🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 4
Domain 4 — Module 6 of 7 86%
27 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 4: Microsoft Compliance Solutions Premium ⏱ ~10 min read

Insider Risk Management

Threats do not always come from outside. Insider Risk Management detects risky behaviour from employees, contractors, and partners — while protecting user privacy by design.

What is insider risk?

☕ Simple explanation

Imagine a hotel where you worry about break-ins from outside. But what about the staff member who copies room keys?

Insider risk is about the threat from people who already have the keys — employees, contractors, partners. They already have access. They already know where the valuable data lives. And if they decide to steal it, leak it, or misuse it, traditional perimeter security will not stop them because they are already inside.

It is not always malicious. Sometimes an employee accidentally shares a confidential file with the wrong person. The risk is real either way.

Insider risk refers to threats that originate from individuals within an organisation — employees, contractors, business partners, or anyone with legitimate access to internal systems and data.

Microsoft Purview Insider Risk Management uses signals from across Microsoft 365 (and external HR systems) to detect patterns of potentially risky activity, generate alerts, and enable investigation workflows — all while preserving user privacy through pseudonymisation and role-based access controls.

Types of insider risk

Not all insider threats look the same. Here are the most common patterns:

TypeWhat it looks likeExample
Data theft by departing employeesAn employee who has resigned starts downloading large volumes of filesA nurse at MedGuard copies patient lists to a USB drive during their notice period
Data leaksSensitive data is shared outside the organisation, accidentally or intentionallyA contractor emails a spreadsheet of patient data to a personal Gmail account
Security policy violationsUsers bypass security controls or violate acceptable use policiesAn employee disables encryption on their device to install unauthorised software
IP theftIntellectual property is copied or transferred before departureA researcher downloads proprietary clinical trial data before joining a competitor
Patient data misuse (healthcare)Access to patient records without a legitimate medical reasonA staff member looks up a celebrity patient’s records out of curiosity

How Insider Risk Management works

Microsoft Purview Insider Risk Management follows a pipeline: signals come in, the system detects patterns, and compliance teams investigate.

The five-stage workflow

StageWhat happensExample at MedGuard
1. Policy configurationAdmins select a policy template and define triggers and thresholdsNadia enables the “departing employee data theft” template
2. Signal ingestionThe system collects signals from across the environmentHR connector sends a resignation notice; DLP detects unusual file downloads
3. Alert generationWhen signals match policy thresholds, the system generates an alertAlert: “User downloaded 200 patient files in 2 hours after submitting resignation”
4. Triage and investigationCompliance analysts review alerts, confirm or dismiss, escalate to casesNadia’s team reviews the alert, sees the pattern is genuine, opens a case
5. ActionRemediation steps — notify the user, restrict access, escalate to legal or HRNadia’s team restricts the user’s access and notifies HR and legal

Where the signals come from

Insider Risk Management does not work alone. It ingests signals from multiple sources:

  • Microsoft 365 activity — file downloads, email forwarding, SharePoint access patterns
  • DLP policy matches — when Data Loss Prevention detects sensitive content being shared
  • HR connector — resignation notifications, termination dates, performance improvement plans
  • Defender for Endpoint — USB device usage, printing activity, access to sensitive file paths
  • Microsoft Entra ID — sign-in anomalies, impossible travel, risky sign-ins
💡 Scenario: departing employee at MedGuard

A senior nurse at MedGuard submits their resignation. The HR connector sends the departure signal to Insider Risk Management.

Over the next two weeks, the system notices:

  • The nurse downloads 350 patient records from SharePoint (normally they access 10-15 per day)
  • They copy files to a personal OneDrive (detected by DLP)
  • They email a ZIP file to an external address

Each action alone might be normal. But the combination — triggered by the departure signal — generates a high-severity alert. Nadia’s team investigates and finds the nurse was copying patient lists to take to a competitor clinic.

Key point: Insider Risk detects patterns, not single events. The departure signal is what activated the policy and made the system pay attention.

Policy templates

Nadia does not build policies from scratch. Microsoft Purview provides templates designed for common scenarios:

TemplateWhat it detects
Departing employee data theftUnusual data activity by users flagged as departing (requires HR connector)
Data leaksSensitive data shared outside the organisation or with unauthorised users
Security policy violationsUsers bypassing security controls, disabling protections, or installing risky software
Patient data misuseUnauthorised access to patient records (healthcare-specific template)
Data leaks by priority usersFocused monitoring on high-risk roles (executives, users with access to trade secrets)
💡 Exam tip: Insider Risk detects patterns, not content

A common exam trap: Insider Risk Management does not read the content of emails or messages by default. It does not scan what people write.

Instead, it detects patterns of behaviour — downloading unusual volumes of files, copying data to USB, emailing large attachments externally. The distinction matters:

  • Insider Risk Management = behavioural patterns
  • Communication Compliance = content scanning (harassment, regulatory language)

If the exam asks about monitoring communications for inappropriate language, the answer is Communication Compliance, not Insider Risk.

Privacy by design

Insider Risk Management is built with employee privacy in mind. This is critical for the exam — and for real-world trust.

Privacy featureWhat it does
PseudonymisationUser names are anonymised by default. Investigators see “User A” and “User B,” not real names. Admins must explicitly enable name resolution.
Role-based accessOnly users in the Insider Risk Management role group can view alerts and cases. IT admins, HR, and other teams cannot see this data unless granted specific access.
Audit logsEvery action taken in the Insider Risk Management portal is logged — who viewed what, who escalated what, who dismissed what.
Policy scopingPolicies can target specific user groups rather than the entire organisation, minimising surveillance scope.

Communication Compliance: the related tool

Communication Compliance is separate from Insider Risk Management, but they are often tested together:

Insider Risk detects behaviour patterns; Communication Compliance monitors message content
FeatureInsider Risk ManagementCommunication Compliance
What it monitorsBehavioural patterns — file activity, data movement, access anomaliesContent of communications — emails, Teams messages, chats
What it detectsData theft, data leaks, security violations, risky behaviour sequencesHarassment, discrimination, regulatory violations, insider trading language
How it worksAnalyses activity signals and correlates patterns across timeScans message content against policy rules and classifiers
Privacy approachPseudonymised users, does not read content by defaultReviews actual message content (with role-based access controls)
Primary audienceCompliance and security teamsCompliance, HR, and legal teams

🎬 Video walkthrough

🎬 Video coming soon

Insider Risk Management — SC-900 Module 6

Insider Risk Management — SC-900 Module 6

~10 min

Flashcards

Question

What is insider risk?

Click or press Enter to reveal answer

Answer

Threats from people inside the organisation — employees, contractors, partners — who already have legitimate access to systems and data. Includes data theft, data leaks, security policy violations, and IP theft.

Click to flip back

Question

How does Microsoft Purview Insider Risk Management protect user privacy?

Click or press Enter to reveal answer

Answer

1) Pseudonymisation — user names are anonymised by default. 2) Role-based access — only authorised roles can see alerts. 3) Audit logs — all investigator actions are tracked. 4) Policy scoping — policies can target specific groups, not everyone.

Click to flip back

Question

What is the difference between Insider Risk Management and Communication Compliance?

Click or press Enter to reveal answer

Answer

Insider Risk Management detects behavioural patterns (unusual file downloads, data movement). Communication Compliance scans the content of messages (harassment, regulatory violations). Insider Risk does not read message content by default.

Click to flip back

Question

What role does the HR connector play in Insider Risk Management?

Click or press Enter to reveal answer

Answer

The HR connector provides departure signals (resignations, terminations) that trigger policies like 'departing employee data theft.' Without the HR connector, the system cannot correlate risky behaviour with an upcoming departure.

Click to flip back

Knowledge check

Knowledge Check

A senior employee at MedGuard submits their resignation. Over the next week, they download 500 patient records — far above their normal daily activity. Which Microsoft Purview solution would detect this pattern?

Knowledge Check

Nadia's compliance team investigates an insider risk alert. They see the user identified as 'User 7' rather than by name. Why?

Knowledge Check

Alex at SecureBank needs to monitor whether employees are using language that could indicate insider trading in their Teams messages. Which solution should Alex configure?

← Previous

Records Management & Retention

Next →

eDiscovery & Audit

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.