Microsoft 365 DLP Integration and Monitoring

Summary of Actions Required:

Register an app in Microsoft Entra ID and configure API permissions for Microsoft Graph and Office 365 Management APIs. Grant admin consent and collect credentials (Application ID, Tenant ID, Client Secret). Ensure Unified Audit Logging is enabled in Microsoft 365.

Pre-requisites:

DLP Alerts:


 Important Note on Microsoft 365 Alert API Limitations

There is an inherent limitation in the Microsoft 365 Security Alert APIs that impacts the level of detail you receive in alert data—this is critical when planning your integration and choosing the appropriate license tier.

  • v1.0 Alerts API (available under Microsoft 365 E3 and E5):

    • Provides only basic alert information, such as:

      • Alert title, category, severity, and timestamps

      • Limited context about the affected user or object

    • Designed primarily for initial alerting and manual investigation

  • v2.0 Alerts API (currently in beta, available with Microsoft 365 E5 or Defender Plan 2):

    • Delivers richer alert context, including:

      • Detailed user activities leading up to the alert

      • Supporting evidence (emails, files, device info)

      • Remediation guidance and recommendations

    • Useful for automated triage, faster incident response, and deeper analysis

License Implication:

  • If you’re using Microsoft 365 E3, only v1.0 is supported, limiting you to high-level alert insights.

  • For access to v2.0’s extended context, an E5 license or add-on is required.

Our Position:
In Microsoft 365 E3, the information from the v1.0 API is sufficient to initiate timely investigations.
However, depending on your operational requirements, you may need to assess whether the basic alert data is adequate or if the richer, contextual insights of v2.0 are necessary for your workflows.

Consider this carefully when designing your alert ingestion pipeline or evaluating Microsoft 365 licensing options. 


Step 1: Microsoft Entra ID - App Registration

Register Your Application in Microsoft Entra ID:

    • Log in to your Azure Account, click here -  Azure Portal Link.

    • Navigate to Azure Active Directory > App registrations.

    • Click New Registration.

    • Provide a Name for the application, we can suggest "CyTechAQUILA-Monitoring". 

    • Click Register. 

Step 2: API Permissions

Microsoft Graph API Permissions:

    • Navigate to App registrations in the Azure Portal.

    • Select the App you just created, then go to API Permissions. 

    • Search for Microsoft Graph.
    • Click Add a permission.
    • Select Microsoft Graph > Application permissions.
    • Search for and add
      • AuditLog.Read.All
      • Files.Read.All
      • InformationProtectionConfig.Read.All
      • InformationProtectionPolicy.Read.All
      • Policy.Read.All
      • SecurityAlert.Read.All
      • SecurityEvents.Read.All
      • SecurityEvents.ReadWrite.All
      • SecurityIncident.Read.All
      • SensitivityLabels.Read.All
      • Sites.Read.All
      • User.Read.All

image.png

Office 365 Management API Permissions: 

    • Search for Office 365 Management APIs and add the required permissions. 
    • In Application Permissions, look for permissions.

    • To read DLP policy events under ActivityFeed select:

       

      • ActivityFeed.Read
      • ActivityFeed.ReadDlp
      • ServiceHealth.Read

image.png

Grant Admin Consent: 

    • In API Permissions, click Grant admin consent for <tenant name>.

    • Confirm the action. 

image.png

Step 3: Integration Requirements for Office 365 

Application (Client) ID: 

    • Go to App registrations > Select your application.

    • Copy the Application (client) ID from the overview page. 

Directory (Tenant) ID: 

    • In the Azure Portal, navigate to Azure Active Directory > Overview.

    • Copy the Directory (tenant) ID. 

image.png

Create New Client Secret (Value): 

    • In App registrations > Select your application, go to Certificates & secrets.

    • Click New client secret.

    • Add a description and expiration period, then click Add.

    • Copy the Value (displayed only once). 

image.png

Step 4: Verify Unified Audit Logging is Enabled

Unified Audit Logging must be enabled before accessing data via the Office 365 Management Activity API. 

Method 1: Using Microsoft 365 Security & Compliance Center 

  1. Sign in to Microsoft 365:

  1. Access the Security & Compliance Center:

  1. Navigate to Audit Log Search:

    • In the Security & Compliance Center, go to Search in the left-hand menu and click on Audit log search. 

  1. Check Audit Log Status:

    • If you see an option to search the audit log, then audit logging is already enabled(refer to the image below).

    • If you see a banner that says "Start recording user and admin activity" or a prompt to enable auditing, it means that audit logging is not yet enabled. 

image (2).png


  1. Enable Audit Logging:

    • If audit logging is not enabled, you can click on the prompt to enable it. This will enable auditing for all activities within your Microsoft 365 environment. The process may take a few hours to be fully operational. 


Microsoft Purview DLP Policy Creation – General Instruction Manual


Overview: Key Factors to Consider Before Creating a DLP Policy

Before you create any DLP policy, take time to understand and document the following:

1. Data Sensitivity and Classification
2. Data Locations
3. User Scope
4. Policy Actions
5. Exceptions or Conditions
6. Notifications and Overrides
7. Audit and Investigation

Step-by-Step Guide: Creating a DLP Policy in Microsoft Purview

Step 1: Access the Microsoft Purview Portal
  1. Go to https://purview.microsoft.com/

  2. Navigate to: Solutions > Data loss prevention > Policies


Step 2: Create a New Policy
  1. Click + Create policy

  2. Choose a template based on your scenario:

    • Predefined compliance regulations (e.g., GDPR, HIPAA)

    • Custom policy for flexibility


Step 3: Name & Describe the Policy

 Step 4: Define Admin Scope

 Step 5: Select Locations to Monitor

Step 6: Define Policy Rules
  1. Choose: Create or customize advanced DLP rules

  2. Click Create rule

  3. Configure the rule components:

A. Conditions

B. Exceptions (Optional)

C. Actions

D. User Notifications

E. Override Settings

F. Incident Reporting


Step 7: Finalize and Simulate
  1. Review the settings

  2. Choose to run the policy in simulation mode (recommended for testing)

  3. Click Submit to create the policy


Post-Creation Tips


Example Use Cases You Can Build From

Scenario Example Policy Configuration
Prevent employees from emailing credit card numbers Condition: Credit Card Info
Action: Block email
Notify sender and admin
Warn users about sharing internal-only content to external domains Condition: Sensitivity label = Internal
Action: Show policy tip
Allow override
Restrict uploading HR documents to personal OneDrive Condition: HR keyword or file name
Location: Devices
Action: Block upload to personal apps

If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.


Revision #13
Created 17 July 2025 08:13:34 by Richmond Abella
Updated 21 July 2025 12:28:10 by Richmond Abella