DLP signals from Microsoft Purview are integrated directly into the Defender XDR incident pipeline. DLP policy matches across Exchange, SharePoint, Teams, and endpoints are correlated with other threat signals for unified investigation and response.
DLP policy matches surface as alerts in the Defender XDR portal alongside endpoint and identity threats.
DLP events correlated with endpoint, email, and identity signals for complete attack context.
DLP policy strictness adjusts automatically based on Insider Risk Management user risk levels.
Monitor and control file operations on endpoints: USB copy, print, clipboard, cloud upload.
Extend DLP policies to discovered cloud apps through Defender for Cloud Apps integration.
Investigate DLP incidents with entity timelines, impacted files, and user activity across products.
Deploy endpoint DLP, configure policies for Teams and Exchange, investigate DLP incidents in the unified XDR portal, and build enterprise DLP dashboards.
Deploy Microsoft Purview Endpoint DLP with Defender XDR integration to monitor and control sensitive data on devices including USB, print, clipboard, and cloud upload activities.
Configure DLP policies for Teams chat and channels, Exchange Online email with tiered enforcement, policy tips for user coaching, and custom sensitive information types.
Investigate DLP incidents in Defender XDR, correlate DLP alerts with identity and endpoint signals, hunt for data exfiltration with KQL, and build automated response playbooks.
Build enterprise DLP dashboards with KPI metrics, unify policies across Microsoft 365, create PCI-DSS and GDPR compliance evidence, and measure program effectiveness.