Create custom sensitive information types in the compliance portal
If the pre-configured sensitive information types (SIT) don't meet your needs, you can create your own custom SITs that you fully define. You can also copy one of the pre-configured SITs and modify it.
The custom sensitive information types that you create by using these methods are added to the rule package named Microsoft.SCCManaged.CustomRulePack
.
There are two ways to create a new sensitive information type:
- from scratch where you fully define all elements
- copy and modify an existing sensitive information type
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.
Before you begin
You should be familiar with sensitive information types and what they're composed of. To get this understanding, see, Learn about sensitive information types. It's critical to understand the roles of:
- regular expressions - Microsoft 365 sensitive information types uses the Boost.RegEx 5.1.3 engine
- keyword lists - you can create your own as you define your sensitive information type or choose from existing keyword lists
- keyword dictionary
- Sensitive information type functions
- confidence levels
Familiarize yourself with Sensitive information type limits.
Your organization must have a subscription, such as Office 365 Enterprise, that includes Microsoft Purview Data Loss Prevention (DLP). See Messaging Policy and Compliance ServiceDescription.
Important
Microsoft Customer Service & Support can't assist with creating custom classifications or regular expression patterns. Support engineers can provide limited support for the feature, such as, providing sample regular expression patterns for testing purposes, or helping to troubleshoot an existing regular expression pattern that's not triggering as expected. However, they can't provide assurances that any custom content-matching development will fulfill your requirements or obligations.
Create a custom sensitive information type
Use this procedure to create a new sensitive information type that you fully define.
In the Compliance Center, go to Data classification > Classifiers > Sensitive info types and choose Create sensitive info type.
Fill in values for Name and Description and choose Next.
Choose Create pattern. You can create multiple patterns, each with different elements and confidence levels, as you define your new sensitive information type.
Choose the default confidence level for the pattern. The values are Low confidence, Medium confidence, and High confidence.
Choose and define Primary element. The primary element can be a Regular expression with an optional validator, a Keyword list, a Keyword dictionary, or one of the pre-configured Functions. For more information on DLP functions, see Sensitive information type functions. For more information on the date and the checksum validators, see Sensitive Information Type regular expression validators.
Fill in a value for Character proximity.
(Optional) Add supporting elements if you have any. Supporting elements can be a regular expression with an optional validator, a keyword list, a keyword dictionary or one of the pre-defined functions. Supporting elements can have their own Character proximity configuration.
(Optional) Add any additional checks from the list of available checks.
Choose Create.
Choose Next.
Choose the recommended confidence level for this sensitive information type.
Check your settings and choose Save.
Important
Microsoft 365 uses the search crawler to identify and classify sensitive information in SharePoint Online and OneDrive for Business sites. To identify your new custom sensitive information type in existing content, the content must be re-crawled. Content is crawled based on a schedule, but you can manually re-crawl content for a site collection, list, or library. For more information, see Manually request crawling and re-indexing of a site, a library or a list.
The Sensitive info types tab of the Classifiers page, lists all of the sensitive information types. Choose Refresh and then browse for or use the search tool to find the sensitive information type you created.
Copy and modify a sensitive information type
Use this procedure to create a new sensitive information type that is based on an existing sensitive information type.
Note
These SITs can't be copied:
- Canada driver's license number
- EU driver's license number
- EU national identification number
- EU passport number
- EU social security number or equivalent identification
- EU tax identification number
- International classification of diseases (ICD-10-CM)
- International classification of diseases (ICD-9-CM)
- U.S. driver's license number
You can also create custom sensitive information types by using PowerShell and Exact Data Match (EDM) capabilities. To learn more about those methods, see:
- Create a custom sensitive information type in Microsoft Purview PowerShell
- Learn about exact data match based sensitive information types
In the Compliance Center, go to Data classification > Classifiers > Sensitive info types and select the sensitive information type that you want to copy.
The overview page for the sensitive information type opens. Choose Copy. When the copy is ready, a message stating that the copy was created appears with an option to edit it. Choose Yes.
Give your new sensitive information type a new Name and Description.
You can choose to create a new pattern, or edit or remove some or all of the existing patterns.
- To create a new pattern, choose Create.
- To edit an existing pattern, choose the Edit (pencil) icon next to the pattern you want to change.
- To remove a pattern, choose the Delete icon next to the pattern you want to remove.
When creating or editing a pattern, choose the default confidence level for the pattern. The values are Low confidence, Medium confidence, and High confidence.
Choose and define Primary element. The primary element can be a Regular expression, a Keyword list, a Keyword dictionary, or one of the pre-configured Functions. See, Sensitive information type functions.
Fill in a value for Character proximity.
(Optional) If you have Supporting elements or any additional checks add them. If needed, you can group your Supporting elements.
If you're creating a new pattern, choose Create. If you are editing an existing pattern, choose Update.
Choose Next.
Confirm your confidence level selection for this sensitive information type and then choose Next.
Review your settings and then choose Save.
Your sensitive information type is created. At the confirmation message, choose *Done
Test a sensitive information type
You can test any sensitive information type in the list. We suggest that you test every sensitive information type that you create before using it in a policy.
Prepare two files, for example, two Word documents. One should have content that matches the elements you specified in your sensitive information type. The other should have content that doesn't match.
In the compliance portal, go to Data classification > Classifiers > Sensitive info types and choose the sensitive information type from the list to open the details pane. Choose Test.
Upload a file and choose Test. (You can only upload and test one file at a time.)
On the Match results page, review the results and choose Finish.
Note
Microsoft Purview information protection supports double byte character set languages for:
- Chinese (simplified)
- Chinese (traditional)
- Korean
- Japanese
This support is available for sensitive information types. See, Information protection support for double byte character sets release notes (preview) for more information.
Tip
To detect patterns containing Chinese/Japanese characters and single byte characters, or to detect patterns containing Chinese/Japanese and English, define two variants of the keyword or regex.
- For example, to detect a keyword like "机密的document", use two variants of the keyword; one with a space between the Japanese and English text and another without a space between the Japanese and English text. So, the keywords to be added in the SIT should be "机密的 document" and "机密的document". Similarly, to detect a phrase "東京オリンピック2020", two variants should be used; "東京オリンピック 2020" and "東京オリンピック2020".
Along with Chinese/Japanese/double byte characters, if the list of keywords/phrases also contain non Chinese/Japanese words also (for instance, English only), creating two dictionaries/keyword lists is recommended. Create one for keywords containing Chinese/Japanese/double byte characters and another for English-only.
- For example, if you want to create a keyword dictionary/list with three phrases "Highly confidential", "機密性が高い", and "机密的document", you should create two keyword lists.
- Highly confidential
- 機密性が高い, 机密的document and 机密的 document
While creating a regex using a double byte hyphen or a double byte period, make sure to escape both the characters in the same way that you would escape a hyphen or period in a regex. Here is a sample regex for reference:
(?<!\d)([4][0-9]{3}[\-?\-\t]*[0-9]{4})
Double-byte special characters should not be used in the keyword.
We recommend using a string match instead of a word match in a keyword list.
Feedback
Submit and view feedback for