Deploy Microsoft Purview Endpoint DLP and understand exactly how it behaves across all Defender Antivirus modes. Map which DLP activities (USB, print, clipboard, cloud upload, browser paste, screen capture) work with CrowdStrike as the primary AV, which require the MDE sensor in passive mode, and which silently fail when Defender is disabled. Troubleshoot the most common deployment pain points.
Microsoft Purview Endpoint DLP is one of the most commonly misunderstood features in MDE deployments with third-party antivirus. Many security teams assume that Endpoint DLP - like network protection and MDA enforcement - stops working when CrowdStrike or another third-party AV takes over as the primary engine. In reality, Endpoint DLP uses the MDE sensor (MsSense.exe) for all monitoring and enforcement, NOT the Defender Antivirus engine. This architectural distinction means Endpoint DLP works fully in passive and EDR block modes. This lab explores the exact dependency chain, maps all 13 DLP activities across all four AV modes, addresses the most common deployment failures, and provides KQL queries for monitoring DLP enforcement across your fleet.
Scenario: A financial services company with 5,000 endpoints runs CrowdStrike Falcon as their primary AV and Microsoft Defender for Endpoint Plan 2 for EDR and vulnerability management. Their compliance team needs to enforce DLP policies on endpoints to prevent credit card numbers and Social Security numbers from being copied to USB drives, printed, uploaded to unauthorized cloud services, or pasted into personal webmail.
The compliance team is concerned that Endpoint DLP will not work because Defender AV is in passive mode. After researching the architecture, they discover that Endpoint DLP depends on the MDE sensor - not the AV engine - and will work fully alongside CrowdStrike. However, they also discover that some devices have Defender in disabled mode (not passive) because CrowdStrike was installed before MDE onboarding - those devices have no DLP enforcement at all.
Success criteria: DLP policies enforced on all onboarded devices regardless of AV mode, browser upload monitoring via Edge and Chrome extension, KQL queries to identify devices with broken DLP enforcement, clear understanding of the DLP vs. network protection architecture difference.
Data loss is a regulatory and reputational risk that compounds over time. Organizations that delay Endpoint DLP deployment because they incorrectly believe it requires Defender AV in active mode are leaving sensitive data unprotected. Understanding that Endpoint DLP uses the MDE sensor (not the AV engine) means you can deploy DLP policies immediately on all MDE-onboarded devices - even those running CrowdStrike. The only failure mode is when Defender is in disabled mode (not passive), which means the MDE sensor itself is not running. This lab ensures you can distinguish between these modes and deploy DLP with confidence.
Microsoft Purview Endpoint DLP does NOT use a separate agent. It runs entirely on the MDE sensor (MsSense.exe). This is the critical architectural fact that determines everything:
| Endpoint DLP Activity | Active | Passive | EDR Block | Disabled |
|---|---|---|---|---|
| Copy to USB / removable media | ✅ | ✅ | ✅ | ❌ |
| Print (physical & virtual printers) | ✅ | ✅ | ✅ | ❌ |
| Copy to clipboard | ✅ | ✅ | ✅ | ❌ |
| Copy to network share | ✅ | ✅ | ✅ | ❌ |
| Upload to cloud service (browser) | ✅ | ✅ | ✅ | ❌ |
| Upload via unallowed app (e.g., WinSCP) | ✅ | ✅ | ✅ | ❌ |
| Access by unallowed apps | ✅ | ✅ | ✅ | ❌ |
| Access by unallowed Bluetooth apps | ✅ | ✅ | ✅ | ❌ |
| Screen capture / screenshot | ✅ | ✅ | ✅ | ❌ |
| Paste to browser (sensitive content) | ✅ | ✅ | ✅ | ❌ |
| RDP access to sensitive files | ✅ | ✅ | ✅ | ❌ |
| DLP policy tips (user notifications) | ✅ | ✅ | ✅ | ❌ |
| DLP alerts in Defender XDR portal | ✅ | ✅ | ✅ | ❌ |
Get-Service Sense to confirm the sensor state. See Getting started with Endpoint DLP for current requirements.
Unlike network protection features (which require Defender AV to be active), Endpoint DLP uses different components of the MDE stack:
# Step 1: Confirm MDE sensor is running (required for DLP)
Get-Service Sense | Select-Object Status, StartType
# Must show: Running / Automatic
# Step 2: Confirm Defender AV mode (passive = OK for DLP)
Get-MpComputerStatus | Select-Object AMRunningMode
# Passive or EDR Block Mode = DLP works fine
# Step 3: Confirm CrowdStrike is running alongside
Get-Service CSFalconService | Select-Object Status
# Should show: Running
# Step 4: Check DLP policy sync status
# Open Event Viewer > Applications and Services > Microsoft > Windows > MDE-DiagTrack
# Look for event ID 1 showing successful policy pull
# Step 5: Test DLP enforcement
# Create a test file with known sensitive content (e.g., 16-digit number for credit card SIT)
# Attempt to copy it to a USB drive
# You should see the DLP policy tip toast notification on the endpoint
Root causes (in order of likelihood):
Get-Service Sense - if not running, DLP cannot work.Get-Service Sense. If the sensor is stopped, re-onboard the device.4539 9930 1034 7418 for credit card).Root cause: Browser upload monitoring requires the Microsoft Purview browser extension or Microsoft Edge (Chromium-based). Without the right browser configuration:
Root cause: Policy is set to "Audit" instead of "Block with override" or "Block." Check your DLP policy rule actions:
Answer: They can coexist but you must understand the layering:
The following queries use Advanced Hunting tables in the Defender XDR portal. ActionType values and column names may vary by MDE agent version. Test in your environment and consult the Advanced Hunting schema reference for current schema.
// Find all Endpoint DLP policy matches in the last 7 days
DeviceEvents
| where Timestamp > ago(7d)
| where ActionType startswith "Dlp"
| summarize EventCount = count() by ActionType, DeviceName
| sort by EventCount desc
// USB copy violations - who is copying sensitive data to USB
DeviceEvents
| where Timestamp > ago(7d)
| where ActionType == "DlpCopyToRemovableMedia"
| project Timestamp, DeviceName, FileName, InitiatingProcessAccountName,
AdditionalFields
| sort by Timestamp desc
// Find devices where DLP should be active but no events are logged
// (potential enforcement gap - maybe disabled mode)
DeviceInfo
| where Timestamp > ago(1d)
| where OnboardingStatus == "Onboarded"
| join kind=leftanti (
DeviceEvents
| where Timestamp > ago(30d)
| where ActionType startswith "Dlp"
| distinct DeviceId
) on DeviceId
| project DeviceName, OSPlatform, LastSeen = Timestamp
| sort by LastSeen asc
// Cloud upload violations - what are users uploading and where
DeviceEvents
| where Timestamp > ago(7d)
| where ActionType == "DlpUploadToCloud"
| extend Details = parse_json(AdditionalFields)
| project Timestamp, DeviceName, FileName,
InitiatingProcessAccountName,
TargetDomain = Details.TargetDomain,
PolicyName = Details.PolicyName
| sort by Timestamp desc
This is the source of most confusion. Endpoint DLP and network-based features use different MDE components:
| Aspect | Endpoint DLP | Network Protection / URL Indicators / MDA Block |
|---|---|---|
| Component used | MDE sensor (MsSense.exe) minifilter driver | Network protection driver (WdNisDrv.sys) |
| Depends on AV engine? | No - uses MDE sensor only | Yes - requires Defender AV as primary (active mode) |
| Works in passive mode? | ✅ Yes - fully functional | ❌ No - silently fails |
| Works with CrowdStrike? | ✅ Yes | ❌ No |
| What it protects | File operations: USB, print, clipboard, cloud upload, app access | Network traffic: URL/domain/IP blocking, web filtering, MDA app blocking |
| Alternative with third-party AV | No alternative needed - it works | Need proxy/DNS/firewall for URL/IP enforcement |
| Resource | Description |
|---|---|
| Learn about Endpoint DLP | Architecture, supported activities, and requirements for Endpoint DLP |
| Get started with Endpoint DLP | Step-by-step onboarding and first policy creation |
| Using Endpoint DLP | Policy configuration, activity monitoring, and enforcement actions |
| Configure endpoint DLP settings | Unallowed apps, unallowed browsers, and file path exclusions |
| Get started with the DLP Chrome extension | Deploy the Purview DLP extension for Chrome browser monitoring |
| Defender AV compatibility with other security products | AV mode behavior with third-party products and MDE features |