Learn about the data loss prevention Alerts dashboard
When the criteria in a Microsoft Purview Data Loss Prevention (DLP) policy is matched by the actions a user is taking on a sensitive item, the policy can generate an alert. This situation can result in a high volume of alerts. DLP alerts are collected in the alerts dashboard. The alerts dashboard gives you a single place to go to do a deep investigation of all the details about the policy match.
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.
Workloads
The DLP alert management dashboard, in the Microsoft Purview compliance portal, shows alerts for DLP policies on these workloads:
- Exchange
- SharePoint
- OneDrive
- Teams
- Windows 10 devices
Tip
Customers who use Endpoint DLP who are eligible for Teams DLP will see their endpoint DLP policy alerts and Teams DLP policy alerts in the DLP alert management dashboard.
Single alert and aggregate alert
There are two types of alerts that can be configured in DLP policies.
Single-event alerts are typically used in policies that monitor for highly sensitive events that occur in a low volume, like a single email with 10 or more customer credit card numbers being sent outside your organization.
Aggregate-event alerts are typically used in policies that monitor for events that occur in a higher volume over a period of time. For example, an aggregate alert can be triggered when 10 individual emails each with one customer credit card number is sent outside your org over 48 hours.
Types of events
Here are some of the events associated with an alert. In the UI, you can choose a particular event to view its details.
Event details
Property name | Description | Event types |
---|---|---|
ID | unique ID associated with the event | all events |
Location | workload where the event was detected | all events |
time of activity | time of the user activity that matched the criteria of the DLP policy |
Affected entities
Property name | Description | Event types |
---|---|---|
user | user who took the action that caused the policy match | all events |
hostname | host name of the computer where the DLP policy match occurred | device events |
IP address | IP address of the computer where the DLP policy match occurred | device events |
sha1 | SHA-1 hash of the file | device events |
sha256 | SHA-256 hash of the file | device events |
MDATP device ID | endpoint device MDATP ID | |
file size | size of the file | SharePoint, OneDrive, and device events |
file path | the absolute path of the item involved with the DLP policy match | SharePoint, OneDrive, and devices events |
email recipients | if an email was the sensitive item that matched the DLP policy, this field includes the recipients of that email | Exchange events |
email subject | subject of the email that matched the DLP policy | Exchange events |
email attachments | names of the attachments in the email that matched the DLP policy | Exchange events |
site owner | name of the site owner | SharePoint and OneDrive events |
site URL | full of the URL of the SharePoint or OneDrive site where the DLP policy match occurred | SharePoint and OneDrive events |
file created | time of creation of the file that matched the DLP policy | SharePoint and OneDrive events |
file last modified | the last time that the file that matched the DLP policy was changed | SharePoint and OneDrive events |
file size | size of the file that matched the DLP policy | SharePoint and OneDrive events |
file owner | owner of the file that matched the DLP policy | SharePoint and OneDrive events |
Policy details
Property name | Description | Event types |
---|---|---|
DLP policy matched | name of the matched DLP policy | all events |
rule matched | name of the matched DLP policy rule | all events |
sensitive information types (SIT) detected | SITs that were detected as part of the DLP policy match | all events |
actions taken | actions that were taken that caused the DLP policy match | all events |
violating action | action on the endpoint device that raised the DLP alert | device events |
user overrode policy | did the user override the policy via a policy tip | all events |
use override justification | the text of the reason provided by the user for the override | all events |
Investigate DLP incidents in Microsoft 365 Defender portal
Incidents for Microsoft Purview Data Loss Prevention (DLP) can be managed in the Microsoft 365 Defender portal. See, Investigate data loss incidents with Microsoft 365 Defender for details. You can manage DLP incidents along with security incidents from Incidents & alerts > Incidents on the quick launch of the Microsoft 365 Defender portal.
From this page, you can:
- View all your DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.
- Hunt for compliance logs along with security under Advanced Hunting.
- In-place admin remediation actions on user, file, and device.
- Associate custom tags to DLP incidents and filter by them.
- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
See Also
Feedback
Submit and view feedback for