🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 4
Domain 4 — Module 5 of 5 100%
28 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 4: Manage Compliance by Using Microsoft Purview Premium ⏱ ~14 min read

Endpoint DLP and Alert Response

Extend data loss prevention to endpoint devices, and master the workflow for reviewing and responding to DLP alerts, events, and reports.

DLP beyond the cloud

☕ Simple explanation

Cloud DLP protects data in M365 apps. But what about when a user copies patient data to a USB drive, prints it, or uploads it to a personal Dropbox? That’s where Endpoint DLP steps in.

Endpoint DLP extends data protection to the device itself — monitoring file activities like copy to USB, print, upload to cloud, and copy to clipboard. It uses the same DLP policies and SITs you’ve already configured, but the enforcement happens at the endpoint level.

Endpoint DLP extends Microsoft Purview DLP policies to Windows and macOS devices. It monitors and controls sensitive data activities at the device level:

  • Copy to USB/removable media
  • Copy to network shares
  • Print
  • Upload to cloud services (browsers)
  • Copy to clipboard
  • Access by unallowed apps

Endpoint DLP requires devices to be onboarded to Microsoft Purview (same onboarding as Defender for Endpoint) and uses the same DLP policy framework — just with “Devices” added as a location.

Configuring Endpoint DLP

Prerequisites

RequirementDetail
Device onboardingDevices must be onboarded to Microsoft Purview (uses Defender for Endpoint onboarding)
Supported platformsWindows 10/11, macOS (three latest released versions)
LicensingM365 E5, M365 E5 Compliance, or standalone Endpoint DLP licence
ManagementDevices managed via Intune or Configuration Manager

Endpoint DLP settings

Global settings for Endpoint DLP are configured in Purview compliance portal > Data loss prevention > Endpoint DLP settings:

SettingWhat It Controls
Unallowed browsersBrowsers that can’t access sensitive data (e.g., block Chrome for certain data)
Unallowed appsApplications that can’t access sensitive files
Service domainsCloud services where upload is monitored (Dropbox, personal OneDrive, etc.)
File path exclusionsPaths exempt from monitoring (e.g., temp folders used by approved apps)
Unallowed Bluetooth appsBlock Bluetooth sharing from specific apps

Adding devices to DLP policies

Once devices are onboarded, add “Devices” as a location in your DLP policy:

SettingConfiguration
LocationDevices (all onboarded, or specific groups)
ConditionsSame as cloud DLP — SITs, sensitivity labels, file types
Activities to monitorCopy to USB, print, upload to cloud, copy to clipboard, access by unallowed apps
ActionAudit, warn, or block each activity independently

Elena’s Endpoint DLP design

For MedGuard Health devices containing patient data:

ActivityActionJustification
Copy to USBBlockPatient data must never leave on removable media
PrintWarn with overrideSome departments need to print — require justification
Upload to personal cloudBlockNo patient data on personal Dropbox/Google Drive
Copy to clipboardAudit onlyToo disruptive to block clipboard — monitor and investigate patterns
💡 Exam tip: Endpoint DLP vs Defender for Endpoint

The exam distinguishes between these two related but different capabilities:

  • Endpoint DLP (Purview) — focuses on data loss prevention. Monitors file activities involving sensitive data. Prevents data exfiltration.
  • Defender for Endpoint — focuses on threat protection. Detects malware, suspicious processes, and vulnerabilities. Responds to security incidents.

Both use the same onboarding mechanism, but they serve different purposes. Endpoint DLP is compliance; Defender for Endpoint is security. Both can be active on the same device.

DLP alerts, events, and reports

DLP alerts dashboard

Purview compliance portal > Data loss prevention > Alerts shows DLP policy matches:

ColumnWhat It Shows
SeverityHigh, Medium, Low, Informational
StatusNew, In Progress, Resolved, Dismissed
UserWho triggered the alert
PolicyWhich DLP policy matched
LocationWhere the activity occurred (Exchange, SPO, endpoint, etc.)
ActivityWhat the user tried to do (share, email, print, copy to USB)
TimeWhen the activity occurred

Alert investigation workflow

When Elena receives a High severity DLP alert:

  1. Review the alert — what data was involved, who triggered it, where
  2. Check context — was it accidental (user emailed wrong recipient) or intentional (data theft attempt)?
  3. Take action:
    • False positive → dismiss the alert, adjust the policy to reduce noise
    • Accidental → educate the user, consider the policy tip effectiveness
    • Intentional → escalate to security team, preserve evidence, consider insider risk investigation
  4. Close the alert — set status to Resolved or Dismissed with notes
  5. Update policy — if the alert revealed a gap or generated false positives

DLP reports

ReportWhat It Shows
DLP policy matchesHow many times each policy was triggered, by workload
DLP incidentsIndividual incidents with details for investigation
DLP false positive overridesHow often users override DLP warnings with justifications
Top sensitive information typesWhich SITs are detected most frequently
ℹ️ Deep dive: Tuning DLP policies to reduce alert fatigue

Alert fatigue is a real risk with DLP. Elena’s approach:

  • Start with audit-only policies to understand baseline alert volumes
  • Review false positive rates — if over 30%, the SIT confidence level is likely too low
  • Use high confidence for blocking actions, medium confidence for warnings
  • Configure user overrides for business-justified scenarios — these generate override reports instead of block alerts
  • Use alert aggregation — combine multiple low-severity events into a single alert instead of flooding the dashboard
  • Review DLP reports monthly to identify trends and adjust policies

The goal is actionable alerts, not a flood of noise.

Key concepts to remember

Question

What activities can Endpoint DLP monitor on devices?

Click or press Enter to reveal answer

Answer

Copy to USB/removable media, copy to network shares, print, upload to cloud services (via browser), copy to clipboard, and access by unallowed applications. Each activity can be independently set to audit, warn, or block.

Click to flip back

Question

What is the relationship between Endpoint DLP onboarding and Defender for Endpoint onboarding?

Click or press Enter to reveal answer

Answer

They use the same onboarding mechanism — devices onboarded to Defender for Endpoint are also available for Endpoint DLP. However, they serve different purposes: Endpoint DLP is for compliance (data protection), Defender for Endpoint is for security (threat protection).

Click to flip back

Question

What should you do when a DLP alert has a high false positive rate?

Click or press Enter to reveal answer

Answer

Increase the required SIT confidence level (from Low/Medium to High), add more corroborative keywords, review the SIT pattern for overly broad matches, and consider using Exact Data Match for high-value SITs. Target: less than 30% false positive rate.

Click to flip back

Knowledge check

Knowledge Check

Elena discovers that MedGuard Health staff are copying patient data spreadsheets to personal USB drives. Cloud DLP policies don't prevent this because the activity happens on the device. What should Elena implement?

Knowledge Check

Dev reviews the DLP alerts dashboard for a client and sees 500 alerts in the past week — 80% are false positives from the credit card SIT matching internal product codes that look like card numbers. What should Dev do?

🎬 Video coming soon


Congratulations! You’ve completed all 4 domains of the MS-102 study guide. Review any modules you found challenging, then test your knowledge with the practice questions.

← Previous

DLP Policies Across M365 Workloads

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.