In April, we will be rolling out two new features in public preview to enhance your Insider risk management policies and workflows. Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy. This message is associated with Microsoft 365 Roadmap ID 88898, 88902.
Customize a policy to trigger on an anomalous activity (e.g., unusual amount of emails with attachments sent outside the organization). Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to ensure user-level privacy.
Enhancements to Analytics including ability to leverage Analytics to recommend thresholds for data leak and departing employee data theft policies and inclusions of Sequence detection within Analytics. Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to ensure user-level privacy.
When this will happen
Rollout will begin in late April and is expected to be complete by late May.
How this will affect your organization
The following preview features will soon appear as options within Insider risk management settings:
- Enhancements to Analytics: Enhancements to Analytics including ability to leverage Analytics to recommend thresholds for data leak and departing employee data theft policies and inclusions of Sequence detection within Analytics.
- Anomaly-as-a-Policy-Trigger: Customize a policy to trigger on an anomalous activity (e.g., unusual number of emails with attachments sent outside the organization).
What you need to do to prepare
Access the Insider Risk Management solution in the Microsoft 365 compliance center.
Learn more
Message ID: MC354698
Published: 07 April 2022
Updated: 07 April 2022