Endpoint DLP not working as expected

Occasional Contributor

Hi,

i created new test tenant to try Endpoint device DLP, i  inboard devices and i created DLP policy for devices , with block action but i its not working .

 

can you help 

thanks

 

12 Replies

@DP-IT 

Just to give more information ,
i am able to see all activities in the activity explorer in the compliance center. for example i can see upload to the cloud activity which i block in the policy but nothing happened

 

DPIT_0-1646040980450.png

 

@DP-IT 

 

Hey man, I am having the exact same problem.  The events get audited but still no actions taken on the Endpoint aka Windows 10 devices.  Did you ever find a solution to this?

@AdminAt845, @DP-IT, @All...
I'm having the same problem: "events get audited but still no (block) actions taken on the Endpoints". Did you find the solution?
I've been succesful in a number of previous deployments, and the only differences I can identify here are:
a- the endpoint is managed from SCCM (no Intune);
b- device join type is "hybrid azure AD join";
c- the UPN I use to authenticate to Azure AD doesn't match my email address.
Microsoft DLP is bit different. After creating the policy for endpoint devices you'll have to go to Microsoft Purview > Data Loss Prevent > Endpoint Settings > Browser and domain restrictions to sensitive data and Set service domain to block.
Also add the domain where you are trying to block the upload on
Assumptions:
1- Device is already onboarded
2- Policy has a action set to block or block with user override for sensitive data

@DP-IT 

Hi, I know its been a long time since this thread was active but I am experiencing the same from my endpoint DLP rules, so i thought I ask a question here.

Did you manage to solve the problem back then? 
In my scenario the protected files gets audited (I can see that in the Activity Explorer) but they are not blocked as they should. 

The device is already onboarded via script.

Any ideas what might be wrong?

 

@Jordi_Nogues , @AdminAt845 @DP-IT , @yodaPREDATOR , same issue, the device is a Windows 11 Pro, managed by intunes, joined as Azure AD ;  I can see that the activities are audited in the Purview Compliance DLP Activity Explorer but they are not blocked on my device as they should by the Endpoint DLP policy I deployed.

 

NB :  I don't see any policy / rule names in the last columns of Activity Explorer?!  (check 

my Purview Endpoint DLP Activity Explorer 

 

Does anyone find the root cause of that issue?




@GuillaumeB 

Maybe the files are not actually scanned by a policy?

I believe those files that appear in the Activity Explorer are audited because the “Always audit file activity for devices” option is On, in the Data loss prevention -> Endpoint DLP settings,  in the Compliance portal.

I cant see what is wrong because if they can be audited then they should been scanned and blocked by the dlp polices. 

My device is Windows 10 Pro and is onboarded be script through the Compliance portal.

 

Anyone, any ideas are appreciated.

 

Hi, thanks for your reply ; actually Microsoft Support gave me this procedure to execute from my device to troubleshoot. I'm waiting for them to come back to me with their analysis ; the log generated is giving a lot of valuable information.

1. Download latest stable version from: https://aka.ms/Betamdeanalyzer
2. Extract contents to "C:\MDATP\MDEClientAnalyzerPreview"
3. From an elevated CMD prompt, run: "C:\MDATP\MDEClientAnalyzerPreview\MDEClientAnalyzer.cmd -t"
4. Specify the maximum number of minutes to collect traces: 6-10 min
5. Reproduce the issue.
6. When completed, send us "C:\MDATP\MDEClientAnalyzerPreview\MDEClientAnalyzerResult.zip

@GuillaumeB i'll tell you what you need to look at. For endpoint dlp to work window defender service needs to be running. If you run just this command MDEClientAnalyzer.cmd (without -t) it will produce the result in web page. There on web page make sure it says defender service is running.

Note: you can run defender with any other AV solution your org uses. If defender detects other AV , it will run in passive mode.
Microsoft Defender Antivirus compatibility with other security products | Microsoft Learn

Hi @Anshulbeniwal , that's very nice of you. Here is in attachment the logs files I got. Let me know from your expert viewpoint if something is wrong. On my side I already updated Defender AV Security Intelligence Version

@Anshulbeniwal , don’t bother with any analysis of my logs : Microsoft support just replied to me with the following root cause analysis

 

finding based on collected logs: The file in question (NewCustomers.xlsx) is not enforced with expected End DLP policy. Instead, it is applied with default policy which is not expected. We are analyzing further to understand why”

 

Can anyone share solutions for this? I have been working with MS support for a while now on this with no resolution