Microsoft Purview: Endpoint DLP Part 2

In this blog post, I will now go into more depth of the different features.

I present the individual protection options with examples and screenshots.

Use case:

A member of the supervisory board, Dr. Ludwig K., works with sensitive data of level C-4.

C-4 is the most sensitive data and any leakage can severely harm the enterprise.

The naming could be different in other companies or enterprises, but the bottom line is, everything boils down to “strictly confidential”.

An acquisition is pending, and a competitor is to be taken over.

The member is required to label all relevant documents and files with the sensitivity label C4 – strictly confidential.    

Use and ways to protect computers from the board of directors

We now accompany Dr. Ludwig on his daily way of working.

In the course of the “Digitalization 2020” project, his company started early to rely on Office 365 as a solution.

The project is scheduled to run for several years and there is still a classic on-premises infrastructure with physical servers. So we have a hybrid AD solution.

Ludwig first checks his email inbox in Outlook and then devotes himself to various calculations for the planned transfer – to Excel.


He has labeled the file as “Strictly Confidential” with a sensitivity label in accordance with internal data classification guidelines.

As a person who is not very tech-savvy, this is simplified for him by the Microsoft Information Protection Button in Excel.

One click and the file is labeled, header, footer and watermarked and protected.

After an hour of analysis and evaluation, he saves the file to his laptop. Instead of his file folder “Excel” he clicks and saves in the local OneDrive synchronized with the cloud….

…and thus, almost violated the data classification guideline. Data of the highest protection class 4 must not enter the cloud.

Fortunately for him, during the “Digitization 2020” project, thought was given to information protection in the cloud and Microsoft Information Protection was implemented.

One part of this is Endpoint DLP. And it is precisely this part that now prevents the synchronization of the file from the OneDrive folder in OneDrive Online.

The blocking of applications

In my last blog post – in case you missed it, you can find it here – I described how Endpoint DLP is a combination of global settings and a DLP policy.

One part of the global settings is called “Restricted Apps and Groups” .

Let’s have a look into the Info Panel in gray.

If a policy blocks restricted apps from accessing files, cloud apps like OneDrive might show repeated notifications to users as the app continuously attempts to access the files.

This means, that some cloud apps like OneDrive, or Dropbox, or Google Drive use a synchronized folder on the endpoint.

When you now copy, create or save a file which is under the scope of the DLP settings into this folder, the application starts to do its’ job –

1. and this is to upload and synchronize the data into the respective cloud.

2. Which is blocked by the Endpoint DLP settings.

3. Which triggers an alert.

And this is a continuous cycle, you can begin at number 1 again.
This, of course, gives an unwanted amount of alerts. Disturbing both for the user as same as the administrators or SOC team or whoever works on incidents and alerts.

Alert cycle

To prevent this, we specify a location on user’s devices to quarantine files, then select the ‘Autoquarantine’ option when adding apps.

To circumvent this, you can add a quarantine folder on the Endusers machine in which the file will be moved.

How can you achieve this?

First, you have to open the global settings in the Microsoft Purview portal.

To go there, choose Data Loss Prevention and then Endpoint DLP Settings.

after clicking on the tab, scroll down to this section:

Here, you go to the Restricted apps section.
and see in this screenshot from our dev environment, that there are boxes already ticked under “Auto-quarantine”.

They are grayed out. Now. How do you add auto-quarantine settings? Click on “+ Add or edit restricted apps”. A new window opens on the right side of your browser:

Here, you can add new apps or edit the already chosen ones.

These first three apps don’t use synchronization folders. Besides Teams, but this is not relevant right now.

These ones here use synchronization folders and should be added to the Auto-quarantine functionality.

The actual Auto-quarantine settings must be set right below the list of applications.

With this rather standard setting, the files will be moved to the folder “Quarantine” in the user folders.

C:\Users\FirstName_LastName\Microsoft DLP\Quarantine\OneDrive as an example.

DLP Auto-quarantine will create sub-folders for the files for each unallowed app.

So if you have both Dropbox and OneDrive in your unallowed apps list then a sub-folder will be created for Quarantine\OneDrive and another sub-folder for Quarantine\Dropbox.

To help the user – which might be confused – to find the file in the quarantine folder, you can choose to configure the settings:

The moved file will now be replaced by a .txt file. When you open the .txt file, it will show this text:

And that is exactly what we wanted to see. The user is informed and the File was not uploaded but instead replaced by this TXT File.

This was an example how applications can be blocked uploading sensitive content.

Dr. K is also regularly and actively working with Microsoft OneNote.

He chose to copy some content of a merger related document into the Quick Notes section as a reminder.

We have previously added OneNote to the restricted apps. Therefore, any activity in between files labeled with our sensitivity label and OneNote is controlled.

As expected, the copy and paste operation from the merger document into OneNote fails and our already known toast message pops-up.

The above animated image shows the behavior with the regular “classic” OneNote app.

It does not matter whether you restrict the OneNote “classic” app (*.exe) or the OneNote for Windows 10 app from the Microsoft Store.

To show the that this is true, please have a look at the next part:

In the following animated Image, you see how Dr. K first copies the content of an invitation into his OneNote for Windows 10 app without any problems.

You can distinguish between both OneNote apps by their design.

After that, he copies parts from the merger document and tries to paste it below the invitation text on the same OneNote page.

Without success.

Please note, that there is only one difference – or bug – at the moment, which shows an additional block message directly in the OneNote Microsoft Store App additionally to the standard toast message which appears with slight delay.

Remote Desktop Protocol (RDP)

I have shown you how to protect a sensitive file from spillage via applications, now we are having a look into blocking the Remote Desktop Protocol.
RDP is used to connect to machines somewhere else. Those might be virtual or physical machines.

You are generally able to copy files or clipboard content from your local machine you are sitting in front of to the remoted machine.
And the other way around.

To prevent sensitive data being lost via this way, Endpoint Data Loss Prevention also protects from spillage via RDP.

In this animated image, I try to copy the sensitive merger document from the virtual machine on our dev server to my local machine.

I can’t

There is no DLP pop-up or warning on my side, which totally makes sense since my machine is not onboarded into the dev tenant and therefore not under the control of Endpoint DLP.

However. The virtual machine from Dr. K is and therefore the file can’t be copied or moved from the endpoint via RDP to my local machine. The warning message appears on the connected endpoint itself.

The blocking works as expected.

Activities in Purview

The endpoint is onboarded in in Microsoft Defender. Therefore, the file activities are monitored.

To check those activities, you have again log-in into the Purview portal and click on “Data Loss Prevention” and then on the tab “Activity Explorer”

The Activity explorer presents a big amount of data for the file activities.

Our attempts to move sensitive files or data from Word or Excel to restricted apps or via RDP is recorded here.
If you wish, you can also configure an alert to get better visibility into these kind of operations and help the Users to not violate compliance regulations.

That’s it for now. I hope you enjoyed the second part of the insights into Endpoint Data Loss prevention and learned something new. Part three will follow.

See you the next time.

Microsoft Endpoint DLP

Microsoft Purview: DKE from Zero to PoC

Double Key Encryption or DKE is a method of protecting data above anything else. As the name eludes it uses two keys together to protect the content. In the way that, one key is held by Microsoft (they protect it!) and the other is held purely by the customer (therefore by extension who are responsible to protect the key!). The mechanism of DKE piggy backs on the Azure Purview Label Set and when configured correctly allows a label to apply DKE protection to the data which it labels.

Continue reading

Spring Microsoft Ignite 2021 – The Future of Cybersecurity

I’m thrilled to be speaking again at Microsoft Ignite (spring edition). In fall 2020 I already had the chance to speak about Zero Trust in 2020 in front of a fully packed session. Table Talks in my oppinion are a very smooth and successful way to interact with experts on specific topics all around the globe. That’s why I’m really excited to be nominated to speak with Gokan Ozcifci, Dr. Mike Jankowski-Lorek, Paula Januszkiewicz and Tomas Vileikis about The Future of Cybersecurity.

Continue reading

Microsoft Ignite 2019 – Join my sessions!

2019 was already an incredible year. I was allowed to be on stages this year that I would never have dreamed of. Fantastic!

Definitely an absolute highlight has been RSA 2019, where I was invited to speak with my buddy Josh Harriman about “The Lost Boys: How Linux and Mac Intersect in a Windows-Centric Security World”. An awesome experience to be on stage with an expert like Josh!

Now two more top conferences are casting their shadow – Microsoft Ignite and ExpertsLive Europe.

Microsoft Ignite | November 4-8, 2019 | Orlando, Florida
Continue reading

Windows Defender ATP: the lost boys – Mac & Linux

At RSA 2019 I’ll be speaking about the Lost Boys: How Linux and Mac Intersect in a Windows-Centric Security World. We often see that Windows has such a large market share as the platform of choice, it can render Linux and Mac the Lost Boys in the world of security. This is also reinforced by the fact that the management of the two platforms for enterprise environments is simply not comparable to the administration of Windows client or server operating systems. But from the perspective of a security officer, this is as important as necessary. In November 2017, Microsoft announced that it will extend Windows Defender ATP partners across platforms. With that, the public availability of the WDATP integration of Ziften, Bitdefender and Lookout went live. With this comprehensive approach, Microsoft unites forces against cyber threats and adds lack of knowledge about behavior-based security solutions on these platforms through the industry expertise of its partners. This integration has now been extended to include two additional platforms, SentinelOne and Corrata. In this blog post I’ll give you a first introduction how the integration with Ziften can be done. Later we will have a look how the agent behaves on Mac and Linux machines with two different examples of real world attacks, that we have seen in the past couple of months.

Continue reading

Experts Live Europe – The new era of endpoint security!


I just arrived home from my trip to Prague Czech Republic. It was an amazing conference with a big firework at the end :). The conference counted over 400 attendees from 29 countries. In six different session tracks you could listen to 42 experts presenting a wide range of topics in the Microsoft universe. Besides the VIP party in Cloud 9 Sky Bar & Lounge my absolute highlight was the Intro Video below.

Continue reading

I’m speaking at Experts Live Europe in Prague


after Microsoft Ignite and IT:SA I’m looking forward to Experts Live Europe. I’m part of the community for more than 4 years now. Back in the days the conference was called System Center Universe Europe. I attended twice and I really liked the warm and welcoming atmosphere and the good quality and selection of the speakers. Honestly I’m super proud to be back as a speaker. Last year I had three sessions – check out the according blog post if you are interested.

Continue reading

Azure ATP: Golden Ticket Attack – Understanding Kerberos


many enterprise IT departments these days are afraid of golden ticket or pass the ticket attacks -which is good because privilege escalation and privileged account exploitation are at the center of cyber attacks as we see them. Attackers crash through the network perimeter, hijack credentials and use them to move laterally throughout the network, taking additional credentials and escalating privileges along the way to accomplish their goals. In this blog series we will have a look at kerberos golden ticket and silver ticket attacks. I’ll try my best to explain how it works and how Azure ATP / Advanced Threat Analytics can help to detect.


Continue reading

© 2022 IT-Pirate