You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/dlp-investigate-alerts-defender.md
+39-10Lines changed: 39 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: how-to
18
18
search.appverid:
19
19
- MOE150
20
20
- met150
21
-
ms.date: 09/05/2023
21
+
ms.date: 10/27/2023
22
22
---
23
23
24
24
# Investigate data loss prevention alerts with Microsoft 365 Defender
@@ -55,7 +55,7 @@ To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft
55
55
56
56
## Roles
57
57
58
-
It is best practice to only grant minimal permissions to alerts in the Microsoft 365 Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
58
+
It's best practice to only grant minimal permissions to alerts in the Microsoft 365 Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
59
59
60
60
|Permission |Defender Alert Access |
61
61
|---------|---------|
@@ -77,17 +77,48 @@ It is best practice to only grant minimal permissions to alerts in the Microsoft
77
77
78
78
1. Go to the Microsoft 365 Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
79
79
80
-
2. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
80
+
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
81
81
82
-
3. Search for the DLP policy name of the alerts and incidents you're interested in.
82
+
1. Search for the DLP policy name of the alerts and incidents you're interested in.
83
83
84
-
4. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
84
+
1. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
85
85
86
-
5. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
86
+
1. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
87
87
88
-
6. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <ahref="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles"target="_blank">here</a>).
88
+
1. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <ahref="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles"target="_blank">here</a>).
89
89
90
-
You can also use Advanced Hunting to search through audit logs of user, files, and site locations for your investigation. The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
90
+
### Extend DLP alert investigation with advanced hunting
91
+
92
+
Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of audit logs of user, files and site locations to aid in your investigation. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats.
93
+
94
+
The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
95
+
96
+
#### Before you begin
97
+
98
+
If you're new to advanced hunting, you should review [Get started with advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview.md).
99
+
100
+
Before you can use advance hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/connect-office-365.md) that contains the Microsoft Purview data.
101
+
102
+
#### Using built in queries
103
+
104
+
> [!IMPORTANT]
105
+
> This feature is in preview. Preview features aren't meant for production use and may have restricted functionality. These features are available before an official release so that customers can get early access and provide feedback.
106
+
107
+
The Defender portal offers multiple built-in queries you can use to help with your DLP alert investigation.
108
+
109
+
1. Go to the Microsoft 365 Defender portal, and select **Incidents & alerts** in the left hand navigation menu to open the incidents page. Select **Incidents**.
110
+
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
111
+
1. Open a DLP incident.
112
+
1. Select on an alert to view its associated events.
113
+
1. Select an event.
114
+
1. In the event details pane, select the **Go Hunt** control.
115
+
1. Defender shows you a list of built-in queries that are relevant to the source location of the event. For example, if the event is from SharePoint you see
116
+
1.**File shared with**
117
+
1.**File activities**
118
+
1.**Site activity**
119
+
1.**User DLP violations for last 30 days**
120
+
1. You can choose to **Run query** immediately, change the time range, edit or save the query for later use.
121
+
1. Once you run the query, view the results on the **Results** tab.
91
122
92
123
If the alert is for an email message, you can download the message by selecting **Actions**\>**Download email**.
93
124
@@ -106,8 +137,6 @@ For Devices DLP alerts, select the device card on the top of the alert page to v
106
137
107
138
Go to the incident summary page and select **Manage Incident** to add incident tags, assign, or resolve an incident.
0 commit comments