🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AB-900 Domain 2
Domain 2 — Module 4 of 10 40%
14 of 28 overall

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free
Domain 2: Data Protection & Governance Premium ⏱ ~13 min read

Insider Risk & Communication Compliance

Not all threats come from outside. Insider Risk catches suspicious behaviour patterns. Communication Compliance monitors messages for policy violations. Both are essential for Copilot-era governance.

Two tools, two threats

☕ Simple explanation

Think of an office with security cameras and a content moderator.

Insider Risk is the security camera system that watches BEHAVIOUR — “this person is downloading an unusual number of files” or “this person just copied 500 documents to USB the day before they resigned.” It primarily watches behaviour patterns and actions, often using content context like sensitivity labels to assess risk.

Communication Compliance is the content moderator — it reads MESSAGES in Teams and Outlook looking for policy violations: harassment, discriminatory language, sharing of confidential information in inappropriate channels, or regulatory breaches.

One watches what people DO. The other watches what people SAY.

Insider Risk Management correlates signals across M365 to identify potentially risky user activities — data theft, security policy violations, and confidentiality breaches. It uses behavioural analytics, not content inspection, to flag unusual patterns such as abnormal download volumes, sequence of activities, or off-hours access.

Communication Compliance scans message content in Exchange, Teams, and third-party platforms for regulatory violations, code-of-conduct breaches, and sensitive information sharing. It uses keyword matching, trainable classifiers, and pattern detection.

Insider Risk Management

What it detects

Risk CategorySignalsExample
Data theft by departing employeesResignation + unusual file downloadsEmployee submits notice, then downloads 2,000 files over 3 days
Data leaksSensitive files shared externally or to personal accountsConfidential spreadsheet shared to personal Gmail
Security policy violationsCircumventing DLP, disabling security featuresUser turns off device encryption to transfer files
Risky AI usageSensitive prompts to Copilot or external AI toolsEmployee pastes customer PII into an external chatbot

How it works

  1. Policies define what to watch for (data theft, leaks, security violations)
  2. Signals are collected from M365 services (SharePoint, OneDrive, Teams, Exchange, endpoints)
  3. Alerts fire when user activity matches risk patterns
  4. Cases are created for investigation — with timeline of all related activities
  5. Actions can be taken: escalate to HR, refer to legal, adjust permissions
ℹ️ Adaptive Protection — Insider Risk meets DLP

Adaptive Protection is a powerful integration between Insider Risk and DLP:

When a user is flagged as “elevated risk” by Insider Risk (e.g., they’ve been downloading unusual amounts of data), DLP policies automatically become stricter for that user — blocking actions that would normally just trigger a warning.

Example: Normal users get “warn” when emailing externally. High-risk users get “block.”

This means protection adapts to the user’s behaviour — no manual intervention needed.

Exam tip: If a question mentions “automatically adjusting DLP strictness based on user risk” → the answer is Adaptive Protection.

Communication Compliance

What it monitors

Policy TypeWhat It CatchesExample
Regulatory complianceFinancial or healthcare regulation violationsInsider trading language, HIPAA breaches
Code of conductHarassment, discrimination, threatsBullying in Teams messages
Sensitive informationConfidential data shared in messagesSharing passwords or account numbers in chat
Conflict of interestInappropriate communicationsEmployee discussing deals with a competitor

How it works

  1. Policies define what to scan (Teams, Outlook, third-party) and what to look for
  2. Detection uses keywords, regex, trainable classifiers, and sensitive info types
  3. Alerts fire when content matches a policy
  4. Review — compliance officers review flagged messages in context
  5. Actions — resolve, escalate, tag for investigation, or remediate
💡 Scenario: Clearfield Council monitors workplace conduct

Officer Patel sets up Communication Compliance:

Policy 1: Anti-harassment

  • Scans: Teams messages + Outlook emails
  • Detects: Trainable classifier for “harassment” + keyword list for slurs
  • Action: Alert Officer Patel for review

Policy 2: Sensitive data in chat

  • Scans: Teams messages
  • Detects: Credit card numbers, citizen ID patterns
  • Action: Alert compliance reviewer for manual review and remediation

First month results: 12 alerts fired. 8 were genuine policy violations (staff sharing citizen IDs in Teams instead of secure channels). 4 were false positives (the word “discrimination” used in a policy discussion context → classifier tuned).

Insider Risk vs Communication Compliance

Insider Risk vs Communication Compliance
FeatureInsider RiskCommunication Compliance
What it watchesUser BEHAVIOUR (actions, patterns)Message CONTENT (words, data)
DetectsUnusual downloads, data theft, policy circumventionHarassment, regulatory violations, sensitive data in messages
Signals fromSharePoint, OneDrive, Teams, Exchange, endpointsTeams messages, Outlook emails, third-party platforms
UsesBehavioural analytics, correlation, timelinesKeywords, classifiers, sensitive info types, regex
Investigated bySecurity/HR teamCompliance/legal team

🎬 Video walkthrough

🎬 Video coming soon

Insider Risk & Communication Compliance — AB-900 Module 14

Insider Risk & Communication Compliance — AB-900 Module 14

~11 min

Flashcards

Question

What does Insider Risk Management detect?

Click or press Enter to reveal answer

Answer

Suspicious user BEHAVIOUR patterns: unusual file downloads, data theft by departing employees, security policy violations, and risky AI usage. It uses behavioural analytics across M365 signals.

Click to flip back

Question

What does Communication Compliance detect?

Click or press Enter to reveal answer

Answer

Policy violations in MESSAGE CONTENT: harassment, discriminatory language, regulatory violations, and sensitive information shared in Teams/Outlook. It uses keywords, classifiers, and pattern matching.

Click to flip back

Question

What is Adaptive Protection?

Click or press Enter to reveal answer

Answer

An integration between Insider Risk and DLP that automatically makes DLP policies stricter for users flagged as high-risk. Normal users get warnings; high-risk users get blocks — automatically adjusted based on behaviour.

Click to flip back

Knowledge Check

Knowledge Check

An employee at Northwave submitted their resignation last week. Over the following 5 days, they downloaded 3,000 files from the company SharePoint to their personal device. Which Purview tool would detect this?

Knowledge Check

Clearfield Council's compliance team discovers that multiple staff members have been using discriminatory language in Teams channels. Officer Patel needs to set up monitoring to detect and review these messages. Which Purview tool should she configure?


Next up: DSPM for AI & Data Lifecycle — governing how AI tools use your data, and managing how long data lives.

← Previous

Data Loss Prevention (DLP)

Next →

DSPM for AI & Data Lifecycle

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.