An example of how you can use a custom Sensitive Info Type in the Microsoft 365 compliance center!

MVP

 

Dear Microsoft 365 Security and Compliance Friends,

 

Collaboration in today's world, with a wide variety of Microsoft cloud services, is here to stay. As in all situations, there are pros and cons. For this reason, in this article I will show you how to work with Sensitive Info Types. But I won't use the "general" classic with the credit card numbers, but a real situation with a customer.

Here's the scenario I encountered with a customer. Technical manuals are created by engineers, including PowerShell blocks that are used for various configurations. These documents are the precious asset for the company/organization. These documents cannot simply "leave" the company or be shared. This is where "our" Sensitive Info Type comes into play. But how exactly does a Sensitive Info Type work? I will show you in a moment in the Microsoft 365 compliance center (and yes with the example of credit card numbers ;-). After that, we create our own Sensitive Info Type.

 

We start by navigating to the Micosoft 365 Compliance Center. https://compliance.microsoft.com

 

In the menu click on "Data classification" and navigate to "Sensitive info types" to the right you will see the search box, enter "cred". Then the Sensitive Infos Type "Credit Card Number"appears.

_Sen1.JPG

 

Click on "Credit Card Number. A new "Card" will open. Click on "Test".

_Sen2.JPG

 

Select "Upload file", I have prepared a text file with a fake credit card number.

_Sen3.JPG

 

Now click on "Test".

_Sen4.JPG

 

We see there is a match. This is how a Sensitive Info Type works (for example, in a policy). Click Finish.

_Sen5.JPG

 

Now we create our own Sensitive Info Type. We go back to Sensitive Info Type, delete keyword in the search box and click on "Create sensitive info type".

_Sen6.JPG

 

Assign a name and description.

_Sen7.JPG

 

Click on "Create pattern".

_Sen8.JPG

 

Confidence level: High Convidence.

_Sen9.JPG

 

Click "Add primary element" and select "Regular expression".

_Sen10.JPG

 

At "ID" you assign a name and at "Regular expression" you enter the following example and click on "Done".

_Sen11.JPG

(RegEx: New-[a-zA-Z]+|Remove-[a-zA-Z]+|Get-[a-zA-Z]+|Add-[a-zA-Z]+|Set-[a-zA-Z]+)

 

Click on "Supporting elements" and select "Regular expression" again.

_Sen12.JPG

 

Enter a name at "ID" and enter the following example and click "Done".

_Sen13.JPG

(RegEx: \s-[a-zA-Z]+\s)

 

We will create a second "pattern". Click on "Create pattern".

_Sen14.JPG

 

This time with a "Confidence level" of Medium. Click "Add primary elemtent" again.

_Sen15.JPG

 

At "ID" you assign a name and at "Regular expression" you enter the following example and click on "Done".

_Sen11.JPG

 

Now we have two patterns, we click on "Next".

_Sen16.JPG

 

Now we can determine the recommended confidence level.

_Sen17.JPG

 

We get the summary and click on "Create".

_Sen18.JPG

 

Perfect, click on "Done".

_Sen19.JPG

 

Back to the "Sensitive Info Type", we navigate to the search field again and enter "power". Now our new Sensitive Info Type appears. Click on the Sensitive Info Type.

_Sen20.JPG

 

Click on "Test".

_Sen21.JPG

Now you need to upload a file again. I have prepared a Word document which is a guide for deploying a VM in Azure using PowerShell. After that click again on "Test".

_Sen22.JPG_Sen23.JPG

 

Jackpot!! So we know for sure that our Sensitive Info Type will work in a policy!

 

Sure this wasn't super exciting, but I still wanted to share this information with you.

 

I hope this article was helpful for you? Thank you for taking the time to read this article.

 

Best regards, Tom Wechsler

0 Replies