Investigate data loss incidents with Microsoft 365 Defender
Want to experience Microsoft 365 Defender? Learn more about how you can evaluate and pilot Microsoft 365 Defender.
- Microsoft 365 Defender
Incidents for Microsoft Purview Data Loss Prevention (DLP) can now be managed in the Microsoft 365 Defender portal. You can manage DLP incidents along with security incidents from Incidents & alerts > Incidents on the quick launch of the Microsoft 365 Defender portal. From this page, you can:
- View all your DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.
- Hunt for compliance logs along with security under Advanced Hunting.
- In-place admin remediation actions on user, file, and device.
- Associate custom tags to DLP incidents and filter by them.
- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
You can also use the Microsoft 365 Defender connector in Microsoft Sentinel to pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation.
To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft 365 Defender portal, you need a license from one of the following subscriptions:
- Microsoft Office 365 E5/A5
- Microsoft 365 E5/A5
- Microsoft 365 E5/A5 Compliance
- Microsoft 365 E5/A5 Security
- Microsoft 365 E5/A5 Information Protection and Governance
When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft 365 Defender. Open a support case if you want to disable this feature. If you disable this feature the behavior will be reverted to DLP alerts surfacing in the Defender portal as Microsoft Defender for Office alerts.
DLP investigation experience in the Microsoft 365 Defender portal
Before you start, turn on alerts for all your DLP policies in the Microsoft Purview compliance portal.
Go to the Microsoft 365 Defender portal, and select Incidents in the left hand navigation menu to open the incidents page.
Select Filters on the top right, and choose Service Source : Data Loss Prevention to view all incidents with DLP alerts.
Search for the DLP policy name of the alerts and incidents you're interested in.
To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
View the Alert story for details about policy and the sensitive information types detected in the alert. Select the event in the Related Events section to see the user activity details.
View the matched sensitive content in the Sensitive info types tab and the file content in the Source tab if you have the required permission (See details here).
You can also use Advanced Hunting to search through audit logs of user, files, and site locations for your investigation. The CloudAppEvents table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
You can also download the email by selecting Actions > Download email.
For remediation actions on files on SPO or ODB sites, you can see actions like:
- Apply retention label
- Apply sensitivity label
- Unshare file
For remediation actions, select the User card on the top of the alert page to open the user details.
For Devices DLP alerts, select the device card on the top of the alert page to view the device details and take remediation actions on the device.
Go to the incident summary page and select Manage Incident to add incident tags, assign, or resolve an incident.
DLP supports associating DLP policies and alert management with administrative units in the Microsoft Purview compliance portal (preview). DLP alerts are only available to unrestricted DLP administrators in the Microsoft 365 Defender portal. Administrative unit restricted DLP administrator will not see DLP alerts. See Administrative units for implementation details. See Policy scoping for details on administrative unit scoping.
DLP investigation experience in Microsoft Sentinel
You can use the Microsoft 365 Defender connector in Microsoft Sentinel to import all DLP incidents into Sentinel to extend your correlation, detection, and investigation across other data sources and extend your automated orchestration flows using Sentinel's native SOAR capabilities.
Follow instructions on Connect data from Microsoft 365 Defender to Microsoft Sentinel to import all incidents including DLP incidents and alerts into Sentinel. Enable
CloudAppEventsevent connector to pull all O365 audit logs into Sentinel.
You should be able to see your DLP incidents in Sentinel once the above connector is set up.
Select Alerts to view the alert page.
You can use AlertType, startTime, and endTime to query the CloudAppEvents table to get all the user activities that contributed to the alert. Use this query to identify the underlying activities:
let Alert = SecurityAlert | where TimeGenerated > ago(30d) | where SystemAlertId == ""; // insert the systemAlertID here CloudAppEvents | extend correlationId1 = parse_json(tostring(RawEventData.Data)).cid | extend correlationId = tostring(correlationId1) | join kind=inner Alert on $left.correlationId == $right.AlertType | where RawEventData.CreationTime > StartTime and RawEventData.CreationTime < EndTime
Submit and view feedback for