Coming soon to general availability for worldwide and U.S. government cloud environments, we’re introducing sequence detection to the Insider Risk Management solution within the Microsoft Purview compliance portal. This message is associated with Microsoft 365 Roadmap ID 93319.
The chronological order of risky activities is an important aspect of risk investigation and identifying these related activities can help to better identify which activities pose a bigger risk. In Insider Risk Management, you can detect these activities with a sequence detection. Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
When this will happen
Rollout will begin in late June and is expected to be complete by late July.
How this will affect your organization
The chronological order of risky activities is an important aspect of risk investigation and identifying these related activities can help to better identify which activities pose a bigger risk. In Insider Risk Management, you can detect these activities with a sequence detection.
To enable this capability, you can select Sequence detections within the Data Leaks or Data Theft policy templates. The following sequences are included in the GA release:
- Download then exfiltrate
- Download, obfuscate, then exfiltrate
- Download, exfiltrate, then delete
- Download, obfuscate, exfiltrate, then delete
What you need to do to prepare
Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Insider Risk Management enables customers to create policies based on their own internal policies, governance, and organizational requirements. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
Access the Insider Risk Management solution in the Microsoft Purview compliance portal:
- Microsoft Purview compliance portal for WW and GCC cloud environments
- Microsoft Purview compliance portal for GCC-High cloud environments
- Microsoft Purview compliance portal for DoD cloud environments
Learn more
Message ID: MC395424
Published: 29 June 2022
Updated: 29 June 2022