Skip to main content

Data Loss Prevention

DLP policies enforce the decisions that labels represent. A file labeled Confidential or Restricted (or CUI — Basic / CUI — Specified in GCC High) should be blocked from leaving via unauthorized channels — DLP is what does the blocking. Policies operate across Exchange, SharePoint, OneDrive, Teams, and Endpoint (Windows devices).

Policy Priority and Execution Order

Purview evaluates DLP policies in priority order, lowest number first. When a policy match triggers, evaluation continues unless the policy includes a Stop processing more policies rule. Assign priorities deliberately:

Priority RangeCategory
0–3Credential protection — highest risk, always enforce
4–8Restricted / CUI-Specified — encrypt, block, alert
9–14Confidential / CUI-Basic — alert and policy tip
15–20PII / Finance SIT-based alerts
21–25Internal label alerts
26+Endpoint controls and policy tips

Credential Protection

Credentials (passwords, API keys, connection strings) shared externally represent an immediate breach risk. These policies operate independently of sensitivity labels.

PriorityPolicyWorkloadRolloutAction
0Exchange — AD Credential AlertExchangeTest group → All usersAlert + block send
1OneDrive — AD Credential AlertOneDriveTest group → All usersAlert + restrict access
2SharePoint — AD Credential AlertSharePointSimulation → Enforced tenant-wideAlert + restrict access
3Teams — AD Credential AlertTeamsTest group → All usersAlert only

Rule condition: Content contains SITGeneral Password OR Software Development Credentials OR Azure Active Directory Client Secret

Rule action (Exchange): Block the email from being sent; notify the user with a policy tip explaining why.

Rule action (OneDrive/SharePoint): Remove external sharing links; notify the site owner.

Rollout method depends on whether the workload supports user/group scoping

Exchange, OneDrive, and Teams DLP all support scoping a policy to a user or group of senders — deploy Enforced to a small test group, observe real friction, then expand. Test-group enforcement produces real user behavior data (override rates, policy-tip responses, helpdesk volume) that simulation mode cannot.

SharePoint DLP is the exception. SharePoint policies are site-scoped, not user-scoped — there is no way to enforce a SharePoint DLP policy against a subset of users. Use Simulation mode tenant-wide for 30 days to build a false-positive baseline without user impact, tune the policy, then promote to Enforced. This is the only Purview workload where simulation is the primary rollout mechanism rather than a last resort.

Restricted / CUI — External Sharing Alerts

Any external sharing of content at the highest classification tier should generate an alert and, optionally, block the action.

PriorityPolicyWorkloadAction
4Exchange — Restricted External Sharing AlertExchangeAlert + override with justification
5OneDrive — Restricted External Sharing AlertOneDriveAlert + restrict access
6SharePoint — Restricted External Sharing AlertSharePointAlert + restrict access

Rule condition: Content is labeledRestricted (or CUI — Specified in GCC High) AND Content is sharedWith people outside the organization

Rule action: Generate an incident report to the compliance team; notify the user; require override justification.

CUI Authorized Transfer Controls

NIST SP 800-171 Rev. 3 3.1.3 requires controlling CUI flow to external parties. DLP's Allowed Domains feature restricts CUI sharing to pre-approved partner tenants, even if your tenant's general external sharing settings would otherwise permit it.

Configuring Allowed Domains for CUI

In the DLP rule for CUI — Basic or CUI — Specified external sharing:

  1. Set the action to Block external sharing.
  2. Add an exception: Recipient domain is one of → list the approved partner GCC High tenant domains (e.g., partner.onmicrosoft.us).
  3. Require justification for any override — captured in the audit log.

This creates an allowlist: CUI can be sent to prime-contractor.onmicrosoft.us but blocked to gmail.com, hotmail.com, and any unknown tenant.

CMMC Control Mapping

NIST ControlDLP Enforcement
3.1.3 — Control CUI flowAllowed Domains exception list on CUI policies
3.13.1 — Monitor communicationsAlert on all external CUI sharing
3.13.8 — Implement cryptographic mechanismsEncryption enforced by label; DLP blocks unencrypted external send
3.3.1 — Audit logIncident reports to compliance mailbox

Confidential / CUI-Basic — External Sharing Alerts

Content at the Confidential tier requires alerting but not automatic blocking during initial deployment (Foundational phase). Escalate to blocking in the Managed phase once false-positive rates are understood.

PriorityPolicyWorkloadAction
7Exchange — Confidential Label External Sharing AlertExchangeAlert
8OneDrive — Confidential Label External Sharing AlertOneDriveAlert
9SharePoint — Confidential Label External Sharing AlertSharePointAlert

Copilot — Sensitive Label Enforcement

Microsoft 365 Copilot respects sensitivity labels when summarizing or referencing content. This DLP policy prevents Copilot from surfacing labeled content to users who lack access permissions — a prerequisite before deploying Copilot in any regulated environment.

PriorityPolicyWorkloadAction
10Copilot Chat — Sensitive Label EnforcementMicrosoft 365 Copilot and Copilot ChatBlock

Rule condition: Content is labeledConfidential OR Restricted (OR CUI — Basic / CUI — Specified in GCC High)

Rule action: Block Copilot from accessing, processing, or referencing the content.

Deploy Copilot DLP Before Copilot

This policy must be deployed and verified before Microsoft 365 Copilot is enabled for any user. Without it, Copilot will summarize sensitive content for any user with Copilot access regardless of label.

PII SITs — External Sharing Alerts

These policies detect content containing PII SITs at the point of sharing and generate security team alerts.

PriorityPolicyWorkloadConfidence
11Exchange — PII External Sharing AlertExchangeHigh + Medium
12SharePoint — PII External Sharing AlertSharePointHigh + Medium
13OneDrive — PII External Sharing AlertOneDriveHigh + Medium

Rule design (two rules per policy):

  • High Confidence rule: PII SIT group at High confidence + Shared externally → Alert with High severity
  • Medium Confidence rule: PII SIT group at Medium confidence + Shared externally → Alert with Medium severity

Separate rules prevent High severity alerts from being suppressed when Medium confidence matches dominate.

Finance SITs — External Sharing Alerts

PriorityPolicyWorkloadConfidence
14Exchange — Finance External Sharing AlertExchangeHigh + Medium
15OneDrive — Finance External Sharing AlertOneDriveHigh + Medium
16SharePoint — Finance External Sharing AlertSharePointHigh + Medium

Internal Label — External Sharing Alerts

Low-priority audit trail for content labeled Internal that is shared externally. These alerts are informational — Internal does not restrict sharing, but the alert provides a baseline for anomaly detection.

PriorityPolicyWorkloadAction
17OneDrive — Internal Label External Sharing AlertOneDriveAlert (Low severity)
18Exchange — Internal Label External Sharing AlertExchangeAlert (Low severity)
19SharePoint — Internal Label External Sharing AlertSharePointAlert (Low severity)

Endpoint DLP

Endpoint DLP extends policy enforcement to Windows device actions: USB copy, Bluetooth transfer, browser upload, print, and RDP clipboard paste.

PriorityPolicyWorkloadAction
20Endpoint — Block External Cloud UploadsDevices (Intune-enrolled)Block
21Endpoint — Block USB Copy of Sensitive FilesDevices (Intune-enrolled)Block

Endpoint — Block External Cloud Uploads

  • Condition: Content is labeled → Confidential OR Restricted
  • Action: Block upload to unapproved cloud storage (list approved services — SharePoint, OneDrive, approved line-of-business apps)
  • User notification: Policy tip explaining the block; link to approved transfer method

Endpoint — Block USB Copy

  • Condition: Content is labeled → Confidential OR Restricted
  • Action: Block copy to removable media; audit log entry
  • Override: Require justification (written to Unified Audit Log)

CMMC Endpoint Requirements

NIST SP 800-171 Rev. 3 3.8.7 prohibits the use of removable media unless approved and limited to documented needs. Endpoint DLP implements this control technically:

  • Block USB copy for all CUI-labeled content with no override option
  • Block Bluetooth transfer for CUI content
  • Block print of CUI content on non-organizationally-owned printers (use Printer groups to define approved printers)
  • Block RDP clipboard paste of CUI content to non-corporate remote sessions

Configure Printer Groups in Endpoint DLP settings to define corporate-approved print destinations. CUI — Specified policies should use Block always (no override); CUI — Basic may use Block with override during transition.

Policy Tips

Policy tips deliver just-in-time education at the point of risk — when the user is sending an email or uploading a file. They reduce false positives by allowing users to self-serve corrections before a DLP violation is logged.

PII Policy Tips

PolicyWorkloadTrigger
Exchange — Policy Tip — PIIExchangePII SIT at any confidence OR Confidential label detected in outbound email
OneDrive — Policy Tip — PIIOneDrivePII SIT or Confidential label on a file being shared externally
SharePoint — Policy Tip — PIISharePointSame as OneDrive

Tip message example:

"This message appears to contain personal information (names, SSNs, or financial account numbers). Before sending, confirm the recipient is authorized to receive this data and that it is protected per your organization's data handling policy."

Finance Policy Tips

PolicyWorkloadTrigger
Exchange — Policy Tip — FinanceExchangeFinance SIT at any confidence OR Confidential label
OneDrive — Policy Tip — FinanceOneDriveFinance SIT or Confidential label on shared file
SharePoint — Policy Tip — FinanceSharePointSame as OneDrive

Email CC List Warning

A lightweight policy tip that displays a banner on outbound messages with a large CC list — a common vector for accidental data disclosure.

PolicyWorkloadTriggerAction
Exchange — CC List WarningExchangeCC recipient count > 10Display policy tip; allow send

This policy has no SIT condition — it fires on recipient count alone. It does not block sending; it prompts the user to verify the CC list is intentional.

Alert Tuning

After initial deployment, tune DLP alerts weekly:

  1. Review the DLP Alerts dashboard in the Microsoft Purview compliance portal.
  2. For each false-positive alert category, identify the SIT or label condition causing the match.
  3. Adjust confidence level thresholds, add keyword exclusions, or scope the policy to exclude known-safe sites or distribution groups.
  4. Document tuning decisions in your DLP policy change log — this record serves as audit evidence for compliance assessments.

📩 Don't Miss the Next Solution

Join the list to see the real-time solutions I'm delivering to my GCC High clients.