-
Notifications
You must be signed in to change notification settings - Fork 1.3k
DLP-chrisda to Main #12455
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
DLP-chrisda to Main #12455
Changes from all commits
Commits
Show all changes
17 commits
Select commit
Hold shift + click to select a range
3b85afc
Locations param
chrisda 7afb89a
Merge branch 'main' into DLP-chrisda
chrisda 499ae6f
Locations parameter
chrisda 14e4fca
Update New-DlpCompliancePolicy.md
chrisda 0a9b5a1
Update New-DlpCompliancePolicy.md
msftyb bb2e6af
Update New-DlpCompliancePolicy.md
chrisda f72128a
Update New-DlpCompliancePolicy.md
chrisda cb66ebf
Update New-DlpCompliancePolicy.md
chrisda fdd1765
Update New-DlpCompliancePolicy.md
chrisda d3aa52c
Merge branch 'DLP-chrisda' into patch-1
chrisda cf4723c
Merge pull request #12407 from msftyb/patch-1
chrisda 72095e4
Merge branch 'main' into DLP-chrisda
chrisda e08c785
Update New-DlpCompliancePolicy.md
chrisda 8721f15
Merge branch 'main' into DLP-chrisda
chrisda b574fee
Merge branch 'main' into DLP-chrisda
chrisda 1d4711f
Synch Locations param description
chrisda e128d4b
Update Set-DlpCompliancePolicy.md
chrisda File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -88,13 +88,67 @@ New-DlpCompliancePolicy -Name "GlobalPolicy" -Comment "Primary policy" -SharePoi | |
This example creates a DLP policy named GlobalPolicy for the specified SharePoint Online and OneDrive for Business locations. The new policy has a descriptive comment and will be enabled on creation. | ||
|
||
### Example 3 | ||
|
||
```powershell | ||
New-DlpCompliancePolicy -Name "PowerBIPolicy" -Comment "Primary policy" -PowerBIDlpLocation "All" -PowerBIDlpLocationException "workspaceID1","workspaceID2","workspaceID3" -Mode Enable | ||
``` | ||
|
||
This example creates a DLP policy named PowerBIPolicy for all qualifying Power BI workspaces (that is, those hosted on Premium Gen2 capacities) except for the specified workspaces. The new policy has a descriptive comment and will be enabled on creation. | ||
|
||
### Example 4 | ||
```powershell | ||
Get-Label | Format-List Priority,ContentType,Name,DisplayName,Identity,Guid | ||
|
||
$guidVar = "e222b65a-b3a8-46ec-ae12-00c2c91b71c0" | ||
|
||
$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","Inclusions":[{Type:"Tenant", Identity:"All"}]}]" | ||
|
||
New-DLPCompliancePolicy -Name "Copilot Policy" -Locations $loc | ||
|
||
$advRule = @{ | ||
"Version" = "1.0" | ||
"Condition" = @{ | ||
"Operator" = "And" | ||
"SubConditions" = @( | ||
@{ | ||
"ConditionName" = "ContentContainsSensitiveInformation" | ||
"Value" = @( | ||
@{ | ||
"groups" = @( | ||
@{ | ||
"Operator" = "Or" | ||
"labels" = @( | ||
@{ | ||
"name" = $guidVar | ||
"type" = "Sensitivity" | ||
} | ||
) | ||
"name" = "Default" | ||
} | ||
) | ||
} | ||
) | ||
} | ||
) | ||
} | ||
} | ConvertTo-Json -Depth 100 | ||
|
||
New-DLPComplianceRule -Name "Copilot Rule" -Policy "Copilot Policy" -AdvancedRule $advrule -RestrictAccess @(@{setting="ExcludeContentProcessing";value="Block"}) | ||
``` | ||
|
||
This example creates a DLP policy for Microsoft 365 Copilot (Preview) in several steps: | ||
|
||
- The first command returns information about all sensitivity labels. Select the GUID value of the sensitivity label that you want to use. For example, `e222b65a-b3a8-46ec-ae12-00c2c91b71c0`. | ||
|
||
- The second command stores the GUID value of the sensitivity label in the variable named `$guidVar`. | ||
|
||
- The third command stores the Microsoft 365 Copilot location (`470f2276-e011-4e9d-a6ec-20768be3a4b0`) in the variable named `$loc`. Update the `$loc` value based on the Inclusions/Exclusions scoping that you want to provide. | ||
|
||
- The fourth command creates the DLP policy using the `$loc` variable for the value of the Locations parameter, and "Copilot Policy" as the name of the policy (use any unique name). | ||
|
||
- The fifth command creates the variable named `$advRule`. The advanced rule needs to be updated depending on the grouping of labels you want to provide as input. | ||
|
||
- The last command creates the DLP rule with the name "Copilot Rule" (use any unique name). Use the name of the DLP policy from step four as the value of the Policy parameter. | ||
|
||
## PARAMETERS | ||
|
||
### -Name | ||
|
@@ -427,7 +481,28 @@ Accept wildcard characters: False | |
``` | ||
|
||
### -Locations | ||
{{ Fill Locations Description }} | ||
The Locations parameter specifies to whom, what, and where the DLP policy applies. This parameter uses the following properties: | ||
|
||
- Workload: What the DLP policy applies to. Use the value `Applications`. | ||
- Location: Where the DLP policy applies. For Microsoft 365 Copilot, (Preview), use the value `470f2276-e011-4e9d-a6ec-20768be3a4b0`. | ||
- Inclusions: Who the DLP policy applies to. For users, use the email address in this syntax: `{Type:IndividualResource,Identity:<EmailAddress>}`. For security groups or distribution groups, use the ObjectId value of the group from the Microsoft Entra portal in this syntax: `{Type:Group,Identity:<ObjectId>}`. For the entire tenant, use this value: `{Type:"Tenant",Identity:"All"}`. | ||
- Exclusions: Exclude security groups, distribution groups, or users from the scope of this DLP policy. For users, use the email address in this syntax: `{Type:IndividualResource,Identity:<EmailAddress>}`. For groups, use the ObjectId value of the group from the Microsoft Entra portal in this syntax: `{Type:Group, Identity:<ObjectId>}`. | ||
|
||
You create and store the properties in a variable as shown in the following examples: | ||
|
||
DLP policy scoped to all users in the tenant: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","Inclusions":[{Type:"Tenant",Identity:"All"}]}]"` | ||
|
||
DLP policy scoped to the specified user and groups: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","Inclusions":[{"Type":"Group","Identity":"fef0dead-5668-4bfb-9fc2-9879a47f9bdb"},{"Type":"Group","Identity":"b4dc1e1d-8193-4525-b59c-6d6e0f1718d2"},{"Type":"IndividualResource","Identity":"[email protected]"}]}]"` | ||
|
||
DLP policy scoped to all users in the tenant except for members of the specified group: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","Inclusions":[{Type:"Tenant",Identity:"All"}]}],"Exclusions":[{"Type":"Group","Identity":"fef0dead-5668-4bfb-9fc2-9879a47f9bdb"}]}]"` | ||
|
||
After you create the `$loc` variable as shown in the previous examples, use the value `$loc` for this parameter. | ||
|
||
```yaml | ||
Type: String | ||
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -743,7 +743,26 @@ Accept wildcard characters: False | |
``` | ||
|
||
### -Locations | ||
{{ Fill Locations Description }} | ||
The Locations parameter specifies to whom, what, and where the DLP policy applies. This parameter uses the following properties: | ||
|
||
- AddInclusions or RemoveInclusions: Add or remove security groups, distribution groups, or users to or from the scope of this DLP policy. For users, use the email address in this syntax: `{Type:IndividualResource,Identity:<EmailAddress>}`. For security groups or distribution groups, use the ObjectId value of the group from the Microsoft Entra portal in this syntax: `{Type:Group,Identity:<ObjectId>}`. | ||
- AddExclusions or RemoveExclusions: Add or remove security groups, distribution groups, or users to or from exclusions to the scope of this DLP policy. For users, use the email address in this syntax: `{Type:IndividualResource,Identity:<EmailAddress>}`. For security groups or distribution groups, use the ObjectId value of the group from the Microsoft Entra portal in this syntax: `{Type:Group,Identity:<ObjectId>}`. | ||
|
||
You create and store the properties in a variable as shown in the following examples: | ||
|
||
DLP policy scoped to all users in the tenant: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","AddInclusions":[{Type:"Tenant",Identity:"All"}]}]"` | ||
|
||
DLP policy scoped to the specified user and groups: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","AddInclusions":[{"Type":"Group","Identity":"fef0dead-5668-4bfb-9fc2-9879a47f9bdb"},{"Type":"Group","Identity":"b4dc1e1d-8193-4525-b59c-6d6e0f1718d2"},{"Type":"IndividualResource","Identity":"[email protected]"}]}]"` | ||
|
||
DLP policy scoped to all users in the tenant except for members of the specified group: | ||
|
||
`$loc = "[{"Workload":"Applications","Location":"470f2276-e011-4e9d-a6ec-20768be3a4b0","AddInclusions":[{Type:"Tenant",Identity:"All"}],"AddExclusions": [{"Type":"Group","Identity":"fef0dead-5668-4bfb-9fc2-9879a47f9bdb"},{"Type":"Group","Identity":"b4dc1e1d-8193-4525-b59c-6d6e0f1718d2"}]}]` | ||
|
||
After you create the `$loc` variable as shown in the previous examples, use the value `$loc` for this parameter. | ||
|
||
```yaml | ||
Type: String | ||
|
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.