πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 2
Domain 2 β€” Module 1 of 8 13%
9 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 2: Implement DLP and Retention Premium ⏱ ~12 min read

DLP Foundations: Stop Data Leaks

Data Loss Prevention detects sensitive data leaving your organisation and takes action. Understand DLP concepts, policy design principles, and the roles required to manage DLP.

What is Data Loss Prevention?

β˜• Simple explanation

Think of airport security β€” but for your data.

Before you board a plane, security scans your bags. Some items are banned completely. Others trigger a warning and a second look. And some are fine to take. DLP works the same way: when someone tries to share, email, upload, or copy sensitive data, DLP scans the content and decides β€” block it, warn the user, or log the event.

DLP does not work in isolation. It uses the sensitive information types and sensitivity labels you set up in Domain 1 to know what to look for. Classification detects the data. DLP enforces the rules.

Data Loss Prevention (DLP) in Microsoft Purview is a policy-driven framework that detects and controls the sharing, transfer, or exposure of sensitive data across Microsoft 365 workloads, endpoints, and third-party cloud apps. DLP policies combine conditions (what to detect β€” SITs, labels, file extensions) with actions (what to do β€” block, warn, audit, encrypt, notify).

DLP operates across Exchange Online, SharePoint, OneDrive, Teams (chat and channels), Windows and macOS endpoints, Power BI, on-premises repositories (via scanner), and third-party cloud apps (via Defender for Cloud Apps). It integrates with Adaptive Protection (from Insider Risk Management) to dynamically adjust enforcement based on user risk levels.

Where DLP works

DLP is not limited to email. It monitors data across your entire digital environment:

LocationWhat DLP MonitorsExample
Exchange OnlineEmails and attachmentsBlocking an email with 10 credit card numbers
SharePoint OnlineDocuments in sites and librariesWarning when a Confidential file is shared externally
OneDrive for BusinessFiles in personal cloud storageBlocking external sharing of files with patient data
Microsoft TeamsChat messages and channel postsBlocking a Teams message containing an SSN
Endpoints (Windows/macOS)Files copied, printed, or uploaded from devicesBlocking USB copy of a file with financial data
Power BIDashboards and reportsAlerting when a report with sensitive data is exported
Third-party appsCloud apps connected via Defender for Cloud AppsApplying policies to files in Box or Google Drive

Designing a DLP policy

Before creating policies, map your organisation’s data protection requirements:

Step 1: Identify what needs protection

Use your classification work from Domain 1:

  • Which SITs detect your critical data?
  • Which sensitivity labels mark your most important content?
  • What regulatory requirements apply (GDPR, HIPAA, PCI-DSS, SOX)?

Step 2: Identify the risk scenarios

ScenarioDLP LocationAction
Employee emails client data externallyExchange OnlineBlock + notify
Contractor uploads files to personal cloudEndpointsBlock + audit
Sensitive document shared with β€œAnyone” linkSharePoint/OneDriveBlock external sharing
Credit card numbers pasted into Teams chatTeamsDelete message + warn
Financial reports printed on personal printerEndpointsBlock + log

Step 3: Choose the right action intensity

IntensityActionWhen to Use
Monitor onlyAudit β€” log the activity but do not interveneTesting new policies, low-risk data
WarnShow a policy tip β€” user can override with justificationModerate risk, user education
Block with overrideBlock the action β€” user can provide business justification to proceedHigh risk, but legitimate exceptions exist
BlockHard block β€” no override availableHighest risk β€” patient data, financial records, regulated content
πŸ’‘ Scenario: Priya designs Meridian's DLP strategy

Priya maps Meridian Financial’s DLP requirements:

Data TypeRisk ScenarioPolicy Action
Client account numbers (custom SIT)Emailed externallyBlock with override β€” auditors need access
Credit card numbers (built-in SIT)Shared in Teams or emailBlock β€” no legitimate reason to share in plaintext
Trading data (sensitivity label)Copied to USBBlock β€” no override
General internal docsShared externallyWarn β€” policy tip with education link

She starts with audit-only mode for two weeks to measure false positives before enabling enforcement.

DLP roles and permissions

RoleDLP Capability
Compliance AdministratorFull DLP management β€” create, edit, delete policies
Compliance Data AdministratorFull DLP management
DLP Compliance Management role groupCreate and manage DLP policies and alerts
Security AdministratorView DLP policies and alerts
Security ReaderView-only access to DLP reports
Information Protection AdminManage labels (which DLP uses as conditions) but not DLP policies directly
πŸ’‘ Exam tip: DLP-specific role group

The exam may ask which role group is specifically designed for DLP management. The answer is the DLP Compliance Management role group. While Compliance Administrator also works, DLP Compliance Management follows least privilege for DLP-only tasks.

Remember: creating DLP policies requires one of these roles. Security Reader and Helpdesk roles cannot create or modify policies.

DLP policy components

Every DLP policy has three layers:

LayerWhat It Defines
PolicyName, description, locations, mode (test/enforce)
RulesConditions and actions β€” each policy can have multiple rules
ConditionsWhat triggers the rule β€” SIT matches, label matches, file extensions
ActionsWhat happens β€” block, warn, audit, encrypt, notify
NotificationsWho gets told β€” user policy tips, admin alerts, email notifications
Question

What are the four main DLP action intensities, from lightest to strongest?

Click or press Enter to reveal answer

Answer

1. Audit only (log but do not intervene). 2. Warn (policy tip β€” user can proceed). 3. Block with override (blocked but user can justify). 4. Block (hard block β€” no override). Start with audit only, then escalate.

Click to flip back

Question

Which role group follows least privilege for managing DLP policies?

Click or press Enter to reveal answer

Answer

DLP Compliance Management. This role group is specifically designed for creating and managing DLP policies and alerts, without the broader permissions of Compliance Administrator or Global Administrator.

Click to flip back

Question

Name three locations where DLP policies can monitor sensitive data.

Click or press Enter to reveal answer

Answer

Exchange Online (email), SharePoint Online (documents), OneDrive (personal storage), Microsoft Teams (chat/channels), Windows/macOS endpoints (files copied/printed/uploaded), Power BI (reports), and third-party cloud apps (via Defender for Cloud Apps).

Click to flip back

Knowledge Check

Priya at Meridian Financial needs to create a DLP policy that blocks credit card numbers from being shared via email but allows the compliance team to override the block when sending to external auditors. Which DLP action should she configure?

Knowledge Check

Dr. Liam is deploying DLP at St. Harbour Health. He has created policies but wants to measure false positive rates before enforcing them. What deployment approach should he use?

🎬 Video coming soon


Next up: DLP Policies: Build, Manage & Extend β€” create policies, configure conditions and actions, and extend DLP to Defender for Cloud Apps.

← Previous

Purview IP Client: Classify Files at Scale

Next β†’

DLP Policies: Build, Manage & Extend

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.