Skip to content

Commit ea4be33

Browse files
authored
Merge pull request #50012 from riswinto/NEW-purview-insider-risk-investigate-alerts
New purview insider risk investigate alerts
2 parents 18e8624 + e37471e commit ea4be33

38 files changed

+846
-1
lines changed

learn-pr/paths/purview-implement-insider-risk-management/index.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.wwl.purview-implement-insider-risk-management
33
metadata:
44
title: 'Implement and manage Microsoft Purview Insider Risk Management (SC-401)'
55
description: 'Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.'
6-
ms.date: 03/24/2025
6+
ms.date: 04/15/2025
77
author: wwlpublish
88
ms.author: riswinto
99
ms.topic: learning-path
@@ -28,6 +28,7 @@ modules:
2828
- learn.wwl.purview-explore-insider-risk-management
2929
- learn.wwl.purview-prepare-insider-risk-management
3030
- learn.wwl.purview-create-manage-insider-risk-policy
31+
- learn.wwl.purview-insider-risk-investigate-alerts
3132
- learn-m365.m365-compliance-irm-adaptive-protection
3233
trophy:
3334
uid: learn.wwl.purview-implement-insider-risk-management.trophy
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-insider-risk-investigate-alerts.activity-explorer-tab
3+
title: Investigate activity details with the Activity explorer tab
4+
metadata:
5+
title: Investigate activity details with the Activity explorer tab
6+
description: "Investigate activity details with the Activity explorer tab."
7+
ms.date: 04/15/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/activity-explorer-tab.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.purview-insider-risk-investigate-alerts.all-risk-factors-tab
3+
title: Analyze alert context with the All risk factors tab
4+
metadata:
5+
title: Analyze alert context with the All risk factors tab
6+
description: "Analyze alert context with the All risk factors tab."
7+
ms.date: 04/15/2025
8+
author: wwlpublish
9+
ms.author: riswinto
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/all-risk-factors-tab.md)]
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
The **Activity explorer** tab in Microsoft Purview Insider Risk Management helps analysts investigate the full context of potentially risky behavior. This tab shows a timeline of user activity that contributes to the alert, with detailed metadata to support investigation, filtering, and review.
2+
3+
Use this tab to confirm what triggered the alert and identify patterns or supporting evidence that indicate whether further action is needed.
4+
5+
:::image type="content" source="../media/activity-explorer-tab.png" alt-text="Screenshot showing the Activity explorer tab in Microsoft Purview Insider Risk Management." lightbox="../media/activity-explorer-tab.png":::
6+
7+
## Review activity details
8+
9+
Each row in the Activity explorer represents an event associated with the alert or broader user activity. Columns show details such as:
10+
11+
- Date and time of the event
12+
- Activity type (for example, file download or risky prompt)
13+
- File name and location
14+
- Associated sensitivity label, if present
15+
- Risk score and related risk factors
16+
17+
You can select an item to open the activity details pane and review:
18+
19+
- Event metadata, such as file path or recipient
20+
- Assigned risk score
21+
- Indicators that contributed to the risk level
22+
23+
This level of detail supports deeper investigation of user behavior.
24+
25+
## Filter activity for investigation
26+
27+
To help focus your review, use filters at the top of the page to narrow the activity list. You can filter by:
28+
29+
- **Activity scope**: Show all scored activity for the user or only activity associated with this specific alert
30+
- **Risk factor**: Focus on specific indicators like sequences, cumulative exfiltration, unallowed domains, or priority content
31+
- **Review status**: Hide previously reviewed items to focus on new activity
32+
33+
Filtering helps streamline triage and identify which events require the most attention.
34+
35+
## Customize the view
36+
37+
Customizing the view helps you focus on relevant attributes during triage. To match your investigation workflow, you can:
38+
39+
- Select or remove columns using **Customize columns**
40+
- Sort the view by date or risk score
41+
- Save custom filter and column views for reuse
42+
43+
These options help personalize the workspace so investigators can focus on what matters most.
44+
45+
## Understand activity count discrepancies
46+
47+
The number of activities shown in Activity explorer might not always match the number of raw event logs. Common reasons include:
48+
49+
- **Cumulative exfiltration detection**: Similar activities are deduplicated and scored as a single risk event
50+
- **Policy changes**: If policy settings change after events occur, prior events might be excluded
51+
- **Excluded items in sequences**: Files excluded from risk scoring might still appear if they're part of a larger sequence
52+
53+
These factors explain why sequences or exfiltration activity counts might differ between views.
54+
55+
## Investigate excluded items in sequences
56+
57+
Even when a file type is excluded from scoring, it might still show up in a sequence if it contributes to broader risk. For example, a .png file normally excluded from policy might appear in a sequence if it was used during an obfuscation attempt.
58+
59+
In these cases:
60+
61+
- A score of 0 appears for the excluded event
62+
- Excluded events are marked as **Excluded** in the activity details
63+
- A link is available to filter and view all excluded events
64+
65+
This helps you understand the full context of a user's behavior, even when individual events aren't scored directly.
66+
67+
## Save views for future use
68+
69+
If you create a useful filter and column setup, you can select **Save this view** to reuse it later. Saved views include both filters and column selections, allowing consistent triage workflows across analysts or alert types.
70+
71+
Select **Views** to load saved views at any time. Views can be personal or shared depending on how your team manages investigations.
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
The **All risk factors** tab in Microsoft Purview Insider Risk Management provides a summary of potentially risky activity associated with an alert. This view helps investigators understand why an alert might be significant by showing which risk signals are present, even if those signals weren’t the direct cause of the alert.
2+
3+
Use this tab to evaluate the broader context of a user's behavior and decide whether to investigate further, dismiss the alert, or take action.
4+
5+
:::image type="content" source="../media/all-risk-factors-tab.png" alt-text="Screenshot showing the All risk factors tab in Microsoft Purview Insider Risk Management." lightbox="../media/all-risk-factors-tab.png":::
6+
7+
## Risk factors shown in this tab
8+
9+
The All risk factors tab surfaces several types of behavior that might increase a user's overall risk level:
10+
11+
- **Top exfiltration activities**: Lists the most frequent exfiltration actions, such as archiving or uploading files.
12+
- **Cumulative exfiltration**: Shows whether repeated actions build over time to indicate rising risk.
13+
- **Sequences of activities**: Highlights related activities that form a recognizable risk sequence.
14+
- **Priority content**: Indicates whether the user interacted with files marked as sensitive or business-critical.
15+
- **Unallowed domains**: Flags any file or data transfers to domains that aren't permitted by policy.
16+
- **Unusual behavior or high-impact user status**: Detects abnormal patterns or identifies users whose role or access level contributes to elevated risk.
17+
18+
Not all alerts are directly caused by these factors, but the tab helps you assess what else might be happening that could influence the user’s risk level.
19+
20+
> [!TIP]
21+
> Risk signals shown on this tab might not be the reason the alert was triggered. Always check the activity listed in the alert summary before deciding how to respond.
22+
23+
## Use the Content detected section
24+
25+
The **Content detected** section on this tab shows specific items involved in each risk activity. Selecting a listed item allows you to:
26+
27+
- View metadata such as file name, type, location, and sensitivity label if present
28+
- Open the **Activity explorer** to see how that item fits into a broader timeline of activity
29+
30+
:::image type="content" source="../media/all-risk-factors-content-detected.png" alt-text="Screenshot showing the Content detected section of the All risk factors tab in Microsoft Purview Insider Risk Management." lightbox="../media/all-risk-factors-content-detected.png":::
31+
32+
This view helps you validate whether the behavior was risky and supports more informed decisions.
33+
34+
## Important behavior to understand
35+
36+
- **Risk factor summaries don't always match the trigger.** An alert might be triggered by access to priority content, but the tab could instead highlight unrelated risky browsing activity or sequences that increase concern.
37+
- **Sequences can include excluded events.** Even if a file type is excluded from scoring, it can still appear in a sequence if it contributes to broader risky behavior. For example, a .png file might normally be excluded but still appears if used during an obfuscation attempt.
38+
- **Use the Content detected section to investigate further.** This section links to Activity explorer, where you can view detailed events and associated content. It serves as a key entry point for deeper review.
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
Cases in Microsoft Purview Insider Risk Management allow investigators to track user risk over time, review associated alerts, and take action based on the severity and context of the activity. Each case focuses on a single user and can include one or more alerts. Cases are created manually when an alert requires deeper review or coordination with other teams.
2+
3+
Use the **Cases** dashboard to view all active and closed cases, assign ownership, and manage follow-up actions such as escalation, communication, and resolution.
4+
5+
## Respond to alerts
6+
7+
Not all alerts require a case. You can take action directly from the **Alerts** queue by confirming or dismissing alerts as part of your triage process:
8+
9+
- **Dismiss** an alert if it's a false positive or doesn't require further review.
10+
- **Confirm** an alert to indicate a policy violation and optionally create a case for deeper investigation.
11+
12+
Creating a case is recommended when an alert involves serious risk, multiple incidents, or needs collaboration across teams. Once a case is created, you can take further action such as sending notices, escalating, or resolving with a classification.
13+
14+
## Create and manage cases
15+
16+
Cases are created from alerts when an incident needs further review or response. Once created, cases can be updated with new alerts and managed through their lifecycle. You can:
17+
18+
- Assign or reassign ownership
19+
- Send an email notice to the user
20+
- Escalate to Microsoft Purview eDiscovery (Premium)
21+
- Run Power Automate flows
22+
- Create or view a connected Microsoft Teams team
23+
- Resolve the case with a classification of Benign or Confirmed policy violation
24+
25+
You can assign a case to any user with one of these roles: **Insider Risk Management**, **Analyst**, or **Investigator**.
26+
27+
:::image type="content" source="../media/insider-risk-case-details.png" alt-text="Screenshot showing how to create a case in Insider Risk Management." lightbox="../media/insider-risk-case-details.png":::
28+
29+
## Use the Cases dashboard
30+
31+
The Cases dashboard lists each case and includes key details:
32+
33+
- Case name and ID
34+
- Assigned user (anonymized if enabled)
35+
- Status: **Active** or **Closed**
36+
- Number of alerts
37+
- Time opened and last updated
38+
- Last updated by
39+
40+
You can search by case ID or keywords, and use filters to narrow by status, date opened, or last updated.
41+
42+
To customize the view, select **Customize columns**. To save filters for future use, apply filters and select **Save this view**.
43+
44+
:::image type="content" source="../media/insider-risk-case-details.png" alt-text="Screenshot showing the Cases dashboard in Insider Risk Management." lightbox="../media/insider-risk-case-details.png":::
45+
46+
## Investigate a case
47+
48+
Selecting a case opens a detailed investigation view with multiple tabs:
49+
50+
- **Case overview**: User identity, department, risk score, associated alerts
51+
- **Alerts**: Status, severity, and alert ID for each included alert
52+
- **User activity**: Timeline of scored risk activity from the alert or broader user history
53+
- **Activity explorer (preview)**: Detailed timeline and metadata for each associated event
54+
55+
**User activity** shows the overall timeline of user risk behavior, while **Activity explorer** focuses on event-level details within the case scope.
56+
57+
- **Forensic evidence**: Screen captures from activity that triggered the alert
58+
- **Content explorer**: Copies of files and email messages associated with risk alerts
59+
- **Case notes:** Permanent, timestamped notes added by analysts
60+
- **Contributors**: Users added to the case for collaboration
61+
62+
:::image type="content" source="../media/insider-risk-case-details.png" alt-text="Screenshot showing details of a case investigation." lightbox="../media/insider-risk-case-details.png":::
63+
64+
> [!NOTE]
65+
> Contributors can view the case and add notes, but they can't edit contributor lists or confirm/dismiss alerts.
66+
67+
## Take action on a case
68+
69+
The case toolbar includes actions for responding to the alert:
70+
71+
### Send email notice
72+
73+
Send a message to the user to reinforce policies or training. Notices are based on templates and are recorded in the **Case notes** tab.
74+
75+
> [!TIP]
76+
> Sending a notice doesn't close the case. To resolve it, you must select **Resolve case** separately.
77+
78+
### Escalate for investigation
79+
80+
Use this option to escalate the case to a Microsoft Purview eDiscovery (Premium) case for deeper investigation and legal hold workflows.
81+
82+
### Run Power Automate flows
83+
84+
Trigger flows for common tasks such as:
85+
86+
- Notifying a manager
87+
- Creating a record in ServiceNow
88+
- Requesting details from HR
89+
90+
### Create or view Teams team
91+
92+
If Teams integration is enabled in Insider Risk Management settings, a team is created automatically when a case is opened. Teams are archived when a case is resolved. To enable Teams integration:
93+
94+
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
95+
1. Select **Settings** > **Insider Risk Management** > **Microsoft Teams**.
96+
1. Select the toggle to enable integration with Microsoft Teams.
97+
98+
:::image type="content" source="../media/insider-risk-teams-integration.png" alt-text="Screenshot showing where to enable Teams integration in Microsoft Purview Insider Risk Management." lightbox=" ../media/insider-risk-teams-integration.png":::
99+
100+
## Resolve a case
101+
102+
When investigation is complete, resolve the case as:
103+
104+
- **Benign**: Behavior is low-risk, accidental, or false positive
105+
- **Confirmed policy violation**: Behavior is intentional or a serious violation
106+
107+
Enter a reason for the resolution. Resolution actions are recorded in Case notes, and the case status is updated to Closed.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
Identifying insider risks is only the beginning. Organizations also need a clear and consistent approach to investigating alerts and understanding the full context of user behavior. Without a structured process, high-risk activity might go unnoticed, low-risk alerts might receive too much attention, and investigators can struggle to determine the right response.
2+
3+
This module focuses on helping you analyze and respond to alerts in Microsoft Purview Insider Risk Management. You'll learn how to:
4+
5+
- Review and triage alerts using the Alerts dashboard
6+
- Understand the factors that influence alert generation and risk scoring
7+
- Use tools like Activity explorer, User activity, and All risk factors to investigate user behavior
8+
- Work with insider risk cases to organize related alerts and take follow-up actions
9+
- Extend your investigation into Microsoft Defender XDR and use advanced hunting for deeper insight
10+
11+
By the end of this module, you'll understand how to investigate insider risk alerts in a way that's efficient, accurate, and aligned with your organization's risk policies.

0 commit comments

Comments
 (0)