Create and Deploy data loss prevention policies

There are many configuration options in a Microsoft Purview Data Loss Prevention (DLP) policy. Each option changes the policy's behavior. This article presents some common intent scenarios for policies that you map to configuration options. Then it walks you through configuring those options. Once you familiarize yourself with these scenarios, you'll have the foundational skills that you need to use the DLP policy creation UX to create your own policies.

How you deploy a policy is as important policy design. You have multiple options to control policy deployment. This article shows you how to use these options so that the policy achieves your intent while avoiding costly business disruptions.

Nod

If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.

Before you begin

If you're new to Microsoft Purview DLP, here's a list of the core articles you should be familiar with as you implement DLP:

  1. Administrative units
  2. Learn about Microsoft Purview Data Loss Prevention - The article introduces you to the data loss prevention discipline and Microsoft's implementation of DLP.
  3. Plan for data loss prevention (DLP) - By working through this article you will:
    1. Identify stakeholders
    2. Describe the categories of sensitive information to protect
    3. Set goals and strategy
  4. Data Loss Prevention policy reference - This article introduces all the components of a DLP policy and how each one influences the behavior of a policy.
  5. Design a DLP policy - This article walks you through creating a policy intent statement and mapping it to a specific policy configuration.
  6. Create and Deploy data loss prevention policies - This article, which you're reading now, presents some common policy intent scenarios that you map to configuration options. It then walks you through configuring those options, and gives guidance on deploying a policy.
  7. Learn about investigating data loss prevention alerts - This article introduces you to the lifecycle of alerts from creation, through final remediation and policy tuning. It also introduces you to the tools you use to investigate alerts.

SKU/subscriptions licensing

Before you start using DLP policies, confirm your Microsoft 365 subscription and any add-ons.

For information on licensing, see Microsoft 365, Office 365, Enterprise Mobility + Security, and Windows 11 Subscriptions for Enterprises.

Permissions

The account you use to create and deploy policies must be a member of one of these role groups

  • Compliance administrator
  • Compliance data administrator
  • Information Protection
  • Information Protection Admin
  • Security administrator

Tábhachtach

Be sure you understand the difference between an unrestricted administrator and an administrative unit restricted administrator by reading Administrative units before you start.

Granular Roles and Role Groups

There are roles and role groups that you can use to fine tune your access controls.

Here's a list of applicable roles. To learn more, see Permissions in the Microsoft Purview compliance portal.

  • DLP Compliance Management
  • Information Protection Admin
  • Information Protection Analyst
  • Information Protection Investigator
  • Information Protection Reader

Here's a list of applicable role groups. To learn more, see To learn more about them, see Permissions in the Microsoft Purview compliance portal.

  • Information Protection
  • Information Protection Admins
  • Information Protection Analysts
  • Information Protection Investigators
  • Information Protection Readers

Policy creation scenarios

The previous article Design a DLP policy introduced you to the methodology of creating a policy intent statement and then mapping that intent statement to policy configuration options. This section takes those examples, plus a few more and walks you through the actual policy creation process. You should work through these scenarios in your test environment to familiarize yourself with the policy creation UI.

There are so many configuration options in the policy creation flow that it's not possible to cover every, or even most configurations. So this article covers several of the most common DLP policy scenarios. Going through these gives you hands on experience across a broad range of configurations.

Scenario 1 Block emails with credit card numbers

Tábhachtach

This is a hypothetical scenario with hypothetical values. It's only for illustrative purposes. You should substitute your own sensitive information types, sensitivity labels, distribution groups and users.

Scenario 1 prerequisites and assumptions

This scenario uses the Highly confidential sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see:

This procedure uses a hypothetical distribution group Finance team at Contoso.com and a hypothetical SMTP recipient adele.vance@fabrikam.com.

This procedure uses alerts, see: Get started with the data loss prevention alerts

Scenario 1 policy intent statement and mapping

We need to block emails to all recipients that contain credit card numbers or that have the ‘highly confidential’ sensitivity label applied except if the email is sent from someone on the finance team to adele.vance@fabrikam.com. We want to notify the compliance admin every time an email is blocked and notify the user who sent the item and no one can be allowed to override the block. Track all occurrences of this high risk event in the log and we want the details of any events captured and made available for investigation

Statement Configuration question answered and configuration mapping
"We need to block emails to all recipients..." - Where to monitor: Exchange
- Administrative scope: Full directory
- Action: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone
"...that contain credit card numbers or have the 'highly confidential' sensitivity label applied..." - What to monitor: use the Custom template
- Conditions for match: edit it to add the highly confidential sensitivity label
"...except if..." - Condition group configuration: Create a nested boolean NOT condition group joined to the first conditions using a boolean AND
"...the email is sent from someone on the finance team..." - Condition for match: Sender is a member of
"...and..." - Condition for match: add a second condition to the NOT group
"...to adele.vance@fabrikam.com..." - Condition for match: Recipient is
"...Notify..." - User notifications: enabled
- Policy tips: enabled
"...the compliance admin every time an email is blocked and notify the user who sent the item..." - Policy tips: enabled
- Notify these people: selected
- The person who sent, shared, or modified the content: selected
- Send the email to these additional people: add the email address of the compliance administrator
"...and no one can be allowed to override the block... - Allow overrides from M365 Services: not selected
"...Track all occurrences of this high risk event in the log and we want the details of any events captured and made available for investigation." - Use this severity level in admin alerts and reports: high
- Send an alert to admins when a rule match occurs: selected
- Send alert every time an activity matches the rule: selected

Steps to create policy for scenario 1

Tábhachtach

For the purposes of this policy creation procedure, you'll accept the default include/exclude values and leave the policy turned off. You'll be changing these when you deploy the policy.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal

  2. Open the Data loss prevention solution and navigate to Policies > + Create policy.

  3. Select Custom from the Categories list.

  4. Select Custom from the Regulations list.

  5. Choose Next.

  6. Give the policy a name Name and a Description. You can use the policy intent statement here.

    Tábhachtach

    Policies can't be renamed

  7. Select Next.

  8. Assign admin units. To apply the policy to all users, accept the default setting.

  9. Choose Next.

  10. Choose where to apply the policy. Select only the Exchange email location. Deselect all the other locations.

  11. Choose Next.

  12. On the Define policy settings page the Create or customize advanced DLP rules option should already be selected.

  13. Select Next.

  14. Select Create rule. Name the rule and provide a description.

  15. Under Conditions select Add condition > Content contains

  16. (Optional) Enter a Group name.

  17. (Optional) Select a Group operator

  18. Select Add > Sensitive info types > Credit Card Number.

  19. Choose Add.

  20. Still within the Content contains section, Select Add > Sensitivity labels > Highly confidential and then choose Add.

  21. Next, beneath the Content contains section, choose Add group.

  22. Leave the Boolean operator set to AND, then set the toggle to NOT.

  23. Select Add condition.

  24. Select Sender is a member of.

  25. Select Add or remove distribution groups.

  26. Select Finance Team and then choose Add.

  27. Choose Add condition > Recipient is.

  28. In the email field, enter adele.vance@fabrikam.com and select Add .

  29. Under Actions, select Add an action > Restrict access or encrypt the content in Microsoft 365 locations

  30. Select Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files, and then select Block everyone.

  31. Set the User notifications toggle to On.

  32. Select Email notifications > Notify the person who sent, shared, or last modified the content.

  33. Choose whether or not to Attach matching email message to the notification.

  34. Choose whether or not to add Policy tips.

  35. Under User ovverides, make sure that Allow overrides from Microsoft 365 apps and services ... is NOT selected.

  36. Under Incident reports, set Use this severity level in admin alerts and reports to High.

  37. Set Send alert every time an activity matches the rule toggle to On..

  38. Choose Save.

  39. Choose Next, then choose Run the policy in simulation mode.

  40. Choose Next and then choose Submit.

  41. Choose Done.

Scenario 2 Block sharing of sensitive items via SharePoint and OneDrive in Microsoft 365 with external users

For SharePoint and OneDrive in Microsoft 365, you create a policy to block sharing of sensitive items with external users via SharePoint and OneDrive.

Scenario 2 prerequisites and assumptions

This scenario uses the Confidential sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see:

This procedure uses a hypothetical distribution group Human Resources and a distribution group for the security team at Contoso.com.

This procedure uses alerts, see: Get started with the data loss prevention alerts

Scenario 2 policy intent statement and mapping

We need to block all sharing of SharePoint and OneDrive items to all external recipients that contain social security numbers, credit card data or have the "Confidential" sensitivity label. We do not want this to apply to anyone on the Human Resources team. We also have to meet alerting requirements. We want to notify our security team with an email every time a file is shared and then blocked. In addition, we want the user to be alerted via email and within the interface if possible. Lastly, we don’t want any exceptions to the policy and need to be able to see this activity within the system.

Statement Configuration question answered and configuration mapping
“We need to block all sharing of SharePoint and OneDrive items to all external recipients...” - Administrative scope: Full directory
- Where to monitor: SharePoint sites, OneDrive accounts
- Conditions for a match: First Condition > Shared outside my org
- Action: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive > Block only people outside your organization
"...that contain social security numbers, credit card data or have the "Confidential" sensitivity label...” - What to monitor: use the Custom template
- Condition for a match: Create a second condition that is joined to the first condition with a boolean AND
- Conditions for a match: Second condition, first condition group > Content contains Sensitive info types > U.S. Social Security Number (SSN), Credit Card Number
- Condition group configuration Create a second Condition group connected to the first by boolean OR
- Condition for a match: Second condition group, second condition > Content contains any of these sensitivity labels > Confidential.
“...We don't want this to apply to anyone on the Human Resources team...” - Where to apply: exclude the Human Resources Team OneDrive accounts
"...We want to notify our Security team with an email every time a file is shared and then blocked..." - Incident reports: Send an alert to admins when a rule match occurs
- Send email alerts to these people (optional): add the Security team
- Send an alert every time an activity matches the rule: selected
- Use email incident reports to notify you when a policy match occurs: On
- Send notifications to these people: add individual admins as desired
- You can also include the following information in the report: select all options
"...In addition, we want the user to be alerted via email and within the interface if possible...” - User notifications: On
- Notify users in Office 365 with a policy tip: selected
“...Lastly, we don’t want any exceptions to the policy and need to be able to see this activity within the system...” -User overrides: not selected

When the conditions are configured, the summary looks like this:

Policy conditions for match summary for scenario 2.

Steps to create policy for scenario 2

Tábhachtach

For the purposes of this policy creation procedure you'll leave the policy turned off. You change these when you deploy the policy.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal

  2. Select Data loss prevention > Policies > + Create policy.

  3. Select Custom from both the Categories list and the Regulations list.

  4. Choose Next.

  5. Give the policy a name Name and a Description. You can use the policy intent statement here.

Tábhachtach

Policies can't be renamed.

  1. Select Next.
  2. Accept the default Full directory on the Assign admin units page.
  3. Choose Next.
  4. Choose where to apply the policy.
    1. Ensure that the the SharePoint sites and OneDrive accounts locations are selected.
    2. Deselect all other locations.
    3. Select Edit in the Actions column next to OneDrive accounts.
    4. Select All users and groups and then select Exclude users and groups.
    5. Choose +Exclude and then Exclude groups.
    6. Select Human Resources.
  5. Choose Done and then choose Next.
  6. On the Define policy settings page, the Create or customize advanced DLP rules option should already be selected. Choose Next.
  7. On the Customize advanced DLP rules page, select + Create rule.
  8. Give the rule a Name and a description.
  9. Select Add condition and use these values:
    1. Choose Content is shared from Microsoft 365.
    2. Select with people outside my organization.
  10. Select Add condition to create a second condition and use these values.
    1. Select Content contains.
  11. Select Add > Sensitivity labels > and then Confidential.
  12. Choose Add.
  13. Under Actions, add an action with these values:
    1. Restrict access or encrypt the content in Microsoft 365 locations.
    2. Block only people outside your organization.
  14. Set the User Notifications toggle to On.
  15. Select Notify users in Office 365 services with a policy tip and then select Notify the user who sent, shared, or last modified the content.
  16. Under User overrides, make sure that Allow override from M365 services is NOT selected.
  17. Under Incident reports:
    1. Set Use this severity level in admin alerts and reports to Low.
    2. Set the toggle for Send an alert to admins when a rule match occurs to On.
  18. Under Send email alerts to these people (optional), choose + Add or remove users and then add the email address of the security team.
  19. Choose Save and then choose Next.
  20. On the Policy mode page, choose Run the policy in simulation mode and Show policy tips while in simulation mode.
  21. Choose Next and then choose Submit.
  22. Choose Done.

Scenario 3 Apply controls to supported files that fail scanning

Nóta

Scenario 3 Apply controls to supported files that fail scanning is in preview.

Use this scenario when you want to apply Audit, Block, or Block with override controls on user activities for files that are on the Monitored files list but failed to be scanned by Endpoint DLP.

Scenario 3 prerequisites and assumptions

This scenario requires that you already have devices onboarded and reporting into activity explorer. If you haven't onboarded devices yet, see Get started with Endpoint data loss prevention.

Tábhachtach

This feature only supports following action types:

  • Upload to a restricted cloud service domain
  • Copy to a removable USB device
  • Copy to a network share
  • Print

Scenario 3 policy intent statement and mapping

Sometimes scanning fails for files that endpoint DLP supports. There may be sensitive information in those files, but we don't know. When scanning fails for a file on any of our onboarded devices, we want to prevent users from copying that file to a USB device or to a network share.

Statement Configuration question answered and configuration mapping
“When scanning fails for a file on any of our onboarded devices ...” - Administrative scope: Full directory
- Where to monitor: Devices
-Scope: Allusers, groups, devices, device groups
- Conditions: Document could not be scanned
"...we want to prevent users from copying that file to a USB device or to a network share." - Action : select audit or restrict activities on devices
- clear Upload to a restriced cloud service domain or access from an unallowed browser
- select Apply restrictions to specific activity
- select Copy to a removable USB device, and Block with override
- select Copy to a network share and Block with override
clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP

When the conditions are configured, the summary looks like this:

Policy conditions for match summary for scenario 3.

Scenario 3 Configure policy actions

Tábhachtach

For the purposes of this policy creation procedure you'll leave the policy turned off. You change these when you deploy the policy.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Data Loss Prevention > Policies.
  3. Select Create policy and select the Custom from the Categories then Custom policy template from Regulations.
  4. Name your new policy and provide a description.
  5. Select Full directory under Admin units.
  6. Scope the location to Devices only.
  7. Create a rule where:
    1. In Conditions:
      1. Select Document could not be scanned
    2. In Actions:
      1. Select Audit or restrict activities on devices.
      2. Clear Upload to a restriced cloud service domain or access from an unallowed browser
      3. Select Apply restrictions to specific activity
      4. Select Copy to a removable USB device, and Block with override
      5. Select Copy to a network share, and Block with override
      6. Clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP
  8. Save.
  9. Choose Turn on the policy immediately. Choose Next.
  10. Review your settings and choose Submit.

Scenario 4 Apply controls to all unsupported files

Nóta

Scenario 4 Apply controls to all unsupported files is in preview.

Use this scenario when you want to apply Audit, Block, or Block with override controls on user activities for files that are not on the Monitored files list without having to enumerate all the file extensions via the File extension is condition. Use this configuration to create a blanket policy to place controls on files like .mp3, .wav, .dat.

Rabhadh

The ability to apply controls to all files is a powerful capability and if implemented without proper caution may have uninteded consequences. Be sure to test this policy in a non-production environment before deploying it to your production environment. This example also shows you how to (optionally) exclude specific file extensions from the scope of the policy.

Tábhachtach

This feature only supports following action types:

  • Upload to a restricted cloud service domain
  • Copy to a removable USB device
  • Copy to a network share
  • Print

Scenario 4 policy intent statement and mapping

There are many types of files that endpoint DLP doesn't scan, more than we can track. We don't know if there is sensitive information in those files, and so we want to have a checkpoint in place before our user try to copy those files to a USB device or to a network share. We don't want to disrupt users workflow for the abc file type which is well known to us and poses no threat of data leakage.

Statement Configuration question answered and configuration mapping
“There are many types of files that endpoint DLP doesn't scan,...” - Administrative scope: Full directory
- Where to monitor: Devices
- Scope: Allusers, groups, devices, device groups
"...We don't want to disrupt users workflow for the abc file type which is well known to us and poses no threat of data leakage." - Endpoint settings: create a Unsupported file extension exclusions list and add the file extension abc to the list.
"...more than we can track. We don't know if there is sensitive information in those files, and so we want to have a checkpoint in place before they try to copy those files to a USB device or to a network share..."
- Conditions for a match: Document could not be scanned
action : select audit or restrict activities on devices
- clear Upload to a restriced cloud service domain or access from an unallowed browser
- select Apply restrictions to specific activity
- select Copy to a removable USB device, and Block with override
- select Copy to a network share and Block with override
- clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP
- select file could not be scanned.
- select apply restrictions to only unsupported file extensions.

Tábhachtach

The difference between this feature and the File extension is condition is:

  • Endpoint DLP will scan content for File extension is condition. For example, you'll be able to see Sensitive info type value on the event or alert; on the other hand, this feature will not scan file content.
  • File extension is condition triggering content scanning may consume higher machine resource, like CPU and memory, and may cause application performance issue for some file types.

Add a file type to Unsupported file extension exclusions

Use this setting to exclude file extensions from the policy.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Settings > Data Loss Prevention > Endpoint DLP settings > Unsupported file extension exclusions.
  3. Select Add file extensions.
  4. Provide extensions.
  5. Select Save.
  6. Close the item.

Scenario 4 Configure policy actions

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Data Loss Prevention > Policies.
  3. Select Create policy and select the Custom from the Categories then Custom policy template from Regulations.
  4. Name your new policy and provide a description.
  5. Select Full directory under Admin units.
  6. Scope the location to Devices only.
  7. Create a rule where:
    1. In Conditions:
      1. Select Document could not be scanned.
    2. In Actions:
      1. Select Audit or restrict activities on devices.
      2. Clear Upload to a restriced cloud service domain or access from an unallowed browser.
      3. Select Apply restrictions to specific activity.
      4. Select Copy to a removable USB device, and Block with override.
      5. Select Copy to a network share, and Block with override.
      6. Clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP.
      7. Select Apply restrictions to only unsupported file extensions.
  8. Save.
  9. Choose Turn on the policy immediately. Choose Next.
  10. Review your settings and choose Submit.

Tábhachtach

You can not use Document could not be scanned together with other conditions in this scenario.

Tábhachtach

You can not use this Document could not be scanned together with other conditions in this scenario.

Scenario 5 Apply controls to some unsupported files

Nóta

Scenario 5 Apply controls to some unsupported files is in preview.

Use this configuration to apply Audit, Block with override, or Block controls to a list of file types that you define from all the files that are NOT on the Monitored files list. For example, to you can apply controls to video files like .mp3 files (which are not monitored by EDLP) only.

Tábhachtach

This feature only supports following action types:

  • Upload to a restricted cloud service domain
  • Copy to a removable USB device
  • Copy to a network share
  • Print

This configuration uses a combination of a File extension group and the Document could not be scanned condition. It doesn't use the File extension is condition. This means that the content of the files that you include in the File extension group won't be scanned by Endpoint DLP and you won't see values for Sensitive info type in events or alerts that are generated by policy matches.

Scenario 5 policy intent statement and mapping

We, Wingtip Toys, have a list of file types on devices that we want to apply controls to. We know that they're not on the monitored files list for Endpoint DLP. We want to prevent users from copying those files to a USB device or to a network share. When they do try, we want to let them know, to educate them, that they are attempting a prohibited action.

Statement Configuration question answered and configuration mapping
“We have a list of file types on devices that we want to apply controls to....” - Administrative scope: Full directory
- Where to monitor: Devices
-Scope: Allusers, groups, devices, device groups
"We know that they're not on the monitored files list for Endpoint DLP." - Endpoint settings: create a File extension group
"...We need to prevent users from copying those files to a USB device or to a network share." - Conditions for a match: Document could not be scanned
- Action: select audit or restrict activities on devices
- clear Upload to a restriced cloud service domain or access from an unallowed browser
- select Apply restrictions to specific activity
- select Copy to a removable USB device, > Block
- Copy to a network share > Block
- clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP
- select file could not be scanned
- select apply restrictions to only unsupported file extensions.
"When they do try, we want to let them know, to educate them, that they are attempting a prohibited action." - Use notifications to inform your users and help educate them on the proper use of sensitive info: On
- Endpoint devices > Show users a policy tip notification when an activity is restricted...: selected
- Customize the notification: selected > Notication Title: Wingtip toys don't copy files > Notification Content: FYI, Wingtip Toy policy doesn't let you copy that type of file to USB device or a network share.

Create a File extension group

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Settings > Data Loss Prevention > Endpoint DLP settings > File extension groups.
  3. Select Create file extension group and enter a Group name. In this scenario, we use Non-classified file extensions.
  4. Provide extensions.
  5. Select Save.
  6. Close the item.

Configure policy actions

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Data Loss Prevention > Policies.
  3. Select Create policy and select the Custom from the Categories then Custom policy template from Regulations.
  4. Name your new policy and provide a description.
  5. Select Full directory under Admin units.
  6. Scope the location to Devices only.
  7. Create a rule where:
    1. In Conditions.
      1. Document could not be scanned.
    2. In Actions:
      1. Select: Audit or restrict activities on devices.
      2. Clear: Upload to a restricted cloud service domain or access from an unallowed browser.
      3. Select: Apply restrictions to specific activity.
      4. Clear: Copy to clipboard.
      5. Select: Copy to a removable USB device > Block.
      6. Select: Copy to a network share > Block.
      7. Clear: Print.
      8. Clear: Copy or move using unallowed Bluetooth app.
      9. Clear: Copy or move using RDP.
      10. Clear: Access by restricted apps.
      11. Select: Apply restrictions to only unsupported file extensions.
      12. Select: Add file extension group and select Non-classified file extensions.
  8. Set User notifications to On.
    1. Under Endpoint devices select Show users a policy tip notification when an activity is restricted....
    2. Select Customize the notification.
      1. Enter Wingtip toys don't copy files in the Notification Title.
      2. Enter FYI, Wingtip Toy policy doesn't let you copy that type of file to USB device or a network share in the Notification Content.
  9. Save.
  10. Choose Turn the policy on immediately. Choose Next.
  11. Review your settings and choose Submit.

Tábhachtach

You can not use this Document could not be scanned together with other conditions in this scenario.

Scenario 6 Disable scanning for some supported files and apply controls

Nóta

Scenario 6 Disable scanning for some supported files and apply controls in preview.

Use this configuration to save local resource consumption by disabling scanning of some file types on the Monitored files list. You can apply Audit, Block, or Block with override controls to those file types.

Tábhachtach

This feature only supports following action types:

  • Upload to a restricted cloud service domain
  • Copy to a removable USB device
  • Copy to a network share
  • Print

Scenario 6 policy intent statement and mapping

Bellows College needs to conserve resources on all our users Windows devices and cutting down on the scanning of files by DLP would be a big help. We have a list of file types that we know the contents of because they are auto generated. These file types are on the supported file types list. There's no need to scan these auto generated files, but we do want to prevent users from copying them to a USB device or to a network share. When they do try, we want to let them know, to educate them, that they are attempting a prohibited action.

Statement Configuration question answered and configuration mapping
“Bellows College needs to conserve resources on all our users Windows devices and cutting down on the scanning of files by DLP would be a big help...” - Administrative scope: Full directory
- Where to monitor: Devices
-Scope: Allusers, groups, devices, device groups
"...We have a list of file types that we know the contents of because they are auto generated. These file types are on the supported file types list. There's no need to scan these auto generated files..." - Endpoint settings: create a File extension group
- Disable classification
...but we do want to prevent users from copying them to a USB device or to a network share... - Conditions for a match: Document could not be scanned
Action : select audit or restrict activities on devices
- clear Upload to a restriced cloud service domain or access from an unallowed browser
- select Apply restrictions to specific activity
- select Copy to a removable USB device, > Block
- Copy to a network share > Block
- clear Copy to clipboard, Print, Copy or move using unallowed Bluetooth app, and Copy or move using RDP
- select file could not be scanned.
"...When they do try, we want to let them know, to educate them, that they are attempting a prohibited action..." - Use notifications to inform your users and help educate them on the proper use of sensitive info: On
- Endpoint devices > Show users a policy tip notification when an activity is restricted...: selected
- Customize the notification: selected > Notication Title: Bellows College IT don't copy files > Notification Content: FYI, Bellows College data loss prevention policies don't let you copy that type of file to USB device or a network share

Create a File extension group

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Settings > Data Loss Prevention > Endpoint DLP settings > File extension groups.
  3. Select Create file extension group and enter a Group name. In this scenario, we use Student Class Registration file extensions.
  4. Provide extensions.
  5. Select Save.
  6. Close the item.

Disable classification

Use this setting to exclude specific file extensions from Endpoint DLP classification.

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Settings > Data Loss Prevention > Endpoint DLP settings > Disable classification.
  3. Select Add or edit file extensions.
  4. Provide extensions.
  5. Select Save.
  6. Close the item.

Configure policy actions

Select the appropriate tab for the portal you're using. To learn more about the Microsoft Purview portal, see Microsoft Purview portal. To learn more about the Compliance portal, see Microsoft Purview compliance portal.

  1. Sign in to the Microsoft Purview portal.
  2. Open Data Loss Prevention > Policies.
  3. Select Create policy and select the Custom from the Categories then Custom policy template from Regulations.
  4. Name your new policy and provide a description.
  5. Select Full directory under Admin units.
  6. Scope the location to Devices only.
  7. Create a rule where:
    1. In Conditions:
      1. Document could not be scanned.
    2. In Actions:
      1. Select: Audit or restrict activities on devices.
      2. Select: Apply restrictions to specific activity.
      3. Clear: Copy to clipboard.
      4. Select: Copy to a removable USB device > Block.
      5. Select: Copy to a network share > Block.
      6. Clear: Print.
      7. Clear: Copy or move using unallowed Bluetooth app.
      8. Clear: Copy or move using RDP.
      9. Clear: Access by restricted apps.
      10. Select: Apply restrictions to only unsupported file extensions.
      11. Select: Add file extension group and select Student Class Registration file extensions.
    3. Save.
  8. Choose Turn it on right away. Choose Next.
  9. Review your settings and choose Submit.

Tábhachtach

You can not use this Document could not be scanned together with other conditions in this case.

Deployment

A successful policy deployment isn't just about getting the policy into your environment to enforce controls on user actions. A haphazard, rushed deployment can negatively impact business process and annoy your users. Those consequences slow acceptance of DLP technology in your organization and the safer behaviors it promotes. Ultimately making your sensitive items less safe in the long run.

Before you start your deployment, make sure you have read through Policy deployment. It gives you a broad overview of the policy deployment process and general guidance.

This section dives more deeply into the three types of controls you use in concert to manage your policies in production. Remember you can change any of these at any time, not just during policy creation.

Three axes of deployment management

There are three axes you can use to control the policy deployment process, the scope, the state of the policy, and the actions. You should always take an incremental approach to deploying a policy, starting from the least impactful/simulation mode through to full enforcement.

When your policy state is Your policy scope can be Impact of policy actions
Run the policy in simulation mode Policy scope of locations can be narrow or broad - You can configure any action
- No user impact from configured actions
- Admin sees alerts and can track activities
Run the policy in simulation mode with policy tips Policy should be scoped to target a pilot group and then expand the scope as you tune the policy - You can configure any action
- No user impact from configured actions
- Users can receive policy tips and alerts
- Admin sees alerts and can track activities
Turn it on All targeted location instances - All configured actions are enforced on user activities
- Admin sees alerts and can track activities
Keep it off n/a n/a

State

State is the primary control you use to roll out a policy. When you finished creating your policy, you set the state of the policy to Keep it off. You should leave it in this state while you're working on the policy configuration and until you get a final review and sign off. The state can be set to:

  • Run the policy in simulation mode: No policy actions are enforced, events are audited. While in this state, you can monitor the impact of the policy in the DLP simulation mode overview and the DLP Activity explorer console.
  • Run the policy in simulation mode and show policy tips while in simulation mode: No actions are enforced, but users receive policy tips and notification emails to raise their awareness and educate them.
  • Turn it on right away: This is full enforcement mode.
  • Keep it off: The policy is inactive. Use this state while developing and reviewing your policy before deployment.

You can change the state of a policy at any time.

Actions

Actions are what a policy does in response to user activities on sensitive items. Because you can change these at any time, you can start with the least impactful, Allow (for devices) and Audit only (for all other locations), gather and review the audit data, and use it to tune the policy before moving to more restrictive actions.

  • Allow: The user activity is allowed to occur, so no business processes are impacted. You get audit data and there aren't any user notifications or alerts.

    Nóta

    The Allow action is only available for policies that are scoped to the Devices location.

  • Audit only: The user activity is allowed to occur, so no business processes are impacted. You get audit data and you can add notifications and alerts to raise awareness and train your users to know that what they're doing is a risky behavior. If your organization intends to enforce more restrictive actions later on, you can tell your users that too.

  • Block with override: The user activity is blocked by default. You can audit the event, raise alerts and notifications. This impacts the business process, but your users are given the option to override the block and provide a reason for the override. Because you get direct feedback from your users, this action can help you identify false positive matches, which you can use to further tune the policy.

    Nóta

    For Exchange online and SharePoint in Microsoft 365, overrides are configured in the user notification section.

  • Block: The user activity is blocked no matter what. You can audit the event, raise alerts and notifications.

Policy scope

Every policy is scoped to one or more locations, such as Exchange, SharePoint in Microsoft 365, Teams, and Devices. By default, when you select a location, all instances of that location fall under the scope and none are excluded. You can further refine which instances of the location (such as sites, groups, accounts, distribution groups, mailboxes, and devices) that the policy is applied to by configuring the include/exclude options for the location. To learn more about your include/exclude scoping options, see, Locations.

In general, you have more flexibility with scoping while the policy is in Run the policy in simulation mode state because no actions are taken. You can start with just the scope you designed the policy for or go broad to see how the policy would impact sensitive items in other locations.

Then when you change the state to Run the policy in simulation mode and show policy tips, you should narrow your scope to a pilot group that can give you feedback and be early adopters who can be a resource for others when they come onboard.

When you move the policy to Turn it on right away, you broaden the scope to include all the instances of locations that you intended when the policy was designed.

Policy deployments steps

  1. After you've created the policy and set its state to Keep it off, do a final review with your stakeholders.
  2. Change the state to Run the policy in simulation mode. The location scope can be broad at this point so you can gather data on the behavior of the policy across multiple locations or just start with a single location.
  3. Tune the policy based on the behavior data so that it better meets the business intent.
  4. Change the state to Run the policy in simulation mode and show policy tips. Refine the scope of locations to support a pilot group if needed and make use of includes/excludes so that the policy is first rolled out to that pilot group.
  5. Gather user feedback and alert and event data, if needed tune the policy and your plans more. Make sure you address all the issues that your users bring up. Your users will most likely encounter issues and raise questions about things that you didn't think of during the design phase. Develop a group of super users at this point. They can be a resource to help train other users as the scope of the policy is increased and more users come onboard. Before you go to the next stage of deployment, make sure that the policy is achieved your control objectives.
  6. Change the state to Turn it on right away. The policy is fully deployed. Monitor DLP alerts and DLP activity explorer. Address alerts.