top of page

Do not miss new blog posts! Subscribe to new posts, news, and updates.

Thank you for joining our Blog subscription!

5 Use Cases for Custom Sensitive Info Types in Microsoft Purview Compliance


Microsoft Purview Sensitive Info Types
Sensitive Info Types in Microsoft Purview Compliance Solutions
 

Sensitive info types (SITs) are pattern-based data classifiers in Microsoft 365 Purview. Microsoft has 300+ built-in sensitive info types and the list is continuously increasing. Organizations can automate compliance with built-in SITs or create custom sensitive info types to identify and classify their data crown jewels. In this article we look at 5 use cases where custom sensitive info types are used in various Microsoft Purview Compliance solutions.


An organisation is currently working on an acquisition project. All the documents related to the acquisition are identified through keyword ‘Project Oblivion’ and sequential document reference numbers OBV-22-AQ-xxxx. The organisation has the following requirements.

Requirement

Microsoft Purview Solution

1. Classify all documents containing the project information as ‘Confidential’ with an MIP sensitivity label.

Information Protection

2. Forward all emails and attachments containing the project information to data compliance team for approval

Data Loss Prevention

3. Retain all the documents containing the project information for 5 years

​Data Life Cycle Management

4. Monitor all the data leakage activity by a project resource serving notice period

Insider Risk Management

5. Search and export all the project related information from specific users for investigation

eDiscovery

 

A custom sensitive info type named SIT-PRJ-OBV is created with a regex to identify the pattern OBV-22-AQ-xxxx with a supporting keyword ‘Project Oblivion’. The custom SIT is then used in the policies of the Microsoft Purview Compliance solutions.

Microsoft Purview Sensitive Info Type

1. Configure Information Protection auto label policy using the custom sensitive info type SIT-PRJ-OBV to apply ‘Confidential’ label on documents.

Microsoft Purview Information Protection

2. Configure Data Loss Prevention policy to forward all emails and attachments identified through custom Sensitive Info Type SIT-PRJ-OBV to data compliance team for approval

Microsoft Purview Data Loss Prevention

3. Configure Data Life Cycle Management auto label policy to apply a 5-year retention label to retain all the documents containing the project information identified through SIT-PRJ-OBV

Microsoft Purview Data Life Cycle Management

4. Configure Insider Risk Management data leak policy targeted to the user and prioritise the documents identified through SIT-PRJ-OBV and monitor exfiltration activity.

Microsoft Purview Insider Risk Management

5. Configure eDiscovery search to export all documents identified through custom sensitive information type SIT-PRJ-OBV. The id of the SIT can be obtained through Get-DlpSensitiveInformationType cmdlet.

Microsoft Purview eDiscovery

Many organisations fail to effectively identify sensitive information due to lack of knowledge and skills in configuring keywords, dictionary and regular expressions which are essential to detect sensitive information. It is important to have the regular expressions and the supporting elements configured and fine tuned right to avoid large number of false positives in sensitive info types. Infotechtion experts can help you configure SITs and all Microsoft Purview Compliance solution policies based on our extensive experience with Microsoft Cloud. Feel free to contact us or request demo of purview solutions.



267 views

Recent Posts

See All
bottom of page