Skip to content

Commit 8023a4a

Browse files
committed
new module content
1 parent 3ec55ce commit 8023a4a

File tree

9 files changed

+132
-25
lines changed

9 files changed

+132
-25
lines changed

learn-pr/wwl-sci/purview-insider-risk-investigate-alerts/all-risk-factors.yml renamed to learn-pr/wwl-sci/purview-insider-risk-investigate-alerts/all-risk-factors-tab.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.wwl.purview-insider-risk-investigate-alerts.all-risk-factors
2+
uid: learn.wwl.purview-insider-risk-investigate-alerts.all-risk-factors-tab
33
title: Analyze alert context with the All risk factors tab
44
metadata:
55
title: Analyze alert context with the All risk factors tab
@@ -12,4 +12,4 @@ azureSandbox: false
1212
labModal: false
1313
durationInMinutes: 5
1414
content: |
15-
[!include[](includes/all-risk-factors.md)]
15+
[!include[](includes/all-risk-factors-tab.md)]

learn-pr/wwl-sci/purview-insider-risk-investigate-alerts/includes/insider-risk-cases.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Selecting a case opens a detailed investigation view with multiple tabs:
5252
- **User activity**: Timeline of scored risk activity from the alert or broader user history
5353
- **Activity explorer (preview)**: Detailed timeline and metadata for each associated event
5454

55-
**User activity** shows the overall timeline of user risk behavior, while A**ctivity explorer** focuses on event-level details within the case scope.
55+
**User activity** shows the overall timeline of user risk behavior, while **Activity explorer** focuses on event-level details within the case scope.
5656

5757
- **Forensic evidence**: Screen captures from activity that triggered the alert
5858
- **Content explorer**: Copies of files and email messages associated with risk alerts
@@ -91,7 +91,7 @@ Trigger flows for common tasks such as:
9191

9292
If Teams integration is enabled in Insider Risk Management settings, a team is created automatically when a case is opened. Teams are archived when a case is resolved. To enable Teams integration:
9393

94-
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/).
94+
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
9595
1. Select **Settings** > **Insider Risk Management** > **Microsoft Teams**.
9696
1. Select the toggle to enable integration with Microsoft Teams.
9797

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
Identifying insider risks is only the beginning. Organizations also need a clear and consistent approach to investigating alerts and understanding the full context of user behavior. Without a structured process, high-risk activity might go unnoticed, low-risk alerts might receive too much attention, and investigators can struggle to determine the right response.
2+
3+
This module focuses on helping you analyze and respond to alerts in Microsoft Purview Insider Risk Management. You'll learn how to:
4+
5+
- Review and triage alerts using the Alerts dashboard
6+
- Understand the factors that influence alert generation and risk scoring
7+
- Use tools like Activity explorer, User activity, and All risk factors to investigate user behavior
8+
- Work with insider risk cases to organize related alerts and take follow-up actions
9+
- Extend your investigation into Microsoft Defender XDR and use advanced hunting for deeper insight
10+
11+
By the end of this module, you'll understand how to investigate insider risk alerts in a way that's efficient, accurate, and aligned with your organization's risk policies.

learn-pr/wwl-sci/purview-insider-risk-investigate-alerts/includes/investigate-alerts-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Use this view to correlate insider risk alerts with data from other services lik
44

55
## Access insider risk alerts in Defender XDR
66

7-
To review alerts in the [Microsoft Defender portal](https://security.microsoft.com/):
7+
To review alerts in the [Microsoft Defender portal](https://security.microsoft.com/?azure-portal=true):
88

99
1. Go to **Investigation & response** > **Incidents & alerts** > **Incidents**.
1010
1. Use the **Service source** filter to select **Microsoft Purview Insider Risk Management**
@@ -67,7 +67,7 @@ Before alerts appear in the Microsoft Defender portal:
6767

6868
The setting **Share user risk details with other security solutions** must be enabled in the Microsoft Purview portal. To enable this setting:
6969

70-
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/).
70+
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
7171
1. Select **Settings** > **Insider Risk Management** > **Data sharing**.
7272
1. Enable **Share user risk details with other security solutions**.
7373

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
Investigating insider risk requires more than reviewing a single alert. It demands tools and workflows that provide insight into user behavior, risk indicators, and broader patterns of activity.
2+
3+
In this module, you learned how Microsoft Purview Insider Risk Management supports that process by:
4+
5+
- Providing the Alerts dashboard for structured triage and prioritization
6+
- Offering context through the All risk factors tab, Activity explorer, and User activity views
7+
- Enabling deeper review and coordinated response through cases
8+
- Connecting alert data to Microsoft Defender XDR for broader investigation
9+
- Supporting advanced queries with hunting tools for detailed behavioral analysis
10+
11+
Together, these tools help analysts and investigators move from initial detection to informed response. With this approach, organizations can respond more effectively to insider risks and reduce the time it takes to identify and act on meaningful threats.
12+
13+
## Resources
14+
15+
- [Investigate insider risk management activities](/purview/insider-risk-management-activities?azure-portal=true)
16+
- [Best practices for managing your alert volume in insider risk management](/purview/insider-risk-management-best-practices-alert-tuning?azure-portal=true)
17+
- [Take action on insider risk management cases](/purview/insider-risk-management-cases?azure-portal=true)
18+
- [Investigate insider risk threats in the Microsoft Defender portal](/defender-xdr/irm-investigate-alerts-defender?azure-portal=true)
Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,31 @@
11
### YamlMime:Module
22
uid: learn.wwl.purview-insider-risk-investigate-alerts
33
metadata:
4-
title: Prepare for Microsoft Purview Insider Risk Management
5-
description: "Prepare for Microsoft Purview Insider Risk Management."
6-
ms.date: 1/3/2025
4+
title: Investigate insider risk alerts and related activity
5+
description: "Investigate insider risk alerts and related activity."
6+
ms.date: 04/15/2025
77
author: wwlpublish
88
ms.author: riswinto
99
ms.topic: module
1010
ms.service: purview
1111
hidden: false
12-
title: Prepare for Microsoft Purview Insider Risk Management
13-
summary: Discover strategies for planning and configuring Microsoft Purview Insider Risk Management to meet organizational needs and protect privacy.
12+
title: Investigate insider risk alerts and related activity
13+
summary: Investigate insider risk alerts and manage related cases in Microsoft Purview to assess user behavior, take appropriate action, and coordinate deeper reviews across teams.
1414
abstract: |
1515
After completing this module, you'll be able to:
16-
- Collaborate with stakeholders to prepare for insider risk management.
17-
- Understand what's needed to meet prerequisites for implementation.
18-
- Configure settings to align with compliance and privacy needs.
19-
- Explore how connecting tools and data sources enhances risk management.
16+
- Understand how alerts are generated and prioritized in Insider Risk Management.
17+
- Tune policies and thresholds to manage alert volume effectively.
18+
- Use the Alerts dashboard and alert details to triage and respond to risky activity.
19+
- Investigate behavior using tabs like All risk factors, Activity explorer, and User activity.
20+
- Integrate with Microsoft Defender XDR for broader threat investigation.
21+
- Create, manage, and resolve Insider Risk Management cases.
2022
prerequisites: |
21-
- Understanding of insider risk concepts.
22-
- Familiarity with organizational compliance and privacy practices.
23+
- Familiarity with Microsoft Purview Insider Risk Management policies and indicators
24+
- Basic understanding of Microsoft 365 compliance and security tools
2325
iconUrl: /training/achievements/generic-badge.svg
2426
levels:
2527
- intermediate
2628
roles:
27-
- auditor
2829
- administrator
2930
- risk-practitioner
3031
products:
@@ -35,13 +36,15 @@ subjects:
3536
- security
3637
units:
3738
- learn.wwl.purview-insider-risk-investigate-alerts.introduction
38-
- learn.wwl.purview-insider-risk-investigate-alerts.plan-insider-risk-management
39-
- learn.wwl.purview-insider-risk-investigate-alerts.insider-risk-management-prerequisites
40-
- learn.wwl.purview-insider-risk-investigate-alerts.configure-insider-risk-settings
41-
- learn.wwl.purview-insider-risk-investigate-alerts.insider-risk-management-integrations
39+
- learn.wwl.purview-insider-risk-investigate-alerts.understand-insider-risk-alerts
40+
- learn.wwl.purview-insider-risk-investigate-alerts.manage-alert-volume
41+
- learn.wwl.purview-insider-risk-investigate-alerts.investigate-triage-alerts
42+
- learn.wwl.purview-insider-risk-investigate-alerts.all-risk-factors-tab
43+
- learn.wwl.purview-insider-risk-investigate-alerts.activity-explorer-tab
44+
- learn.wwl.purview-insider-risk-investigate-alerts.user-activity-tab
45+
- learn.wwl.purview-insider-risk-investigate-alerts.investigate-alerts-defender
46+
- learn.wwl.purview-insider-risk-investigate-alerts.insider-risk-cases
4247
- learn.wwl.purview-insider-risk-investigate-alerts.knowledge-check
4348
- learn.wwl.purview-insider-risk-investigate-alerts.summary
44-
45-
4649
badge:
4750
uid: learn.wwl.purview-insider-risk-investigate-alerts.badge

learn-pr/wwl-sci/purview-insider-risk-investigate-alerts/insider-risk-cases.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.wwl.purview-insider-risk-investigate-alerts.investigate-alerts-defender
2+
uid: learn.wwl.purview-insider-risk-investigate-alerts.insider-risk-cases
33
title: Manage and take action on insider risk cases
44
metadata:
55
title: Manage and take action on insider risk cases
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-insider-risk-investigate-alerts.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check."
7+
ms.date: 04/15/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
quiz:
15+
title: "Check your knowledge"
16+
questions:
17+
- content: "Where do you go in Microsoft Purview Insider Risk Management to view all alerts generated by policies?"
18+
choices:
19+
- content: "Cases dashboard"
20+
isCorrect: false
21+
explanation: "Incorrect: The Cases dashboard is for reviewing ongoing investigations, not initial alert triage."
22+
- content: "Activity explorer"
23+
isCorrect: false
24+
explanation: "Incorrect: Activity explorer shows event-level behavior but doesn't show all alerts."
25+
- content: "Alerts dashboard"
26+
isCorrect: true
27+
explanation: "Correct: The Alerts dashboard is the centralized queue for reviewing all policy-triggered alerts."
28+
29+
- content: "How does the scatter plot in the User activity tab help investigators?"
30+
choices:
31+
- content: "It maps user behavior to Microsoft Entra ID roles."
32+
isCorrect: false
33+
explanation: "Incorrect: The scatter plot shows risk-scored events, not Microsoft Entra ID data."
34+
- content: "It visualizes risk-scored events over time to identify sequences and patterns."
35+
isCorrect: true
36+
explanation: "Correct: The scatter plot helps surface trends and clusters of risky behavior."
37+
- content: "It provides direct access to Copilot summaries for each activity."
38+
isCorrect: false
39+
explanation: "Incorrect: Copilot summaries appear in the alert view, not the scatter plot."
40+
41+
- content: "What is a recommended next step if an alert involves multiple serious activities across different services?"
42+
choices:
43+
- content: "Dismiss the alert to avoid duplication."
44+
isCorrect: false
45+
explanation: "Incorrect: Dismissing could miss an opportunity for deeper investigation."
46+
- content: "Create a case to manage follow-up actions and collaboration."
47+
isCorrect: true
48+
explanation: "Correct: Creating a case is best for managing serious or multi-layered incidents."
49+
- content: "Delete the alert to reduce dashboard clutter."
50+
isCorrect: false
51+
explanation: "Incorrect: Alerts can't be manually deleted this way."
52+
53+
- content: "What role do cases play in insider risk investigations?"
54+
choices:
55+
- content: "They track licensing for each alert."
56+
isCorrect: false
57+
explanation: "Incorrect: Licensing is configured elsewhere and is unrelated to individual cases."
58+
- content: "They allow grouping and managing alert investigations for a specific user."
59+
isCorrect: true
60+
explanation: "Correct: Cases are created per user and help manage multiple alerts and related activity."
61+
- content: "They store Power Automate logs for compliance tracking."
62+
isCorrect: false
63+
explanation: "Incorrect: Cases support automation but aren't used for Power Automate auditing."
64+
65+
- content: "Which role is required to use Advanced hunting for insider risk events?"
66+
choices:
67+
- content: "Microsoft 365 Compliance Administrator"
68+
isCorrect: false
69+
explanation: "Incorrect: This role doesn't grant access to insider risk data in Defender."
70+
- content: "Insider Risk Management Analyst or Investigator"
71+
isCorrect: true
72+
explanation: "Correct: Only users with these roles can access insider risk data in Advanced hunting."
73+
- content: "Security Operator"
74+
isCorrect: false
75+
explanation: "Incorrect: Security roles in Defender don't grant access to Purview risk event data."

0 commit comments

Comments
 (0)