Forum Discussion
DLP inspection for content shared with external users in Teams
- Mar 11, 2020Hmmm, afaik it does: see here: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide and section restrict access to content. AFAIK, the other user it has been shared with cannot access it.
In terms of downloading, well, you would probably look to use app protection policies using Intune in order to block downloads on non managed devices
https://docs.microsoft.com/en-gb/mem/intune/protect/data-leak-prevention
Or you could look to apply sensitivity labels, for example on Teams to require the device to be managed
https://microsoft365pro.co.uk/2019/12/10/teams-real-simple-with-pictures-using-sensitivity-labels-to-regulate-the-privacy-and-guest-access-of-a-team/
If you were taking a zero trust policy no device accessing the corporate access or applications would be non-managed.
Best, Chris
See here on my blog
https://microsoft365pro.co.uk/2019/09/16/teams-real-simple-with-pictures-applying-data-loss-prevention-dlp-to-chat-channel-messages-and-files/
Note: As outlined here on Petri, Teams communications are internal whilst DLP checking for other workloads focuses on outbound email/document sharing. The DLP policy must therefore cover content shared “only with people in my organization” (many existing policies are likely set to cover content shared “with people outside my organization.” In the context of Teams, this means teams with guest users). It is recommended – if external and guest access is on to set two DLP Policies – one internal and one external.
Hope that answers your question!
Best, Chris
- Mitchell BakkerMar 11, 2020Steel Contributor
Nice post ChrisHoardMVP 👍🏼
Does this also work only on non-managed devices? This to prevent any file downloading on non-managed devices. Tried to set it up, and disabling the "Files" section is working, but for files still in the chat it doesn't apply. You can still open/download these. Any idea?- Mar 11, 2020Hmmm, afaik it does: see here: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide and section restrict access to content. AFAIK, the other user it has been shared with cannot access it.
In terms of downloading, well, you would probably look to use app protection policies using Intune in order to block downloads on non managed devices
https://docs.microsoft.com/en-gb/mem/intune/protect/data-leak-prevention
Or you could look to apply sensitivity labels, for example on Teams to require the device to be managed
https://microsoft365pro.co.uk/2019/12/10/teams-real-simple-with-pictures-using-sensitivity-labels-to-regulate-the-privacy-and-guest-access-of-a-team/
If you were taking a zero trust policy no device accessing the corporate access or applications would be non-managed.
Best, Chris- ReuvainJan 17, 2021Copper Contributor
ChrisHoardMVP thanks for your article.
Do you know if the MS DLP cover messages/files sent in a meeting that is hosted by the external?
- Yoav CrombieMar 11, 2020Iron Contributor
I am not sure i fully understood the setting we are required to do, but i could understand the bottom line that is written clearly in your great blog that :
"DLP for external chat sessions will only work if both the sender and the receiver are in Teams Only mode and using https://docs.microsoft.com/microsoftteams/manage-external-access."
In other words, if the other side is not Teams only or is Skype for Business - content will not be inspected and sensitive data can be shared. Is this a correct understanding?
- Mar 11, 2020Correct 😄
Best, Chris