Skip to content

Commit b812b44

Browse files
authored
Merge pull request #53251 from MicrosoftDocs/NEW-purview-data-loss-prevention-create-manage-policies
New purview data loss prevention create manage policies
2 parents c5730f7 + 9aa11c8 commit b812b44

38 files changed

Lines changed: 1138 additions & 0 deletions
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-loss-prevention-create-manage-policies.adaptive-protection-data-loss-prevention
3+
title: Adjust enforcement dynamically based on risk
4+
metadata:
5+
title: Adjust enforcement dynamically based on risk
6+
description: "Adjust enforcement dynamically based on risk"
7+
ms.date: 01/27/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/adaptive-protection-data-loss-prevention.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-loss-prevention-create-manage-policies.define-policy-detection
3+
title: Define what the policy detects
4+
metadata:
5+
title: Define what the policy detects
6+
description: "Define what the policy detects"
7+
ms.date: 01/27/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/define-policy-detection.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-data-loss-prevention-create-manage-policies.guided-walkthrough-create-policy
3+
title: "Guided walkthrough: Create a DLP policy"
4+
metadata:
5+
title: "Guided Walkthrough: Create a DLP policy"
6+
description: "Guided Walkthrough: Create a DLP policy"
7+
ms.date: 01/27/2026
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 15
14+
content: |
15+
[!include[](includes/guided-walkthrough-create-policy.md)]
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
Up to this point, policy design has focused on defining detection, scope, actions, and validation. That model works well when risk is clear and usage patterns are predictable.
2+
3+
In some environments, risk isn't static. The same action can carry different levels of risk depending on who performs it, how often it occurs, or what other signals are present. Risk-based behavior allows data loss prevention (DLP) enforcement to adapt based on context rather than relying only on fixed rules.
4+
5+
## Know when content-based controls are sufficient
6+
7+
For many scenarios, content-based policies provide the right level of protection.
8+
9+
They work well when:
10+
11+
- Risk scenarios are clearly defined
12+
- Usage patterns are consistent
13+
- Enforcement decisions don't need additional context
14+
15+
In these cases, adding risk-based behavior doesn't improve outcomes. It increases complexity without addressing a real need.
16+
17+
Before extending policies, confirm that simpler controls can't already meet the requirement.
18+
19+
## Identify scenarios where added context improves decisions
20+
21+
Risk-based behavior becomes useful when context changes how risk should be evaluated.
22+
23+
This includes scenarios where:
24+
25+
- The same action is acceptable for some users but risky for others
26+
- Behavior escalates gradually rather than occurring as a single event
27+
- Repeated activity signals increasing risk over time
28+
29+
In these situations, static rules often feel either too permissive or too restrictive.
30+
31+
## Use risk signals to adjust enforcement dynamically
32+
33+
Risk-based DLP behavior incorporates signals beyond content alone. These signals allow enforcement to respond differently as conditions change.
34+
35+
Rather than enforcing a fixed action in all cases, policies can:
36+
37+
- Apply stricter controls as risk increases
38+
- Reduce enforcement when risk is low
39+
- Focus protection where it's most needed
40+
41+
For example, a low-risk user might receive a warning for an action, while the same action performed by a higher-risk user results in blocking.
42+
43+
## Understand how adaptive protection fits into DLP
44+
45+
Adaptive protection doesn't replace DLP policies. It builds on existing detection, scope, and actions by adjusting enforcement based on user risk.
46+
47+
User risk can change over time as behavior changes. This allows enforcement outcomes to adapt without redefining the policy itself.
48+
49+
This connection helps explain why enforcement results might vary even when policy rules remain the same.
50+
51+
## Keep complexity aligned with actual risk
52+
53+
Risk-based behavior should solve a specific problem. If risk can be addressed with clear, static rules, those rules are usually the better choice.
54+
55+
Extending DLP with adaptive behavior makes sense when:
56+
57+
- Enforcement decisions need to change over time
58+
- User context meaningfully alters risk
59+
- Static policies no longer scale with real usage patterns
60+
61+
When applied intentionally, risk-based behavior extends DLP capabilities without sacrificing clarity or control.
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
Once you decide how to start a policy, the next step is defining what the policy should detect. Detection choices shape how accurate a policy is, how often it triggers, and how much noise it generates over time.
2+
3+
Good detection isn't about catching everything. It's about identifying the situations that matter most and responding consistently when they occur.
4+
5+
## Ensure detection matches the risk
6+
7+
In Microsoft Purview, detection isn't based on a single signal. Policies evaluate different kinds of signals that describe what the data is, how it's classified, and how it's being used.
8+
9+
These signals generally fall into three categories:
10+
11+
- **Content-based signals** focus on what the data contains, like identifying specific patterns or content types.
12+
13+
These signals are useful when detection needs to be driven by the data itself rather than prior classification. They work well when patterns, keywords, or content structure matter more than how the data was labeled.
14+
15+
- **Classification-based signals** rely on prior classification decisions, like labels applied by users or automation.
16+
17+
These signals are useful when protection should follow the data consistently, regardless of where it appears or how it's used.
18+
19+
- **Context-based signals** describe how data is handled, like the action being taken or where the data is sent.
20+
21+
These signals focus on actions, destinations, and user context, and they help narrow enforcement to situations that actually represent risk.
22+
23+
Effective policies often combine signals from more than one category. Choosing the right mix depends on how reliably data is classified and what behavior the policy is meant to address.
24+
25+
## Combine conditions to improve accuracy
26+
27+
Single detection conditions can work for simple scenarios, but they often lack context. Combining conditions helps narrow enforcement to situations that actually represent risk.
28+
29+
For example, combining content-based detection with:
30+
31+
- A specific action
32+
- A destination or location
33+
- A user or group scope
34+
35+
Can significantly reduce unnecessary triggers.
36+
37+
The goal isn't complexity for its own sake. It's clarity. Each condition should contribute meaningfully to the scenario you're trying to address.
38+
39+
## Balance coverage with precision
40+
41+
Broad detection increases coverage, but it also increases the chance of false positives. Narrow detection improves precision, but it can miss edge cases.
42+
43+
Early in policy creation, it's often better to favor clarity over completeness. A policy that triggers reliably in fewer scenarios is easier to validate and refine than one that fires constantly with mixed results.
44+
45+
Detection can always be expanded later. Noise is harder to undo.
46+
47+
## Define what "good enough" detection looks like
48+
49+
Detection doesn't have to be perfect on day one. What matters is whether it reliably identifies the behavior you care about without disrupting normal work.
50+
51+
"Good enough" detection usually means:
52+
53+
- The policy triggers when expected
54+
- Results are understandable
55+
- False positives are limited and explainable
56+
57+
This creates a strong foundation for validation and tuning.
58+
59+
## Account for how detection choices affect false positives
60+
61+
Detection decisions made early often determine where false positives appear later. Overly broad conditions, weak context, or reliance on unreliable signals can all contribute to unnecessary enforcement.
62+
63+
Being intentional about detection upfront reduces the need for heavy tuning after deployment.
64+
65+
## Consider scenarios where data is reused or transformed
66+
67+
Some scenarios are more complex than simple sharing or copying. When sensitive data is reused or transformed, detection becomes more important.
68+
69+
This includes workflows where:
70+
71+
- Content is rewritten or summarized
72+
- Data is combined with other inputs
73+
- Sensitive information appears in generated responses
74+
75+
In these cases, detection quality matters more than aggressive enforcement. Clear, accurate detection helps ensure policies respond to real risk instead of incidental use.
76+
77+
With detection defined, the next step is deciding where the policy should apply and who it should affect.

0 commit comments

Comments
 (0)