🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 4
Domain 4 — Module 4 of 5 80%
27 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 4: Manage Compliance by Using Microsoft Purview Premium ⏱ ~15 min read

DLP Policies Across M365 Workloads

Configure Data Loss Prevention policies for Exchange Online, SharePoint, OneDrive, Teams, Power BI, and Microsoft 365 Copilot to prevent sensitive data leaks.

Stopping sensitive data from leaving

☕ Simple explanation

DLP is the exit scanner at the airport — it checks everything leaving your organisation for items that shouldn’t leave.

When someone tries to email a spreadsheet with patient IDs, share a SharePoint document containing credit card numbers, or paste sensitive data into a Teams chat — DLP detects it and takes action: warn the user, block the action, or alert compliance. It works across ALL M365 workloads, including the newer additions like Power BI and Copilot.

Microsoft Purview Data Loss Prevention (DLP) uses sensitive information types, sensitivity labels, and conditions to detect and prevent the sharing of sensitive data across M365 workloads. DLP policies define:

  • What to detect — SITs, sensitivity labels, keywords, or trainable classifiers
  • Where to monitor — Exchange, SharePoint, OneDrive, Teams, Power BI, Copilot, Endpoint devices
  • What action to take — warn, block, encrypt, notify admin, require justification
  • Who to alert — compliance officers, the user, or both

DLP policies are created in the Microsoft Purview compliance portal > Data loss prevention > Policies.

DLP across workloads

WorkloadWhat DLP MonitorsTypical Actions
Exchange OnlineEmail body, attachments, subject lineBlock send, encrypt, add disclaimer, notify sender
SharePoint OnlineDocuments in librariesBlock external sharing, show policy tip, restrict access
OneDriveUser files synced/storedBlock sharing, show policy tip
TeamsChat messages, channel messages, shared filesBlock message, show policy tip (message redacted)
Power BIReports, dashboards, datasetsBlock export, restrict sharing
Microsoft 365 CopilotContent processed by Copilot for summarisation/generationPrevent Copilot from referencing DLP-protected content
💡 Exam tip: DLP for Copilot is new and testable

DLP for Microsoft 365 Copilot is a newer addition to the exam. Key points:

  • DLP policies can prevent Copilot from surfacing or summarising content that matches DLP conditions
  • This means if a document contains patient IDs and a DLP policy protects that data, Copilot won’t include it in generated responses
  • DLP for Copilot requires a separate, dedicated DLP policy — when you select the Copilot location, all other locations are disabled
  • You cannot combine Copilot with Exchange/SharePoint/Teams in the same policy
  • The exam may ask: “How does Elena prevent Copilot from summarising patient records?” → Apply DLP policy with Copilot location enabled

This is where DLP and AI governance intersect — a frequently tested modern topic.

DLP policy components

Conditions (what triggers the policy)

Condition TypeExample
Content contains SITsCredit card numbers, patient IDs, passport numbers
Content has sensitivity label”Confidential” or higher
Content is shared withExternal users, specific domains
File extension.xlsx, .csv, .pdf
Document propertyCustom metadata values

Actions (what the policy does)

ActionExchangeSharePoint/ODTeams
Restrict accessBlock send to externalBlock external sharingBlock message
EncryptAuto-encrypt emailApply encryptionN/A
Show policy tipWarning banner in OutlookPolicy tip in document libraryWarning in compose box
NotifyEmail to compliance officerAlert in DLP dashboardAlert in dashboard
Override with justificationUser provides business reason to send anywayUser provides reason to shareUser provides reason

Policy tips vs blocking

DLP supports a graduated enforcement model:

  1. Audit only — log but don’t restrict (use during testing)
  2. Policy tip — warn the user (“This email contains patient data. Are you sure?”)
  3. Block with override — block by default but let users justify and override
  4. Block — prevent the action entirely with no override

Elena starts MedGuard Health DLP policies in audit mode, reviews false positive rates, then upgrades to block with override for most users and block (no override) for contractors.

Designing DLP policies for MedGuard Health

Policy 1: Protect patient data

SettingConfiguration
Name”Protect Patient Data — External Sharing”
ConditionsContent contains: Patient ID SIT (High confidence) OR Sensitivity label = “Confidential / Patient Data”
LocationsExchange, SharePoint, OneDrive, Teams (separate policy for Copilot)
ActionsBlock external sharing. Encrypt email. Show policy tip. Notify compliance officer.
OverrideUsers can override with justification for business-critical scenarios

Policy 2: Protect financial data

SettingConfiguration
Name”Protect Financial Data — Prevent Export”
ConditionsContent contains: Credit card numbers or bank account numbers (Medium+ confidence)
LocationsExchange, SharePoint, Power BI
ActionsBlock sharing with external. Block Power BI export. Notify finance compliance officer.
OverrideCFO group can override
ℹ️ Deep dive: DLP policy priority and rule ordering

When multiple DLP policies apply to the same content:

  • Most restrictive action wins — if Policy A warns and Policy B blocks, the content is blocked
  • Policy priority — lower priority number = higher priority (0 is highest)
  • Rule ordering within a policy — all matching rules are evaluated; the most restrictive action across all matching rules is applied

If Elena has a “block external sharing” policy and a “warn on internal sharing” policy, external sharing is blocked while internal sharing shows a warning. The policies complement each other.

Key concepts to remember

Question

What M365 workloads can DLP policies monitor?

Click or press Enter to reveal answer

Answer

Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams, Power BI, Microsoft 365 Copilot, and Endpoint devices (with Endpoint DLP). Important: Copilot requires a SEPARATE policy — it cannot be combined with other locations in the same policy.

Click to flip back

Question

How does DLP for Microsoft 365 Copilot work?

Click or press Enter to reveal answer

Answer

DLP policies can prevent Copilot from surfacing or summarising content that matches DLP conditions. Important: Copilot requires a SEPARATE DLP policy — when you select the Copilot location, all other locations are disabled. You need one policy for Exchange/SharePoint/Teams and a separate policy for Copilot.

Click to flip back

Question

What are the four enforcement levels for DLP policies?

Click or press Enter to reveal answer

Answer

1. Audit only (log without restricting). 2. Policy tip (warn the user). 3. Block with override (block but allow justified override). 4. Block (prevent entirely, no override). Best practice: start with audit, then graduate to enforcement.

Click to flip back

Knowledge check

Knowledge Check

Elena needs to prevent Copilot from summarising documents containing patient data when users ask it to generate reports. Which approach should she use?

Knowledge Check

Dev configures a DLP policy for a client that blocks external email containing credit card numbers. The CFO complains that she can't send financial reports to the company's bank. What is the best solution?

🎬 Video coming soon


Next up: Endpoint DLP and Alert Response — extending data protection to devices and responding to DLP incidents.

← Previous

Sensitivity Labels and Monitoring

Next →

Endpoint DLP and Alert Response

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.