Skip to content

Commit 5828865

Browse files
authored
Merge pull request #49957 from riswinto/main
update module
2 parents 24984bb + ce207d0 commit 5828865

File tree

5 files changed

+122
-1
lines changed

5 files changed

+122
-1
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-identify-mitigate-ai-risks.dspm-ai-recommendations
3+
title: Apply AI security recommendations with DSPM for AI
4+
metadata:
5+
title: Apply AI security recommendations with DSPM for AI
6+
description: "Apply AI security recommendations with DSPM for AI."
7+
ms.date: 04/10/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/dspm-ai-recommendations.md)]

learn-pr/wwl-sci/purview-identify-mitigate-ai-risks/includes/data-assessments.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The **Protect** tab helps security teams limit access to high-risk data and enfo
5252

5353
- **Restrict all items**: Use [SharePoint Restricted Content Discoverability](/sharepoint/restricted-content-discovery?azure-portal=true) to prevent Microsoft 365 Copilot from indexing specified SharePoint sites.
5454

55-
:::image type="content" source="../media/data-assessment-dlp-restrict-items.png" alt-text="Screenshot showing the options in the Protect tab in Data assessments to restrict access to sensitive data." lightbox="../media/data-assessment-dlp-restrict-items.png":::
55+
:::image type="content" source="../media/data-assessment-restrict-items.png" alt-text="Screenshot showing the options in the Protect tab in Data assessments to restrict access to sensitive data." lightbox="../media/data-assessment-restrict-items.png":::
5656

5757
- **Apply auto-labeling policies**: [Automatically apply sensitivity labels](/purview/apply-sensitivity-label-automatically?azure-portal=true#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) to unlabeled files containing sensitive information.
5858

@@ -70,3 +70,45 @@ The **Monitor** tab provides visibility into how data is shared and accessed acr
7070
:::image type="content" source="../media/data-assessment-monitor.png" alt-text="Screenshot showing the options in the Monitor tab in Data assessments to Run a site access review and Run an identity access review." lightbox="../media/data-assessment-monitor.png":::
7171

7272
By regularly reviewing assessment results in both the **Protect** and **Monitor** tabs, organizations can enforce security policies, reduce oversharing risks, and ensure compliance with data protection requirements.
73+
74+
## Respond to assessment findings
75+
76+
After reviewing a data assessment, it's important to act on the insights to reduce risk and strengthen data protection. While tools like the Protect and Monitor tabs help apply controls, some decisions require investigation and follow-up outside the portal.
77+
78+
Consider the following actions based on what you find in your assessment results:
79+
80+
### Investigate frequently accessed or unlabeled sites
81+
82+
If a site shows a high volume of activity or contains a large number of unlabeled files, review the site to determine:
83+
84+
- Whether the data is still needed
85+
- If it contains sensitive content that should be labeled
86+
- If access should be limited to fewer users or groups
87+
88+
Sites that receive frequent access but contain no labeled items might require manual classification or a review of auto-labeling coverage.
89+
90+
### Review broad internal sharing
91+
92+
Sites shared with “People in your organization” might still be too permissive. Follow up with site owners to confirm whether that level of access is necessary. If not, adjust permissions or run a SharePoint site access review to delegate cleanup.
93+
94+
### Apply protections to sensitive files
95+
96+
When sensitive data is found with no labels or protections applied, consider:
97+
98+
- Running an auto-labeling policy to apply the appropriate sensitivity level
99+
- Restricting access to high-risk data using DLP or Restricted Content Discoverability
100+
- Applying retention policies to remove stale content no longer in use
101+
102+
### Clean up unused or empty data sources
103+
104+
If a site shows no scanned items or access activity, determine whether it's still needed. Inactive sites can be archived or restricted to reduce your organization's overall exposure risk.
105+
106+
### Follow up with content owners
107+
108+
For sites with unclear or outdated access patterns, notify data owners and provide guidance on how to:
109+
110+
- Review and update sharing settings
111+
- Label content correctly
112+
- Remove unused files or folders
113+
114+
Creating a process to follow up with site owners can help maintain long-term control over shared and sensitive content.
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
Microsoft Purview Data Security Posture Management (DSPM) for AI includes a set of AI security recommendations to help reduce the risk of sensitive data exposure and ensure responsible AI use. These recommendations help you apply protections through solutions like data loss prevention (DLP), sensitivity labels, Insider Risk Management, and Communication Compliance.
2+
3+
Some recommendations can be applied automatically using one-click policies, while others require manual configuration across Purview solutions.
4+
5+
## About AI security recommendations
6+
7+
When you enable DSPM for AI, the **Recommendations** page in the Microsoft Purview portal surfaces AI security risks related to interactions with Microsoft 365 Copilot, enterprise AI tools (like ChatGPT Enterprise), and other AI applications. These risks are grouped into categories like:
8+
9+
- **Data security**: Prevent oversharing, apply labels, and enforce protective actions
10+
11+
- **Data discovery**: Detect where sensitive information is used in AI tools
12+
13+
- **AI regulations**: Help align AI usage with regulatory requirements
14+
15+
- **Insight into communications**: Detect inappropriate or risky prompts and responses
16+
17+
Each recommendation includes either:
18+
19+
- A **preconfigured one-click policy** that can be activated immediately
20+
21+
- A **set of guided steps** for manually creating a policy in another Microsoft Purview solution
22+
23+
When a one-click policy is activated, the resulting policy appears in the **Policies** tab of the Microsoft Purview portal.
24+
25+
> [!NOTE]
26+
> One-click policies currently don't support administrative units. Even if you're scoped to a specific administrative unit, a created policy applies to all users.
27+
28+
## One-click policy recommendations
29+
30+
These recommendations create and configure policies automatically when selected in the Recommendations page:
31+
32+
| Recommendation | Description | Solution area |
33+
|-----|-----|-----|
34+
| **Fortify your data security** | Creates a DLP policy using Adaptive Protection. High-risk users are warned before pasting or uploading sensitive data to AI sites. | Data Loss Prevention |
35+
| **Protect your data with sensitivity labels** | Sets up default sensitivity labels and policies to protect data in prompts and responses. Includes autolabeling and publishing policies. | Information Protection |
36+
| **Detect risky interactions in AI apps (preview)** | Creates an Insider Risk Management policy to detect prompts or responses that might indicate risky user behavior. | Insider Risk Management |
37+
| **Control unethical behavior in AI** | Creates a Communication Compliance policy to flag unethical or inappropriate AI-generated content. | Communication Compliance |
38+
39+
Policies created from these recommendations appear in the Policies tab of the Microsoft Purview portal.
40+
41+
## Recommendations that require manual action
42+
43+
These recommendations guide you through configuration steps but don't create policies automatically:
44+
45+
| Recommendation | Description | Solution area |
46+
|-----|-----|-----|
47+
| **Protect sensitive data referenced in Microsoft 365 Copilot (preview)** | Provides instructions for creating a custom DLP policy to prevent Copilot from using labeled content. | Data Loss Prevention |
48+
| **Protect your data from potential oversharing risks** | Opens the default weekly data assessment to help identify unlabeled or overshared content. | DSPM for AI|
49+
| **Guided assistance to AI regulations** | Offers a checklist of recommended policy configurations across Audit, Communication Compliance, DLP, and retention settings. | Multi-solution (Audit, DLP, Communication Compliance, Data Lifecycle Management) |
50+
| **Discover and govern interactions with ChatGPT Enterprise AI (preview)** | Requires registering a ChatGPT Enterprise workspace and configuring a data connector in Purview. | Data Map and Scanning |
51+
| **Use Copilot to improve your data security posture (preview)** | Requires Security Copilot permissions and manual use of prompts to analyze security alerts and behavior. | Security Copilot |
52+
| **Protect sensitive data referenced in Copilot responses** | Guides you to run a manual data assessment to identify unlabeled or overshared content. | DSPM for AI |
53+
54+
## What to expect after activating a policy
55+
56+
Activated policies begin analyzing activity or applying controls based on the configuration for each solution. For example:
57+
58+
- DLP policies created from DSPM for AI recommendations start in **simulation mode**, where enforcement actions aren't applied, but results are logged for review.
59+
- Insider Risk Management policies generate alerts based on user behavior signals.
60+
- Communication Compliance policies flag content for review based on detected policy violations.
61+
- Data assessments identify oversharing risks and surface them in reports.
62+
63+
You can review policy results in **Activity Explorer**, the **Policies** tab, or directly in the related Microsoft Purview solution area.

learn-pr/wwl-sci/purview-identify-mitigate-ai-risks/index.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ units:
4040
- learn.wwl.purview-identify-mitigate-ai-risks.understand-ai-security-risks
4141
- learn.wwl.purview-identify-mitigate-ai-risks.dspm-ai-overview
4242
- learn.wwl.purview-identify-mitigate-ai-risks.configure-dspm-ai
43+
- learn.wwl.purview-identify-mitigate-ai-risks.dspm-ai-recommendations
4344
- learn.wwl.purview-identify-mitigate-ai-risks.review-ai-security-reports
4445
- learn.wwl.purview-identify-mitigate-ai-risks.data-assessments
4546
- learn.wwl.purview-identify-mitigate-ai-risks.knowledge-check

0 commit comments

Comments
 (0)