Saturday, May 2, 2026

Microsoft 365 Security & Compliance (Purview) Complete Guide

Microsoft 365 Security & Compliance (Purview) — Complete Guide

Sensitivity Labels · DLP · Retention · eDiscovery · Audit · Insider Risk · Zero Trust · Conditional Access · Scenarios · Cheat Sheet


Table of Contents

  1. Core Concepts — Basics
  2. Information Protection & Sensitivity Labels
  3. Data Loss Prevention (DLP)
  4. Data Lifecycle Management & Retention
  5. eDiscovery, Audit & Insider Risk
  6. Identity Protection & Zero Trust
  7. Scenario-Based Questions
  8. Cheat Sheet — Quick Reference

1. Core Concepts — Basics

What is Microsoft Purview and what does it cover?

Microsoft Purview is the unified data governance, risk, and compliance platform in Microsoft 365 — rebranded from Microsoft 365 Compliance Centre in 2022, consolidating Microsoft Information Protection (MIP) and Azure Purview under one brand.

Core capability areas:

Capability Description
Information Protection Sensitivity labels, encryption, rights management
Data Loss Prevention Detect and prevent oversharing of sensitive information
Data Lifecycle Management Retention policies, retention labels, records management
eDiscovery Search, preserve, and export content for legal investigations
Audit Comprehensive activity logging across M365 services
Compliance Manager Assess compliance posture against regulations (GDPR, ISO 27001, HIPAA)
Insider Risk Management Detect risky user behaviour before data leaks occur
Communication Compliance Monitor communications for policy violations

What are the key Microsoft 365 compliance licence tiers?

Feature E3 E5
Audit log retention 90 days 1 year (+10yr add-on)
eDiscovery Standard Premium (Advanced)
Insider Risk Management No Yes
Communication Compliance No Yes
Advanced DLP (Endpoint) Limited Full
Auto-labelling policies Limited Full
Customer Lockbox No Yes
MailItemsAccessed audit No Yes

Warning: Always clarify licence tier before designing a compliance solution. Insider Risk, Communication Compliance, and Advanced eDiscovery require E5 or the E5 Compliance add-on.


What is the Microsoft Purview compliance portal?

The Microsoft Purview compliance portal (compliance.microsoft.com) is the central management interface.

Key features:

  • Content Explorer: shows WHERE sensitive content lives (which sites, mailboxes, folders)
  • Activity Explorer: shows WHAT is happening to labelled content (label applied, removed, file shared externally)
  • Compliance Manager: compliance score dashboard with improvement actions per regulation
  • Solutions: access to all compliance tools — Information Protection, DLP, Records Management, eDiscovery, Audit

Tip: Content Explorer and Activity Explorer are powerful diagnostic tools — the "what" and "where" of your data estate.


2. Information Protection & Sensitivity Labels

What are Sensitivity Labels and how do they work?

Sensitivity Labels are metadata tags applied to emails, documents, meetings, and Microsoft 365 containers (Teams, SharePoint sites, M365 Groups) that define how content should be protected.

Typical label taxonomy:
Public              → no restrictions — safe for external sharing
General             → internal use, no encryption
Confidential
  ├── All Employees   → internal only, no encryption
  └── Specific People → encrypted, only named recipients open
Highly Confidential
  └── Restricted     → encrypted, watermarked, no forwarding/copy/print

What a label can enforce:
→ Encryption (Azure Rights Management): who can open, copy, print, forward
→ Content marking: header ("CONFIDENTIAL"), footer, watermark
→ Access control: prevent edit, copy, print, forward, screen capture
→ Container settings (Teams/SPO sites):
   Privacy: Public or Private (enforced)
   External sharing: blocked
   Unmanaged device access: browser-only or blocked
→ Auto-labelling: apply when sensitive info types detected

Label persistence:
→ Travels with the file wherever it goes
→ Emailed externally, stored in Dropbox, opened on personal device
→ Encryption follows the document — not the location

What is the difference between manual, recommended, and auto-labelling?

  1. Manual labelling: user selects from Sensitivity button in Office apps/Outlook/Teams. Relies on user judgment.

  2. Recommended labelling: client detects sensitive content → pops up recommendation. User can accept or dismiss.

  3. Mandatory labelling: user must select a label before saving or sending — forces deliberate classification.

  4. Auto-labelling (client-side): automatically applies label when sensitive content detected. No user prompt. Works in Office apps.

  5. Auto-labelling policies (service-side): scan content at rest in SharePoint, OneDrive, and Exchange. Applies labels as a background service — catches existing content without user interaction. Requires E5.

Tip: Service-side auto-labelling policies are the most powerful — they scan ALL existing content and label it centrally. The answer to "how do you label millions of existing documents."


What is Azure Rights Management (ARM) and how does it underpin sensitivity labels?

Azure Rights Management is the cloud-based encryption and access control service that enforces sensitivity label protection.

How it works:
1. User applies "Confidential – Specific People" label to a document
2. AIP client encrypts the document with AES-256
3. A use licence is stored: who can access + what they can do
4. When recipient opens: their identity verified via Entra ID
5. If authorised: document decrypts in memory, permissions enforced
   If not authorised: document stays encrypted — cannot open

Permissions ARM can enforce:
VIEW (open/read)        → can read only
EDIT                    → can edit but not copy/print
COPY                    → can copy content to clipboard
PRINT                   → can print
FORWARD                 → can forward (email)
REPLY                   → can reply
EXTRACT                 → can copy/paste content

Super Users:
→ A designated group that can decrypt ANY ARM-protected content
→ Used by eDiscovery administrators and compliance officers
→ Must be explicitly configured — no default super users

3. Data Loss Prevention (DLP)

What is Data Loss Prevention (DLP) in Microsoft Purview?

DLP policies detect and prevent sharing of sensitive information across Microsoft 365. They monitor content, match against sensitive information types or labels, and take protective actions.

DLP policy structure:

1. Locations (where policy applies):
   → Exchange (email)
   → SharePoint Online
   → OneDrive for Business
   → Microsoft Teams chat and channel messages
   → Endpoint devices (Windows/macOS via MDE)
   → Power Platform
   → Microsoft Defender for Cloud Apps

2. Conditions (what triggers the policy):
   → Content contains: SITs (Credit Card, SSN, NHS No., IBAN)
   → Content is labelled: Highly Confidential
   → Being shared: externally / with specific domains
   → Instance count: ≥ 3 credit card numbers

3. Actions (what happens):
   → Block the action (prevent send/share)
   → Block with override (user overrides with justification)
   → Restrict access (accessible to owner only)
   → Show policy tip to user
   → Alert admin / send incident report
   → Quarantine the email

What are Sensitive Information Types (SITs)?

SITs are pattern definitions used to detect sensitive data in content — the "what to look for" in DLP and auto-labelling policies.

Type Description
Built-in SITs 300+ pre-defined (Credit Card, SSN, NHS No., IBAN, Passport No.) — use regex + keyword proximity + checksum
Custom SITs Organisation-specific patterns (employee IDs, project codes) — regex + keyword lists + confidence levels
Trainable classifiers AI/ML models trained on document types ("Legal Contract", "HR Document", "Source Code")
Named entities ML-based detection of personal names, addresses, medical terms — context-aware
Custom SIT example — Employee ID:
Pattern: EMP-[0-9]{6}   (e.g., EMP-123456)
Supporting keywords: "employee", "staff ID", "badge number"
Confidence levels:
  High:   pattern match + keyword within 200 chars
  Medium: pattern match alone

Custom SIT use in DLP:
→ Condition: content contains "Employee ID" custom SIT
→ Action: block external sharing, alert HR compliance team

What is Endpoint DLP?

Endpoint DLP extends Purview DLP policies to Windows 10/11 and macOS devices enrolled in Microsoft Defender for Endpoint (MDE).

Activities monitored and controlled:

  1. Copy to USB/removable media: block or audit
  2. Copy to network share: prevent unauthorised locations
  3. Upload to cloud services: block personal Dropbox, Google Drive, personal OneDrive
  4. Print: block or audit printing of sensitive files
  5. Clipboard copy: block copying content from sensitive documents
  6. Unallowed apps: prevent opening sensitive files in unauthorised apps

Warning: Endpoint DLP requires devices onboarded to Microsoft Defender for Endpoint. Devices not in MDE are unprotected — a common deployment gap.


4. Data Lifecycle Management & Retention

What are retention policies vs retention labels?

Retention policy: applied to a location (all SharePoint sites, all Exchange). Blunt instrument — retains or deletes everything in that location.

Retention label: applied to individual items. Provides item-level lifecycle management. Can declare items as records.

Retention policy (location-level):
→ Applied to: All SharePoint, All Exchange, All Teams
→ Setting: Retain 3 years, then delete
→ Effect: EVERYTHING in those locations retained for 3 years
→ Users cannot delete items during retention period

Retention label (item-level):
→ Applied to: specific documents, emails, or library items
→ Setting: "Contract" label → Retain 7 years, then disposition review
→ Effect: only labelled items have 7-year retention
→ Can declare records (immutable)

Priority rules :
1. Retain wins over delete
2. Longer retention wins over shorter
3. Explicit retention label wins over implicit retention policy

Example:
Retention policy: delete after 3 years
Retention label on item: retain for 7 years
→ RESULT: item kept for 7 years (label wins, longer wins)

Tip: The priority rule is a guaranteed question. "Preserve wins over delete, longer wins over shorter, label wins over policy."


What is Records Management and what is a regulatory record?

Record Type Description
Record Locked from editing/deletion during retention. Label CAN be removed by site owner. Most common.
Regulatory record Strictest — label cannot be removed, content cannot be edited or deleted by ANYONE (including Global Admins) during retention period. Requires admin opt-in.
Disposition review At end of retention period — reviewers must approve deletion or extend before auto-deletion. Full audit trail.
File plan Structured classification system mapping business functions to retention labels. Exportable for regulatory review.

Critical: Regulatory records are irreversible. Once declared, no one — including Global Admins — can delete the content until the retention period expires. Test thoroughly before enabling in production.


What is Preservation Lock?

Preservation Lock locks a retention policy so it cannot be turned off or weakened — even by Global Admins. It is permanent and irreversible.

What Preservation Lock prevents:
→ Cannot decrease the retention duration
→ Cannot disable the policy
→ Cannot remove locations

What is still allowed:
→ Can ADD more locations
→ Can EXTEND the retention period (only strengthening)

Use cases:
→ SEC Rule 17a-4(f) — financial services record immutability
→ FINRA, CFTC regulations
→ Any regulation requiring "policies cannot be circumvented by insiders"

Enable via PowerShell (not available in UI):
Set-RetentionCompliancePolicy -Identity "SEC Records Policy" `
  -RestrictiveRetention $true

Critical: Preservation Lock is permanent. If you lock a policy with incorrect settings, you cannot fix it. Always test retention policies thoroughly before locking.


5. eDiscovery, Audit & Insider Risk

What are the three levels of eDiscovery in Microsoft Purview?

Level Licence Key Features
Content Search Free Search across Exchange/SPO/OneDrive/Teams. Export. No case management, no holds.
eDiscovery (Standard) E3 Case-based. Add custodians, place holds, search within case, export.
eDiscovery (Premium) E5 Custodian management, legal hold notifications, review sets, predictive coding, redaction, chain-of-custody audit.
eDiscovery Standard workflow:
1. Create case: "Smith v Contoso 2025"
2. Add custodians: relevant employees
3. Place holds: preserve Exchange/SPO/OneDrive for custodians
4. Search: keyword + date + sender/recipient filters
5. Review: preview content, identify relevant items
6. Export: PST (email) or file format for legal review

Hold types:
Query-based hold: only items matching search query preserved
Full hold:        ALL custodian content preserved

eDiscovery Premium additions:
→ Legal hold notifications: formal notice to custodians via email workflow
→ Review sets: collect evidence, apply tags/annotations/redactions
→ Predictive coding: AI scores relevance — prioritise review
→ Export formats: native, PST, PDF with bates numbering

What is Microsoft Purview Audit?

Purview Audit captures a comprehensive log of user and admin activities across Microsoft 365.

Audit tiers:
Standard (E3): 90-day retention, standard activities
Premium (E5):  1-year default (10-year add-on), high-value events

Key activities captured:
SharePoint: FileAccessed, FileSharingInvitationCreated,
            SitePermissionsModified, SensitivityLabelApplied
Exchange:   MailItemsAccessed (Premium only!), Send,
            SoftDelete, HardDelete, RecordDelete
Teams:      MeetingParticipantDetail, ChatCreated, MessageSent
Admin:      AddUser, ResetPassword, AssignRole, ChangePolicy

Search via portal:
Purview → Audit → New search
→ Filter: User, Activity type, Date range, Workload
→ Export to CSV for analysis

PowerShell:
Search-UnifiedAuditLog `
  -StartDate "2025-01-01" -EndDate "2025-01-31" `
  -Operations "FileAccessed" `
  -UserIds "user@contoso.com" `
  -ResultSize 5000

Tip: MailItemsAccessed (Premium audit only) shows which emails a compromised account READ — not just sent. Critical for breach investigations. This is the key E5 audit differentiator.


What is Insider Risk Management?

Insider Risk Management (IRM) uses Microsoft 365 signals to detect risky user behaviour patterns before they result in data leaks.

Built-in policy templates:

Template Detects
Data theft by departing employee Mass downloads, USB copies, sharing spikes in 90 days before/after last day
General data leaks Unusual uploads to personal cloud, email to personal accounts, USB copies
Data leaks by priority users Enhanced monitoring for executives, employees with elevated access
Security policy violations Repeated disabling of security software, bypassing controls
Patient data misuse Inappropriate access to patient records (Healthcare)

Warning: IRM requires HR and Legal involvement. Only compliance investigators see alerts — not regular managers. Involve your Data Protection Officer before deployment.


What is Communication Compliance?

Communication Compliance monitors internal and external communications for policy violations.

Policy types:
Offensive language / harassment  → detect threats, discrimination in Teams/email/Yammer
Financial regulatory compliance  → detect potential SEC/FINRA violations
Confidential info disclosure     → detect inappropriate sharing of business secrets
Conflict of interest             → detect undisclosed conflicts
Custom policies                  → keyword lists, SITs, trainable classifiers

Workflow:
Policy configured → communications captured and analysed
  → ML model scores each communication
  → High-confidence matches → alert for reviewer
  → Reviewer: Resolve / Escalate / Tag / Notify user
  → Full audit trail of all review actions

Requirements:
→ E5 or Communication Compliance add-on
→ Reviewers need Communication Compliance Analyst role
→ Privacy notice to users required in most jurisdictions (legal review)

6. Identity Protection & Zero Trust

What is Microsoft Defender for Office 365?

MDO protects against advanced email threats bypassing basic spam/malware filters.

Feature How It Works
Safe Attachments Opens attachments in a virtual sandbox (detonation) before delivery. Malicious → blocked. Adds 1-5 min delay.
Safe Links Replaces URLs with Microsoft-proxied links. Re-evaluates at time-of-click for malicious content.
Anti-phishing ML detects impersonation attacks, domain lookalikes, spear phishing, BEC.
Attack Simulation Training Send simulated phishing emails. Track who clicked. Auto-enrol clickers in security training.
Threat Explorer Investigate email threats — malicious emails received, delivery actions, users targeted.

Tip: Safe Attachments = sandboxing on delivery. Safe Links = time-of-click re-evaluation. Both are frequently asked about in .


What is Zero Trust and how does Microsoft implement it?

Zero Trust assumes breach and requires every access request to be explicitly authorised regardless of network location.

Three Zero Trust principles:

  1. Verify explicitly: authenticate and authorise based on all available signals — identity, location, device health, data classification, anomalies
  2. Use least privilege access: just-in-time, just-enough access; risk-based adaptive policies
  3. Assume breach: minimise blast radius, segment access, verify encryption, use analytics
Microsoft Zero Trust pillars:
Identity        → Entra ID, MFA, Conditional Access, PIM
Endpoints       → Intune, Defender for Endpoint, compliance policies
Applications    → Defender for Cloud Apps, app governance
Data            → Purview sensitivity labels, DLP, encryption
Infrastructure  → Defender for Cloud, RBAC, Azure Policy
Network         → Network segmentation, Defender for Identity, Azure Firewall

Zero Trust access evaluation example:
User accesses SharePoint:
1. Is identity verified? (MFA complete) → Yes
2. Is device compliant? (Intune managed, patches current) → Yes
3. Is location allowed? (not blocked by Conditional Access) → Yes
4. Is data appropriately labelled? (sensitivity label applied) → Yes
All checks passed → access granted with minimum permissions

What is Conditional Access?

Conditional Access is the Entra ID policy engine that evaluates signals and enforces access decisions — the "if/then" engine of Zero Trust.

# Conditional Access policy structure:
WHEN (Assignments):
  Users: All users / Specific groups / Guest users
  Apps:  All cloud apps / Specific apps (SharePoint, Teams)
  Conditions:
    Sign-in risk:    Low / Medium / High (Identity Protection)
    Device platform: Windows / iOS / Android
    Location:        Trusted IP ranges / Named locations / Countries
    Client apps:     Browser / Mobile apps / Legacy auth clients
    Device state:    Compliant / Hybrid joined / Unmanaged

THEN (Access controls):
  Block access
  OR Grant with conditions:
    Require MFA
    Require device compliance (Intune)
    Require hybrid Azure AD join
    Require approved client app
  Session controls:
    Sign-in frequency (re-auth every X hours)
    Persistent browser: No (close browser = sign out)
    App-enforced restrictions (browser-only on SharePoint)

Key policies to implement:
1. Require MFA for all users (exclude break-glass accounts)
2. Block legacy authentication (highest-impact single policy)
3. Require compliant device for Office 365 apps
4. Allow SharePoint from personal devices — browser only
5. Block access from high-risk sign-in locations
6. Require MFA for admin roles always

Tip: Blocking legacy authentication is the highest-impact single security action. Legacy auth (POP, IMAP, SMTP, basic auth) cannot support MFA — it's the primary vector for credential stuffing attacks.


What is Privileged Identity Management (PIM)?

PIM provides just-in-time (JIT) privileged access — users hold elevated roles only when needed, for limited time, with approval and audit trail.

PIM role assignment types:
Eligible: user CAN activate the role but is not permanently assigned
Active:   role is live — user has elevated permissions now
Permanent active: always active (break-glass accounts only)

Activation flow:
User requests activation → provides justification → selects duration
  → Approval required from designated approver(s)
  → MFA required at activation
  → Role active for requested duration (max configurable)
  → After duration: role auto-deactivates

Without PIM:
Global Admin → permanently assigned → compromised account
= attacker has Global Admin permanently

With PIM:
Global Admin eligible → user activates for 2 hours when needed
→ Justification: "Creating new app registration for Project X"
→ Approval: IT Security manager approves
→ After 2 hours: role expires automatically
→ Compromised account: attacker has NO elevated access

Key roles to manage in PIM:
Global Administrator, SharePoint Administrator, Exchange Administrator,
Teams Administrator, Security Administrator, Compliance Administrator

Tip: PIM is one of the most impactful Microsoft 365 security controls. Nobody should have permanent standing Global Admin access — always a key recommendation in any security assessment.


7. Scenario-Based Questions

Scenario: Design a data protection strategy for a financial services firm under GDPR.

  1. Sensitivity label taxonomy: Public / Internal / Confidential (All Staff) / Confidential (Finance) / Highly Confidential (PII). Highly Confidential enforces encryption, no external sharing, watermarking.

  2. Auto-labelling policies: scan all SharePoint, OneDrive, Exchange — auto-apply "Confidential (PII)" label when EU GDPR SITs detected (EU National IDs, credit cards, IBAN, health info).

  3. DLP policies:

    • Block external sharing of content containing personal data SITs
    • Prevent emailing EU personal data to non-approved domains
    • Endpoint DLP: block USB copy of PII-containing files
  4. Retention policies:

    • 6-year financial records retention (regulatory requirement)
    • Separate 3-year personal data retention (GDPR data minimisation)
    • Disposition review at end of period — human review before deletion
  5. Audit: Enable E5 Advanced Audit. 1-year audit log retention. Alerts for mass file downloads and unusual external sharing.

  6. Conditional Access: MFA enforced for all, compliant device required, block legacy auth, browser-only for financial apps on personal devices.

  7. Compliance Manager: track GDPR assessment score, document evidence of controls, work through improvement actions.


Scenario: Suspected data exfiltration by a departing employee. How do you investigate?

  1. Insider Risk Management: check IRM "departing employee" alerts for the user. Review risk timeline showing download spikes, USB activity, cloud upload patterns.

  2. Audit log search:

    Search-UnifiedAuditLog -StartDate "2025-01-01" -EndDate "2025-03-01" `
      -UserIds "employee@contoso.com" `
      -Operations "FileDownloaded,FileSyncDownloadedFull,Send,MailItemsAccessed"
    

    Look for: volume/timing of downloads, mass sync, emails to personal accounts.

  3. eDiscovery case: create Standard/Premium case. Place hold on employee's Exchange mailbox and OneDrive to preserve evidence immediately.

  4. Content search: search for company IP (product names, internal codenames) in the employee's outbound email to personal addresses.

  5. Endpoint DLP: review DLP incident reports for USB copy activity from the employee's device.

  6. Legal hold notification: if proceeding legally, issue formal hold via eDiscovery Premium custodian management.

  7. Preserve before offboarding: convert mailbox to Inactive Mailbox before deleting the account. Apply retention hold on OneDrive. Do NOT delete the account immediately.


Scenario: A user cannot delete a document they created. Why and how do you resolve it?

Diagnose in order:

  1. Retention label: open document in SharePoint → View properties → check for applied retention label. "Record" or active retention period = deletion blocked.
  2. Retention policy: Purview → Data Lifecycle Management → Retention policies → check if any policy covers the site with active retention.
  3. eDiscovery hold: check active eDiscovery cases — if document is in scope of a hold, deletion is blocked by the hold, not the policy.
  4. Sensitivity label permissions: check if the label restricts deletion to owners only.

Resolution:

  • Retention label: site owner or records manager can remove non-regulatory labels. Regulatory records: cannot be removed until retention period expires.
  • Retention policy: wait for expiry, or modify policy scope if appropriate.
  • eDiscovery hold: must be released by the eDiscovery case manager — cannot be bypassed by admin.

Scenario: Implement comprehensive email security for a 1,000-person organisation.

  1. Block legacy authentication (highest-impact single action): Conditional Access → block POP, IMAP, SMTP AUTH, basic auth for all users.

  2. Enforce MFA: Conditional Access → require MFA for all users, all cloud apps. Use Authenticator app (not SMS for sensitive roles).

  3. Enable Defender for Office 365 Plan 2:

    • Safe Attachments: all internal + external email
    • Safe Links: email + Teams + Office apps
    • Anti-phishing: impersonation protection for all executives
  4. Configure email authentication (DNS):

    SPF:   v=spf1 include:spf.protection.outlook.com -all
    DKIM:  Add DKIM signatures via Exchange Admin Centre
    DMARC: v=DMARC1; p=reject; rua=mailto:dmarc@contoso.com
    

    DMARC p=reject prevents spoofing of your domain.

  5. DLP on email: detect and block exfiltration of sensitive data (credit cards, PII, financial data) via email.

  6. Attack Simulation Training: quarterly phishing simulations. Auto-enrol clickers in security awareness training.

  7. Mailbox audit (E5): enable MailItemsAccessed for all sensitive mailboxes (executives, finance, HR).

  8. PIM for admin roles: no standing Exchange Admin or Global Admin. Activate via PIM with approval + justification.


Scenario: How do you assess and improve your organisation's compliance posture?

  1. Compliance Manager: navigate to Purview → Compliance Manager. Review compliance score across regulations (GDPR, ISO 27001, NIST, HIPAA). Score is expressed as a percentage of controls implemented.

  2. Improvement actions: Compliance Manager lists specific improvement actions — each with description, implementation guidance, points value, and test status. Prioritise high-point, high-impact actions.

  3. Assessments: create regulation-specific assessments. Map Microsoft-managed controls (what Microsoft does) and customer-managed controls (what you must do).

  4. Evidence collection: for each customer-managed control, upload evidence (policies, screenshots, certificates). Compliance Manager stores evidence for audit.

  5. Regulatory templates: Compliance Manager includes 300+ pre-built templates for global regulations. Use the template for your specific regulation(s).

  6. Action tracking: assign improvement actions to team members with due dates. Track completion status. Compliance Manager integrates with Microsoft Secure Score.


8. Cheat Sheet — Quick Reference

Sensitivity Label Hierarchy

Public → General → Confidential → Highly Confidential → Regulatory

Each level adds more protection:
Public:            No restrictions
General:           Internal only, no encryption
Confidential:      May include encryption, content marking
Highly Confidential: Encryption required, no external sharing, watermark
Regulatory:        All above + immutable record declaration

Container label (Teams/SharePoint site):
→ Privacy enforcement (Public/Private)
→ External sharing restriction
→ Unmanaged device restriction
→ Documents created inherit the container label

DLP Policy Quick Reference

Locations:
Exchange (email)         SharePoint         OneDrive
Teams chat/channel       Endpoint devices   Power Platform

Conditions:
Contains SIT             Labelled as        Shared externally
Instance count ≥ N       Recipient domain   File extension

Actions (least to most restrictive):
Policy tip only          Notify + allow     Override with justification
Block with override      Block completely   Quarantine + alert admin

Priority of DLP policies:
Lower number = higher priority
First matching policy wins (unless "Stop processing more rules" disabled)

Retention Priority Rules

Rule 1: Retain wins over delete
  Retention policy says delete after 3 years
  Retention label says retain for 7 years
  → Content retained for 7 years (retain wins)

Rule 2: Longer retention wins over shorter
  Policy 1: retain 3 years
  Policy 2: retain 5 years
  → Content retained for 5 years (longer wins)

Rule 3: Explicit label wins over implicit policy
  Retention policy applies to entire SharePoint site
  Retention label applies to specific document
  → Label settings apply to that document (explicit wins)

Hold priority:
eDiscovery hold > Retention label > Retention policy
(Holds always win — preserve for legal proceedings)

eDiscovery Levels

Content Search (Free):
→ Search across all M365 locations
→ Export results
→ No holds, no case management

eDiscovery Standard (E3):
→ Case management
→ Custodian holds (preserve content)
→ Case-scoped searches and exports

eDiscovery Premium (E5):
→ All Standard features
→ Legal hold notifications to custodians
→ Review sets with tags, annotations, redactions
→ Predictive coding (AI relevance scoring)
→ Chain-of-custody audit trail
→ Multiple export formats with bates numbering

Conditional Access Key Policies

Policy 1 — Require MFA for all users:
  Users: All   Apps: All cloud apps
  Grant: Require MFA
  Exclude: Break-glass accounts, service accounts

Policy 2 — Block legacy authentication (HIGHEST IMPACT):
  Users: All   Apps: All cloud apps
  Conditions: Client apps = Exchange ActiveSync + Other clients
  Grant: Block access

Policy 3 — Require compliant device:
  Users: All   Apps: Office 365
  Grant: Require device compliance (Intune)

Policy 4 — Browser-only for personal devices:
  Users: All   Apps: SharePoint / OneDrive
  Conditions: Device state = Unregistered
  Session: App-enforced restrictions (browser only, no download)

Policy 5 — Admin MFA always:
  Users: All admin roles
  Apps: All cloud apps
  Grant: Require MFA + Require compliant device

PIM Quick Reference

Role states:
Eligible  → can activate, not currently active
Active    → currently has the elevated permissions
Permanent → always active (break-glass accounts only)

Activation settings (configurable per role):
Max duration:          1 hour to 24 hours
Require justification: Yes (always recommended)
Require approval:      Yes for Global Admin, Security Admin
Require MFA:           Yes always
Notification:          Email to approvers + admin

Recommended roles to manage in PIM:
Global Administrator      Security Administrator
SharePoint Administrator  Exchange Administrator
Teams Administrator       Compliance Administrator
Billing Administrator     User Administrator

Compliance Score Components

Microsoft Purview Compliance Manager score:
Total score = Points achieved / Total points possible × 100

Point categories:
Microsoft-managed controls: ~50% (what Microsoft does for you)
Customer-managed controls:  ~50% (what you must configure)

Priority improvement actions (high points):
→ Enable MFA for all users
→ Enable audit log recording
→ Configure sensitivity labels
→ Enable DLP policies
→ Configure retention policies
→ Enable Safe Attachments and Safe Links
→ Block legacy authentication
→ Enable PIM for privileged roles
→ Configure DMARC, SPF, DKIM
→ Enable Endpoint DLP

Top 10 Tips

  1. Retention priority: preserve beats delete, longer beats shorter, label beats policy — the most tested retention rule in every compliance . Know it by heart.

  2. Regulatory records are truly irreversible — once declared, no one including Global Admins can delete the content until retention expires. Always emphasise this for risk-aware recommendations.

  3. Block legacy authentication first — the highest single-impact security action. Legacy auth cannot support MFA and is the primary credential stuffing vector. Always recommend this before anything else.

  4. MailItemsAccessed requires E5 audit — this is the forensic differentiator. Shows which emails a compromised account READ. Knowing this detail separates candidates in breach investigation scenarios.

  5. Service-side auto-labelling covers existing content — client-side only works on content users open. Service-side scans ALL content in SharePoint/OneDrive/Exchange in the background. The answer to labelling millions of existing documents.

  6. PIM = no standing admin access — eligible assignments + JIT activation = minimal blast radius if accounts are compromised. Always recommend PIM over permanent admin roles.

  7. eDiscovery holds trump retention policies — a legal hold preserves content regardless of any retention policy configured to delete. Know this interaction for any litigation scenario.

  8. Preservation Lock is irreversible — only enable after thorough testing. Once locked, you cannot weaken the policy even as Global Admin. Regulatory requirement (SEC Rule 17a-4) is the primary use case.

  9. Endpoint DLP requires MDE onboarding — devices not in Microsoft Defender for Endpoint are not protected. Always check device onboarding coverage when designing Endpoint DLP.

  10. Compliance Manager score is actionable — it's not just a vanity metric. Each improvement action has specific guidance, evidence requirements, and point value. Walk through Compliance Manager to show you know how to systematically improve posture.



No comments:

Post a Comment

Featured Post

Microsoft Graph API & Development Complete Guide

  Microsoft Graph API & Development — Complete Guide Graph Fundamentals · Authentication · OData Queries · Webhooks · Delta Query · Bat...

Popular posts