%3CLINGO-SUB%20id%3D%22lingo-sub-1452127%22%20slang%3D%22en-US%22%3EGetting%20started%20with%20Insider%20Risk%20Management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1452127%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EInsider%20Risk%20Management%20is%20a%20solution%20in%20Microsoft%20365%20that%20helps%20minimize%20internal%20risks%20by%20enabling%20you%20to%20detect%2C%20investigate%2C%20and%20take%20action%20on%20risky%20activities%20in%20your%20organization.%20Custom%20policies%20allow%20you%20to%20detect%20and%20take%20action%20on%20malicious%20and%20inadvertent%20risk%20activities%20in%20your%20organization%2C%20including%20escalating%20cases%20to%20Microsoft%20Advanced%20eDiscovery%20if%20needed.%20Risk%20analysts%20in%20your%20organization%20can%20quickly%20take%20appropriate%20actions%20to%20make%20sure%20users%20are%20compliant%20with%20your%20organization's%20compliance%20standards.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20enable%20the%20insider%20risk%20management%20capability%20in%20your%20organization%E2%80%99s%20tenant%20by%20following%20the%20steps%20below%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EGrant%20yourself%20or%20a%20designated%20administrator%20the%20Insider%20risk%20management%20Admin%20role%20by%20-ERR%3AREF-NOT-FOUND-enabling%20permissions.%3C%2FLI%3E%0A%3CLI%3ENavigate%20to%20-ERR%3AREF-NOT-FOUND-%3CA%20href%3D%22https%3A%2F%2Fcompliance.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fcompliance.microsoft.com%2F%3C%2FA%3E%20and%20on%20the%20left%20pane%20select%20the%20%3CSTRONG%3ECatalog%3C%2FSTRONG%3E%20under%20the%20%3CSTRONG%3ESolutions%3C%2FSTRONG%3E%20section.%3C%2FLI%3E%0A%3CLI%3EScroll%20down%20to%20%3CSTRONG%3EInsider%20Risk%20Management%3C%2FSTRONG%3E%2C%20and%20click%20%3CSTRONG%3EView%3C%2FSTRONG%3E%20under%20the%20%3CSTRONG%3EInsider%20Risk%20Management%3C%2FSTRONG%3E%20solution.%3C%2FLI%3E%0A%3CLI%3EClick%20%3CSTRONG%3EShow%20in%20Navigation%3C%2FSTRONG%3E%20and%20then%20%3CSTRONG%3EOpen%20Solution%3C%2FSTRONG%3E%20to%20confirm%20you%20have%20access.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EOnce%20you%20confirm%20you%20have%20access%2C%20you%20can%20start%20creating%20policies%2C%20investigating%20alerts%2C%20and%20handling%20cases.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20Insider%20Risk%20Management%20is%20a%20technical%20solution%2C%20its%20scope%20straddles%20the%20worlds%20of%20security%2C%20privacy%2C%20HR%20and%20legal%2C%20so%20we%20recommend%20involving%20stakeholders%20from%20those%20areas%20in%20your%20organization%20that%20might%20be%20able%20to%20provide%20validation%20and%20insight%20during%20the%20evaluation.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20order%20to%20get%20a%20meaningful%20experience%2C%20we%20highly%20recommend%20that%20you%20evaluate%20the%20solution%20in%20a%20production%20environment.%20The%20experience%20is%20highly%20dependent%20on%20the%20amount%20of%20data%20the%20system%20can%20analyze%2C%20so%20real-world%20data%20will%20provide%20the%20most%20meaningful%20results.%20If%20you%20decide%20to%20initially%20perform%20the%20evaluation%20in%20a%20test%20tenant%20you%20will%20have%20to%20generate%20simulated%20user%20actions%20for%20the%20system%20to%20consume.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWhen%20employees%20leave%20your%20organization%2C%20there%20are%20specific%20risk%20signals%20typically%20associated%20with%20data%20theft%20by%20departing%20employees.%20The%20%3CSTRONG%3Edata%20theft%20policy%20template%3C%2FSTRONG%3E%20prioritizes%20these%20signals%20and%20focuses%20detection%20and%20alerts%20to%20this%20risk%20area.%20Data%20theft%20for%20departing%20employees%20may%20include%20downloading%20files%20from%20SharePoint%20Online%2C%20copying%20files%20to%20portable%20devices%20such%20as%20USB%20drives%2C%20printing%20files%2C%20and%20copying%20data%20to%20personal%20cloud%20messaging%20and%20storage%20services%20near%20their%20employment%20resignation%20and%20end%20dates.%20This%20template%20prioritizes%20signals%20relating%20to%20these%20activities%20and%20how%20they%20correlate%20with%20employee%20employment%20status.%20%E2%80%AFPlease%20follow%20these%20few%20steps%20to%20setup%20this%20policy%20for%20your%20organization.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Furldefense.com%252Fv3%252F__https%253A%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps*3A*2F*2Fdocs.microsoft.com*2Fen-us*2Fmicrosoft-365*2Fcompliance*2Fimport-hr-data%2526data%253D02*7C01*7Cshmahapa*40microsoft.com*7C8de646e81d624d93a90f08d7aa691384*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C637165240600322815%2526sdata%253DnYYTsmed5irMC9T4Y4n5EvaYL6ZqzjSNY47ZCNebHIM*3D%2526reserved%253D0__%253BJSUlJSUlJSUlJSUlJSUlJQ!!Kjv0uj3L4nM6H-I!yYJxlVHCY_8OvbBZlADpjyqxauzoBlLfvAh0i9nzXOAKGho3yp66Y_0WMQI%2524%26amp%3Bdata%3D04%257C01%257CMavi.Etzyon-Grizer%2540microsoft.com%257C2dff62bf819e47cfb21a08d80cabbd36%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637273279044780528%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DcZ77ACkWW8OVz5dP47dHb3aiK3ZyIj7U%252B2OkLL9Pkv0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESetup%20HR%20connector%3C%2FA%3E%3CU%3E%26nbsp%3B%3C%2FU%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Furldefense.com%252Fv3%252F__https%253A%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps*3A*2F*2Fdocs.microsoft.com*2Fen-us*2Fmicrosoft-365*2Fcompliance*2Finsider-risk-management-policies%2526data%253D02*7C01*7Cshmahapa*40microsoft.com*7C8de646e81d624d93a90f08d7aa691384*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C637165240600332810%2526sdata%253DrHyVtmQBf0xnTCiy*2FNg*2B7Ht2l1ytAQ83*2FU3iIFjoFb0*3D%2526reserved%253D0__%253BJSUlJSUlJSUlJSUlJSUlJSUlJQ!!Kjv0uj3L4nM6H-I!yYJxlVHCY_8OvbBZlADpjyqxauzoBlLfvAh0i9nzXOAKGho3yp66roLldZI%2524%26amp%3Bdata%3D04%257C01%257CMavi.Etzyon-Grizer%2540microsoft.com%257C2dff62bf819e47cfb21a08d80cabbd36%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637273279044790527%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DvmqQCxCnQxpf7VC6PjGlP2tMxif07JPYGcp5%252BxAs91s%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESetup%26nbsp%3BIP%26nbsp%3Btheft%20policy%26nbsp%3B%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Furldefense.com%252Fv3%252F__https%253A%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps*3A*2F*2Fdocs.microsoft.com*2Fen-us*2Fmicrosoft-365*2Fcompliance*2Finsider-risk-management-alerts%2526data%253D02*7C01*7Cshmahapa*40microsoft.com*7C8de646e81d624d93a90f08d7aa691384*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C637165240600332810%2526sdata%253DdPqJoP99Ez6OywG1TpgjADggQmFfhYq11ivA9dVBPN0*3D%2526reserved%253D0__%253BJSUlJSUlJSUlJSUlJSUlJQ!!Kjv0uj3L4nM6H-I!yYJxlVHCY_8OvbBZlADpjyqxauzoBlLfvAh0i9nzXOAKGho3yp66Y2YyKl4%2524%26amp%3Bdata%3D04%257C01%257CMavi.Etzyon-Grizer%2540microsoft.com%257C2dff62bf819e47cfb21a08d80cabbd36%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637273279044830524%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DUBE3BAxP8ksr83qmV1W1WUm7B77wY2FUlhFEv5mmpUk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETriage%20and%20manage%20alerts%3C%2FA%3E%3CU%3E%26nbsp%3B%3C%2FU%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20on%20Insider%20Risk%20Management%2C%20see%20the%20information%20below.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERead%20the%20-ERR%3AREF-NOT-FOUND-Insider%20risk%20management%20documentation%20to%20learn%20how%20to%20deploy%20the%20solution.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fcompliance%252Finsider-risk-management-plan%253Fview%253Do365-worldwide%26amp%3Bdata%3D04%257C01%257CMavi.Etzyon-Grizer%2540microsoft.com%257C2dff62bf819e47cfb21a08d80cabbd36%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637273279044850512%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DybIFQalE31AysrQrj5rOcSLprMLYUeTBbadTOGtmn%252Fo%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPlan%20your%20insider%20risk%20program%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EWatch%20a%20video%20with%20a%20-ERR%3AREF-NOT-FOUND-quick%20view%20of%20Insider%20risk%20management.%3C%2FLI%3E%0A%3CLI%3ELearn%20more%20about%20using%20Insider%20risk%20management%20in%20this%20-ERR%3AREF-NOT-FOUND-Microsoft%20Ignite%20presentation%20on%20Insider%20risk%20management.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EStay%20up%20to%20date%20with%20the%20-ERR%3AREF-NOT-FOUND-Insider%20risk%20management%20blog.%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1452127%22%20slang%3D%22en-US%22%3E%3CP%3EHere's%20how%20to%20get%20started%20today%20and%20enable%20the%20insider%20risk%20management%20capability%20in%20your%20org.%26nbsp%3B%3C%2FP%3E%0A%3CP%3Efollow%20these%20quick%20steps%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1452127%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Einsiders%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIRM%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMIP%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eprotection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Insider Risk Management is a solution in Microsoft 365 that helps minimize internal risks by enabling you to detect, investigate, and take action on risky activities in your organization. Custom policies allow you to detect and take action on malicious and inadvertent risk activities in your organization, including escalating cases to Microsoft Advanced eDiscovery if needed. Risk analysts in your organization can quickly take appropriate actions to make sure users are compliant with your organization's compliance standards.

 

You can enable the insider risk management capability in your organization’s tenant by following the steps below:

  1. Grant yourself or a designated administrator the Insider risk management Admin role by enabling permissions.
  2. Navigate to https://compliance.microsoft.com/ and on the left pane select the Catalog under the Solutions section.
  3. Scroll down to Insider Risk Management, and click View under the Insider Risk Management solution.
  4. Click Show in Navigation and then Open Solution to confirm you have access.

Once you confirm you have access, you can start creating policies, investigating alerts, and handling cases.

 

While Insider Risk Management is a technical solution, its scope straddles the worlds of security, privacy, HR and legal, so we recommend involving stakeholders from those areas in your organization that might be able to provide validation and insight during the evaluation. 

 

In order to get a meaningful experience, we highly recommend that you evaluate the solution in a production environment. The experience is highly dependent on the amount of data the system can analyze, so real-world data will provide the most meaningful results. If you decide to initially perform the evaluation in a test tenant you will have to generate simulated user actions for the system to consume.

 

When employees leave your organization, there are specific risk signals typically associated with data theft by departing employees. The data theft policy template prioritizes these signals and focuses detection and alerts to this risk area. Data theft for departing employees may include downloading files from SharePoint Online, copying files to portable devices such as USB drives, printing files, and copying data to personal cloud messaging and storage services near their employment resignation and end dates. This template prioritizes signals relating to these activities and how they correlate with employee employment status.  Please follow these few steps to setup this policy for your organization.

  1. Setup HR connector 
  2. Setup IP theft policy 
  3. Triage and manage alerts 

 

For more information on Insider Risk Management, see the information below.