Skip to content

Commit e221cd9

Browse files
committed
update for more exam mechanics
1 parent 35f4df5 commit e221cd9

8 files changed

Lines changed: 58 additions & 19 deletions

File tree

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/adaptive-protection-data-loss-prevention.md

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,21 @@ For example, a low-risk user might receive a warning for an action, while the sa
4242

4343
## Understand how adaptive protection fits into DLP
4444

45-
Adaptive protection doesn't replace DLP policies. It builds on existing detection, scope, and actions by adjusting enforcement based on user risk.
45+
Adaptive Protection doesn't replace DLP policies. It extends them by adjusting enforcement based on user risk.
4646

47-
User risk can change over time as behavior changes. This allows enforcement outcomes to adapt without redefining the policy itself.
47+
At a high level:
4848

49-
This connection helps explain why enforcement results might vary even when policy rules remain the same.
49+
- Adaptive Protection is configured **within DLP rules**
50+
- Detection conditions remain unchanged
51+
- Enforcement behavior adjusts based on user risk signals
52+
53+
The image shows where Adaptive Protection settings appear within a DLP rule. These settings control how enforcement changes based on user risk, while detection conditions remain the same.
54+
55+
:::image type="content" source="../media/adaptive-protection-conditions.png" alt-text="Screenshot showing the DLP rule conditions pane with Insider risk level for Adaptive Protection and selectable risk levels." lightbox="../media/adaptive-protection-conditions.png":::
56+
57+
User risk can change over time as behavior changes. When risk increases or decreases, the same rule can produce different enforcement outcomes without redefining detection or scope.
58+
59+
This is why a policy might warn a user in one situation and block the same action later, even though the rule itself hasn't changed.
5060

5161
## Keep complexity aligned with actual risk
5262

@@ -59,4 +69,3 @@ Extending DLP with adaptive behavior makes sense when:
5969
- Static policies no longer scale with real usage patterns
6070

6171
When applied intentionally, risk-based behavior extends DLP capabilities without sacrificing clarity or control.
62-

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/define-policy-detection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,9 @@ Good detection isn't about catching everything. It's about identifying the situa
44

55
## Ensure detection matches the risk
66

7-
In Microsoft Purview, detection isn't based on a single signal. Policies evaluate different kinds of signals that describe what the data is, how it's classified, and how it's being used.
7+
In Microsoft Purview, detection is defined at the **rule level**, not at the policy level. A data loss prevention (DLP) policy can contain one or more rules, and each rule defines its own detection conditions and response behavior.
8+
9+
When a policy includes multiple rules, those rules are evaluated independently. Each rule determines whether its conditions are met and what action to take when they are.
810

911
These signals generally fall into three categories:
1012

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/guided-walkthrough-create-policy.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,19 @@ An organization stores sensitive business documents in Microsoft 365 and collabo
88

99
The security team wants visibility into risky sharing activity before enforcing restrictions. The goal is to reduce accidental data exposure without disrupting normal work.
1010

11+
### Before creating or managing DLP policies
12+
13+
Creating and managing data loss prevention (DLP) policies depends on having the appropriate Microsoft Purview roles assigned. Role assignment affects which policy options are visible, who can review simulation results and alerts, and who can change enforcement behavior or policy priority. Confirming roles up front helps avoid confusion during policy creation and clarifies administrative responsibilities.
14+
15+
**DLP administration requires one of these roles:**
16+
17+
- **Compliance Administrator**, which provides full administrative access to create, configure, enforce, and manage DLP policies across supported locations
18+
- **Compliance Data Administrator**, which provides the ability to create and manage DLP policies and review policy results without broader compliance administration permissions
19+
20+
These roles are required to create, edit, and enforce DLP policies. They also allow administrators to review simulation results and alerts, and to manage policy mode, enforcement behavior, and policy priority.
21+
22+
Once the appropriate roles are assigned, policy creation and management decisions can be made consistently in the Microsoft Purview portal.
23+
1124
### Start a new data loss prevention (DLP) policy
1225

1326
Start by creating a new Data Loss Prevention policy in the Microsoft Purview portal.

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/manage-policies.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,31 +4,31 @@ Effective policy management focuses on understanding how policies interact, know
44

55
## Understand how multiple DLP policies interact
66

7-
In Microsoft Purview, DLP policies are evaluated in priority order. When activity matches a policy, the evaluation process starts at the highest-priority policy and works downward.
7+
In Microsoft Purview, DLP policies are evaluated in **priority order**, starting with the highest-priority policy and moving downward.
88

9-
In some cases, the **first matching policy determines the enforcement outcome**. If that policy applies an action, lower-priority policies might never be evaluated for the same activity.
9+
When activity matches a policy, the **first matching policy can determine the enforcement outcome**. If that policy applies an action, lower-priority policies might never be evaluated for the same activity.
1010

1111
This means that:
1212

13-
- Policy order can affect enforcement results
14-
- Later policies might not apply if an earlier policy already matches
15-
- The same data can be treated differently depending on which policy is evaluated first
13+
- Higher-priority policies are evaluated before lower-priority policies
14+
- The first matching policy can control enforcement
15+
- Lower-priority policies might not apply, even if they also match the data
1616

1717
For example, a high-priority policy that audits sensitive data sharing might prevent a lower-priority policy from blocking the same action, even if both policies target similar data. Understanding this interaction helps explain why enforcement outcomes don't always align with expectations when multiple policies exist.
1818

1919
## Know when policy priority matters
2020

2121
Policy priority doesn't always affect outcomes, but when it does, the impact can be significant.
2222

23-
Priority matters most when:
23+
Policy priority matters most when::
2424

2525
- Multiple policies apply to the same location
2626
- Policies target overlapping users or similar data
2727
- Actions differ across policies, such as audit versus block
2828

2929
In these cases, changing priority can alter which policy controls enforcement without changing detection or scope.
3030

31-
Priority usually matters less when:
31+
Policy priority usually matters less when:
3232

3333
- Policies are scoped to different locations
3434
- Policies apply to separate user groups

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-actions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ Choosing the right action is about aligning protection with business tolerance.
66

77
Data loss prevention (DLP) policies can take different actions when conditions are met. Each action represents a different balance between visibility, guidance, and restriction.
88

9-
Common action patterns include:
9+
In Microsoft Purview, these actions generally fall into a few enforcement categories:
1010

11-
- Auditing activity to understand behavior without interruption
12-
- Warning users when an action might introduce risk
13-
- Blocking actions while allowing users to override with justification
14-
- Blocking actions outright when risk is unacceptable
11+
- **Audit**, where activity is logged without interrupting users
12+
- **Warn**, where users receive guidance but can continue their action
13+
- **Block with override**, where users can proceed with justification
14+
- **Block**, where the action is prevented entirely
1515

16-
No single action is correct for every scenario. The right choice depends on the likelihood of risk and the consequences of disruption.
16+
Not every enforcement category is available in every location. Available actions depend on where the policy applies and the type of activity being evaluated. Actions are configured at the **rule level**, not at the policy level, so each rule defines its own enforcement behavior.
1717

1818
## Match actions to business tolerance
1919

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-scope.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,18 @@ It's tempting to scope policies broadly across all locations to ensure coverage.
88

99
Different locations support different kinds of data movement. Email, collaboration sites, file storage, and endpoints often expose data in different ways.
1010

11-
This view highlights how many locations a single policy can cover, which is why scoping decisions should be intentional.
11+
In Microsoft Purview, DLP policies can be scoped to locations like:
12+
13+
- Exchange email
14+
- SharePoint sites
15+
- OneDrive accounts
16+
- Microsoft Teams messages
17+
- Devices through Endpoint DLP
18+
- Browser-based activity in supported browsers
19+
20+
Available conditions and enforcement actions vary by location, which is why scoping decisions directly affect how a policy behaves.
21+
22+
This page shows how those locations appear during policy creation, with each location scoped independently.
1223

1324
:::image type="content" source="../media/policy-scope-page.png" alt-text="Screenshot of the Microsoft Purview DLP policy location selection page with multiple locations selected." lightbox="../media/policy-scope-page.png":::
1425

learn-pr/wwl-sci/purview-data-loss-prevention-create-manage-policies/includes/policy-validation.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ Validation helps ensure policies reduce risk without disrupting normal work. It
66

77
Simulation mode allows a policy to evaluate activity without taking enforcement actions. Instead of blocking activity, the policy records what _would_ have happened.
88

9+
A DLP policy can be **off**, run in **simulation**, or run in **enforcement**, and the selected mode applies at the policy level, not per rule.
10+
11+
All rules within a policy run under the same mode. You can't simulate one rule while enforcing another.
12+
913
This makes simulation a design tool, not just a safety check.
1014

1115
Simulation helps you:
25.5 KB
Loading

0 commit comments

Comments
 (0)