|
| 1 | +--- |
| 2 | +title: Stream data from Microsoft Purview Information Protection to Microsoft Sentinel |
| 3 | +description: Stream data from Microsoft Purview Information Protection (formerly Microsoft Information Protection) to Microsoft Sentinel so you can analyze and report on data from the Microsoft Purview labeling clients and scanners. |
| 4 | +author: limwainstein |
| 5 | +ms.topic: how-to |
| 6 | +ms.date: 01/02/2023 |
| 7 | +ms.author: lwainstein |
| 8 | +#Customer intent: As a security operator, I want to get specific labeling data from Microsoft Purview, so I can track, analyze, report on the data and use it for compliance purposes. |
| 9 | +--- |
| 10 | + |
| 11 | +# Stream data from Microsoft Purview Information Protection to Microsoft Sentinel |
| 12 | + |
| 13 | +This article describes how to stream data from Microsoft Purview Information Protection (formerly Microsoft Information Protection or MIP) to Microsoft Sentinel. You can use the data ingested from the Microsoft Purview labeling clients and scanners to track, analyze, report on the data, and use it for compliance purposes. |
| 14 | + |
| 15 | +> [!IMPORTANT] |
| 16 | +> The Microsoft Purview Information Protection connector is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability. |
| 17 | + |
| 18 | +## Overview |
| 19 | + |
| 20 | +Auditing and reporting are an important part of organizations' security and compliance strategy. With the continued expansion of the technology landscape that has an ever-increasing number of systems, endpoints, operations, and regulations, it becomes even more important to have a comprehensive logging and reporting solution in place. |
| 21 | + |
| 22 | +With the Microsoft Purview Information Protection connector, you stream auditing events generated from unified labeling clients and scanners. The data is then emitted to the Microsoft 365 audit log for central reporting in Microsoft Sentinel. |
| 23 | + |
| 24 | +With the connector, you can: |
| 25 | + |
| 26 | +- Track adoption of labels, explore, query, and detect events. |
| 27 | +- Monitor labeled and protected documents and emails. |
| 28 | +- Monitor user access to labeled documents and emails, while tracking classification changes. |
| 29 | +- Gain visibility into activities performed on labels, policies, configurations, files and documents. This visibility helps security teams identify security breaches, and risk and compliance violations. |
| 30 | +- Use the connector data during an audit, to prove that the organization is compliant. |
| 31 | + |
| 32 | +### Azure Information Protection connector vs. Microsoft Purview Information Protection connector |
| 33 | + |
| 34 | +This connector replaces the Azure Information Protection (AIP) data connector. The Azure Information Protection (AIP) data connector uses the AIP audit logs (public preview) feature. As of **March 31, 2023**, the AIP analytics and audit logs public preview will be retired, and moving forward will be using the [Microsoft 365 auditing solution](/microsoft-365/compliance/auditing-solutions-overview). |
| 35 | + |
| 36 | +For more information: |
| 37 | +- See [Removed and retired services](/azure/information-protection/removed-sunset-services#azure-information-protection-analytics). |
| 38 | +- Learn how to [disconnect the AIP connector](#disconnect-the-azure-information-protection-connector). |
| 39 | + |
| 40 | +When you enable the Microsoft Purview Information Protection connector, audit logs stream into the standardized |
| 41 | +`MicrosoftPurviewInformationProtection` table. Data is gathered through the [Office Management API](/office/office-365-management-api/office-365-management-activity-api-schema), which uses a structured schema. The new standardized schema is adjusted to enhance the deprecated schema used by AIP, with more fields and easier access to parameters. |
| 42 | + |
| 43 | +Review the list of supported [audit log record types and activities](microsoft-purview-record-types-activities.md). |
| 44 | + |
| 45 | +## Prerequisites |
| 46 | + |
| 47 | +Before you begin, verify that you have: |
| 48 | + |
| 49 | +- The Microsoft Sentinel solution enabled. |
| 50 | +- A defined Microsoft Sentinel workspace. |
| 51 | +- A valid license to [Microsoft Purview Information Protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance). |
| 52 | +- [Enabled Sensitivity labels for Office](/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files?view=o365-worldwide#use-the-microsoft-purview-compliance-portal-to-enable-support-for-sensitivity-labels&preserve-view=true) and [enabled auditing](/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-worldwide#use-the-compliance-center-to-turn-on-auditing&preserve-view=true). |
| 53 | +- The Global Administrator or Security Administrator role on the workspace. |
| 54 | + |
| 55 | +## Set up the connector |
| 56 | + |
| 57 | +> [!NOTE] |
| 58 | +> If you set the connector on a workspace located in a different region than your Office 365 location, data might be streamed across regions. |
| 59 | + |
| 60 | +1. Open the [Azure portal](https://portal.azure.com/) and navigate to the **Microsoft Sentinel** service. |
| 61 | +1. In the **Data connectors** blade, in the search bar, type *Purview*. |
| 62 | +1. Select the **Microsoft Purview Information Protection (Preview)** connector. |
| 63 | +1. Below the connector description, select **Open connector page**. |
| 64 | +1. Under **Configuration**, select **Connect**. |
| 65 | + |
| 66 | + When a connection is established, the **Connect** button changes to **Disconnect**. You're now connected to the Microsoft Purview Information Protection. |
| 67 | + |
| 68 | +Review the list of supported [audit log record types and activities](microsoft-purview-record-types-activities.md). |
| 69 | + |
| 70 | +## Disconnect the Azure Information Protection connector |
| 71 | + |
| 72 | +We recommend using the Azure Information Protection connector and the Microsoft Purview Information Protection connector simultaneously (both enabled) for a short testing period. After the testing period, we recommend that you disconnect the Azure Information Protection connector to avoid data duplication and redundant costs. |
| 73 | + |
| 74 | +To disconnect the Azure Information Protection connector: |
| 75 | + |
| 76 | +1. In the **Data connectors** blade, in the search bar, type *Azure Information Protection*. |
| 77 | +1. Select **Azure Information Protection**. |
| 78 | +1. Below the connector description, select **Open connector page**. |
| 79 | +1. Under **Configuration**, select **Disconnect**. |
| 80 | + |
| 81 | +## Known Issues And Limitations |
| 82 | + |
| 83 | +- The Office Management API doesn't obtain a Downgrade Label with the names of the labels before and after the downgrade. To retrieve this information, extract the `labelId` of each label and enrich the results. |
| 84 | + |
| 85 | + Here's an example KQL query: |
| 86 | + |
| 87 | + ```kusto |
| 88 | + let labelsMap = parse_json('{' |
| 89 | + '"566a334c-ea55-4a20-a1f2-cef81bfaxxxx": "MyLabel1",' |
| 90 | + '"aa1c4270-0694-4fe6-b220-8c7904b0xxxx": "MyLabel2",' |
| 91 | + '"MySensitivityLabelId": "MyLabel3"' |
| 92 | + '}'); |
| 93 | + MicrosoftPurviewInformationProtection |
| 94 | + | extend SensitivityLabelName = iif(isnotempty(SensitivityLabelId), |
| 95 | + tostring(labelsMap[tostring(SensitivityLabelId)]), "") |
| 96 | + | extend OldSensitivityLabelName = iif(isnotempty(OldSensitivityLabelId), |
| 97 | + tostring(labelsMap[tostring(OldSensitivityLabelId)]), "") |
| 98 | + ``` |
| 99 | + |
| 100 | +- The `MicrosoftPurviewInformationProtection` table and the `OfficeActivity` table might include some duplicated events. |
| 101 | + |
| 102 | +## Next steps |
| 103 | + |
| 104 | +In this article, you learned how to set up the Microsoft Purview Information Protection connector to track, analyze, report on the data, and use it for compliance purposes. To learn more about Microsoft Sentinel, see the following articles: |
| 105 | + |
| 106 | +- Learn how to [get visibility into your data, and potential threats](get-visibility.md). |
| 107 | +- Get started [detecting threats with Microsoft Sentinel](detect-threats-built-in.md). |
| 108 | +- [Use workbooks](monitor-your-data.md) to monitor your data. |
0 commit comments