Scenario-based troubleshooting guide – DLP Issues

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

Compliance team / IT admins play a vital role in the organization to ensure the firm complies with business standards and industry regulations. When it comes to data, the detection and protection of data are among the most important tasks that any business has today.

 

With the help of Office DLP, it makes it easier to identify, monitor, and protect the sensitive data across:

 

  • Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive
  • Office applications such as Word, Excel, and PowerPoint
  • Windows 10, Windows 11 and macOS (Catalina 10.15 and higher) endpoints
  • non-Microsoft cloud apps
  • on-premises file shares and on-premises SharePoint.

Microsoft 365 DLP detects sensitive items by using deep content analysis, not by just a simple text scan. Content is analyzed for primary data matches to keywords, by the evaluation of regular expressions, by internal function validation, and by secondary data matches that are in proximity to the primary data match. Beyond that, DLP also uses machine learning algorithms and other methods to detect content that matches your DLP policies.

 

This article describes how to troubleshoot some common DLP issues.

 

Common Scenarios:

  • DLP policy is not blocking sensitive information.
  • DLP policy tips are not working in Outlook and OWA clients.
  • DLP Policy False positive

.

Scenario 1: DLP policy is not blocking the sensitive information

 

Users are able to send emails/documents containing Sensitive Information like Credit Cards and SSN and items are not being blocked by the DLP policy.

 

Possible cause:

  • Content of the email message.
  • Configuration issue – DLP Policy

Possible Solution:

  • Content of the email message

Check if the content of the message matches the format, pattern, and keywords as per Sensitive information type entity definitions - Microsoft 365 Compliance | Microsoft Docs

 

Example:

 

Sathya_Narayanan_0-1653916513865.png

 

You can upload a file to test whether these sensitive info types detect the matching elements you specified.

 

  1. In the Microsoft 365 compliance center, locate Data Classification in the left pane.
  2. On the Sensitive info types tab, select the one which you would like to test. Click on Test and upload the file

 

Sathya_Narayanan_1-1653916513873.png

 

Test results include a Confidence level and Support elements as below

 

Sathya_Narayanan_2-1653916513878.png

 

  1. In the Microsoft 365 compliance center, locate Data loss prevention in the left pane.
  2. On the Policies tab, select the policy that requires editing, and then select Edit policy.
  3. Review the policy settings and make necessary changes

 

Sathya_Narayanan_3-1653916513884.png

 

 

Learn more about Fundamental parts of a sensitive information type and confidence levels Learn about sensitive information types - Microsoft 365 Compliance | Microsoft Docs

Create, test, and tune a DLP policy: Create, test, and tune a DLP policy - Microsoft 365 Compliance | Microsoft Docs

Supported DLP Conditions: Data Loss Prevention policy reference - Microsoft 365 Compliance | Microsoft Docs

 

Scenario 2: DLP policy tips are not working in Outlook / OWA client

DLP is not detecting the sensitive information and the policy tips are not shown in Outlook / OWA clients. The DLP function to evaluate the message isn't triggered immediately. When a message is created, it doesn't yet meet the DLP policy conditions. The DLP policy tip is called and the content is evaluated after data is added to the message. Wait about 30-50 seconds to let the function be called. You can also expect the function to occur automatically when one of the following actions occurs: 

  • An attachment is added or removed.
  • AutoSave runs (one time every minute).
  • You click Save (to manually save a message).
  • You open a draft.

After the function is triggered, you receive a message that resembles the following if the message violates the DLP policies.

 

Sathya_Narayanan_4-1653916513885.png

 

Possible Cause:

  • Outlook Licenses
  • Client-side issue.
  • DLP Policy Configuration.

Troubleshooting:

Steps: Outlook > File > Options > Mail > MailTips Options

 

Sathya_Narayanan_5-1653916513889.png

 

  • This issue may occur because the compatible version criteria that are processed by the policy evaluator are based on the version of mso20win32client.dll, not the version of Outlook. In many cases, the version of mso20win32client.dll is not the same as the version of Outlook and Office. Make sure that Outlook applies all expected DLP policies, the administrator must verify that the Policy Nudge Rule for minRequiredVersion has a value that's no greater than the client-installed version of mso20win32client.dll. Please refer to DLP Policy Tip notifications are not displayed in Outlook for Windows - Outlook | Microsoft Docs
  • This problem occurs if the updated DLP policy wasn't downloaded to Outlook. Outlook Client checks for changes to DLP policies one time every 24 hours.

To work around this issue, force Outlook Client to download the updated DLP policies. To do this, you must use Registry Editor to remove existing DLP policies that are applied to Outlook Client. To do this, follow these steps:

  1. Exit Outlook Client
  2. Click Start, click Run, type regedit, and then click OK.
  3. In Registry Editor, locate the following subkey: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\PolicyNudges (For Outlook 2016  - HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\PolicyNudges)
  4. Delete the LastDownloadTimesPerAccount registry entry.
  5. Exit Registry Editor.

 

Now start Outlook 2013 again, create a new message, and then type some text. When you do this, you force Outlook 2013 to download DLP policies. For more information: Changes to a data loss prevention policy don't take effect in Outlook 2013 in Office 365 - Office 365 | Microsoft Docs

Currently, Outlook 2013 and later supports showing policy tips only for these conditions:

  1. Content contains
  2. Content is shared

Currently, Outlook 2013 and later supports showing policy tips only for this action:

  1. Block people from receiving email messages or accessing shared SharePoint, OneDrive, and Teams files.

 

Note: Exceptions are considered conditions and all these conditions work in Outlook. They will match content and enforce protective actions on content. However, showing policy tips is not yet supported.

 

Scenario 3: DLP Policy False positive:

DLP policy triggers incorrectly on content in messages or files. For example, numbers are mistaken for a Credit Card or Bank Account number.

 

Possible Cause:

  • DLP Policy Configuration
  • Content of the message

Troubleshooting:

It is always important for the administrators to test and tune the DLP policies before turning on for all the users in the Organisation.

Generate an incident report action to the existing DLP policy

  • In the Microsoft 365 compliance center, locate Data loss prevention in the left pane.
  • On the Policies tab, select the policy that requires editing, and then select Edit policy.

 

Sathya_Narayanan_6-1653916513893.png

 

Sathya_Narayanan_7-1653916513899.png

 

  • Review the Incident Report to determine why the rule is triggered. Below is a sample incident report that was generated

 

Sathya_Narayanan_8-1653916513901.png

 

DLP false positives and overrides: If your DLP policy allows users to override it or report a false positive, this report shows a count of such instances over time. You can filter the report by date, location, or policy. You can use this report to:

  • Tune or refine your DLP policies by seeing which policies incur a high number of false positives.
  • View the justifications submitted by users when they resolve a policy tip by overriding the policy.
  • Discover where DLP policies conflict with valid business processes by incurring a high number of user overrides.

All DLP reports can show data from the most recent four-month time period. The most recent data can take up to 24 hours to appear in the reports.

 

For more information, please refer to:

View the reports for data loss prevention - Microsoft 365 Compliance | Microsoft Docs

Tips and tricks for maximizing accuracy and reducing false positive detections in MIP and DLP - Microsoft Tech Community

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.