🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 2
Domain 2 — Module 3 of 8 38%
11 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 2: Implement DLP and Retention Premium ⏱ ~14 min read

DLP: Precedence & Adaptive Protection

When multiple DLP rules match the same content, which one wins? Understand rule and policy precedence, and how Adaptive Protection dynamically adjusts DLP enforcement based on insider risk levels.

Why precedence matters

☕ Simple explanation

Imagine two security guards at the same door with different instructions.

Guard A says “let employees through with ID.” Guard B says “block everyone — the building is locked down.” Who wins? You need clear rules about which instruction takes priority.

The same happens with DLP. When an email matches Rule 1 (warn) AND Rule 2 (block), which action applies? Microsoft Purview has a clear precedence system: the most restrictive action wins. If one rule says warn and another says block, the content is blocked.

Adaptive Protection adds a twist — DLP enforcement can change dynamically based on a user’s risk level. A trusted employee gets a warning. A high-risk employee (flagged by Insider Risk Management) gets a hard block — for the same content.

DLP precedence in Microsoft Purview follows a hierarchy: when multiple rules or policies match the same content, the most restrictive action is enforced. Within a single policy, rules are evaluated by priority order (lower number = higher priority). Across multiple policies, all matching rules from all policies are evaluated, and the most restrictive combined action applies.

Adaptive Protection integrates Insider Risk Management with DLP. When enabled, users are assigned dynamic risk levels (elevated, moderate, minor) based on their behaviour patterns. DLP policies can use these risk levels as conditions — applying stricter enforcement to higher-risk users and lighter touch to lower-risk users. This creates a proportional response instead of one-size-fits-all rules.

Rule precedence within a policy

Each DLP policy can contain multiple rules. Rules are evaluated in priority order (configurable):

PriorityRule NameConditionAction
0 (highest)Block bulk export50+ credit cardsHard block
1Block external sharing5+ credit cards, external recipientBlock with override
2Warn on any detection1+ credit cardWarn with policy tip

The precedence rules

  1. All matching rules are evaluated — not just the first match
  2. The most restrictive action wins — block beats warn beats audit
  3. User notifications from all matching rules are combined — user sees all relevant tips
  4. Incident reports from all matching rules are generated — admin sees all matches

Key concept: DLP does NOT stop evaluating after the first match. All matching rules contribute to the final enforcement decision.

Policy precedence across multiple policies

When content matches rules in multiple DLP policies, the system combines all matching rules:

PolicyRule MatchedAction
”Protect Credit Cards”5+ credit card numbersBlock with override
”Protect PII”1+ SSNWarn
”Financial Compliance”Confidential label + external sharingBlock

Result: The content is blocked (most restrictive action from any matching rule across all policies). The user sees notifications from all three matches.

💡 Exam tip: most restrictive wins

The exam frequently tests DLP precedence. The core rule is simple: the most restrictive action wins.

If two rules match:

  • Rule A says “warn” and Rule B says “block” → block wins
  • Rule A says “audit only” and Rule B says “block with override” → block with override wins
  • Rule A says “block” and Rule B says “block with override” → block wins (no override available)

The precedence of actions from most to least restrictive: Block > Block with override > Warn > Audit only

Adaptive Protection — risk-based DLP

Adaptive Protection connects Insider Risk Management (Domain 3) to DLP. Instead of treating all users equally, DLP responds proportionally to each user’s risk level.

How it works

StepWhat Happens
1. Insider Risk assigns risk levelsBased on user behaviour (file downloads, email patterns, resignation signals)
2. Risk levelsElevated (highest risk), Moderate, Minor
3. DLP policy uses risk as a conditionA DLP rule can say “if user is elevated risk AND content matches SIT → hard block”
4. Dynamic enforcementAs risk level changes, DLP enforcement changes automatically

Adaptive Protection example

User Risk LevelContent: 1 credit card numberContent: 10+ credit card numbers
MinorAudit onlyWarn
ModerateWarnBlock with override
ElevatedBlock with overrideHard block

The same DLP policy, but enforcement scales with risk. A trusted employee gets a gentle nudge. A user showing risky behaviour gets a hard stop.

Configuring Adaptive Protection in DLP

  1. Enable Adaptive Protection in Insider Risk Management settings
  2. Define risk level thresholds — what behaviours trigger each level
  3. Create or edit DLP policies — add “User’s risk level for Adaptive Protection” as a condition
  4. Configure actions per risk level — different actions for elevated vs moderate vs minor
💡 Scenario: Priya deploys Adaptive DLP at Meridian

Priya’s current DLP policy blocks all credit card sharing externally. But this generates complaints from the wealth management team, who legitimately share transaction data with clients.

With Adaptive Protection:

  • Minor risk (most users): Warn with policy tip when sharing credit card data externally
  • Moderate risk (flagged users): Block with override — require justification
  • Elevated risk (departing employees, users with data exfiltration signals): Hard block — no override, immediate alert to security team

Result: 90% of users experience a lighter policy. The 10% showing risky behaviour face stricter controls. Complaints drop. Security improves.

Prerequisites for Adaptive Protection in DLP

RequirementDetail
Insider Risk ManagementMust be configured with at least one active policy
Risk levelsUsers must be assigned risk levels (requires 7+ days of activity data)
LicensingE5, E5 Compliance, or E5 Insider Risk Management
DLP policyMust include “User’s risk level for Adaptive Protection” as a condition
Question

When multiple DLP rules match the same content, which action is enforced?

Click or press Enter to reveal answer

Answer

The most restrictive action wins. Priority order from most to least restrictive: Block > Block with override > Warn > Audit only. All matching rules are evaluated, and user notifications from all matching rules are combined.

Click to flip back

Question

What are the three Adaptive Protection risk levels, from highest to lowest?

Click or press Enter to reveal answer

Answer

Elevated (highest risk — users showing significant risky behaviour), Moderate (some risk indicators), and Minor (low risk — normal behaviour). These levels are assigned by Insider Risk Management and can be used as conditions in DLP policies.

Click to flip back

Question

Does DLP stop evaluating after the first matching rule?

Click or press Enter to reveal answer

Answer

No. DLP evaluates ALL matching rules across ALL policies. All matching rules contribute to the final action (most restrictive wins), user notifications are combined from all matches, and incident reports are generated for each match.

Click to flip back

Knowledge Check

At Meridian Financial, an email matches two DLP rules: Rule A (from the PCI policy) says 'warn with policy tip' and Rule B (from the financial compliance policy) says 'block with override'. What happens?

Knowledge Check

Priya enabled Adaptive Protection and configured DLP to block with override for elevated-risk users who share credit card data. A wealth management analyst (currently at 'minor' risk level) shares a document containing 3 credit card numbers externally. The DLP rule for minor-risk users is set to 'warn'. What happens?

🎬 Video coming soon


Next up: Endpoint DLP: Setup & Configuration — extend DLP to Windows and macOS devices where data physically lives.

← Previous

DLP Policies: Build, Manage & Extend

Next →

Endpoint DLP: Setup & Configuration

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.