Module 01 β€” Protection & Enforcement

Data Loss Prevention

Policy scope, enforcement ladder, workload coverage, and DLP + Labeling integration strategy

What Is DLP?

Data Loss Prevention (DLP) in Microsoft Purview is a policy-based framework that identifies, monitors, and protects sensitive information across Microsoft 365 workloads, endpoints, and on-premises repositories. DLP works through deep content analysis β€” not simple text scans β€” combining regular expressions, keyword dictionaries, sensitive information types (SITs), machine learning classifiers, and label-based conditions.

DLP is the enforcement layer that acts on classification decisions made by Sensitivity Labeling and data posture signals surfaced by DSPM. The three systems work together: labels declare intent, DLP enforces it, DSPM monitors the gap.

DLP Enforcement Ladder
Operating principle: Start in Audit mode. Validate signal quality. Add notifications. Then enforce. Never jump to Block without a test cycle.
β‘  Audit

Log all matches silently. No user impact. Establishes detection baseline and false-positive rate.

β‘‘ Notify

Show policy tips in-app. Email notifications to users. No block. Drives awareness and behavior change.

β‘’ Override

Allow with business justification required. Logs the override reason. Builds exception audit trail.

β‘£ Block

Hard block on sharing, transmission, or endpoint action. Reserved for high-confidence matches on Confidential and Restricted.

Workload Coverage
WorkloadDLP ScopeKey ActionsNotes
Exchange OnlineEmail send/receiveBlock, Notify, Encrypt, RedirectCovers external and internal mail
SharePoint / OneDriveFile sharing, upload, accessBlock sharing, Quarantine, Restrict accessCovers guest sharing and anonymous links
Microsoft TeamsChat messages, channel postsBlock message, Notify, RemoveRequires Teams DLP policy mode
EndpointClipboard, USB, print, upload, screenshotAudit, Warn, Block per activityRequires Defender for Endpoint onboarding
On-Premises β€” Data Map (SHIR)File shares, relational databases, multi-cloud sourcesScan, Classify, Catalog (metadata only)Self-Hosted Integration Runtime connects sources to Purview Data Map; does not apply labels or enforce DLP actions
On-Premises β€” IP ScannerFile shares, SharePoint Server (at-rest files)Apply label, Encrypt, Quarantine, Move, AlertInformation Protection on-premises scanner; applies sensitivity labels and protection actions to at-rest content
On-Premises β€” DLPFile repositories via on-premises scanner infrastructureAudit, Alert, Restrict, QuarantinePurview DLP on-premises; enforces DLP policies on at-rest repositories; requires IP scanner infrastructure
Power BI / FabricReports, datasets, workspacesRestrict access, AlertPremium Gen2 workspaces required
Microsoft 365 CopilotAI-generated responses, grounding dataInherit label controls, Block oversharingLabel must be applied to source content
DLP + Labeling Integration
Label-Based DLP Conditions

DLP rules can use sensitivity labels as conditions β€” no SIT required. Example: If label = Restricted AND recipient is external β†’ Block. This is the most reliable condition type because it does not depend on content pattern matching.

SIT + Label Hybrid Rules

High-confidence rules combine a SIT match (e.g., SSN, account number, custom Legal SIT) with a label condition. This reduces false positives significantly and enables workload-specific enforcement β€” for example, blocking endpoint print only when both a custom SIT and the Confidential label are present.

Key rule: DLP does not auto-apply labels. Labels are applied by auto-labeling policies, client-side labeling, or Defender for Cloud Apps. DLP reads the label that was already applied. The two systems have separate configuration paths.
Custom SIT Strategy (SitPak Model)

The platform uses a SitPak methodology for non-standard sensitive information types. Rather than relying on built-in SITs that generate broad alerts, SitPaks build custom SITs using a combination of primary elements, supporting dictionaries, contextual facets, and bi-directional proximity to surface intent β€” not just pattern presence.

SitPak Structure

  • Primary element: regex anchor (e.g., subpoena language, financial routing patterns)
  • Supporting dictionary: contextual vocabulary confirming document type
  • Facets: risk-amplifying attributes (amounts, dates, authority language, case references)
  • Exceptions: training content, templates, mock examples

v2 Packed SIT (Single-SIT Method)

The 2026 SitPak model packages all patterns inside a single custom SIT using multiple pattern sets. This reduces administrative overhead while preserving contextual detection. Each thematic domain (Legal, Security, HR, Governance) has its own SitPak.

βš–οΈ Legal SitPak

Subpoena Β· Search Warrant Β· Law Enforcement Inquiry Β· Preservation Request

πŸ” Security SitPak

Internal Investigation Β· Damage Assessment Β· Threat of Violence Β· Breach Impact

πŸ‘₯ HR SitPak

HR Investigation Β· Employee Investigation Β· Disciplinary Β· Workplace Review

πŸ›οΈ Governance SitPak

CUI Β· TLP:RED Β· TLP:AMBER Β· Controlled Unclassified Β· Official Use Only

DLP Best Practices
  • Scope policies to specific locations rather than "All" initially β€” reduce noise and test coverage
  • Use TestWithNotifications mode before enabling block actions
  • Always define exception rules for known-good content (templates, training docs)
  • Separate discovery policies from enforcement policies β€” keep them independent and independently tuneable
  • Version every policy and rule β€” name includes domain, version, date, and mode (e.g., Legal-DLP-v1-Audit)
  • Start with medium confidence (75) β€” not high β€” to avoid false negatives on first pass
  • Use Activity Explorer to review match distribution before tightening proximity or confidence
  • Export baseline before any SIT modification β€” use Get-DlpSensitiveInformationTypeRulePackage
  • Simulate in Test mode for at least one full week before enabling notifications
  • Document every SIT: owner, domain, corpus, confidence rationale, exception list
  • Endpoint DLP requires Defender for Endpoint β€” confirm device onboarding before scoping
  • Control activities independently: clipboard, print, USB, network upload, Bluetooth, screenshot
  • Use scoped policies for high-sensitivity roles (Finance, Legal, Security) before broad rollout
  • Test on a pilot device group β€” Endpoint DLP can block critical workflows if misconfigured
  • Review Endpoint activity in Activity Explorer with the Endpoint filter applied
Alert Workflow Model β€” Risk-Based Triage
Confirmed Operating Principles: Triage is risk-based, never FIFO.  Β·  Severity must appear in the ticket subject line (e.g., "Critical event β€” PHI disclosure via email").  Β·  Single-incident and multi-incident workflows are distinct branches, not the same path.
β‘  Generate

DLP policy fires on SIT match / label violation. Alert generated from Purview policy logic and surfaced primarily in Defender XDR, where DLP alerts are grouped into incidents, correlated with other Microsoft security alerts, enriched with evidence, and optionally synchronized into Sentinel or external SIEM/SOAR.

β‘‘ Enrich

Alert enriched with SIT type, confidence score, user risk score (IRM), prior incident history. Subject-line schema applied: [Severity] [Source] [Brief] [TicketID].

β‘’ Notify + Preserve

Ticket created in ServiceNow/SOAR. Power Automate triggers eDiscovery hold at notification stage β€” preserves evidence before triage starts. Regulatory clock begins here.

β‘£ Triage

L1 analyst assigns risk score. Risk-based queue ordering β€” highest risk first. Single-incident path or multi-incident/pattern path. FIFO is explicitly prohibited.

β‘€ Investigate

L2 analyst reviews content, access logs, and communications. Gathers evidence per RACI. PHI/patient-impact threshold determines whether L3 or Legal is pulled in immediately.

β‘₯ Act

Action taken: block, quarantine, revoke access, patient/member notification (if required by HIPAA breach rule). Escalation to L3 for PHI-related incidents. All actions timestamped in ticket.

⑦ Close

Closure category selected: true positive, false positive, accepted risk, or escalated. Closure evidence attached. Metrics fed back to Splunk KPI dashboards (Artifact 2).

πŸ“‹ Replication Template

Every future workflow uses the same schema: trigger, severity, RACI, SLA, steps, decision tree, evidence requirements, closure criteria, KPI feed. See Platform Workbook A4 for full template.

SeverityTriage SLAInvestigation SLATicket Subject PrefixEscalation Trigger
Critical15 minutes4 hoursCritical event β€”PHI disclosure confirmed / mass exfil
High2 hours24 hoursHigh event β€”Repeated pattern / IRM score β‰₯ 70
Medium24 hours5 business daysMedium event β€”Business justification absent
Low5 business days10 business daysLow event β€”Accumulation of 5+ low events
Alert Volume Tuning (prerequisite): Before documenting workflows, reduce alert volume by at least 40% through SIT confidence tuning, policy scope narrowing, and exception list building. A workflow documented against a 1,000-alert-per-day baseline will be operationally useless. Tune first, document second.

Artifact 4 β€” Workflow Replication Order (5 Named Workflows)

Each workflow is documented end-to-end using the 7-stage lifecycle schema above. Build in this order β€” each adds complexity and prerequisite tooling over the prior.

  1. IRM Departing Employee β€” highest-risk exfiltration vector. Leverage IRM integration already in scope. Cross-references Insider Risk Management alerts to DLP events. Triage, evidence collection, and HR handoff documented.
  2. Auto-Label Failure β€” captures label misapplication and detection gaps. Documents the review-and-correct loop when auto-labeling produces wrong or missing labels on sensitive content. Engineering diagnostic path.
  3. Retention Disposition Exception β€” governance-critical. Documents the workflow when scheduled disposition is blocked: legal hold, unresolved review, regulatory exception. Connects Artifact 1 (retention) to Artifact 4 (workflow).
  4. eDiscovery Preservation Hold β€” legal interface workflow. Documents trigger β†’ preserve β†’ notify chain for when a hold is placed. Evidence preservation at Notify+Preserve stage is automated via Power Automate. Legal and compliance RACI defined.
  5. Communication Compliance β€” policy violation detection in Teams/Exchange. Documents triage and review workflow for flagged communications. Highest privacy sensitivity β€” requires defined reviewer roles and legal sign-off on scope.

See Deliverables Tracker β€” Artifact 4 for contracted scope and output checklist. See Platform Workbook A4 for full replication template schema.

References
CNC Data Security Platform Β· Module 01

Data Loss Prevention

Policy scope Β· Enforcement ladder Β· Workload coverage Β· DLP + Labeling integration Β· Custom SIT strategy
What Is DLP?

Core Definition

Policy-based framework identifying, monitoring, and protecting sensitive information across Microsoft 365 workloads, endpoints, and on-premises repositories. Uses deep content analysis: regex, keyword dictionaries, SITs, ML classifiers, and label conditions.

Operating Principle

Labels declare intent. DLP enforces it. DSPM monitors the gap. The three systems are designed to work together β€” not independently.

Enforcement Ladder

β‘  Audit

Log silently. No user impact. Build baseline.

β‘‘ Notify

Policy tips + email. No block. Drive awareness.

β‘’ Override

Allow with justification. Log override reason.

β‘£ Block

Hard block. High-confidence only. Confidential+.

Workload Coverage Summary

Core Workloads

  • Exchange Online β€” email block, encrypt, redirect
  • SharePoint / OneDrive β€” block sharing, quarantine
  • Microsoft Teams β€” block message, notify
  • Endpoint β€” clipboard, USB, print, upload controls

Extended Coverage

  • On-Premises β€” Data Map scanning via SHIR (catalog/classify)
  • On-Premises β€” label enforcement via Information Protection scanner
  • On-Premises β€” DLP enforcement on at-rest repositories via IP scanner infrastructure
  • Power BI / Fabric β€” Premium Gen2 workspaces
  • Microsoft 365 Copilot β€” label-inherited controls
SitPak Custom SIT Domains

βš–οΈ Legal

  • Subpoena, Search Warrant
  • Law Enforcement Inquiry
  • Preservation Request

πŸ” Security

  • Internal Investigation
  • Damage Assessment
  • Threat of Violence

πŸ‘₯ HR

  • HR Investigation
  • Employee Investigation
  • Disciplinary matters

πŸ›οΈ Governance

  • CUI, TLP:RED, TLP:AMBER
  • Controlled Unclassified
  • Official Use Only
References: learn.microsoft.com/en-us/purview/dlp-learn-about-dlp  Β·  learn.microsoft.com/en-us/purview/dlp-policy-reference  Β·  learn.microsoft.com/en-us/purview/sit-create-a-custom-sensitive-information-type