Skip to main content

Incident Response & Insider Risk

DLP policies generate alerts when data crosses a policy boundary. Insider Risk Management (IRM) operates differently — it correlates behavioral signals over time to identify users whose pattern of activity poses risk, even when no individual action crosses a DLP threshold. The two systems complement each other: DLP stops transactions, IRM stops actors.

Activity Explorer

Activity Explorer is the first stop in any label-related incident investigation. It provides a timeline of labeling and DLP actions across Exchange, SharePoint, OneDrive, and Endpoint:

  • Sensitivity label applied — who applied what label to which file
  • Sensitivity label changed — includes the from-label, to-label, and justification text
  • Sensitivity label removed — with justification if mandatory labeling is enabled
  • DLP policy matched — which rule triggered, which workload, override or no override
  • File uploaded to cloud — endpoint DLP events for cloud upload attempts
  • File copied to USB — endpoint events for removable media

Accessing Activity Explorer:

Purview compliance portal → Data classificationActivity explorer

Filter by Label activityLabel downgraded or Label removed to identify mass downgrade events. Filter by user to build a timeline for a specific insider risk investigation.

Investigating a Mass Downgrade Event

If IRM or a DLP alert surfaces a mass downgrade pattern:

  1. Filter Activity Explorer: Activity = Sensitivity label changed, Label action = Downgrade, Date range = past 7 days, User = suspect user
  2. Export to CSV for offline analysis
  3. Cross-reference with file download events in the same period (SharePoint audit log)
  4. Cross-reference with email send events from Exchange (Unified Audit Log)

If the user downloaded files after downgrading labels, this is a strong indicator of intentional exfiltration and should be escalated per your incident response plan.

Insider Risk Management

Policy Configuration

IRM policies correlate signals from Purview labels, DLP events, HR system offboarding feeds, and Entra ID sign-in anomalies into a risk score per user.

SettingValue
Policy templateData theft by departing users / Data leaks
Content to prioritizeSensitivity labels — Confidential, Restricted (or CUI equivalents)
ScoringGet alerts for all activity above threshold
Triggering eventUser performs an exfiltration activity
Triggering thresholdCustom (see below)

Triggering Events

The IRM policy activates risk scoring for a user when any of the following occur:

  • Sends email with attachments to recipients outside the organization
  • Sends email with attachments to free public email domains (gmail.com, yahoo.com, etc.)
  • Sends email with attachments to their own personal email address
  • Uses a browser to upload files to the web (Endpoint DLP signal required)
  • File copied to a remote desktop session
  • Sensitivity label downgraded or removed, then file downloaded, then exfiltrated

The last trigger — the Downgrade-Download-Exfiltrate sequence — is the highest-fidelity signal for intentional insider theft and should always be included.

Policy Indicators

CategoryIndicator
Label activityDowngrading sensitivity labels on files
Label activityRemoving sensitivity labels from files
Label activityRemoving sensitivity labels from SharePoint sites
Cloud activityUnusual mass downloading from a cloud app
Cloud activityUnusual mass sharing from a cloud app
Endpoint activityFile copy to USB (if Endpoint DLP is configured)
Endpoint activityBrowser upload to unapproved cloud storage

Detection Sequences

Enable all three cumulative detection sequences:

SequenceDescription
Download → ExfiltrateLarge-scale download from M365, then external send
Downgrade/Remove → ExfiltrateLabel stripped to evade DLP, then external send
Downgrade/Remove → Download → ExfiltrateFull bypass pattern: strip label, download locally, exfiltrate

Cumulative Exfiltration and Boosters

SettingValue
Cumulative exfiltrationDetect when volume exceeds organizational norms
Booster — Daily volumeActivity is above the user's typical daily volume
Booster — Unusual recipientEmail sent to a domain not previously used by the user

Boosters increase the risk score for an individual event without requiring a separate policy match. They are additive — a downgrade event with a daily-volume booster and an unusual-recipient booster generates a much higher score than a downgrade alone.

Adaptive Protection

Adaptive Protection dynamically applies a DLP action based on a user's current IRM risk level. This directly supports NIST SP 800-171 Rev. 3 3.13.3 (separate user functionality from system management functions based on risk).

IRM Risk LevelAdaptive DLP Action
MinorPolicy tip added to all external sends
ModerateOverride-with-justification required for all external sends
ElevatedBlock all external sharing; alert compliance team

Enable Adaptive Protection under IRM → Adaptive Protection → link to DLP policies. The linked DLP policy must have a condition Adaptive protection risk level is with separate rules for each tier.

CMMC Control Mapping

NIST ControlIRM Capability
3.1.3 — Control CUI flowAdaptive Protection blocks external CUI access for high-risk users
3.3.1 — Create audit logsAll IRM alerts and risk score events written to Unified Audit Log
3.3.2 — Review audit logsActivity Explorer enables investigation of label downgrade timelines
3.6.1 — Incident response planIRM alert → case → investigation workflow
3.14.2 — Security monitoringIRM cumulative exfiltration detection

HR Connector — Offboarding Trigger

IRM can use departure date from HR as a triggering event — activating a departing user policy before the user's last day, not after.

Configure an HR data connector in the Purview compliance portal:

  1. Data connectorsHR connector
  2. Map CSV columns: EmailAddress, ResignationDate, TerminationDate, LastWorkingDay
  3. Schedule daily import via Azure Logic App or scheduled task

Once the connector is active, any user whose ResignationDate is within 30 days will automatically be enrolled in the departing-user IRM policy. Risk scoring begins immediately — not on the last day.

DSPM for AI Readiness

Data Security Posture Management (DSPM) for AI provides visibility into how AI tools (Microsoft 365 Copilot, Copilot Chat) interact with labeled content. It answers the question: "What sensitive data can Copilot reach, and for whom?"

Key DSPM for AI views:

ViewWhat It Shows
Oversharing summaryFiles labeled Confidential or above shared with broad permissions (org-wide, Anyone)
AI interactions with sensitive dataCopilot prompts that referenced Confidential or Restricted content
Users with access to labeled contentWhich users can reach restricted or sensitive files through Copilot

Why labeling today prevents Copilot risk tomorrow:

Copilot cannot summarize or retrieve content that the user does not have access to. But if content is unlabeled and stored in a broadly accessible SharePoint site, Copilot will summarize it for any licensed Copilot user with SharePoint access — regardless of whether the content is sensitive.

The DSPM for AI report surfaces exactly this exposure: unlabeled sensitive content in broadly-shared locations. Labeling that content, combined with the Copilot DLP policy (see DLP Policies), closes the gap before Copilot is deployed.

Pre-Copilot Checklist:

  1. Run DSPM for AI in discovery mode
  2. Remediate overshared sites (remove "Everyone" and "Everyone except external users" sharing permissions)
  3. Apply appropriate sensitivity labels to unlabeled sensitive content identified by service-side auto-labeling
  4. Confirm Copilot DLP policy is enabled and verified
  5. Review DSPM for AI weekly for the first 60 days after Copilot launch

Incident Response Workflow

When a DLP alert or IRM case is generated, follow this workflow:

Alert generated (DLP violation or IRM high risk score)

Triage in Purview Alerts or IRM Cases

Open Activity Explorer — build user timeline

Pull SharePoint/Exchange audit log for file/email evidence

Determine: false positive or confirmed incident?
↓ (confirmed)
Open IRM Case → assign investigator

Collect evidence package (Activity Explorer export + audit log CSV)

Notify HR, Legal, and Security per incident response plan

Apply Adaptive Protection elevated restriction if not already triggered

Close case with disposition (no action / warning / HR action / law enforcement)

Document in incident response log (NIST 3.6.2 audit evidence)

Purview IRM cases include a built-in evidence collection feature — Forensic evidence — that captures screen recordings on managed Windows devices for confirmed high-risk users (requires additional licensing). Enable this capability only after legal review, as it may be subject to employee privacy agreements.

📩 Don't Miss the Next Solution

Join the list to see the real-time solutions I'm delivering to my GCC High clients.