This module acts as an additional resource, offering important notes and a quick guide through the Purview portal. To gain a better understanding, you should complete this module before starting the official 4-module course.
Microsoft Purview
Microsoft Purviewis adata governance andcompliancesolution designed to help organizationsmanageandsecuretheir data across various platforms.- It offers capabilities such as data
cataloging, dataclassification, and risk management to ensure data compliance and protection. By providing aunified viewof data assets, it helps organizations maintain control over their data landscape. - Data
catalogingislistingand describing data - Data
classificationissortingdata by sensitivity or importance.
Data Loss Prevention (DLP) Alerts
- Purpose:
Notifywhensensitiveinformation isdetectedor whenDLP policies are violated. - Sources: Microsoft
Purview Complianceor Microsoft Defender forCloud Apps. - if we deploy in one the other will also be deployed in
- Usage:
- Identify and investigate
data loss incidents. - Monitor and
enforcecompliancewithDLP policies. Educateusers about DLP policies and help themstay compliant.- Management:
Viewandmanagealerts in MicrosoftPurviewcompliance portal or Microsoft Defender forCloud Appsportal. - Features:
- Alerts can be
filteredandsorted. - Valuable for security operations analysts to
protect sensitive informationand comply with regulations.
Definition and Components
DLP Component | Description |
Sensitive Information Types | DLP policies identify and protect sensitive information by matching it to predefined or custom types, like credit card numbers, social security numbers, and health records. |
Sensitivity Labels | Sensitivity labels classify documents for more granular protection. For instance, "Confidential" documents may have different restrictions than "Public" ones. |
Data Loss Prevention Policies | DLP policies define the rules for protecting sensitive information, such as blocking users from sharing such data with external parties. |
Defender for Cloud App File Policy | File policies monitor and protect sensitive information in cloud apps, such as alerting when a user attempts to share sensitive documents with public cloud storage. |
Insider Risk Management
Insider Risk Managementin Microsoft helpsdetect,investigate, andrespondto potentialrisksfrom within an organization, such asdata leaksorpolicy violations. It uses advanced analytics and machine learning to identify unusual behaviors and mitigate insider threats.- Example Policy:
Departing employee data theft. - Policy Settings:
- Privacy:
Anonymize usernames. - Indicators:
Sharingfiles fromSharePointOnline, downloading content, copying toUSBor cloud,printingdocuments.
Manage Insider Risk In Microsoft Purview
Feature | Description |
Policy Templates | Pre-defined templates for insider risk management policies, such as Departing Employee Data Theft and Data Leaks. |
Policy Settings | Settings that apply to all policies, including privacy, indicators, monitoring windows, and intelligent detections. |
Policy Timeframes | Review periods triggered after policy matches based on events and activities for the insider risk management templates. |
Intelligent Detections | Controls for file type exclusions, file volume limits, and offensive language detection sensitivity. |
Anomaly Detections | Settings for file type exclusions and file volume limits to identify unusual behavior. |
Offensive Language Detections | Adjusts the sensitivity of the offensive language classifier for policies using the Offensive Language in Email template. |
Traditional Approaches to Identifying Insider Risks
- Features:
User behavior analytics- Monitoring user
activity Data loss prevention- Limitations:
Complexdeploymentscenarios- Limited
insights - Lack of workload integration beyond SECOPS
Security Operationsis a collaboration betweenIT securityandoperationsteams that integrates tools, processes, and technology to keep an enterprise secure while reducing risk.
Purview Provides Protection From Internal Risk
- Real-Time Native Signals:
File activity- Communications
sentiment Abnormaluser behaviorsResignation date- Policy Templates, Configurable and tailored for risks such as:
Digital IP theft- Confidentiality
breach HR violations- Machine Learning and Intelligence:
Correlatesignals to identifyhidden patternsandrisksthattraditionalormanual methods might miss- Insider Risk Leveraged Components:
- Microsoft Graph
Microsoft Graph is a unified APIendpoint that provides access to a wide range ofdataandinsightsfrom acrossMicrosoft 365 services. It enables integration with various Microsoft applications, such as Office 365, Azure Active Directory, and more- Security services and connectors to
human resources (HR)systems like SAP
Table Of Insider Risk Management Role Groups:
Role Group | Description |
Insider Risk Management Admin | Configure insider risk management features |
Assign permissions to other users | |
Insider Risk Management Analysts | Access and investigate insider risk management alerts |
Access and investigate cases | |
Insider Risk Management Investigators | Access and investigate all insider risk management alerts |
Access and investigate all cases and notices templates |
- Insider Risk Management Admin:
Configurefeatures andassignpermissions. - Insider Risk Management Analysts: Access and
investigatealerts and cases. - Insider Risk Management Investigators: Access and
investigate all alerts, cases, and templates.
Policy Creation and Management
- Go to Microsoft
Purview Compliance Portal. - Click
Insider Risk Management. - Click
Policies. - Click Create
Policy. - Select
Policy Template. ConfigureSettings.- Click
Create.
Forensic Evidence Management
Key Feature | Description |
Visual capturing of security-related user activities | Captures screenshots, screen recordings, and audio recordings of user activity |
Customizable triggers and capturing options | Allows you to specify which events should trigger capturing and what types of data should be captured |
User-centric policy targeting | Allows you to target specific users or groups of users for capturing |
Strong role-based access controls | Ensures that only authorized users can access and manage captured data |
Deep integration with insider risk management features | Allows you to correlate captured data with other insider risk signals to identify and investigate potential threats |
Create Insider Risk Management Notice Templates
Automatically emailusers when their actionsmatch a policy, confirm an alert, and trigger case creation.- Alerts often
stem from mistakesorunintentional actions. Noticesserve as reminders to exercise caution and include links to training resources or corporate policies.- Help create a documented
audit trailfor users who repeatedly engage in risky behaviors. Noticescan only be sent to the email address associated with the specific case.Noticetemplates can be used with predefined field values or customized as needed.
Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
Differences between Audit (Standard) and Audit (Premium)
- Audit (
Standard):Basiclogging capabilities,defaultenabled. - Audit (
Premium):Advancedfeatures,long-term retention,forensicinvestigations. - Audit Log Retention Policies: Define
how long audit logsarekeptto meetregulatoryor legal requirements. - Forensic Investigations: Use Audit (
Premium) to investigate security incidents by searching, filtering, and exporting audit log events.
Searching for Audited Activities:
- Use the
audit log search toolin the Microsoft Purview compliance portal for aunified auditlog of Microsoft 365 services. - Exporting and Configuring Audit Logs:
- Export search results to a
CSVfile. - Configure the tool to
display specific fieldsand filter results. - Investigating Support Issues:
- Use
audit logsearches toaddress issueswithuseraccounts,permissions, andfile access.
Microsoft Purview (Premium):
- A
cloud-basedcompliance solution for managing data and meeting compliance requirements. - Features include
audit logging,data loss prevention, andeDiscovery. - Content Search:
Searchmailboxes forimported third-party data, refine results using search queries, and export the findings. eDiscovery(Standard): Build onsearch and export functionsbycreatingcases, controlling access to case data, and placing holds on relevantmailboxesor data.eDiscovery(Premium): Expands oneDiscovery (Standard)by managing custodians, placing their data on hold, andreviewingit fordetailed analysis, including theme detection and duplicate identification.
To investigate threats using audit, follow these steps:
Identifythe threat to investigate.Determinerelevant audit logs.Searchaudit logs forsuspiciousactivity.Analyzelogs to identify the root cause.Take actionto remediate and prevent recurrence.
What is Content Search?
Content searchis a tool forsearching acrossMicrosoft 365, includingemail,documents, andinstantmessaging.- It helps
investigatethreats,troubleshootissues, andcomplywith regulations.
eDiscovery Location search
ExchangeOnlineOneDrivefor BusinessSharePointOnlineMicrosoftTeamsMicrosoft 365GroupsYammerteams.
Content Search and eDiscovery
Content Search:Searchfor and export imported third-party data in mailboxes using queries.- eDiscovery (
Standard):Create cases, control access, and place holds on mailboxes or data. - eDiscovery (
Premium):Manage custodians, place their data on hold, and review it fordetailed analysis, including detecting themes and duplicates.
Practical Part
Create a policy from a template policy
- opening the purview portal
- going to the DLP section
- overview about DLP analytics, alerts, polices, classifiers, etc.
classifiers: to classify data in way DLP polices will use to detect data- click on polices then create policy ( we want compliance admin role to create a policy )
- templates for the polices
- check each policy template with it’s related regulations that can be used
- we need to check what information does its protect, and if it meets our standards
- let’s start with
GDPR - select the name and the description
- restrict the policy to be matched on some users that are registered inside the
Entra-ID - default is
full directoryas all the users we have - select the data location to apply the policy on and what is the scope of users
- Then follow up the steps …
Create a policy as custom policy
- select the name and the description
- select the admin units
- select the data locations to apply the policy on
- as we didn’t select a template then we need to make the customization manually as
advanced customization DLP rule - create
new rule - select the
name,description,conditions - confidence means how confidence level am I towards this policy that I’m making
- select the specific action to take when the policy is triggered
- select the audit action
- select the
severity levelto notify the admin - overview of the created rule
- select the policy mode
on,off, orsimulationsimulationmeaning we are going to test the policy without any taken actions, for 14 Days- review and finish the policy
Insider Risk Management
- select the insider risk management form the portal
- overview and recommended actions to follow
- select the name and description
- select the users
- exclude users
- we can make some priorities and how to apply this policy
- select the
prioritydepend on thesensitivity labels - select what alerts we want to receive as depending on the whole policy or sensitivity labels, etc.
- what action needs to be preformed in order to trigger the policy
- select the intended
IOC - at the end we have the
IOC threshold, to select when do we get alerts on how many times the policy must betriggeredin order togenerateanalertor notify about a risky user
Information Protection
- we select the sensitivity labels in order to classify the data, by user or automatically
- create a label, with related
name,descriptionandpriority - what does it
coveras thescope - select the protection settings
- select the permissions and when does it expires
- follow up the steps …
- how does it shows
- the user scope with information related type and location
Classifiers
classifiersautomatically categorize and tag data based on its content and context, helping to organize and identify sensitive information, it should be trained on data in order to know it later, using MLPolicieson the other hand,enforce data governance ruleslike retention and access controls, ensuring proper data management and compliance with regulations, it uses theclassifiersto know the matching data