🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 3
Domain 3 — Module 7 of 9 78%
23 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 3: Manage Risks, Alerts, and Activities Premium ⏱ ~13 min read

Alert Response: Purview, XDR & Cloud Apps

DLP alerts, insider risk alerts, Defender XDR incidents, and Cloud Apps file policy alerts all need response. Know which portal handles which alert type and how to respond effectively across platforms.

Alerts come from everywhere

☕ Simple explanation

Imagine you’re the head of security for a building complex with four separate alarm systems.

The fire alarm goes to the fire panel. The intruder alarm goes to the security desk. The car park barrier alarm goes to reception. And the server room temperature alarm goes to IT.

Microsoft’s information security alerts work similarly — DLP alerts appear in the Purview portal, insider risk alerts in IRM, security incidents in Defender XDR, and cloud app alerts in Defender for Cloud Apps. Knowing which console handles which alert type is critical for fast response.

Information security alerts in Microsoft 365 are generated across multiple surfaces: DLP policy matches in the Purview portal, Insider Risk Management alerts in the IRM console, integrated security incidents in Microsoft Defender XDR, and file policy violations in Defender for Cloud Apps. Each surface has its own investigation workflow, response actions, and role requirements. Understanding the alert routing is essential for efficient incident response and for the SC-401 exam.

Alert sources and portals

Know which portal handles which alert type
Alert TypeWhere It AppearsGenerated ByResponse Actions
DLP alertsMicrosoft Purview portal → DLP → AlertsDLP policy rule matchesReview event details, view content, modify policy, dismiss, or escalate
Insider risk alertsPurview → Insider Risk Management → AlertsIRM policy triggersTriage (confirm/dismiss), open case, investigate, send notice
Purview alerts in XDRMicrosoft Defender XDR → Incidents & AlertsPurview alerts forwarded to XDR for unified viewCorrelate with other security signals, assign to analyst, take remediation actions
Cloud Apps file policy alertsDefender for Cloud Apps → AlertsFile policy matches in connected cloud appsQuarantine file, remove sharing, apply label, notify user, close alert

Responding to DLP alerts

DLP alert page (Purview portal)

InformationWhat You See
Alert summaryPolicy name, rule matched, severity, timestamp
UserWho triggered the alert
ContentThe item (email, document, message) that matched
Match detailsWhich SIT matched, confidence level, instance count
ActivityWhat the user was doing (sharing, emailing, copying)
LocationExchange, SharePoint, OneDrive, Teams, or endpoint

Response actions for DLP alerts

ActionWhen to Use
DismissFalse positive — the match is incorrect or the activity is legitimate
View contentInspect the actual content to confirm the detection accuracy
Override/resolveMark as resolved after taking corrective action
Modify policyAdjust the DLP rule if the alert reveals a tuning issue
EscalateSend to Insider Risk or eDiscovery for deeper investigation

Responding to insider risk alerts

Insider risk alerts follow the workflow covered in Module 19:

  1. Triage: Confirm (escalate to case), Dismiss, or Resolve
  2. Case investigation: Timeline, content explorer, user activity
  3. Actions: Send notice, escalate to eDiscovery, resolve case

The key distinction: insider risk alerts are about behaviour patterns (the user is showing risky behaviour over time), not single events.

Purview alerts in Defender XDR

Microsoft Defender XDR provides a unified alert view that includes Purview alerts alongside security alerts from Defender for Endpoint, Defender for Office 365, and other Defender services.

Why alerts appear in XDR

BenefitWhat It Provides
CorrelationLink a DLP alert with a Defender for Endpoint alert — e.g., a user triggered DLP by sharing sensitive data AND their device is compromised
Unified investigationOne console for security teams instead of switching between Purview and Defender
Incident groupingRelated alerts from different sources are grouped into incidents
Automated investigationXDR can automatically investigate and remediate some alert types

Responding in XDR

ActionWhat It Does
AssignAssign the incident to a security analyst
ClassifyMark as true positive, false positive, or informational
Link alertsConnect related alerts from different sources into one incident
RemediateTake action — isolate device, disable account, block sender
CloseResolve the incident with a classification

Cloud Apps file policy alerts

When file policies in Defender for Cloud Apps detect violations:

Response actions

ActionWhat It Does
QuarantineMove the file to a quarantine folder — user cannot access it
Remove sharingRemove external sharing links from the file
Apply labelApply a sensitivity label to the file
Notify userSend an email notifying the user of the policy violation
Notify adminAlert the security or compliance team
Close alertDismiss or resolve after review
💡 Scenario: Marcus responds to a multi-platform alert

NovaTech’s security gets three alerts within an hour:

  1. DLP alert (Purview): A developer shared a document containing source code with an external email address
  2. Cloud Apps alert: The same document appeared in a connected Google Drive with external sharing enabled
  3. Defender XDR incident: The developer’s device shows unusual network traffic to an unknown IP

Marcus’s response:

  • Opens Defender XDR to see all three alerts correlated into one incident
  • The XDR correlation reveals: the developer’s account may be compromised — the sharing was not intentional
  • Action: Disable the account (XDR), quarantine the Google Drive file (Cloud Apps), remove external sharing (DLP), initiate password reset
  • Close: Classify as true positive — compromised account leading to data exposure
💡 Exam tip: which portal for which alert

The exam tests your knowledge of alert routing:

  • DLP policy match alert → Purview portal DLP alerts page
  • Insider risk alert → Purview portal Insider Risk Management
  • Cross-platform security incident → Microsoft Defender XDR
  • Third-party cloud app file violation → Defender for Cloud Apps

If the question mentions correlation between DLP and endpoint alerts, the answer is Defender XDR (unified view). If it’s a standalone DLP alert, the answer is the Purview portal.

Question

Where do you respond to DLP policy alerts?

Click or press Enter to reveal answer

Answer

Microsoft Purview portal → Data loss prevention → Alerts. Here you can view the alert details, inspect the matched content, dismiss false positives, resolve alerts, modify the policy, or escalate to Insider Risk or eDiscovery.

Click to flip back

Question

Why do Purview alerts also appear in Microsoft Defender XDR?

Click or press Enter to reveal answer

Answer

Defender XDR provides a unified alert view that correlates Purview alerts (DLP, Insider Risk) with security alerts from Defender for Endpoint, Office 365, etc. This enables cross-platform correlation — e.g., linking a DLP data leak to a compromised device — and unified incident management.

Click to flip back

Question

What governance actions can you take on a Cloud Apps file policy alert?

Click or press Enter to reveal answer

Answer

Quarantine the file (block access), remove external sharing links, apply a sensitivity label, notify the user, notify the admin, or close the alert. These actions apply to files in connected third-party cloud apps like Google Drive, Box, and Dropbox.

Click to flip back

Knowledge Check

A DLP alert in the Purview portal shows that a user at St. Harbour Health emailed a document containing 15 patient identifiers to an external address. Simultaneously, Defender for Endpoint shows the user's device communicating with a known malware C2 server. Where should Dr. Liam investigate?

🎬 Video coming soon


Next up: DSPM for AI: Setup & Controls — the newest exam topic. Protect your organisation’s data from exposure through AI services like Microsoft Copilot.

← Previous

Activity Explorer & Content Search

Next →

DSPM for AI: Setup & Controls

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.