Skip to content

Commit 6f2be4b

Browse files
authored
Merge pull request #50147 from MicrosoftDocs/NEW-purview-protect-on-premises-data
New purview protect on premises data
2 parents 61fbdef + ee65cb9 commit 6f2be4b

20 files changed

+697
-3
lines changed

learn-pr/paths/purview-implement-information-protection/index.yml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:LearningPath
22
uid: learn.wwl.purview-implement-information-protection
33
metadata:
4-
title: 'Implement Information Protection (SC-401)'
4+
title: 'Implement Microsoft Purview Information Protection (SC-401)'
55
description: 'Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.'
6-
ms.date: 03/13/2025
6+
ms.date: 04/24/2025
77
author: wwlpublish
88
ms.author: riswinto
99
ms.topic: learning-path
10-
title: 'Implement Information Protection'
10+
title: 'Implement Microsoft Purview Information Protection'
1111
prerequisites: |
1212
- Familiarity with Microsoft Purview compliance solutions
1313
- Basic understanding of data protection and security concepts
@@ -22,15 +22,18 @@ roles:
2222
- ip-admin
2323
products:
2424
- microsoft-purview
25+
- m365
2526
subjects:
2627
- security
28+
- information-protection-governance
2729
modules:
2830
- learn.wwl.purview-protect-sensitive-data
2931
- learn-m365.m365-compliance-information-classify-data
3032
- learn.wwl.purview-review-analyze-data-classification
3133
- learn.wwl.create-manage-sensitive-information-types
3234
- learn-m365.m365-compliance-information-protect-information
3335
- learn.wwl.apply-manage-sensitivity-labels
36+
- learn.wwl.purview-protect-on-premises-data
3437
- learn-m365.audit-encryption
3538
- learn.wwl.deploy-message-encryption-microsoft-365
3639

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-on-premises-data.configure-install-scanner
3+
title: Configure and install the Microsoft Purview Information Protection scanner
4+
metadata:
5+
title: Configure and install the Microsoft Purview Information Protection scanner
6+
description: "Configure and install the Microsoft Purview Information Protection scanner."
7+
ms.date: 04/24/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 10
14+
content: |
15+
[!include[](includes/configure-install-scanner.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-protect-on-premises-data.data-loss-prevention-on-premises
3+
title: Enforce data loss prevention policies on on-premises files
4+
metadata:
5+
title: Enforce data loss prevention policies on on-premises files
6+
description: "Enforce data loss prevention policies on on-premises files."
7+
ms.date: 04/24/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/data-loss-prevention-on-premises.md)]
Lines changed: 154 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,154 @@
1+
The Microsoft Purview Information Protection scanner extends labeling and protection to on-premises files. Before running scans, you need to define scanner settings, install the service, configure authentication, and optionally enable data loss prevention (DLP) rules.
2+
3+
## Step 1: Configure scanner settings in the portal
4+
5+
Start in the Microsoft Purview portal. First, define a scanner cluster, which acts as a logical container for the scanner instance. Then, create one or more content scan jobs to specify the schedule, labeling behavior, and repositories to scan.
6+
7+
You need one of these Microsoft Purview roles to configure the scanner in the portal:
8+
9+
- Compliance Administrator
10+
- Compliance Data Administrator
11+
- Security Administrator
12+
- Organization Management
13+
14+
### Steps to configure scanner settings
15+
16+
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true) > **Settings** > **Information Protection** > **Information protection scanner**.
17+
1. On the Clusters tab, select **Add**.
18+
1. Give your cluster a **name** and optional **description**.
19+
1. Select **Save** to save your changes.
20+
21+
The cluster name is required later when you install the scanner.
22+
23+
### Create the content scan job
24+
25+
1. On the **Content scan jobs** tab, select **Add**.
26+
1. Configure the scan job settings:
27+
28+
- **Schedule**: Controls how often the scan runs. The default setting is **Manual**. Change it to **Always** to enable continuous scanning.
29+
- **Info types to be discovered**: Determines which information types are identified during scanning. Choose Policy only to scan only for types defined in your labeling policy, or All to include all built-in types.
30+
- **Enable DLP rules**: Activates enforcement of data loss prevention policies. Set to On only if a DLP policy is already configured in Microsoft Purview.
31+
- **Enforce sensitivity labeling policy**: Turns automatic labeling on or off. Set this to On if you want the scanner to apply sensitivity labels based on content.
32+
- **Relabel files**: Specifies whether files that already have a label can be relabeled. Turn this on if you want labels to be updated during scanning.
33+
- **Preserve metadata**: Keeps original file attributes such as Date modified, Last modified, and Modified by during scanning. This setting is On by default.
34+
35+
:::image type="content" source="../media/content-scan-job.png" alt-text="Screenshot showing where to edit a content scan job for the Microsoft Purview Information Protection scanner." lightbox="../media/content-scan-job.png":::
36+
37+
1. Add repositories on the **Repositories** tab:
38+
- Use UNC paths, for example: `\\Server\Folder`
39+
- Use local file paths, for example: `C:\Folder`
40+
- Add SharePoint Server libraries, for example: `http://sp2016/Shared Documents/Reports`
41+
- To scan an entire SharePoint root site, for example `http://sp2016`, the scanner account must have **Site Collection Auditor** permissions
42+
43+
:::image type="content" source="../media/repository-settings.png" alt-text="Screenshot showing the repository settings for the Microsoft Purview Information Protection scanner." lightbox="../media/repository-settings.png":::
44+
45+
## Step 2: Install the scanner service
46+
47+
Once you configured your cluster and scan job, the next step is to install the scanner service on a supported Windows Server. This step uses PowerShell and requires that you meet a few key setup requirements.
48+
49+
### Prerequisites
50+
51+
Before you begin installation, make sure the following requirements are met:
52+
53+
- You're installing on a **64-bit Windows Server 2016 or later**.
54+
- The server has at least **4 CPU cores**, **8 GB of RAM**, and **10 GB of available disk space**.
55+
- The **Microsoft Purview Information Protection client** (full version) is already installed on the server.
56+
- A **SQL Server 2016 or later** instance is available to store the scanner's configuration database. This can be a local or remote SQL Server.
57+
- You have the **scanner cluster name** you defined earlier in the Microsoft Purview portal. This is required during installation.
58+
59+
### Install using PowerShell
60+
61+
Open a PowerShell session with Run as administrator on the Windows Server that hosts the scanner. Run this command to install the scanner:
62+
63+
``` powershell
64+
Install-Scanner -SqlServerInstance <SQLServerName> -Cluster <ClusterName>
65+
```
66+
67+
Example:
68+
69+
``` powershell
70+
Install-Scanner -SqlServerInstance SQL01\SCANNER -Cluster Europe
71+
```
72+
73+
After you run the command, you'll be prompted to enter the credentials for the scanner service account. This should be an Active Directory account that is synced to Microsoft Entra ID.
74+
75+
When the installation completes, a Windows service named **Microsoft Purview Information Protection Scanner** is created and set to run under the service account you provided.
76+
77+
## Step 3: Authenticate with Microsoft Entra ID
78+
79+
To allow the scanner to run unattended and apply sensitivity labels, it needs to authenticate with Microsoft Entra ID using an app registration. This step connects the scanner to Microsoft Purview services securely and enables policy enforcement.
80+
81+
### Set up API permissions in Microsoft Entra ID
82+
83+
The app registration used by the scanner must be granted specific permissions:
84+
85+
- Azure Rights Management Service
86+
- `Content.DelegatedReader`: allows the scanner to read sensitivity labels and policies.
87+
- `Content.DelegatedWriter`: allows the scanner to apply or remove labels and protection.
88+
89+
- Microsoft Information Protection Sync Service
90+
- `UnifiedPolicy.Tenant.Read`: allows the scanner to retrieve labeling policies.
91+
92+
These permissions must be added and admin consent granted in the Microsoft Entra admin center before proceeding.
93+
94+
### Authenticate using PowerShell
95+
96+
Once permissions are configured, use this PowerShell command to authenticate the scanner:
97+
98+
``` powershell
99+
Set-Authentication -AppId <AppID> -AppSecret <Secret> -TenantId <TenantID> -DelegatedUser <EntraUser>
100+
```
101+
102+
Example:
103+
104+
``` powershell
105+
Set-Authentication -AppId "77c3c1c3-abf9-404e-8b2b-4652836c8c66" `
106+
-AppSecret "OAkk+rnuYc/u+]ah2kNxVbtrDGbS47L4" `
107+
-TenantId "9c11c87a-ac8b-46a3-8d5c-f4d0b72ee29a" `
108+
-DelegatedUser [email protected]
109+
```
110+
111+
If the scanner service account isn't allowed to sign in locally, use the `-OnBehalfOf` parameter along with credentials for the service account:
112+
113+
Example:
114+
115+
``` powershell
116+
$creds = Get-Credential CONTOSO\scanner
117+
Set-Authentication -AppId "<AppID>" -AppSecret "<Secret>" -TenantId "<TenantID>" `
118+
-DelegatedUser [email protected] -OnBehalfOf $creds
119+
```
120+
121+
After this step, the scanner is registered with Microsoft Entra ID and ready to classify and protect content according to your configured policies.
122+
123+
## Step 4: Turn on policy enforcement
124+
125+
When first created, content scan jobs are set to discovery mode by default. This means the scanner scans files but doesn't apply labels or enforce protection. To move from discovery to enforcement, you need to update the scan job configuration.
126+
127+
### Update the scan job in the Microsoft Purview portal
128+
129+
Follow these steps to enable protection:
130+
131+
1. In the Microsoft Purview portal, go to the Content scan jobs tab.
132+
1. Select the scan job you created earlier.
133+
1. Change the **Schedule** setting from **Manual** to **Always** so that the scan runs continuously.
134+
1. Turn on **Enforce sensitivity labeling policy**. This allows the scanner to apply labels and protection automatically based on the policy.
135+
1. Once a scanner node is online, select **Scan now** to begin the job.
136+
137+
> [!TIP]
138+
> The **Scan now** button only appears when a scanner node is connected and available.
139+
140+
### Use PowerShell to enable enforcement
141+
142+
If you're configuring the scanner using PowerShell, use this command:
143+
144+
``` powershell
145+
Set-ScannerContentScan -Schedule Always -Enforce On
146+
```
147+
148+
This command changes the scan job from manual to continuous and enables policy enforcement, allowing the scanner to apply classification and protection to the scanned files.
149+
150+
## Step 5: Run your first scan
151+
152+
With configuration complete, go back to the Microsoft Purview portal and start your first scan by selecting **Scan now** on your content scan job. This action starts the scan using your defined settings.
153+
154+
It's a good practice to begin in discovery mode to review what the scanner finds without making changes. Once you're confident in the results, switch to enforcement to apply labeling and protection.
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
Microsoft Purview Data Loss Prevention (DLP) helps protect sensitive data at rest across cloud and on-premises environments. For on-premises files stored in file shares or SharePoint Server, DLP enforcement depends on the Microsoft Purview Information Protection scanner.
2+
3+
Once the scanner is deployed and content scan jobs are configured, you can enable DLP rules to detect risky content. These rules can automatically apply access restrictions or move files based on your policy configuration.
4+
5+
## Requirements for using DLP with the scanner
6+
7+
Before using DLP with on-premises repositories, make sure:
8+
9+
- The Microsoft Purview Information Protection scanner is fully installed and operational.
10+
- At least one content scan job is created and assigned to a scanner cluster.
11+
- **Enable DLP rules** is turned **on** in the scan job settings.
12+
- You've published at least one label and policy in Microsoft Purview (even if you're only using sensitive information types for DLP detection).
13+
14+
## DLP policy triggers for on-premises files
15+
16+
The scanner evaluates each file in the configured repositories and can trigger a DLP policy based on:
17+
18+
- **Sensitive information types** (for example credit card numbers, health data)
19+
- **Sensitivity labels** already applied to the file
20+
- **File extensions**
21+
- **Custom document properties** (Office files only)
22+
23+
## Available DLP actions
24+
25+
When a file matches a DLP policy, the following actions can be applied:
26+
27+
- **Block all access**: Remove NTFS or SharePoint permissions for all users except the file owner, repository owner, last modifier (SharePoint only), and administrators.
28+
- **Block broad access**: Remove built-in groups such as _Everyone_, _Authenticated Users_, and _Domain Users_ from the file's access list.
29+
- **Force inheritance from parent folder**: Apply permissions from the parent folder. You can optionally override and enforce this even if the parent permissions are less restrictive.
30+
- **Quarantine the file**: Replace the original file with a stub `.txt` file and move the file to a designated quarantine folder.
31+
32+
These actions are enforced at the file level during scanning and help reduce accidental or malicious data exposure.
33+
34+
## How to deploy and test DLP enforcement
35+
36+
To enforce DLP with the scanner:
37+
38+
1. Make sure **Enable DLP rules** is turned on in your scan job settings.
39+
1. Create a DLP policy that includes the **On-premises repositories** location.
40+
1. Scope the policy to specific file paths if needed using inclusion or exclusion lists. Wildcards are supported in limited patterns.
41+
1. Run the policy in simulation mode first to validate its behavior before switching to enforcement.
42+
1. Monitor results in **Activity explorer**, the **Audit log**, or directly from scan reports on the scanner server.
43+
44+
> [!TIP]
45+
> To apply updated DLP settings across all scanned content, use the **Rescan all files** option in the Microsoft Purview portal or run `Start-Scan -Reset` in PowerShell.
46+
47+
### Where to view DLP activity
48+
49+
DLP detection and enforcement for on-premises files is visible in:
50+
51+
- **Activity explorer**: View matches by file name, type, rule name, and applied actions.
52+
- **Audit log**: Track when DLP actions are taken on files.
53+
- **Local scan reports**: Stored in `%localappdata%\Microsoft\MSIP\Scanner\Reports`, including `.csv` logs with DLP-specific columns like `DLP Rule Name`, `DLP Status`, and applied permissions.
54+
55+
## Limitations
56+
57+
- **Policy tips** aren't available for on-premises DLP enforcement.
58+
- The scanner doesn't support OneDrive locations or WebDAV paths.
59+
- DLP actions can't be previewed. Test in simulation mode before enforcing.

0 commit comments

Comments
 (0)