Identity Protection Permission Groups
Security Admin
Security Operator
Security Reader
Security Admin
Can:
Full access to Identity Protection
Cant:
Reset password for a user
Security Operator
Can:
View all Identity Protection reports and Overview screen, Dismiss user risk, confirm safe sign-in, confirm compromise
Cant:
Configure or change policies, Reset password for a user, Configure alerts
Security Reader
Can:
View all Identity Protection reports and Overview screen
Cant:
Configure or change policies, Reset password for a user, Configure alerts, Give feedback on detections
Enforcing information protection w Defender for Cloud Apps
Phase 1: Discover data, make sure apps arec onnected to defender so you can scan data with either an app connector or use Conditional access app
Phase 2: Classify data, default labels personal, public, general, confidential, highly confidential
Phase 3: Protect Data, create file policy to scan files in real time, or apply governance actions.
Phase 4: Monitor and report,
UEBA
User and entity behavioral analytics (out of the box anomaly detection)
How many days does Microsoft Defender for cloud apps spend learning your enviorment?
Seven Days
It looks at the IP addresses, devices, and locations your users access, identifies which apps and services they use, and calculates the risk score of all of these activities.
Where do DLP alert show up?
Microsoft Defender XDR
Microsoft Purview (used for compliance focuses on the policy itself)
DLP alert lifecycle
Trigger - action meets condition on DLP policy
Notify - if alert is generated, it goes to Defender portal & Purview alert dashboard, email can also be setup
Triage - reviewing new alerts, false positive?
Investigate - after assigning the owner, next step is to investigate further
Remediate - the alert owner decides what actions to take
Tune - tune DLP policy
Types of DLP alerts within Purview
Single event - alert everytime a policy rule matches
Aggregate event - alert when threshold is met, ex: 10 matching events within 24 hours (can set by number of matches or volume of data
Licensing requirments for DLP policy
Single event alert - E1, F1, G1, E3, or G3
Aggregate event alert - Requires an E5 license or one of the following add-ons for E3/G3:
Office 365 Advanced Threat Protection Plan 2
Microsoft 365 E5 Compliance
Microsoft 365 eDiscovery and Audit add-on
Roles required to configure dlp alerts
Compliance Administrator
Information Protection Admin
Security Operator
Security Reader
Information Protection Investigator
How long do DLP alerts remain in the Purview alerts dashboard?
30 days
DLP Emails might be unavailable to download
An internal sender deleted the message sent to an external recipient
An external sender’s message was deleted by the internal recipient
Both internal sender and recipient deleted the message
DLP Response actions in Purview
Set alert status to track progress, such as Investigating or Resolved
Assign the alert to a reviewer for accountability
Add comments to capture internal notes or observations
Share alert details using a generated read-only link
View user activity summary (if Insider Risk Management is integrated)
DLP Response actions in Defender XDR
Update the incident status, assign it to a team member, and add notes
Apply classifications like True Positive or False Positive and specify a reason
Take remediation actions directly, such as:
Disabling a user account
Removing file access
Applying a sensitivity or retention label
Alert Generation process
Settings configured - configure policy settings to align with their insider risk management strategy.
policy Created - Policies define whose activity to evaluate, what activity to detect, and which events should trigger active monitoring.
Triggered event occurs - triggering event activates the policy for a specific user
user activity evaluated and scored - The system begins monitoring the user’s actions. Activities are assigned risk scores based on the type of activity, configured thresholds, and the user’s history.
Alert generation - An alert is generated if the user’s risk score exceeds the policy-defined threshold.
Microsoft Purview Insider Risk Managment
helps investigators and analysts view, prioritize, and take action on potentially risky user activity. Each alert is based on policy-defined conditions
Microsoft Purview Insider Risk Managment Alert Details Retention
Alerts in “Needs Review” are retained for 120 days, after that they will be deleted unless linked to an active case.
All risk factors tab in Microsoft Purview Insider Risk Management
provides a summary of potentially risky activity associated with an alert.
All risk factors shown in Purview Insider Risk Managment
Top exfiltration activities: Lists the most frequent exfiltration actions, such as archiving or uploading files.
Cumulative exfiltration: Shows whether repeated actions build over time to indicate rising risk.
Sequences of activities: Highlights related activities that form a recognizable risk sequence.
Priority content: Indicates whether the user interacted with files marked as sensitive or business-critical.
Unallowed domains: Flags any file or data transfers to domains that aren’t permitted by policy.
Unusual behavior or high-impact user status: Detects abnormal patterns or identifies users whose role or access level contributes to elevated risk.
Content Detected within Purview
shows specific items involved in each risk activity.
Activity Explorer tab in Purview Insider Risk Managment
investigate the full context of potentially risky behavior. This tab shows a timeline of user activity that contributes to the alert, with detailed metadata to support investigation, filtering, and review.
Use this tab to confirm what triggered the alert and identify patterns or supporting evidence that indicate whether further action is needed.
Activity Explorer tab in Purview Insider Risk Managment Filters
Activity scope: Show all scored activity for the user or only activity associated with this specific alert
Risk factor: Focus on specific indicators like sequences, cumulative exfiltration, unallowed domains, or priority content
Review status: Hide previously reviewed items to focus on new activity