Microsoft Compliance – Paint By Numbers Series (Part 3) – Data Loss Protection for Exchange

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

paint_by_numbers_splash_picture.jpg

Disclaimer

This document is not meant to replace any official documentation, including those found at docs.microsoft.com.  Those documents are continually updated and maintained by Microsoft Corporation.  If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as needed.  Links to the docs.microsoft.com data will be referenced both in the document steps as well as in the appendix.

All of the following steps should be done with test data, and where possible, testing should be performed in a test environment.  Testing should never be performed against production data.

 

Target Audience

The Data Loss Protection (DLP) section of this blog series is aimed at Security and Compliance officers who need to prevent data from being emailed to users in untrusted domains.

Document Scope

This document is meant to guide an administrator who is “net new” to Microsoft E5 Compliance through the configuration of Teams Data Protection Loss (DLP).

It is presumed that you already have a Sensitive Information Type that you want to use in your DLP policy.  For the purposes of this Policy I will use the U.S. Social Security Number (SSN) Sensitive Information Types (or SIT of short).

 

Out-of-Scope

This document does not cover any other aspect of Microsoft E5 Compliance, including:

  • Sensitive Information Types
  • Exact Data Matches
  • Microsoft Cloud App Security (MCAS)
  • Records Management (retention and disposal)
  • Data Protection Loss (DLP) for Teams, Endpoint and devices
  • Information Protection
  • Advanced eDiscovery

 

It is presumed that you have a pre-existing of understanding of what Microsoft E5 Compliance does and how to navigate the User Interface (UI).

It is also presumed you are using an existing Information Types (SIT) or a SIT you have created for your testing.

 

Overview of Document

  1. Choose which Sensitive Information Types (or SIT) you wish to use.
  2. Create a DLP policy
  3. Test your DLP against emails in Exchange with either an internal or external email address

 

 

Use Case

Your company does not want data to be emailed outside of the company, by accident or on purpose.

 

Definitions

There are no extra definitions for this part of the blog series.

 

 

Notes

  • There are no extra notes for this part of the blog series.
  • It will take a minimum of 15 minutes after DLP policy creation for the account to take affect

 

Pre-requisites

  • Have an recipient email address you can us for testing. This email address can be internal to your organization or external to your tenant.

 

DLP Creation

  1. On the left-hand navigation field, select Data Loss Protection.

James_Havens_0-1628289099332.png

 

 

  1. In the right-rand pain, select Policies and Create Policy

 

 

James_Havens_1-1628289099345.png

 

 

  1. First you need to Choose the information to Protect.  Select Custom –> Custom Policy and then click Next.

 

James_Havens_2-1628289099371.png

 

 

  1. Name your Policy and give it a description.  Then click Next.
    1. Example = Name – Exchange DLP
    2. Example = Description – Exchange DLP

 

James_Havens_3-1628289099373.png

 

 

  1. Chose the Locations to apply the policy.  For this DLP policy, we will deselect everything Exchange for the Exchange email.
    1. Under Included, leave the All as the default.
    2. Under Excluded, leave the None as the default.
    3. Click Next.

 

James_Havens_4-1628289099378.png

 

 

  1. Define DLP rules settings
    1. Click Create or Customize advanced DLP rules and click Next.
    2. Now click Create Rule.

 

James_Havens_6-1628289099380.png

 

c. In the Customize advanced DLP rules, click Create Rule

 

James_Havens_7-1628289099381.png

 

d. Name your Rule and give it a description.

i. Example = Name – Exchange SSN DLP

ii. Example = Description – Exchange SSN DLP

 

James_Havens_8-1628289099384.png

 

e. Under Conditions, click Add Condition and select Add -> Sensitive info types and select your SIT.  I am selecting the SIT labeled U.S. SSN – numbers only.  Let us place the confidence of this SIT to High Confidence.

James_Havens_9-1628289099390.png

f. On the right hands side you will see a drop down.  Leave this at the default of Any of these.

 

James_Havens_10-1628289099391.png

 

g. Do not add a second Condition for this test, but you can add multiple Conditions for your own testing later on.

 

 

James_Havens_11-1628289099394.png

 

h. Do not added an Exception.  Again, you can do this for your own testing at a later time.

 

James_Havens_12-1628289099398.png

 

i. Under Actions, select Add an Action -> Restrict Access or Encrypt the content in Microsoft 365 location.

i. Select Block users and then select Block Everyone.

a. Note – If you have access to an external Exchange account for testing, feel free to select Block only people outside your organization.

James_Havens_13-1628289099428.png

 

j. Now go to User Notifications.  Here you will set up the alerts to be sent to your administrator or compliance officer. 

 

a. Select On.

b. Select Notify the user who sent, shared or last modified the content.  This will alert the users that they have violated the DLP policy.  If desired, create a custom email text, email subject, and/or policy top.

 

James_Havens_14-1628289099441.png

 

k. Next are user overrides.  For this document, we will leave this to Off.

 

James_Havens_15-1628289099446.png

 

l. The last section in the Rules pop-out, is the Incident reports.  Here you can select the severity (Low, Medium, High) for the rule.  I will select High for my rule.

 

James_Havens_16-1628289099452.png

 

i. For Send an alert to admins when a rule match occurs, select On.  Then click Add or remove people and add the admin or compliance officer you want to receive alerts.  For my rule, I will send alerts to the Admin account.

 

 

James_Havens_17-1628289099456.png

 

m. Next you can either Send alert every time or Send alert when the volume matches a threshold.  We will accept the default of Send alert every time.  This will allow for more granular testing to start.

 

James_Havens_18-1628289099462.png

 

 

n. For Use email incident reports to notify you when a policy match occurs and turn it to On.  Then click Add or remove people and add the admin or compliance officer you want to receive alerts.  I will send notifications to the Admin account.

 

James_Havens_19-1628289099466.png

 

o. For the rest of the options, leave them at the defaults and click Save.

 

James_Havens_20-1628289099481.png

 

p. Click Save and then click Next.

 

  1. Now we arrive at the step to configure Test or turn on the policy.  Let us enable Turn it on right away, and then click Next.

 

James_Havens_21-1628289099492.png

 

 

  1. Review your policy and create it.  You will see a summary of what you have created.  If everything looks correct, click Submit.

 

James_Havens_22-1628289099501.png

 

 

DLP Testing

  1. Open Exchange365 for your test user and create an with another test user.  I am using Pradeep and Admin as my two test users.  My test data belongs to user John Doe.
  2. In the email, enter the data you wish to block and click Send.  Again, I am using a U.S. SSN – number only as my SIT.  This will any block Social Security Numbers without the need of an accompanying keywords such as SSN, SSID, Social Security Number, etc.

 

 

James_Havens_24-1628289099504.png

 

 

  1. When you click Send, you should see a message similar to the one those below indicating this email message is blocked.   This first image is a pop-up that will not appear when you click Send.  The second is what message that will appear in your email notifications pop-up IF you are able to click Send.

 

  • Pop-up #1

 

 

 

James_Havens_25-1628289099509.png

 

  • Pop-up #2

 

 

James_Havens_26-1628289099514.png

 

 

 

  1. Now find a file with blocked SIT inside the file body or in the file name and click Send.

James_Havens_27-1628289099517.png

 

 

  1. Again, you will see a message indicating that the message is blocked.

 

If you want to test overrides, take a look at the following section.  Otherwise, proceed to Part 3 of this blog series or any other part you wish to explore.

 

 

 

Overrides

  1. If you wish to allow user to Override DLP policy, you can go to the Rule and then the section labeled User overrides.  Click it to On.  Then select which override you want to run for your testing.

 

James_Havens_28-1628289099522.png

 

 

 

Appendix – Official Document Links

 

 

 

Note: This solution is a sample and may be used with Microsoft Compliance tools for dissemination of reference information only. This solution is not intended or made available for use as a replacement for professional and individualized technical advice from Microsoft or a Microsoft certified partner when it comes to the implementation of a compliance and/or advanced eDiscovery solution and no license or right is granted by Microsoft to use this solution for such purposes. This solution is not designed or intended to be a substitute for professional technical advice from Microsoft or a Microsoft certified partner when it comes to the design or implementation of a compliance and/or advanced eDiscovery solution and should not be used as such.  Customer bears the sole risk and responsibility for any use. Microsoft does not warrant that the solution or any materials provided in connection therewith will be sufficient for any business purposes or meet the business requirements of any person or organization.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.