πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 3
Domain 3 β€” Module 3 of 9 33%
19 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 3: Manage Risks, Alerts, and Activities Premium ⏱ ~14 min read

Insider Risk: Investigate & Close Cases

When Insider Risk fires an alert, the investigation begins. Triage alerts, manage cases, capture forensic evidence, send notice templates, and close investigations with the right action.

The investigation workflow

β˜• Simple explanation

Think of a fire alarm. The alarm goes off (alert). A firefighter assesses whether it’s real or a false alarm (triage). If real, they investigate the source (case). They document evidence (forensic capture). Then they take action β€” contain the fire, evacuate, or stand down if it’s burnt toast.

Insider Risk follows the same workflow: alert β†’ triage β†’ case β†’ investigation β†’ action. Each stage has specific tools and roles designed to protect both the organisation and the employee’s privacy.

The Insider Risk Management investigation lifecycle follows a structured workflow: alerts are generated when policy conditions are met, analysts triage alerts (confirm/dismiss), confirmed alerts escalate to cases, investigators examine detailed activity timelines and optionally capture forensic evidence, and cases are resolved through actions including user notification, escalation to eDiscovery, or dismissal. Notice templates provide standardised communication, and forensic evidence settings control the capture of user desktop activity for severe cases.

Alert management

Alert severity levels

SeverityWhat It IndicatesTypical Response
HighSignificant risk β€” multiple indicators, high-value data, known risk factorsInvestigate immediately, consider case escalation
MediumModerate risk β€” some indicators above thresholdReview within 24-48 hours, gather more context
LowMinor risk β€” single indicator slightly above normalMonitor, may dismiss if isolated incident

Triage actions

ActionWhat It DoesWhen to Use
ConfirmEscalates the alert to a case for formal investigationGenuine risk pattern identified
DismissCloses the alert as benignFalse positive or explained activity
ResolveCloses the alert with a resolution noteMinor issue, handled informally
FeedbackProvide feedback on alert qualityHelp improve the ML model

Case management

When an alert is confirmed, it becomes a case. Cases provide:

FeatureWhat It Provides
Activity timelineChronological view of ALL user activities related to the case
Content explorerView the actual files and messages involved
User activityDetailed breakdown of what the user did, when, and where
Similar casesAlerts and cases involving the same user or pattern
NotesInvestigator notes and documentation
EscalationEscalate to eDiscovery (Premium) for legal hold and evidence preservation

Case actions

ActionPurpose
Send noticeSend a templated communication to the user (warning, reminder, etc.)
Escalate to eDiscoveryCreate an eDiscovery case for legal investigation
Escalate to ServiceNowCreate a ticket in your ITSM system (if integrated)
Resolve caseClose the case with a resolution (confirmed/dismissed/resolved)

Forensic evidence

For serious cases, IRM can capture forensic evidence β€” recordings of user desktop activity:

SettingWhat It Controls
Enable/disableTurn forensic evidence capture on or off globally
Capture triggersWhich policy matches trigger evidence capture
Capture qualityResolution and frame rate of captures
StorageWhere evidence is stored (Azure Storage account)
RetentionHow long evidence is kept
Approval workflowCaptures require approval from the Insider Risk Management Approvers role

Privacy safeguards for forensic evidence

SafeguardHow It Protects
Approval requiredA separate approver must authorise evidence capture
Scoped captureOnly captures activities related to the policy match β€” not continuous surveillance
Audit loggingAll capture requests, approvals, and viewings are logged
Time-limitedCaptures have defined start and end times
Role separationApprovers cannot be the same people as investigators

Notice templates

Notice templates are pre-written communications sent to users during or after an investigation:

Template TypePurposeExample
ReminderRemind the user of data handling policies”This is a reminder that external file sharing must comply with our data classification policy.”
WarningFormal warning about detected activity”Activity on your account has been flagged for review. Further incidents may result in disciplinary action.”
EscalationNotify the user that the matter has been escalated”This matter has been escalated to HR for further review.”

Creating and managing templates

SettingWhat You Configure
Template nameInternal name for the template
Subject lineEmail subject the user sees
BodyMessage content β€” supports placeholders for user name, date, policy
CC recipientsOptionally copy HR, legal, or the user’s manager
πŸ’‘ Scenario: Zara investigates a departing consultant

Atlas Global’s IRM flags an alert: a senior consultant (2 weeks until departure) downloaded 2,000 files from SharePoint in 3 days β€” 10x their normal volume.

Zara’s investigation:

  1. Triage: High-severity alert β†’ confirm and escalate to case
  2. Activity timeline: Shows bulk downloads started the day after resignation. Files include client proposals, pricing data, and strategy documents.
  3. Forensic evidence: Zara requests capture approval. Approver grants it. Capture shows the consultant copying files to a personal external hard drive.
  4. Notice: Send β€œWarning” template to the consultant, CC HR and Legal.
  5. Escalation: Escalate to eDiscovery for legal preservation. HR initiates exit interview with security present.
  6. Resolution: Case resolved β€” access revoked, legal hold placed, incident documented.
Question

What are the three main triage actions for an Insider Risk alert?

Click or press Enter to reveal answer

Answer

1. Confirm β€” escalate to a formal case for investigation. 2. Dismiss β€” close as benign (false positive or explained). 3. Resolve β€” close with a resolution note for minor issues handled informally.

Click to flip back

Question

What role is required to approve forensic evidence capture in Insider Risk Management?

Click or press Enter to reveal answer

Answer

Insider Risk Management Approvers. This is a separate role from Investigators β€” ensuring that the person requesting evidence capture is not the same person who approves it. This separation of duties protects employee privacy.

Click to flip back

Question

What are the three types of notice templates in Insider Risk Management?

Click or press Enter to reveal answer

Answer

1. Reminder β€” reminds users of data handling policies. 2. Warning β€” formal warning about detected risky activity. 3. Escalation β€” notifies the user that the matter has been escalated to HR or legal. Templates support placeholders and CC recipients.

Click to flip back

Knowledge Check

An Insider Risk alert at Atlas Global shows a low-severity alert for a single file download by a marketing coordinator. The file is a public brochure template. What should the analyst do?

Knowledge Check

During a case investigation at St. Harbour Health, Dr. Liam's team discovers that a departing nurse copied patient records to a personal USB drive. Legal counsel requests that all evidence be preserved for potential litigation. What should the investigator do?

🎬 Video coming soon


Next up: Adaptive Protection: Risk Levels Meet DLP β€” the bridge between Insider Risk and DLP that makes enforcement dynamic.

← Previous

Insider Risk: Policies & Indicators

Next β†’

Adaptive Protection: Risk Levels Meet DLP

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.