This module acts as an additional resource, offering important notes and a quick guide through the Purview portal. To gain a better understanding, you should complete this module before starting the official 4-module course.
Microsoft Purview
Microsoft Purview
is adata governanc
e andcompliance
solution designed to help organizationsmanage
andsecure
their data across various platforms.- It offers capabilities such as data
cataloging
, dataclassification
, and risk management to ensure data compliance and protection. By providing aunified view
of data assets, it helps organizations maintain control over their data landscape. - Data
cataloging
listing
and describing data - Data
classification
sorting
data by sensitivity or importance.
Data Loss Prevention (DLP) Alerts
- Purpose:
Notify
whensensitive
information isdetected
or whenDLP policie
s are violated. - Sources: Microsoft
Purview Compliance
or Microsoft Defender forCloud Apps
. - if we deploy in one the other will also be deployed in
- Usage:
- Identify and investigate
data loss incidents.
- Monitor and
enforce
compliance
withDLP policies.
Educate
users about DLP policies and help themstay compliant
.- Management:
View
andmanage
alerts in MicrosoftPurview
compliance portal or Microsoft Defender forCloud Apps
portal. - Features:
- Alerts can be
filtered
andsorted
. - Valuable for security operations analysts to
protect sensitive information
and comply with regulations.
Definition and Components
DLP Component | Description |
Sensitive Information Types | DLP policies identify and protect sensitive information by matching it to predefined or custom types, like credit card numbers, social security numbers, and health records. |
Sensitivity Labels | Sensitivity labels classify documents for more granular protection. For instance, "Confidential " documents may have different restrictions than "Public " ones. |
Data Loss Prevention Policies | DLP policies define the rules for protecting sensitive information, such as blocking users from sharing such data with external parties. |
Defender for Cloud App File Policy | File policies monitor and protect sensitive information in cloud apps , such as alerting when a user attempts to share sensitive documents with public cloud storage. |
Insider Risk Management
Insider Risk Management
in Microsoft helpsdetect
,investigate
, andrespond
to potentialrisks
from within an organization, such asdata leaks
orpolicy violations
. It uses advanced analytics and machine learning to identify unusual behaviors and mitigate insider threats.- Example Policy:
Departing employee data theft.
- Policy Settings:
- Privacy:
Anonymize usernames
. - Indicators:
Sharing
files fromSharePoint
Online, downloading content, copying toUSB
or cloud,printing
documents.
Manage Insider Risk In Microsoft Purview
Feature | Description |
Policy Templates | Pre-defined templates for insider risk management policies , such as Departing Employee Data Theft and Data Leaks. |
Policy Settings | Settings that apply to all policies , including privacy , indicators , monitoring windows, and intelligent detections. |
Policy Timeframes | Review periods triggered after policy matches based on events and activities for the insider risk management templates. |
Intelligent Detections | Controls for file type exclusions , file volume limits , and offensive language detection sensitivity. |
Anomaly Detections | Settings for file type exclusions and file volume limits to identify unusual behavior. |
Offensive Language Detections | Adjusts the sensitivity of the offensive language classifier for policies using the Offensive Language in Email template. |
Traditional Approaches to Identifying Insider Risks
- Features:
User behavior analytics
- Monitoring user
activity
Data loss prevention
- Limitations:
Complex
deployment
scenarios- Limited
insights
- Lack of workload integration beyond SECOPS
Security Operations
is a collaboration betweenIT security
andoperations
teams that integrates tools, processes, and technology to keep an enterprise secure while reducing risk.
Purview Provides Protection From Internal Risk
- Real-Time Native Signals:
File activity
- Communications
sentiment
Abnormal
user behaviorsResignation date
- Policy Templates, Configurable and tailored for risks such as:
Digital IP theft
- Confidentiality
breach
HR violations
- Machine Learning and Intelligence:
Correlate
signals to identifyhidden patterns
andrisks
thattraditional
ormanual methods might miss
- Insider Risk Leveraged Components:
- Microsoft Graph
Microsoft Graph is a unified API
endpoint that provides access to a wide range ofdata
andinsights
from acrossMicrosoft 365 services
. It enables integration with various Microsoft applications, such as Office 365, Azure Active Directory, and more- Security services and connectors to
human resources (HR)
systems like SAP
Table Of Insider Risk Management Role Groups:
Role Group | Description |
Insider Risk Management Admin | Configure insider risk management features |
Assign permissions to other users | |
Insider Risk Management Analysts | Access and investigate insider risk management alerts |
Access and investigate cases | |
Insider Risk Management Investigators | Access and investigate all insider risk management alerts |
Access and investigate all cases and notices templates |
- Insider Risk Management Admin:
Configure
features andassign
permissions. - Insider Risk Management Analysts: Access and
investigate
alerts and cases. - Insider Risk Management Investigators: Access and
investigate all alerts
, cases, and templates.
Policy Creation and Management
- Go to Microsoft
Purview Compliance Portal.
- Click
Insider Risk Management.
- Click
Policies
. - Click Create
Policy
. - Select
Policy Template.
Configure
Settings.- Click
Create
.
Forensic Evidence Management
Key Feature | Description |
Visual capturing of security-related user activities | Captures screenshots , screen recordings, and audio recordings of user activity |
Customizable triggers and capturing options | Allows you to specify which events should trigger capturing and what types of data should be captured |
User-centric policy targeting | Allows you to target specific users or groups of users for capturing |
Strong role-based access controls | Ensures that only authorized users can access and manage captured data |
Deep integration with insider risk management features | Allows you to correlate captured data with other insider risk signals to identify and investigate potential threats |
Create Insider Risk Management Notice
Templates
Automatically email
users when their actionsmatch a policy
, confirm an alert, and trigger case creation.- Alerts often
stem from mistakes
orunintentional actions.
Notices
serve as reminders to exercise caution and include links to training resources or corporate policies.- Help create a documented
audit trail
for users who repeatedly engage in risky behaviors. Notices
can only be sent to the email address associated with the specific case.Notice
templates can be used with predefined field values or customized as needed.
Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
Differences between Audit (Standard) and Audit (Premium)
- Audit (
Standard
):Basic
logging capabilities,default
enabled. - Audit (
Premium
):Advanced
features,long-term retention
,forensic
investigations. - Audit Log Retention Policies: Define
how long audit logs
arekept
to meetregulatory
or legal requirements. - Forensic Investigations: Use Audit (
Premium
) to investigate security incidents by searching, filtering, and exporting audit log events.
Searching for Audited Activities:
- Use the
audit log search tool
in the Microsoft Purview compliance portal for aunified audit
log of Microsoft 365 services. - Exporting and Configuring Audit Logs:
- Export search results to a
CSV
file. - Configure the tool to
display specific fields
and filter results. - Investigating Support Issues:
- Use
audit log
searches toaddress issues
withuser
accounts,permissions
, andfile access.
Microsoft Purview (Premium):
- A
cloud-based
compliance solution for managing data and meeting compliance requirements. - Features include
audit logging
,data loss prevention
, andeDiscovery
. - Content Search:
Search
mailboxes forimported third-party data
, refine results using search queries, and export the findings. eDiscovery
(Standard): Build onsearch and export functions
bycreating
cases, controlling access to case data, and placing holds on relevantmailboxes
or data.eDiscovery
(Premium): Expands oneDiscovery (Standard)
by managing custodians, placing their data on hold, andreviewing
it fordetailed analysis
, including theme detection and duplicate identification.
To investigate threats using audit, follow these steps:
Identify
the threat to investigate.Determine
relevant audit logs.Search
audit logs forsuspicious
activity.Analyze
logs to identify the root cause.Take action
to remediate and prevent recurrence.
What is Content Search?
Content search
is a tool forsearching across
Microsoft 365, includingemail
,documents
, andinstant
messaging.- It helps
investigate
threats,troubleshoot
issues, andcomply
with regulations.
eDiscovery Location search
Exchange
OnlineOneDrive
for BusinessSharePoint
OnlineMicrosoft
TeamsMicrosoft 365
GroupsYammer
teams.
Content Search and eDiscovery
Content Search
:Search
for and export imported third-party data in mailboxes using queries.- eDiscovery (
Standard
):Create cases
, control access, and place holds on mailboxes or data. - eDiscovery (
Premium
):Manage custodians
, place their data on hold, and review it fordetailed analysis
, including detecting themes and duplicates.
Practical Part
Create a policy from a template policy
- opening the purview portal
- going to the DLP section
- overview about DLP analytics, alerts, polices, classifiers, etc.
classifiers
: to classify data in way DLP polices will use to detect data- click on polices then create policy ( we want compliance admin role to create a policy )
- templates for the polices
- check each policy template with it’s related regulations that can be used
- we need to check what information does its protect, and if it meets our standards
- let’s start with
GDPR
- select the name and the description
- restrict the policy to be matched on some users that are registered inside the
Entra-ID
- default is
full directory
as all the users we have - select the data location to apply the policy on and what is the scope of users
- Then follow up the steps …
Create a policy as custom policy
- select the name and the description
- select the admin units
- select the data locations to apply the policy on
- as we didn’t select a template then we need to make the customization manually as
advanced customization DLP rule
- create
new rule
- select the
name
,description
,conditions
- confidence means how confidence level am I towards this policy that I’m making
- select the specific action to take when the policy is triggered
- select the audit action
- select the
severity level
to notify the admin - overview of the created rule
- select the policy mode
on
,off
, orsimulation
simulation
meaning we are going to test the policy without any taken actions, for 14 Days- review and finish the policy
Insider Risk Management
- select the insider risk management form the portal
- overview and recommended actions to follow
- select the name and description
- select the users
- exclude users
- we can make some priorities and how to apply this policy
- select the
priority
depend on thesensitivity labels
- select what alerts we want to receive as depending on the whole policy or sensitivity labels, etc.
- what action needs to be preformed in order to trigger the policy
- select the intended
IOC
- at the end we have the
IOC threshold
, to select when do we get alerts on how many times the policy must betriggered
in order togenerate
analert
or notify about a risky user
Information Protection
- we select the sensitivity labels in order to classify the data, by user or automatically
- create a label, with related
name
,description
andpriority
- what does it
cover
as thescope
- select the protection settings
- select the permissions and when does it expires
- follow up the steps …
- how does it shows
- the user scope with information related type and location
Classifiers
classifiers
automatically categorize and tag data based on its content and context, helping to organize and identify sensitive information, it should be trained on data in order to know it later, using MLPolicies
on the other hand,enforce data governance rules
like retention and access controls, ensuring proper data management and compliance with regulations, it uses theclassifiers
to know the matching data