Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article uses the process you learned in Design a data loss prevention policy to show you how to create a Microsoft Purview Data Loss Prevention (DLP) policy that helps prevent users from sharing credit card numbers through email. Work through this scenario in your test environment to familiarize yourself with the policy creation UI.
Important
This article presents a hypothetical scenario with hypothetical values. It's only for illustrative purposes. Substitute your own sensitive information types, sensitivity labels, distribution groups, and users.
How you deploy a policy is as important as policy design. This article shows you how to use the deployment options so that the policy achieves your intent while avoiding costly business disruptions.
Prerequisites and assumptions
This scenario uses the Highly confidential sensitivity label, so it requires that you create and publish sensitivity labels. To learn more, see:
- Learn about sensitivity labels
- Get started with sensitivity labels
- Create and configure sensitivity labels and their policies
This procedure uses a hypothetical distribution group Finance team at Contoso.com and a hypothetical SMTP recipient adele.vance@fabrikam.com.
This procedure uses alerts, see: Get started with the data loss prevention alerts
Policy intent statement and mapping
We need to block emails to all recipients that contain credit card numbers or that have the ‘highly confidential’ sensitivity label applied except if the email is sent from someone on the finance team to adele.vance@fabrikam.com. We want to notify the compliance admin every time an email is blocked and notify the user who sent the item and no one can be allowed to override the block. Track all occurrences of this high risk event in the log and we want the details of any events captured and made available for investigation
Statement | Configuration question answered and configuration mapping |
---|---|
"We need to block emails to all recipients..." | - Where to monitor: Data stored in connected sources and Exchange - Administrative scope: Full directory - Action: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone |
"...that contain credit card numbers or have the 'highly confidential' sensitivity label applied..." | - What to monitor: use the Custom template - Conditions for match: edit it to add the highly confidential sensitivity label |
"...except if..." | - Condition group configuration: Create a nested boolean NOT condition group joined to the first conditions using a boolean AND |
"...the email is sent from someone on the finance team..." | - Condition for match: Sender is a member of |
"...and..." | - Condition for match: add a second condition to the NOT group |
"...to adele.vance@fabrikam.com..." | - Condition for match: Recipient is |
"...Notify..." | - User notifications: enabled - Policy tips: enabled |
"...the compliance admin every time an email is blocked and notify the user who sent the item..." | - Policy tips: enabled - Notify these people: selected - The person who sent, shared, or modified the content: selected - Send the email to these additional people: add the email address of the compliance administrator |
"...and no one can be allowed to override the block... | - Allow overrides from M365 Services: not selected |
"...Track all occurrences of this high risk event in the log and we want the details of any events captured and made available for investigation." | - Use this severity level in admin alerts and reports: high - Send an alert to admins when a rule match occurs: selected - Send alert every time an activity matches the rule: selected |
Steps to create the policy
Important
For this policy creation procedure, accept the default include and exclude values and leave the policy turned off. Change these values when you deploy the policy.
Sign in to the Microsoft Purview portal.
Open the Data loss prevention solution and go to Policies > + Create policy.
Select Data stored in connected sources.
Select Custom from the Categories list.
Select Custom from the Regulations list.
Select Next.
Enter a Name and a Description for the policy. You can use the policy intent statement here.
Important
You can't rename policies.
Select Next.
Assign admin units. To apply the policy to all users, accept the default setting.
Select Next.
Choose where to apply the policy. Select only the Exchange email ___location. Deselect all the other locations.
Select Next.
On the Define policy settings page, the Create or customize advanced DLP rules option should already be selected.
Select Next.
Select Create rule. Name the rule and provide a description.
Under Conditions, select Add condition > Content contains.
(Optional) Enter a Group name.
(Optional) Select a Group operator.
Select Add > Sensitive info types > Credit Card Number.
Select Add.
Still within the Content contains section, select Add > Sensitivity labels > Highly confidential and then select Add.
Next, beneath the Content contains section, select Add group.
Leave the Boolean operator set to AND, then set the toggle to NOT.
Select Add condition.
Select Sender is a member of.
Select Add or remove distribution groups.
Select Finance Team and then select Add.
Select Add condition > Recipient is.
In the email field, enter adele.vance@fabrikam.com and select Add .
Under Actions, select Add an action > Restrict access or encrypt the content in Microsoft 365 locations.
Select Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files, then select Block everyone.
Set the User notifications toggle to On.
Select Email notifications > Notify the person who sent, shared, or last modified the content.
Choose whether or not to Attach matching email message to the notification.
Choose whether or not to add Policy tips.
Under User ovverides, make sure that Allow overrides from Microsoft 365 apps and services ... is NOT selected.
Under Incident reports, set Use this severity level in admin alerts and reports to High.
Set Send alert every time an activity matches the rule toggle to On.
Select Save.
Select Next, then select Run the policy in simulation mode.
Select Next and then select Submit.
Select Done.