Not
Bu sayfaya erişim yetkilendirme gerektiriyor. Oturum açmayı veya dizinleri değiştirmeyi deneyebilirsiniz.
Bu sayfaya erişim yetkilendirme gerektiriyor. Dizinleri değiştirmeyi deneyebilirsiniz.
Note
This documentation is for the preview version of Data Security Posture Management that's now rolling out. We invite you to try this preview that introduces guided workflows for proactive risk management and streamlines data security operations so you can more confidently adopt AI across your digital estate.
Most new features will be added to this version only but you can still access the previous versions and their documentation:
Data risk assessments from Data Security Posture Management help you identify and fix potential data oversharing risks in your organization. Because of the power and speed AI can proactively surface content that might be obsolete, over-permissioned, or lack governance controls, generative AI amplifies the problem of oversharing data. Use data risk assessments to both identify and remediate issues.
You can access data risk assessments from the Microsoft Purview portal > DSPM (preview) > Discover > Data risk assessments, and insights from these assessments are surfaced from the security objective Prevent oversharing of sensitive data.
Default data risk assessments
For oversharing insights in SharePoint and OneDrive, use the Microsoft 365 tab, and the Fabric tab for items in Fabric workspaces.
A default data risk assessment automatically runs weekly for the top 100 SharePoint sites based on usage in your organization, and you might have already run a custom assessment as one of the recommendations. However, come back regularly to this option to check the latest weekly results of the default assessment and run custom assessments when you want to check for different users or specific sites. After a custom assessment has run, wait at least 48 hours to see the results that don't update again. You'll need a new assessment to see any changes in the results.
The Default assessment displays at the top of the page with a quick summary, such as the total number of items found, the number of sensitive data detected, and the number of links sharing data with anyone. The first time the default assessment is created there's a 4-day delay before results are displayed.
After you select View details for more in-depth information, from the list, select each site to access the flyout pane that has tabs for Overview, Identify, Protect, and Monitor. Use the information on each tab to learn more, and take recommended actions. For example:
Use the Identify tab to identify how much data has been scanned or not scanned for sensitive information types, with an option to initiate an on-demand classification scan as needed.
Use the Protect tab to select options to remediate oversharing, which include:
- Restrict access by label: Use Microsoft Purview Data Loss Prevention to create a DLP policy that prevents Microsoft 365 Copilot and agents from summarizing data when it has sensitivity labels that you select. For more information about how this works and supported scenarios, see Learn about using Microsoft Purview Data Loss Prevention to protect interactions with Microsoft 365 Copilot and Copilot Chat.
- Restrict all items: Use SharePoint Restricted Content Discovery to list the SharePoint sites to be exempt from Microsoft 365 Copilot. For more information, see Restrict discovery of SharePoint sites and content.
- Create an auto-labeling policy: When sensitive information is found for unlabeled files, use Microsoft Purview Information Protection to create an auto-labeling policy to automatically apply a sensitivity label for sensitive data. For more information about how to create this policy, see How to configure auto-labeling policies for SharePoint, OneDrive, and Exchange.
- Create retention policies: When content hasn't been accessed for at least 3 years, use Microsoft Purview Data Lifecycle Management to automatically delete it. For more information about how to create the retention policy, see Create and configure retention policies.
Use the Monitor tab to view the number of items in the site shared with anyone, shared with everyone in the organization, shared with specific people, and shared externally. Select Start a SharePoint site access review for information how to use the SharePoint data access governance reports.
Custom data risk assessments
To create your own custom data risk assessment, select Create custom assessment to identify potential oversharing issues for all or selected users, the data sources to scan, and run the assessment.
Note
Microsoft 365 custom assessments optionally support item-level scanning with remediation actions when you complete a one-time authentication process. To specify the required settings, you must have a registered Entra application. For more information about the Entra application, see Prerequisites for Microsoft 365 item-level scanning for data risk assessments.
Select Item-level on the Scan level page, and then Authenticate to specify the Entra application information.
This data risk assessment is created in the Custom assessments category. Wait for the status of your assessment to display Completed, and select it to view details. To rerun a custom data risk assessment, and to see results after the 30-day expiration, use the duplicate option to create a new assessment with the same selections.
Item-level scanning and remediation for items that are potentially overshared is applicable to Microsoft 365 only, and currently restricted to SharePoint sites. This scan identifies items as potentially overshared if they have a sharing link for external or anonymous users, and also shows any applied sensitivity label and the owner of each item.
When the scan is complete, open the custom assessment and view item-level insights from the Potentially overshared items tab or the View items button from the Potentially overshared items banner. The following remediation actions can be taken on the identified potentially overshared items:
- Resolve, for example if you decide the item isn't at risk of oversharing.
- Apply sensitivity label for items that are identified as currently unlabeled or should have a different sensitivity label.
- Notify the site owner with an email notification (not customizable).
- Remove sharing link to remove the existing sharing link so it can no longer be used to access the item. This is an action to be used sparingly because it could prevent people from accessing the item legitimately. In this scenario, the site owner or item owner must then set a less permissive sharing link type for authorized users. If you haven't already, consider configuring sensitivity labels for a default sharing link.
The email notification contains information and instructions about the potentially overshared items in the site. It also contains options for them to go to the SharePoint site to manage access to the items from there, or to the Microsoft Purview portal for a read-only view of the item-level scan results that only show items and sites that they own.
Tip
Both the default and custom data risk assessments provide an Export option that let you save and customize the data into a choice of file formats (Excel, CSV, JSON, TSV).
Limits for Microsoft 365:
- A maximum of 200,000 items per location, which applies to both a custom data risk assessment and a default data risk assessment. The count of files reported might not be accurate when there are more than 100,000 files per location.
- OneDrive currently isn't supported for item-level scanning.
- A current maximum of 10 SharePoint sites for item-level scanning.