Lab 2 – Exercise 2 – Manage endpoint DLP

You are Joni Sherman, the newly hired Compliance Administrator for Contoso Ltd. tasked to configure the company's Microsoft 365 tenant for data loss prevention. Contoso Ltd. is a company offering driving instruction in the United States and you need to make sure that sensitive customer information does not leave the organization. For this reason, you decide to not only implement Microsoft 365 DLP policies but extend this protection to devices in your organization.

Tasks:

  1. Enable device onboarding
  2. Onboard a device to endpoint DLP
  3. Create an endpoint DLP policy
  4. Configure Endpoint DLP settings
  5. Configure Microsoft Purview extension

Task 1 – Enable device onboarding

In this task, you'll enable device onboarding for your organization.

  1. Log into Client 1 VM (SC-400-CL1) as the SC-400-CL1\admin account.

  2. In Microsoft Edge, navigate to https://purview.microsoft.com and log into the Microsoft Purview portal as Joni Sherman. sign in as JoniS@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). Joni's password was set in a previous exercise.

  3. In Microsoft Edge, navigate to https://purview.microsoft.com, then select Settings from the left sidebar.

  4. In the left sidebar, expand Device onboarding then select Devices.

  5. On the Devices page, select Turn on device onboarding to enable the solution for your tenant.

  6. Accept the Turn on device onboarding dialog by selecting OK.

  7. Accept the Device monitoring is being turned on dialog by selecting OK.

You have now enabled device onboarding and can start to onboard devices to be protected with Endpoint DLP policies. The process of enabling the feature might take up to 30 minutes, but you can proceed with the next task as it's not dependent on this.

Task 2 – Onboard a device to endpoint DLP

In this task, you will use the local script option to onboard a Windows 11 device to allow it to be protected by Endpoint DLP policies.

  1. Log into Client 2 VM (SC-400-CL2) as the SC-400-cl1\admin account.

  2. Open Microsoft Edge, and navigate to https://purview.microsoft.com and log into the Microsoft Purview portal as Joni Sherman. sign in as JoniS@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). Joni's password was set in a previous exercise.

  3. Select Settings from the left sidebar.

  4. On the left sidebar, expand Device onboarding, then select Onboarding.

  5. On the Onboarding page, in the Deployment method dropdown menu, select Local Script (for up to 10 machines) and select Download package.

  6. In the Downloads dialog, hover over the download, then select the folder icon to Show in folder.

  7. Extract the zip-file to the Desktop of SC-400-CL1. You should see a script named DeviceComplianceLocalOnboardingScript.cmd.

  8. On the desktop right click the DeviceComplianceLocalOnboardingScript.cmd file you just extracted and select Show more options, then select Properties.

  9. Towards the bottom of the General tab of the properties window, in the Security section, select Unblock, then select OK to save this setting.

  10. Back on the desktop, right click DeviceComplianceLocalOnboardingScript.cmd, then select Run as administrator. On the User Account Control dialogue, select Yes.

  11. In the Command Prompt screen type Y to confirm, and then press Enter.

  12. When the script is complete, you'll get a success message and a prompt to Press any key to continue. Press any key to close the command line window. It can take a minute to complete the onboarding.

  13. Open the start menu and search for Access work or school. Select Access work or school under Best match.

  14. In the Access work or school window for Add a work or school account select Connect.

  15. In the Set up a work or school account dialog, select the Join this device to Microsoft Entra ID link and sign in as Joni Sherman JoniS@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). Joni's password was set in a previous exercise.

  16. In the Make sure this is your organization dialog, review the tenant URL and select Join.

  17. Once your device has connected select Done on the You're all set! screen.

  18. Restart Client 2 VM (SC-400-CL2).

  19. Log back into Client 1 VM (SC-400-CL1).

  20. The Microsoft Purview window should still be open at the Devices page. Refresh this page and verify the device has been successfully onboarded.

You have successfully onboarded a device and joined it to Microsoft Entra ID to be protected by endpoint DLP policies.

Task 3 – Create an endpoint DLP policy

In this task, you will create a Data Loss Prevention (DLP) policy in the Microsoft Purview portal to prevent sensitive information from being shared with generative AI platforms on Windows 11 devices. This policy will help ensure that sensitive customer data, such as driver's license numbers and personal information, is not accidentally or intentionally shared with AI platforms, protecting the organization's data integrity.

  1. Log on to Client 1 VM (SC-400-CL1) as the SC-400-cl1\admin account.

  2. You should still be at the Devices page in the Microsoft Purview portal, logged in as Joni Sherman. Select the Home button on the top left of the screen. If you're not logged in, navigate to https://purview.microsoft.com and login as Joni Sherman. Joni's password was set in a previous exercise.

  3. In the Microsoft Purview portal, select Solutions from the left sidebar, then select Data Loss Prevention.

  4. From the left, navigation pane, select Policies then select + Create policy.

  5. On the Start with a template or create a custom policy page, select Custom and Custom policy, then select Next.

  6. On the Name your DLP policy page, enter:

    • Name: Generative AI sharing DLP policy
    • Description: Prevent sharing of sensitive data with generative AI platforms.
  7. On the Assign admin units page, select Next.

  8. On the Choose locations to apply the policy page, select only the Devices location. If any other location is selected, ensure they're deselected, then select Next.

  9. On the Define policy settings page, select Create or customize advanced DLP rules then select Next.

  10. On the Customize advanced DLP rules page, select + Create rule.

  11. On the Create rule page, enter:

    • Name: Sensitive data protection rule
    • Description: Detect and restrict sharing of sensitive information with generative AI platforms.
  12. Under Conditions select + Add condition then select Content contains.

  13. In the newly opened Content contains area, select Add then select Sensitive info types.

  14. On the Sensitive info types flyout panel on the right, search for U.S. then select all United States related sensitive info types. Select Add at the bottom of the flyout panel.

  15. Scroll down to Actions and select the + Add an action dropdown then select Audit or restrict activities on devices.

  16. In the newly opened Audit or restrict activities on devices area, in the Service domain and browser activities section, select the checkbox for Upload to a restricted cloud service domain or access from an unallowed browsers, then select + Choose different restrictions for sensitive service domains under this option.

  17. In the Sensitive service domain restrictions flyout panel, select + Add group.

  18. In the Choose sensitive service domain groups select the checkbox for Generative AI Websites, then select Add at the bottom of the flyout panel.

  19. Back on the Sensitive service domain restrictions page, ensure Generative AI Websites is listed, then select Save at the bottom of the flyout panel.

  20. Back on the Create rule, select the checkbox for Paste to supported browsers, then select + Choose different restrictions for sensitive service domains under this option.

  21. In the Sensitive service domain restrictions flyout panel, select + Add group.

  22. In the Choose sensitive service domain groups select the checkbox for Generative AI Websites, then select Add at the bottom of the flyout panel.

  23. Back on the Create rule in the Service domain and browser activities section, update the action for both Upload to a restricted cloud service domain or access from an unallowed browsers and Paste to supported browsers from Audit only to Block.

  24. In the File activities for all apps section, leave the default action of Audit only.

  25. In the User notifications section, set Use notifications to inform your users and help educate them on the proper use of sensitive info. to On.

  26. Under Endpoint devices select the checkbox for Show users a policy tip notification when an activity is restricted. This is turned on when you select Block for an activity in Windows. To turn off the notifications on Windows devices, disable the restrictions.

  27. Under Microsoft 365 services select the checkbox for Notify users in Office 365 service with a policy tip.

  28. Select Save at the bottom of the flyout panel.

  29. Back on the Customize advanced DLP rules, select Next.

  30. On the Policy mode page select Turn the policy on immediately then select Next.

  31. On the Review and finish page, review your policy settings then select Submit to create the policy.

  32. Once the policy is created select Done on the New policy created page.

You have successfully activated the Endpoint DLP Policy. This policy will prevent the sharing of sensitive information with generative AI platforms, ensuring that sensitive data such as driver's license numbers and personal details are protected from unauthorized access or exposure.

Task 4 – Configure endpoint DLP settings

In this task, you will configure a file path exclusion to a folder on your Windows 11 devices to make sure that the content of this folder is not monitored by the Endpoint DLP policy you created.

  1. You should still be logged into Client 1 VM (SC-400-CL1) as the SC-400-cl1\admin account, and you should be logged into Microsoft 365 as Joni Sherman.

  2. In Microsoft Edge, the Microsoft Purview portal tab should still be open to the Policies page for data loss prevention. Select Settings from the left sidebar.

  3. On the settings page, select Data Loss Prevention from the left sidebar.

  4. The Data Loss Prevention settings page should open to the Endpoint DLP settings.

  5. On the Endpoint DLP settings page, expand File path exclusions for Windows then select + Add file path exclusion.

  6. On the Exclude these file paths from Windows devices flyout page in the File path exclusion field, enter C:\FilePathExclusionTest then select the + button to the right. Select Save to save this entry.

  7. Back on the Endpoint DLP settings page, expand Browser and domain restrictions to sensitive data and select + Add or edit unallowed browsers.

  8. On the Add unallowed browsers flyout page select the checkbox for Google Chrome and select Save.

  9. Back on the Endpoint DLP settings page, select the dropdown to for Service domains and change it from Off to Block.

  10. In the Update cloud app mode dialogue select Yes to activate the block mode.

  11. Under Service domains select + Add cloud service domain.

  12. On the Add cloud service domain flyout page in the Domain field enter dropbox.com then select the + to the right. Select Save to save this setting.

  13. Close the browser window.

You have now configured custom settings for your Endpoint DLP policies. Every policy you create will ignore content in the folder you configured, and the Google Chrome browser has been added as unallowed browser to handle sensitive data.

Task 5 – Configure Microsoft Purview extension

As Compliance Administrator you need to evaluate the new business requirement of rolling out the Chrome browser to several users for working with sensitive data. For this test, you'll install the Google Chrome browser to Client 01 and then add the Microsoft Purview Compliance Extension for Google manually from the Google web store.

  1. Open the Edge browser from the task bar.

  2. Navigate to the Google Chrome download at https://chrome.google.com.

  3. Select Download Chrome and select Open file from the Downloads notification for ChromeSetup.exe.

  4. Select Yes in the User Account Control dialog to install the Chrome browser.

  5. When the installation is finished, select Don't sign in on the Sign in to Chrome page.

  6. Select Skip on the Set your default browser page.

  7. When the newly installed Chrome browser window opens, navigate to the Microsoft Purview Extension in the Chrome web store at:

    https://chrome.google.com/webstore/detail/microsoft-purview-extensi/echcggldkblhodogklpincgchnpgcdco

  8. Verify you are on the extension page of Microsoft Purview Extension and select Add to Chrome.

  9. On the Add "Microsoft Purview Extension"? window, select Add extension.

  10. Close the notification for the extension being added to Chrome, then navigate to chrome://extensions.

  11. Validate the Microsoft Purview Extension is visible and activated.

  12. Close the Chrome browser window.

You have successfully installed the Chrome browser and added the Microsoft Purview Extension to your client. The Chrome browser can now be used like the Edge browser to work with sensitive data and the previously configured Endpoint DLP policy also applies when using the Chrome browser.