Data Loss Prevention Flashcards

1
Q

What is the primary goal of Microsoft Purview Data Loss Prevention (DLP)?

A

To avoid unintentional data leaks and ensure sensitive data is protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does DLP identify and monitor sensitive data?

A

DLP identifies sensitive data and monitors specific locations (e.g., SharePoint, OneDrive, Exchange, endpoints) for potential breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when a DLP rule is breached?

A

Automated actions are triggered based on the rule’s conditions, and alerts are generated, which can be reviewed and responded to in the Compliance Portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does DLP help educate users?

A

DLP policies provide policy tips or notifications to educate users when they unintentionally risk data leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tools in the Data Classification view help identify sensitive content?

A

The Content Explorer and the Activity Explorer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Content Explorer do?

A

It allows you to search documents and emails by Sensitive Information Types (SITs) and filter information across SharePoint, OneDrive, and Exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Activity Explorer track?

A

It logs the last 30 days of actions on labeled data, providing insights into activities like sharing or printing sensitive documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can Trainable Classifiers be used in DLP?

A

Trainable Classifiers help identify more complex, custom-sensitive information that does not fit pre-built SITs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between pre-built and custom DLP policies?

A

Pre-built policies are designed to comply with regulatory standards (e.g., GDPR, HIPAA), while custom policies allow you to define specific rules tailored to your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps to configure a DLP policy?

A

1) Choose pre-built or custom, 2) Name the policy, 3) Select locations, 4) Define policy settings, 5) Choose the policy mode (Test or Enforce).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between Test Mode and Enforce Mode?

A

In Test Mode, policy breaches are logged but no actions are enforced. In Enforce Mode, actual actions (e.g., block or notify) are taken when breaches occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the Rule Editor in DLP?

A

The Rule Editor allows the creation of custom rules, with conditions, actions, and exceptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the default rules in DLP based on?

A

Default rules are usually set to detect low-volume breaches (e.g., 1-2 policy breaches trigger a warning) and high-volume breaches (e.g., 100+ SITs shared externally trigger a security breach alert).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What factors influence the conditions in a DLP rule?

A

Conditions depend on the locations being monitored (e.g., different conditions for email vs endpoints).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of actions can DLP policies enforce?

A

Actions can include blocking, restricting, notifying users, or triggering DLP alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Override feature in DLP actions?

A

It allows users to override restrictions if the rule breach is not severe, but they must justify their actions.

17
Q

What are the actions specific to Endpoint DLP?

A

Endpoint DLP can restrict file activities like copying, saving, or printing sensitive data on devices that have been onboarded.

18
Q

What must be done before devices can be monitored with Endpoint DLP?

A

Devices need to be onboarded into Microsoft Defender for Endpoint.

19
Q

Where can you configure DLP alerts in a policy?

A

In the Incident Reports section of each policy rule.

20
Q

How can DLP alerts be customized?

A

Alerts can be set to different severity levels and configured to be sent to specific recipients.

21
Q

What information does a DLP alert typically contain?

A

DLP alerts include details such as the rule breached, the sensitive data involved, and the user who triggered the alert.

22
Q

How should DLP alerts be handled in the Compliance Portal?

A

Alerts should be reviewed, and appropriate actions (e.g., resolving or escalating) should be taken to mitigate the risk.

23
Q

What are false positives in DLP, and why are they problematic?

A

False positives occur when a policy breach is triggered by non-sensitive data. They clutter the alert dashboard, reduce trust in the system, and cause users to ignore policy tips.

24
Q

What are false negatives in DLP, and why are they critical?

A

False negatives happen when a real breach does not trigger an alert, leading to undetected data leaks, which can result in severe consequences.

25
Q

Why is policy tuning important in DLP?

A

Tuning policies helps reduce false positives and false negatives, ensuring that DLP accurately detects and mitigates real risks.

26
Q

How does DLP integrate with other Microsoft Purview tools?

A

DLP integrates with tools like Insider Risk Management and Microsoft Defender to provide a comprehensive data protection strategy.

27
Q

What role do DLP reports play in managing data protection?

A

DLP reports provide insights into policy effectiveness, data protection trends, and allow admins to monitor and adjust policies for better outcomes.