Skip to content

Commit 5c69c77

Browse files
authored
in progress
1 parent b3a5b73 commit 5c69c77

1 file changed

Lines changed: 68 additions & 0 deletions

File tree

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
# Data Loss Prevention (DLP) in Azure Purview - How to configure it
2+
3+
Costa Rica
4+
5+
[![GitHub](https://badgen.net/badge/icon/github?icon=github&label)](https://github.com)
6+
[![GitHub](https://img.shields.io/badge/--181717?logo=github&logoColor=ffffff)](https://github.com/)
7+
[brown9804](https://github.com/brown9804)
8+
9+
Last updated: 2024-11-19
10+
11+
----------
12+
13+
## Access the Microsoft Purview Compliance Portal
14+
15+
- Go to the [Microsoft Purview portal](https://purview.microsoft.com/).
16+
- Sign in with your administrator credentials.
17+
18+
<img width="550" alt="image" src="https://github.com/user-attachments/assets/8c39f351-c098-4858-9e41-96c8b91de5b1">
19+
20+
## Create a DLP Policy
21+
22+
- Go to `Data loss prevention`
23+
24+
<img width="550" alt="image" src="https://github.com/user-attachments/assets/da6ef80f-7ca8-456a-993d-a6d40bb28c53" />
25+
26+
27+
- Select `Policies` > `Create policy`:
28+
29+
<img width="550" alt="image" src="https://github.com/user-attachments/assets/85f706eb-276e-4f7f-998f-f44bcf8fbfc3" />
30+
31+
- Choose a template or create a custom policy based on your organization's needs.
32+
33+
## Define Policy Scope
34+
35+
- Select the locations where the policy will apply (e.g., Exchange email, SharePoint sites, OneDrive accounts, Teams chat).
36+
- Specify the users or groups the policy will target.
37+
38+
## Configure Policy Settings
39+
40+
- **Sensitive Information Types**: Choose the types of sensitive information the policy will detect (e.g., credit card numbers, social security numbers).
41+
- **Conditions**: Set conditions for when the policy should trigger (e.g., when sensitive information is shared externally).
42+
- **Actions**: Define actions to take when a policy violation occurs (e.g., block sharing, send alerts, notify users).
43+
44+
## Set Up Alerts and Notifications
45+
46+
- Configure alerts to notify administrators and users when a policy violation occurs.
47+
- Customize notification messages to inform users about the policy and the actions taken.
48+
49+
## Test and Deploy the Policy
50+
51+
- **Test Mode**: Initially deploy the policy in test mode to monitor its impact without enforcing actions.
52+
- **Review Results**: Analyze the test results and adjust the policy settings as needed.
53+
- **Enforce Policy**: Once satisfied with the configuration, switch the policy to enforce mode.
54+
55+
## Monitor and Manage Policies
56+
57+
- Regularly review policy performance and adjust settings based on new threats or changes in business needs.
58+
- Use the DLP reports and dashboards to track policy effectiveness and compliance.
59+
60+
## Advanced Configuration (Optional)
61+
62+
- **Endpoint DLP**: Configure settings for endpoint devices to restrict actions like copying, printing, or transferring sensitive data
63+
- **Integration with Microsoft Defender**: Extend DLP alerts to Microsoft Defender XDR and Microsoft Sentinel for advanced threat detection and response
64+
65+
<div align="center">
66+
<h3 style="color: #4CAF50;">Total Visitors</h3>
67+
<img src="https://profile-counter.glitch.me/brown9804/count.svg" alt="Visitor Count" style="border: 2px solid #4CAF50; border-radius: 5px; padding: 5px;"/>
68+
</div>

0 commit comments

Comments
 (0)