🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AB-900 Domain 2
Domain 2 — Module 3 of 10 30%
13 of 28 overall

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free
Domain 2: Data Protection & Governance Premium ⏱ ~11 min read

Data Loss Prevention (DLP)

DLP is the safety net that catches sensitive data before it leaves your organisation. Credit card numbers in an email? Confidential files shared on Teams? DLP blocks it and alerts the admin.

What is DLP?

☕ Simple explanation

DLP is the airport security scanner for your data.

Before anything leaves your organisation (via email, Teams, SharePoint sharing, or even copy-paste), DLP scans it. If it contains something sensitive — credit card numbers, health records, confidential labels — DLP can block it, warn the user, or alert an admin.

The user might not even realise they’re about to share something sensitive. DLP catches it anyway.

Data Loss Prevention (DLP) in Microsoft Purview detects and prevents the inappropriate sharing, transfer, or use of sensitive data across M365 services (Exchange, SharePoint, OneDrive, Teams, endpoints) and even third-party cloud apps.

DLP policies define conditions (what sensitive data to look for), actions (block, warn, or audit), and notifications (alert the user, admin, or both). DLP leverages sensitive information types, sensitivity labels, and trainable classifiers to identify content.

How DLP policies work

A DLP policy has three parts:

PartWhat It DefinesExample
ConditionsWhat to look for”Documents containing credit card numbers” or “files with Confidential label”
ActionsWhat to do when detectedBlock sharing, restrict access, warn user, audit only
NotificationsWho to tellWarn the user (policy tip), alert the admin, send incident report

DLP actions — what happens when a rule triggers

DLP action levels — from gentle to strict
FeatureImpact LevelWhat Users See
Audit onlyLow — logging onlyNothing — activity is logged but not blocked
WarnMedium — user sees a tipPolicy tip: 'This email contains sensitive data. Are you sure?'
Block with overrideHigh — blocked but user can justify'This action is blocked. Provide a business justification to proceed.'
BlockHighest — hard block'You cannot share this content externally.' No override possible.
💡 Scenario: Maya handles a DLP alert

Maya receives a DLP alert:

Alert: “Sam (Marketing) attempted to email a spreadsheet containing 47 credit card numbers to an external email address”

What happened:

  1. Sam prepared a report with customer payment data (didn’t realise it had raw card numbers)
  2. DLP scanned the email attachment → detected credit card pattern (SIT match)
  3. DLP blocked the email and showed Sam a policy tip: “This email contains credit card information and cannot be sent externally”
  4. DLP sent an alert to Maya with full details

Maya’s response:

  1. Reviews the alert in Purview → DLP → Alerts
  2. Contacts Sam → explains why it was blocked
  3. Sam redacts the card numbers → resends successfully
  4. Maya marks the alert as resolved

Without DLP: Those 47 credit card numbers would have been emailed to an external address. Data breach, regulatory fine, customer trust destroyed.

Where DLP applies

DLP isn’t just for email — it covers multiple channels:

LocationWhat DLP Monitors
Exchange OnlineEmail body and attachments
SharePoint OnlineFiles in document libraries
OneDrivePersonal file storage
TeamsChat messages and channel messages
EndpointsFiles copied to USB, printed, or uploaded to cloud
Power BIDashboards and reports containing sensitive data

Exam tip: DLP in Teams monitors MESSAGES — not just files. If someone types a credit card number in a Teams chat, DLP can catch it.

DLP alerts and investigation

When DLP triggers, admins investigate in Microsoft Purview → DLP → Alerts:

  • Alert details: What was detected, who triggered it, when, which policy matched
  • Activity explorer: See the full timeline of DLP events
  • False positive handling: Dismiss alerts that aren’t real issues, tune policies to reduce noise

🎬 Video walkthrough

🎬 Video coming soon

Data Loss Prevention — AB-900 Module 13

Data Loss Prevention — AB-900 Module 13

~9 min

Flashcards

Question

What does DLP do?

Click or press Enter to reveal answer

Answer

Detects and prevents inappropriate sharing of sensitive data across M365 services (email, SharePoint, OneDrive, Teams, endpoints). Uses conditions (what to detect), actions (block/warn/audit), and notifications (alert user/admin).

Click to flip back

Question

What's the difference between 'block with override' and 'block' in DLP?

Click or press Enter to reveal answer

Answer

Block with override: user is stopped but can provide a business justification to proceed. Block: hard stop, no override possible. Use 'block with override' when there might be legitimate reasons to share; use 'block' for the most sensitive data.

Click to flip back

Question

Can DLP monitor Teams chat messages (not just files)?

Click or press Enter to reveal answer

Answer

Yes — DLP monitors both files AND messages in Teams. If someone types a credit card number in a Teams chat, DLP can detect and block it.

Click to flip back

Knowledge Check

Knowledge Check

Northwave's DLP policy blocks external sharing of documents with credit card numbers. Sam in Marketing needs to send a report with payment data to an external auditor for a legitimate audit. What's the BEST configuration?


Next up: Insider Risk & Communication Compliance — detecting suspicious behaviour and monitoring for policy violations.

← Previous

Sensitivity Labels & Data Classification

Next →

Insider Risk & Communication Compliance

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.