ¥, ΓÇ£MobileΓÇ¥, ΓÇ£emailΓÇ¥, ΓÇ£Thanks and regardsΓÇ¥ etc. Keep the proximity of this keyword list to a smaller value like 50 characters for better accuracy. For more information, see [Get started with custom sensitive information types](create-a-custom-sensitive-information-type.md). +Add a 'NOT' group in supporting elements using a keyword list containing commonly used keywords in email signatures, such as ΓÇ£PhoneΓÇ¥, ΓÇ£MobileΓÇ¥, ΓÇ£emailΓÇ¥, ΓÇ£Thanks and regardsΓÇ¥ etc. Keep the proximity of this keyword list to a smaller value (for instance, 50 characters) for better accuracy. For more information, see [Get started with custom sensitive information types](create-a-custom-sensitive-information-type.md). ## Unable to trigger ABA routing policy Create a copy of the built-in SIT and edit it to change the proximity of the key ## Unable to detect credit card numbers with unusual delimiters -Contoso Bank has noticed some of their employees share credit card numbers with ΓÇÿ/ΓÇÖ as a delimiter, for example 4111/1111/1111/1111, which the out-of-the-box credit card definition doesn't detect. Contoso would like to define their own regex and validate it using LuhnCheck. +Contoso Bank has noticed some of their employees share credit card numbers with ΓÇÿ/ΓÇÖ as a delimiter, for example, 4111/1111/1111/1111, which the out-of-the-box credit card definition doesn't detect. Contoso would like to define their own regex and validate it using LuhnCheck. **Suggested solution** -1. Create a copy of the Credit card SIT using the steps in [Customize a built-in sensitive information type](customize-a-built-in-sensitive-information-type.md). +1. Create a copy of the credit card SIT using the steps in [Customize a built-in sensitive information type](customize-a-built-in-sensitive-information-type.md) 1. Add a new pattern-1. In the primary element, select regular expression -1. Define the regular expression that includes ΓÇÿ/ΓÇÖ as part of the regular expression and then choose validator and select luhncheck or func_credit_card to ensure the regex also passes the LuhnCheck. +1. In the primary element, select **regular expression** +1. Define the regular expression that includes ΓÇÿ/ΓÇÖ as part of the regular expression; choose **validator** and then select **luhncheck** or **func_credit_card** to ensure the regex also passes the LuhnCheck. ## Ignore a disclaimer notice -Many organizations add legal disclaimers, disclosure statements, signatures, etc., or other information to the top or bottom of email messages that enter or leave their organizations. In some cases, emails sent within an organization itself can contain such text. For example, employees may add signatures with motivational quotes, social messages, and so on. A disclaimer or signature can contain the terms that are present in the lexicon of a CC and may generate many false positives. +Many organizations add legal disclaimers, disclosure statements, signatures, or other information to the top or bottom of email messages that enter or leave their organizations. In some cases, emails sent within an organization itself can contain such text. For example, employees may add signatures with motivational quotes, social messages, and so on. A disclaimer or signature can contain the terms that are present in the lexicon of a CC and may generate many false positives. For example, a typical disclaimer might contain words like *sensitive*, or *confidential* and a policy looking for sensitive info will detect it as an incident, leading to lot of false positives. Thus providing customers with an option to ignore disclaimers can reduce the number of false positives and increase the efficiency of the compliance team. For example, a typical disclaimer might contain words like *sensitive*, or *conf Consider the following disclaimer: -IMPORTANT NOTICE: This e-mail message is intended to be received only by persons entitled to receive the confidential information it may contain. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient of it. If you have received this message in error, please forward it to the sender and delete it completely from your computer system. +"IMPORTANT NOTICE: This e-mail message is intended to be received only by persons entitled to receive the confidential information it may contain. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient. If you have received this message in error, please forward it to the sender and delete it completely from your computer system." If the SIT is configured to detect *confidential* as a keyword, the pattern will invoke a match every time an email includes the disclaimer, leading to considerable number of false positives. One way to ignore the instances of keywords in the disclaimer is by excluding th Consider this disclaimer: -IMPORTANT NOTICE: This e-mail message is intended to be received only by persons *entitled to receive the* confidential **information it may contain**. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient of it. If you have received this message in error, please forward it to the sender and delete it completely from your computer system. +"IMPORTANT NOTICE: This e-mail message is intended to be received only by persons *entitled to receive the* confidential **information it may contain**. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient. If you have received this message in error, please forward it to the sender and delete it completely from your computer system." Say we have two instances of the keyword *confidential*. If we configure the SIT to ignore instances of this keyword that are preceded by prefixes (italicized in the example) and followed by suffixes (bolded in the example), then we can successfully ignore disclaimers in most cases. Another way to add a list of supporting elements (instances in disclaimer) that Consider this disclaimer: -IMPORTANT NOTICE: This e-mail message is intended to be received only by persons entitled to receive the confidential information it may contain. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient of it. If you have received this message in error, please forward it to the sender and delete it completely from your computer system. +"IMPORTANT NOTICE: This e-mail message is intended to be received only by persons entitled to receive the confidential information it may contain. E-mail messages to clients of Contoso may contain information that is confidential and legally privileged. Please do not read, copy, forward, or store this message unless you are an intended recipient. If you have received this message in error, please forward it to the sender and delete it completely from your computer system." -We have two instances of the keyword ΓÇ£confidentialΓÇ¥ in this example. If we configure the SIT to ignore instances of this keyword in the disclaimer (underlined as red), we can achieve ignoring disclaimers in most of the cases. +We have two instances of the keyword ΓÇ£confidentialΓÇ¥ in this example. If we configure the SIT to ignore instances of this keyword in the disclaimer (underlined as red in the following image), we can achieve ignoring disclaimers in most of the cases. :::image type="content" source="../media/sit-scenario-edit-pattern.png" alt-text="You can add more conditions to the pattern to exclude additional instances in the disclaimer."::: |
compliance | Sit Edm Notifications Activities | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-edm-notifications-activities.md | |
compliance | Sit Manage Custom Sits Compliance Center | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-manage-custom-sits-compliance-center.md | This article walks you through the steps to modify and remove an existing custom ## Modify custom sensitive information types in the compliance portal -1. In the Compliance Center, go to **Data classification** \> **Classifiers** \> **Sensitive info types** and choose the sensitive information type from the list that you want to modify. Choose **Edit**. +1. In the compliance portal, go to **Data classification** \> **Classifiers** \> **Sensitive info types** and choose the sensitive information type from the list that you want to modify. Choose **Edit**. 2. You can add other patterns, with unique primary and supporting elements, confidence levels, character proximity, and [**additional checks**](sit-regex-validators-additional-checks.md#sensitive-information-type-additional-checks) or edit/remove the existing ones. This article walks you through the steps to modify and remove an existing custom > [!IMPORTANT] > Before your remove a custom sensitive information type, verify that no DLP policies or Exchange mail flow rules (also known as *transport rules*) still reference the sensitive information type. -1. In the Compliance Center, go to **Data classification** \> **Classifiers** \>**Sensitive info types** and choose the sensitive information type that you want to remove from the list. +1. In the compliance portal, go to **Data classification** \> **Classifiers** \>**Sensitive info types** and choose the sensitive information type that you want to remove from the list. 2. On the detail page for the selected sensitive information type, choose **Delete**. |
compliance | Sit Modify A Custom Sensitive Information Type In Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-a-custom-sensitive-information-type-in-powershell.md | f1.keywords: Previously updated : 07/06/2021 Last updated : 06/02/2023 audience: Admin To connect to Security & Compliance PowerShell, see [Security & Compliance Power ``` > [!NOTE]- > The built-in rule package that contains the built-in sensitive information types is named Microsoft Rule Package. The rule package that contains the custom sensitive information types that you created in the Compliance center UI is named Microsoft.SCCManaged.CustomRulePack. + > The built-in rule package that contains the built-in sensitive information types is named *Microsoft Rule Package*. The rule package that contains the custom sensitive information types that you created in the Compliance center UI is named *Microsoft.SCCManaged.CustomRulePack*. 2. Use the [Get-DlpSensitiveInformationTypeRulePackage](/powershell/module/exchange/get-dlpsensitiveinformationtyperulepackage) cmdlet to store the custom rule package to a variable: |
compliance | Sit Modify Edm Schema Configurable Match | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-edm-schema-configurable-match.md | Exact Data Match (EDM) based classification enables you to create custom sensiti 2. Download the appropriate **EdmUploadAgent.exe** file for your subscription using the links below: - [Commercial + GCC](https://go.microsoft.com/fwlink/?linkid=2088639) - most commercial customers should use this- - [GCC-High](https://go.microsoft.com/fwlink/?linkid=2137521) - This is specifically for high security government cloud subscribers + - [GCC-High](https://go.microsoft.com/fwlink/?linkid=2137521) - This is specifically for high-security government cloud subscribers - [DoD](https://go.microsoft.com/fwlink/?linkid=2137807) - this is specifically for United States Department of Defense cloud customers 3. Authorize the EDM Upload Agent, open a Command Prompt window (as an administrator) and run the following command: Exact Data Match (EDM) based classification enables you to create custom sensiti 5. Customize the schema so each column utilizes ΓÇ£caseInsensitiveΓÇ¥ and / or ΓÇ£ignoredDelimitersΓÇ¥. The default value for ΓÇ£caseInsensitiveΓÇ¥ is ΓÇ£falseΓÇ¥ and for ΓÇ£ignoredDelimitersΓÇ¥, it is an empty string. > [!NOTE]- > The underlying custom sensitive information type or built-in sensitive information type used to detect the general regex pattern must support detection of the input variations listed with ignoredDelimiters. For example, the built-in U.S. social security number (SSN) sensitive information type can detect variations in the data that include dashes, spaces, or lack of spaces between the grouped numbers that make up the SSN. As a result, the only delimiters that are relevant to include in EDMΓÇÖs ignoredDelimiters for SSN data are: dash and space. + > The underlying custom sensitive information type or built-in sensitive information type used to detect the general regex pattern must support detection of the input variations listed with ignoredDelimiters. For example, the built-in U.S. Social Security Number (SSN) sensitive information type can detect variations in the data that include dashes, spaces, or lack of spaces between the grouped numbers that make up the SSN. As a result, the only delimiters that are relevant to include in EDMΓÇÖs **ignoredDelimiters** for SSN data are: dash and space. Here is a sample schema that simulates case-insensitive matching by creating the extra columns needed to recognize case variations in the sensitive data. |
compliance | Sit Modify Keyword Dictionary | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-keyword-dictionary.md | You might need to modify keywords in one of your keyword dictionaries, or modify ## Modify a keyword dictionary in Compliance center -Keyword dictionaries can be used as `Primary elements` or `Supporting elements` in sensitive information type (SIT) patterns. You can edit a keyword dictionary while creating a SIT or in an existing SIT. For example to edit an existing keyword dictionary: +Keyword dictionaries can be used as **Primary elements** or **Supporting elements** in sensitive information type (SIT) patterns. You can edit a keyword dictionary while creating a SIT or in an existing SIT. For example to edit an existing keyword dictionary: 1. Open the pattern that has the keyword dictionary you want to update. 2. Find the keyword dictionary you want to update and choose edit. Keyword dictionaries can be used as `Primary elements` or `Supporting elements`  -4. Choose `Done`. +4. Choose **Done**. ## Modify a keyword dictionary using PowerShell |
compliance | Sit Regex Validators Additional Checks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-regex-validators-additional-checks.md | |
compliance | Sit Remove A Custom Sensitive Information Type In Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-remove-a-custom-sensitive-information-type-in-powershell.md | f1.keywords: Previously updated : 07/06/2021 Last updated : 06/02/2023 audience: Admin |
compliance | Sit Use Exact Data Manage Schema | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-use-exact-data-manage-schema.md | If you want to make changes to your EDM schema, for example the **edm.xml** file > [!TIP] > You can change your EDM schema and sensitive information table source file to take advantage of **configurable match**. When configured, EDM will ignore case differences and some delimiters when it evaluates an item. This makes defining your xml schema and your sensitive data files easier. To learn more see, [Using the caseInsensitive and ignoredDelimiters fields](sit-get-started-exact-data-match-create-schema.md#using-the-caseinsensitive-and-ignoreddelimiters-fields). -1. Edit your **edm.xml** file (this is the file discussed in the [Create the schema for exact data match based sensitive information types](sit-get-started-exact-data-match-create-schema.md#create-the-schema-for-exact-data-match-based-sensitive-information-types). +1. Edit your **edm.xml** file (this file is discussed in the [Create the schema for exact data match based sensitive information types](sit-get-started-exact-data-match-create-schema.md#create-the-schema-for-exact-data-match-based-sensitive-information-types). 2. [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell). If you want to make changes to your EDM schema, for example the **edm.xml** file Set-DlpEdmSchema -FileData ([System.IO.File]::ReadAllBytes('.\\edm.xml')) -Confirm:$true ``` - You will be prompted to confirm, as follows: + You're prompted to confirm as follows: > Confirm > If you want to remove the schema you're using for EDM-based classification, foll Remove-DlpEdmSchema -Identity 'patientrecords' ``` - You will be prompted to confirm: + You're prompted to confirm the following message: > Confirm > If you want to remove the schema you're using for EDM-based classification, foll ### Edit or delete the EDM schema with the wizard -1. Open **Compliance center** \> **Data classification** \> **Exact data matches**. +1. Open **Compliance center** \> **Data classification** \> **Classifiers**. -2. Choose **EDM schemas**. +2. Choose **EDM classifiers**. + +3. Double-click on the EDM SIT you want to edit. -3. Choose the EDM SIT you want to edit. --4. Choose **Edit EDM schema** or **Delete EDM schema** from the flyout. +4. Choose **Edit EDM sensitive info type** or **Delete EDM sensitive info type** from the flyout. + +5. Follow the steps in the wizard to complete your edits or to delete the classifier. > [!IMPORTANT] > If you want to remove a schema, and it is already associated with an EDM sensitive info type, you must first delete the EDM sensitive info type, then you can delete the schema. |
compliance | Sit Use Exact Data Refresh Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-use-exact-data-refresh-data.md | |
security | Device Health Microsoft Defender Antivirus Health | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health.md | +> For devices to appear in Microsoft Defender Antivirus device health reports they must meet the following pre-requisites: +> +> - Device is onboarded to Microsoft Defender for Endpoint +> - OS: Windows 10, Windows 11, Windows Server 2012 R2/, 2016 R2/ 2019/2022 (non MMA), MacOS, Linux +> - Sense (MsSense.exe): **10.8210.** \*+. See [Prerequisites](#prerequisites) section for related details. +> > For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution). In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**. The [**Microsoft Defender Antivirus health** tab](#microsoft-defender-antivirus-health-tab) has eight cards that report on the following aspects of Microsoft Defender Antivirus: Up-to-date reporting generates information for devices that meet the following c - Engine version: 1.1.19300.2+ - Platform version: 4.18.2202.1+ - Cloud protection enabled-- MsSense.exe version 10.8210.x or later+- Sense (MsSense.exe): **10.8210.** \*+ΓÇ» - Windows OS - Windows 10 1809 or later > [!NOTE]- > Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "No data available"/Unknown. + > \* Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "No data available"/Unknown. :::image type="content" source="images/device-health-defender-antivirus-health-tab.png" alt-text="Shows the Microsoft Defender Antivirus Health tab." lightbox="images/device-health-defender-antivirus-health-tab.png"::: |
security | Run Analyzer Macos Linux | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux.md | f1.keywords: ms.localizationpriority: medium Previously updated : 01/18/2023 Last updated : 06/15/2023 audience: ITPro There are two ways to run the client analyzer tool: 1. Using a binary version (no Python dependency) 2. Using a Python-based solution + ## Running the binary version of the client analyzer 1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the macOS or Linux machine you need to investigate.\ When using a terminal, unzip the file using one of the following commands based > [!NOTE] >-> - The analyzer depends on few extra pip packages(sh, distro, lxml, pandas) to produce the result output. If not installed, the analyzer will try to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml). +> - The analyzer depends on few extra PIP packages (sh, distro, lxml, pandas) which are installed in the OS when in root to produce the result output. If not installed, the analyzer will try to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml). +> +> >[!WARNING] +> >Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment. > > - In addition, the tool currently requires Python version 3 or later to be installed. > |
security | Alert Grading Playbook Email Forwarding | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md | Select **Activity** to view the details of that activity in the sidebar. Here's :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-details.png" alt-text="Details of the activity" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-details.png"::: -The **Reason** field contains the following information related to this alert. --- Forwarding Type (FT) is one of the following:- - Exchange Transport Rule (ETR): Forwarded using and Exchange Transport Rule - - SMTP: Forwarded using Mailbox Forwarding - - InboxRule: Forwarded using an Inbox Rule --- Message Trace ID (MTI): This is the identifier (NetworkMessageId) of the forwarded email that triggered this alert. NetworkMessageId is the unique identifier of an email in your organization.-- Forwarder (F): The user who forwarded this email.-- Suspicious Recipient List (SRL): The list of recipients considered suspicious in this email.-- Recipient List (RL): The list of all the recipients in this email.- ## Investigation workflow While investigating this alert, you must determine: |
security | Attack Simulation Training Teams | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-teams.md | In addition to having user reporting for Teams messages turned on as described i To configure the accounts, do the following steps: -1. Identify or create a user who's a member of the [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator), [Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator), or [Attack Simulation Administrator](/azure/active-directory/roles/permissions-reference#attack-simulation-administrator) roles in Azure Active Directory. You need to know the password. +1. Identify or create a user who's a member of the [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator), [Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator), or [Attack Simulation Administrator](/azure/active-directory/roles/permissions-reference#attack-simulation-administrator) roles in Azure Active Directory. Assign a Microsoft 365, Office 365, Microsoft Teams Essentials, Microsoft 365 Business Basic, or a Microsoft 365 Business Standard license for [Microsoft Teams](/office365/servicedescriptions/teams-service-description). You need to know the password. 2. Using the account from Step 1, open the Microsoft 365 Defender portal at <https://security.microsoft.com> and go to **Email & collaboration** \> **Attack simulation training** \> **Settings** tab. Or, to go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>. 3. On the **Settings** tab, select **Manager user accounts** in the **Teams simulation configuration** section. 4. In the **Teams simulation configuration** flyout that opens, select **Generate token**. Read the information in the confirmation dialog, and then select **I agree**. |