Skip to content

Latest commit

 

History

History
58 lines (45 loc) · 3.52 KB

manage-devices-with-intune-dlp-mip.md

File metadata and controls

58 lines (45 loc) · 3.52 KB
title description ms.author author f1.keywords manager ms.date audience ms.topic ms.service ms.localizationpriority ms.collection ms.custom keywords
Step 7. Implement data loss prevention (DLP) with information protection capabilities
Implement Endpoint DLP by working with your information protection and governance team to create DLP policies for your organization.
bcarter
brendacarter
Endpoint dlp
data loss prevention
dlp policies
dougeby
04/16/2024
ITPro
article
o365-solutions
high
highpri
endpoint dlp
data loss prevention
dlp policies
M365-security-compliance
m365solution-managedevices
m365solution-scenario
zerotrust-solution

Step 7. Implement data loss prevention (DLP) with information protection capabilities

If your organization has already put the time into understanding your data, developing a data sensitivity schema, and applying the schema, you might be ready to extend elements of this schema to endpoints by using Microsoft Purview Data Loss Prevention (DLP) policies.

Endpoint data loss prevention (Endpoint DLP) currently applies to:

  • Windows 10 and Windows 11
  • macOS

DLP policies are created by your information protection and governance team. Each DLP policy defines what elements within a data set to look for, like sensitive information types or labels, and how to protect this data.

For example, a DLP policy can look for personal data like a passport number. The DLP policy includes a condition that triggers the policy to take action, such as when a passport number is shared with people outside your organization. The action the policy takes can be configured as well. Options range from simply reporting the action to admins, warning users, or even preventing the data from being shared.

The DLP policy also specifies the location to apply the policy to, such as Exchange email and SharePoint sites. One of the locations available to admins is devices. If devices are selected, you can specify which users and user groups to apply the policy to. You can also specify users and user groups to exclude from the policy.

If your information protection and governance team is ready to extend DLP policies to endpoints, you need to coordinate with them to enable devices for Endpoint DLP, test and tune DLP policies, train users, and monitor the results.

:::image type="content" source="../media/devices/endpoint-dlp-steps.png" alt-text="The three steps to implement Endpoint DLP steps for device admins." lightbox="../media/devices/endpoint-dlp-steps.png":::

Use the following steps to work with your information protection team.

Step Description
1 Learn about Endpoint DLP.
2 Enable devices for Endpoint DLP. If you onboarded devices to Microsoft Defender for Endpoint, your devices are already enabled for Endpoint DLP. If your devices aren't onboarded to Defender for Endpoint, see Get started with Endpoint data loss prevention for instructions.
3 Work with your information protection and governance team to define, test, and tune policies. This includes monitoring the results. See these resources:

- Using Endpoint data loss prevention

- Get started with Activity Explorer

Next step

Go to Step 7. Implement data loss prevention (DLP) with information protection capabilities.