🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 3
Domain 3 — Module 2 of 9 22%
18 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 3: Manage Risks, Alerts, and Activities Premium ⏱ ~14 min read

Insider Risk: Policies & Indicators

Choose the right policy template, configure which activities to monitor, and create Insider Risk policies that detect data theft, leaks, and security violations — without overwhelming your team with noise.

Policy templates — choosing the right one

☕ Simple explanation

Think of security camera presets. You could manually aim each camera, but presets make it easier: “entrance monitoring” points cameras at doors, “loading dock” watches deliveries, “car park” covers vehicles. Each preset knows what to watch for in that context.

Insider Risk policy templates are the same — each template is pre-configured to detect specific threat patterns. “Departing employee” watches for data hoarding before departure. “Data leaks” watches for unusual sharing. You choose the template that matches your risk scenario.

Policy templates in Insider Risk Management provide pre-configured combinations of triggering events, policy indicators, and detection logic optimised for specific threat scenarios. Each template defines which signals are relevant, what activity thresholds apply, and how alerts are scored. Templates can be customised after creation — adjusting indicators, thresholds, user scope, and content conditions.

Available policy templates

TemplateWhat It DetectsTrigger
Data theft by departing usersUsers downloading, copying, or sharing large volumes before departureHR connector: resignation/termination signal
Data leaksUnusual data sharing — external emails, cloud uploads, large downloadsActivity anomaly (no HR trigger needed)
Data leaks by priority usersSame as data leaks but focused on high-risk users (executives, admins)Activity anomaly for priority user group
Data leaks by disgruntled usersRisky activity after negative HR events (demotion, poor review)HR connector: performance improvement plan signal
Security policy violationsBypassing security controls — disabling antivirus, installing unapproved softwareDefender for Endpoint signals
Patient data misuseAccessing patient records without clinical justificationHealthcare connector signals
Risky browser usageVisiting risky websites, downloading from untrusted sourcesDefender for Endpoint browser signals

Policy indicators

Indicators are the individual activities that IRM monitors. They are configured globally (in settings) and then selected per policy.

Indicator categories

CategoryExamples
Office indicatorsDownloading files from SharePoint, sending emails with attachments, sharing with external users
Device indicatorsCopying to USB, printing, uploading via browser, clipboard to external app
Cumulative exfiltrationTotal volume of data moved outside the organisation over time
Risk score boostersActivity from departing users, priority users, or users with previous alerts
Sequence detectionMultiple indicators occurring in sequence (e.g., download → rename → upload to personal cloud)
Healthcare indicatorsAccessing patient records outside normal patterns

Configuring indicators

SettingWhat It Controls
Enable/disable per categoryTurn on/off entire indicator categories globally
Threshold customisationSet minimum activity volumes before alerting (e.g., “10+ files downloaded per day”)
Sequence detectionEnable detection of multi-step exfiltration patterns
Cumulative thresholdsAlert when total data movement exceeds a threshold over days/weeks
💡 Scenario: Zara configures indicators at Atlas Global

Zara’s indicator configuration:

Enabled: Office indicators (email, SharePoint, OneDrive), Device indicators (USB, print, browser upload), Cumulative exfiltration, Sequence detection

Thresholds adjusted:

  • File downloads: Threshold raised from 5 to 20 per day (consultants regularly download many files)
  • External email volume: Threshold raised from 10 to 30 (client-facing teams email externally frequently)
  • USB copy: Threshold kept at 1 (zero tolerance for removable media data transfer)

These adjustments reduce false positives while catching genuine anomalies.

Creating a policy

StepWhat You Configure
1. Choose templateSelect from the available policy templates
2. Name and describePolicy name and admin description
3. Users and groupsAll users, specific groups, or adaptive scope (priority user groups)
4. Content to prioritiseOptionally focus on content matching specific SITs, sensitivity labels, or file types
5. Policy indicatorsSelect which indicators this policy uses (from globally enabled indicators)
6. Indicator thresholdsUse default, customise, or use recommended thresholds
7. Review and createReview settings and activate

Content prioritisation

You can focus a policy on specific types of content:

PrioritisationExample
Sensitivity labelsOnly alert when users interact with “Confidential” or “Highly Confidential” content
Sensitive info typesOnly alert when activity involves content matching patient data SITs
File extensionsOnly alert for specific file types (.xlsx, .pdf, .pst)
SharePoint sitesOnly alert for activity involving specific high-value sites
💡 Exam tip: template selection logic

The exam tests whether you can match scenarios to the right template:

  • Employee resigned + downloading files → “Data theft by departing users”
  • No HR signal, just unusual external sharing → “Data leaks”
  • Employee on performance improvement plan → “Data leaks by disgruntled users”
  • Executive with high-sensitivity access → “Data leaks by priority users”
  • User disabling antivirus → “Security policy violations”
  • Nurse accessing celebrity patient records → “Patient data misuse”

If the question mentions an HR signal (resignation, termination, PIP), the answer involves an HR-triggered template. If there’s no HR signal, use the general “Data leaks” template.

Question

What is the difference between the 'Data theft by departing users' and 'Data leaks' policy templates?

Click or press Enter to reveal answer

Answer

'Data theft by departing users' requires an HR connector signal (resignation/termination) to trigger — it specifically targets users who are leaving. 'Data leaks' detects unusual data sharing by any user without needing an HR signal — it uses activity anomaly detection as the trigger.

Click to flip back

Question

What is sequence detection in Insider Risk Management?

Click or press Enter to reveal answer

Answer

Sequence detection identifies multi-step exfiltration patterns — for example, a user downloads sensitive files from SharePoint, renames them, then uploads to a personal cloud service. The individual activities may not be alarming alone, but the sequence indicates intentional data exfiltration.

Click to flip back

Question

What does content prioritisation do in an Insider Risk policy?

Click or press Enter to reveal answer

Answer

Content prioritisation focuses the policy on specific high-value content — documents with specific sensitivity labels, content matching certain SITs, specific file types, or files in specific SharePoint sites. This reduces noise by only generating alerts when risky activity involves the most sensitive content.

Click to flip back

Knowledge Check

An employee at Atlas Global received a poor performance review and is now downloading large numbers of client files to their personal OneDrive. Zara wants to detect this behaviour. Which policy template should she use?

Knowledge Check

Marcus at NovaTech's IRM policy is generating 50+ alerts per day, most of which are false positives. Developers regularly download large codebases from SharePoint. What should Marcus do?

🎬 Video coming soon


Next up: Insider Risk: Investigate & Close Cases — when alerts fire, learn how to investigate, manage cases, capture forensic evidence, and close out with appropriate action.

← Previous

Insider Risk: Foundations & Setup

Next →

Insider Risk: Investigate & Close Cases

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.