Skip to content

Commit 0cb3e80

Browse files
authored
Merge pull request #49947 from MicrosoftDocs/NEW-purview-ai-assess-mitigate-risks
New purview ai assess mitigate risks
2 parents e9d9894 + 1fa74f2 commit 0cb3e80

20 files changed

+492
-0
lines changed
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-ai-assess-mitigate-risks.adaptive-protection-ai
3+
title: "Case study: Implement Adaptive Protection for AI data security"
4+
metadata:
5+
title: "Case study: Implement Adaptive Protection for AI data security"
6+
description: "Case study: Implement Adaptive Protection for AI data security"
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
durationInMinutes: 10
12+
content: |
13+
[!include[](includes/adaptive-protection-ai.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-ai-assess-mitigate-risks.data-assessments
3+
title: Use data assessments to detect oversharing risks
4+
metadata:
5+
title: Use data assessments to detect oversharing risks
6+
description: "Use data assessments to detect oversharing risks."
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 10
14+
content: |
15+
[!include[](includes/data-assessments.md)]
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
As organizations adopt generative AI tools, traditional security policies might not provide enough flexibility to manage evolving risks. Microsoft Purview Adaptive Protection helps address this challenge by adjusting data loss prevention (DLP) policy enforcement based on user risk signals. These signals can come from browsing behavior or how users handle data in AI environments. This dynamic approach helps protect sensitive information without blocking productivity across the organization.
2+
3+
The next example shows how a financial technology company uses Adaptive Protection to safeguard sensitive data while enabling responsible use of AI tools.
4+
5+
## Learning objectives
6+
7+
In this example, you'll learn how to:
8+
9+
- Use Adaptive Protection to manage data security risks related to AI tool usage.
10+
- Link insider risk policies and DLP policies through dynamic user risk levels.
11+
- Configure protections that block or restrict risky actions based on those levels.
12+
13+
## Example: Protecting financial data in generative AI tools
14+
15+
Contoso, a financial software company, uses external generative AI tools in both R&D and marketing workflows. These tools support productivity, but they also raise risks, including:
16+
17+
- Sharing of sensitive financial data
18+
- Exposure of proprietary algorithms
19+
- Disclosure of confidential product information
20+
21+
To manage these risks, Contoso uses Adaptive Protection to adjust DLP enforcement based on each user's behavior. This example walks through how they configure Microsoft Purview to support that goal.
22+
23+
## Step 1: Create an insider risk policy for browsing behavior
24+
25+
Contoso begins by creating an insider risk policy using the **Risky browser usage (preview)** template. The policy includes the **browsed to generative AI websites** indicator to detect access to external AI tools.
26+
27+
:::image type="content" source="../media/risky-browser-usage-template.png" alt-text="Screenshot shows the Choose a policy template screen in the Insider Risk Management policy template wizard." lightbox="../media/risky-browser-usage-template.png":::
28+
29+
This policy helps Contoso identify users who interact with external AI sites while working with sensitive data. They name the policy **AI Browsing Detection**, making it easier to track and reference when configuring Adaptive Protection.
30+
31+
## Step 2: Assign adaptive risk levels
32+
33+
Next, Contoso configures risk levels for Adaptive Protection. They associate both their existing Data leaks policy and the new AI Browsing Detection policy with Adaptive Protection to support dynamic risk scoring based on a broader range of activities.
34+
35+
- **Elevated**: Assigned when high-severity events like confirmed data sharing occur
36+
- **Moderate**: Used for irregular but less severe activities
37+
- **Minor**: Assigned for low-level but notable behaviors
38+
39+
Contoso chooses to assign risk levels based on user activity, allowing them to focus on specific signals related to AI usage.
40+
41+
:::image type="content" source="../media/custom-risk-levels-adaptive-protection.png" alt-text="Screenshot shows the Custom risk levels menu in Adaptive Protection." lightbox="../media/custom-risk-levels-adaptive-protection.png":::
42+
43+
## Step 3: Create a DLP policy with risk-based actions
44+
45+
Contoso uses the **Fortify your data security** recommendation in **DSPM for AI** to simplify deployment. This recommendation creates a prebuilt DLP policy named **DSPM for AI - Block sensitive info from AI sites** designed to work with Adaptive Protection.
46+
47+
**The policy**:
48+
49+
- Targets **elevated risk users** identified through insider risk management
50+
- **Blocks pasting and uploading** of sensitive content to AI tools in Microsoft Edge, Chrome, and Firefox
51+
- Uses a **block with override** action to give users a chance to justify the action
52+
- Starts in **simulation mode** to evaluate potential matches before enforcement
53+
54+
Contoso reviews the policy configuration and simulation results to confirm accuracy. They enable the option to automatically turn the policy on after 15 days if no changes are made, ensuring it doesn't remain inactive indefinitely.
55+
56+
This approach gives Contoso a fast way to put protections in place while still allowing time for validation and adjustment.
57+
58+
## Step 4: Enable Adaptive Protection
59+
60+
To complete setup, Contoso enables Adaptive Protection in the Microsoft Purview portal. This activates the dynamic protections they configured.
61+
62+
:::image type="content" source="../media/enable-adaptive-protection.png" alt-text="Screenshot shows Adaptive Protection enabled." lightbox="../media/enable-adaptive-protection.png":::
63+
64+
Once enabled:
65+
66+
- Insider Risk Management policies assign risk levels based on activity
67+
- Adaptive Protection updates risk levels and tracks users in scope
68+
- DLP policies apply different enforcement rules based on each user's risk level
69+
70+
This connection ensures that users with higher risk scores face stricter safeguards when interacting with sensitive data, while lower-risk users can work with fewer restrictions.
71+
72+
This configuration helps Contoso manage AI-related data risks while allowing their teams to continue using tools that support productivity and innovation.
Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
AI tools like Microsoft 365 Copilot can unintentionally expose misclassified or over-permissioned content. Data assessments help security teams detect these risks early, apply protections, and maintain compliance.
2+
3+
Microsoft 365 Copilot and other AI tools can surface misclassified, over-permissioned, or outdated content, increasing the likelihood of unintentional data exposure. By running data assessments, organizations can identify these risks early, apply appropriate protections, and ensure compliance with internal policies and regulatory requirements.
4+
5+
## Default data assessments
6+
7+
Microsoft Purview Data Security Posture Management (DSPM) for AI automatically runs a weekly assessment on the top 100 SharePoint sites used by Microsoft 365 Copilot. This built-in assessment helps organizations identify high-risk data exposure without manual configuration.
8+
9+
To review the latest weekly assessment:
10+
11+
1. Navigate to **DSPM for AI** in the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
12+
1. Select **Assessments** from the navigation pane.
13+
1. Open the **Oversharing Assessment for the week of <month, year>**.
14+
1. Review key findings, including:
15+
- Number of sensitive files accessed
16+
- Frequency of access
17+
- External sharing risks
18+
19+
:::image type="content" source="../media/data-assessment-oversharing.png" alt-text="Screenshot of the Oversharing assessments page in Microsoft Purview, showing details on total items, sensitivity labels, and data with sharing links." lightbox="../media/data-assessment-oversharing.png":::
20+
21+
The weekly assessment helps identify trends in data exposure, allowing organizations to detect misconfigured access settings, overly permissive sharing, or files that contain sensitive data but lack proper classification. Reviewing these results regularly ensures that security policies are informed by actual risks rather than assumptions.
22+
23+
For a deeper analysis of specific users, sites, or data sources, security teams can run custom assessments tailored to their needs.
24+
25+
## Run a custom data assessment
26+
27+
Organizations might need to scan beyond the default assessment to evaluate AI security risks in different users, sites, or content types. Custom data assessments allow security teams to define the scope of their analysis.
28+
29+
To create and run a custom assessment:
30+
31+
1. Navigate to **DSPM for AI** > **Data assessments**.
32+
1. Select **Create assessment**.
33+
1. On the **Basic details** page:
34+
- Enter an **Assessment name**.
35+
- Provide an optional **Description** to define the purpose of the assessment.
36+
1. On the **Add users** page:
37+
- Choose whether to Include all users or Include specific users or groups.
38+
1. On the **Data sources** page, select the SharePoint sites or other data sources you want to scan.
39+
1. On the **Review and run the data assessment scan**, select **Save and run** to run the custom assessment.
40+
41+
Assessments can take up to 48 hours to complete. After the assessment completes, review the findings in the Protect and Monitor tabs to determine the appropriate security actions.
42+
43+
## Review and act on assessment results
44+
45+
After a data assessment runs, security teams can analyze the results and take action using the **Protect** and **Monitor** tabs. These tabs provide insights into how sensitive data is being accessed and shared, and offer remediation options to reduce oversharing risks.
46+
47+
### Protect tab - Apply security controls
48+
49+
The **Protect** tab helps security teams limit access to high-risk data and enforce compliance measures. Recommended actions include:
50+
51+
- **Restrict access by label**: Use Microsoft Purview Data Loss Prevention (DLP) to prevent Microsoft 365 Copilot from summarizing data that has specific sensitivity labels. For more information about how this works and supported scenarios, see [Learn about the Microsoft 365 Copilot policy location](/purview/dlp-microsoft365-copilot-location-learn-about?azure-portal=true).
52+
53+
- **Restrict all items**: Use [SharePoint Restricted Content Discoverability](/sharepoint/restricted-content-discovery?azure-portal=true) to prevent Microsoft 365 Copilot from indexing specified SharePoint sites.
54+
55+
:::image type="content" source="../media/data-assessment-restrict-items.png" alt-text="Screenshot showing the options in the Protect tab in Data assessments to restrict access to sensitive data." lightbox="../media/data-assessment-restrict-items.png":::
56+
57+
- **Apply auto-labeling policies**: [Automatically apply sensitivity labels](/purview/apply-sensitivity-label-automatically?azure-portal=true#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) to unlabeled files containing sensitive information.
58+
59+
- **Enforce retention policies**: Use [Microsoft Purview Data Lifecycle Management retention policies](/purview/create-retention-policies?azure-portal=true) to delete content that hasn't been accessed for at least three years.
60+
61+
:::image type="content" source="../media/data-assessment-apply-label.png" alt-text="Screenshot showing the options in the Protect tab in Data assessments to manage sensitivity labels and policies for a specific SharePoint site." lightbox="../media/data-assessment-apply-label.png":::
62+
63+
### Monitor tab - Review sharing and access risks
64+
65+
The **Monitor** tab provides visibility into how data is shared and accessed across the organization. It includes tools for reviewing and managing access:
66+
67+
- **Run a SharePoint site access review**: Identify and assess sites that are shared broadly or externally. IT administrators can delegate access reviews to site owners.
68+
- **Run an identity access review**: Review group memberships, enterprise application access, and role assignments in Microsoft Entra ID to ensure only the right users maintain access.
69+
70+
:::image type="content" source="../media/data-assessment-monitor.png" alt-text="Screenshot showing the options in the Monitor tab in Data assessments to Run a site access review and Run an identity access review." lightbox="../media/data-assessment-monitor.png":::
71+
72+
By regularly reviewing assessment results in both the **Protect** and **Monitor** tabs, organizations can enforce security policies, reduce oversharing risks, and ensure compliance with data protection requirements.
73+
74+
## Respond to assessment findings
75+
76+
After reviewing a data assessment, it's important to act on the insights to reduce risk and strengthen data protection. While tools like the Protect and Monitor tabs help apply controls, some decisions require investigation and follow-up outside the portal.
77+
78+
Consider the following actions based on what you find in your assessment results:
79+
80+
### Investigate frequently accessed or unlabeled sites
81+
82+
If a site shows a high volume of activity or contains a large number of unlabeled files, review the site to determine:
83+
84+
- Whether the data is still needed
85+
- If it contains sensitive content that should be labeled
86+
- If access should be limited to fewer users or groups
87+
88+
Sites that receive frequent access but contain no labeled items might require manual classification or a review of auto-labeling coverage.
89+
90+
### Review broad internal sharing
91+
92+
Sites shared with “People in your organization” might still be too permissive. Follow up with site owners to confirm whether that level of access is necessary. If not, adjust permissions or run a SharePoint site access review to delegate cleanup.
93+
94+
### Apply protections to sensitive files
95+
96+
When sensitive data is found with no labels or protections applied, consider:
97+
98+
- Running an auto-labeling policy to apply the appropriate sensitivity level
99+
- Restricting access to high-risk data using DLP or Restricted Content Discoverability
100+
- Applying retention policies to remove stale content no longer in use
101+
102+
### Clean up unused or empty data sources
103+
104+
If a site shows no scanned items or access activity, determine whether it's still needed. Inactive sites can be archived or restricted to reduce your organization's overall exposure risk.
105+
106+
### Follow up with content owners
107+
108+
For sites with unclear or outdated access patterns, notify data owners and provide guidance on how to:
109+
110+
- Review and update sharing settings
111+
- Label content correctly
112+
- Remove unused files or folders
113+
114+
Creating a process to follow up with site owners can help maintain long-term control over shared and sensitive content.

0 commit comments

Comments
 (0)