Manage data loss prevention violations in Microsoft Defender for Cloud Apps
When you create a DLP policy using Microsoft Defender for Cloud Apps as a location in the Microsoft Purview compliance portal, the matches will appear in the regular DLP reports.
When you create a file policy in Defender for Cloud Apps the matched conditions and taken actions will instead be logged in Defender for Cloud Apps.
For example, you created a file policy in Defender for Cloud Apps to identify files including Tax Identification numbers that are shared with external users from OneDrive or SharePoint Online and automatically move them into the trash folder and revoke external access. If you want to see any matches on this policy, open the Microsoft Defender for Cloud Apps portal and follow these steps:
Under Control section, select policies.
Search for the policy you want to review.
Select Matches from the Count Column for the Policy you want to review.
You should see three tabs at the top of the page:
Matching now allows you to see currently existing matches for the file policy and use the filters at the top to refine the results.
Quarantined allows you to see the files that have been quarantined because of a file policy governance action.
History allows you to see former matches to the policy that have been resolved because of changes to the file or the policy itself.
Use this page to find patterns in your matches and decide if you need to take action. For example, you notice a high volume of matches, but they all originate from a single user. You should investigate the matches and identify if the user has a valid business reason to generate these matches.
Need help? See our troubleshooting guide or provide specific feedback by reporting an issue.