MCAS Data Protection Blog Series: MCAS DLP Walk-Through
Published Mar 03 2021 01:32 PM 12.2K Views
Microsoft

MCAS DLP Walk-Through

March 2021

 

Hi everyone! Welcome to the fourth blog of my MCAS Data Protection Blog Series! If this is your first time seeing this blog, check out my landing page for some more information about me and links to previous blogs!

 

This month, I’ll be focusing on the new capability of extending Microsoft data loss prevention to MCAS (announced in September here) in the Compliance Center.

 

As my colleague Mas Libman mentioned, since MCAS provides compliance visibility and control over both native and third-party apps, this new extension of capability pushes the integration for Microsoft DLP policy-based content inspection across connected applications such as Dropbox, Box, Google Drive, WebEx, One Drive, SharePoint, and others. This goal is to help users remain continuously compliant when using both native and third-party cloud apps. It also helps prevent sensitive content from accidentally or inappropriately being shared. DLP in MCAS now uses the same DLP policy framework common across all Microsoft DLP offerings, to provide a familiar, consistent, and seamless compliance experience.

 

After this announcement and the rollout of the capability, my team and I have received several questions regarding deployment. For this blog, I’ll be walking through how this looks for MCAS users.

 

Before we begin, please refer to the table below with some high-level details regarding the portals necessary for the following customer scenario. Disclaimer: the following scenario is based on a use case submitted by a commercial customer.

 

Name

Portal

Colloquial Names

What can you access? (Non-Exhaustive List)

Microsoft 365 Compliance Center

Compliance.microsoft.com

 

GCC-High: compliance.microsoft.us

 

DOD: compliance.apps.mil

Compliance Center, Compliance Portal

  • Sensitivity Labels
  • Custom and Built-in Information Types
  • Test Custom Information Types
  • Trainable Classifiers
  • Content Explorer
  • Activity Explorer
  • Endpoint DLP

Microsoft Cloud App Security

Portal.cloudappsecurity.com

 

GCC-High: portal.cloudappsecurity.us

MCAS, Microsoft CAS, Microsoft CASB

  • File Policies
  • Threat Detection Policies
  • Information Protection Policies
  • Cloud Discovery Policies

 

Alright, so for our first step, we are going to jump over to the Compliance Portal. Let’s scroll down to Solution and select Data Loss Prevention. From there, please select Policies and click Create Policy.

 

DLP  Portal.PNG

 

For the purposes of this effort, we’re going to focus on PCI DSS and select this under Templates from the Financial Category.

 

portal with financial cred.PNG

 

Now, enter a name that’ll help you differentiate this policy from others, I’m naming it “Sarahzin: MCAS Credit Card DLP” to make it easier to identify.

 

Name Policy.PNG

 

Next, let’s choose the location of Microsoft Cloud App Security (only) and click Choose whichever Instances you’d like to use. For my scenario, I selected Box, Salesforce, Dropbox, and ServiceNow.


Chose MCAS and unselect everything else.PNG

 

Select all instances.PNG

 

 

NOTE: To have your instances pop up here, it is required that your apps already be connected in MCAS. Visit our documentation here to get more guidance on connected apps in MCAS.

 

Afterwards, move on to the next step and click Create or customize advanced DLP rules.

 

customized advanced.PNG

 

Next, you can either create a rule or use the prepopulated Low volume of content detected PCI Data Security Standard or High volume of content detected PCI Data Security Standard rule sets. We’re going to create a custom rule and delete the prefilled rule sets (not a requirement).

 

Please add a condition with the sensitive information type of Credit Card Number. Then, click on Add an action and select Restrict Third Party Apps.

 

DLP create rule restrict third party apps.PNG

 

Please select Restrict Third Party Apps at the top, and choose “Send policy-match digest to file owner” for the apps that have this option available. You can choose any of these actions and these are from the list of governance provided by MCAS.

 

DLP rules for apps.PNG

 

After saving your configurations, your page should look like the image below.

 

page should look like this.PNG

 

Next, you have the option to turn this on, run in simulation mode, or keep turned off but saved. We’re turning it on.

 

Turn on.PNG

 

So once the policy is set through the Compliance center, after some time, it’ll populate in MCAS as a policy. The naming convention will say “MIP - ” with your name from the Compliance Center. In MCAS, go to policies and filter on File Policies. You’ll see your new policy here.

 

MCAS File Policy.PNG

 

Note: Policies from the Compliance Center pop up in MCAS but policies from MCAS do not pop up in the Compliance Center (only alerts under the Alerts section on the Compliance Center home page).

 

List of DLP policies in compliance.PNG

 

When you click into the policy in MCAS, you wont be able to change any of the configurations. It gives you a warning that “This policy is an imported subset rule of Microsoft Information Protection policy. Read-only fields can be edited in the original policy. Go to Microsoft Information Protection policies.”

 

File Policy in MCAS.PNG

 

The filters are pre-filled and your governance actions are selected as well.

 

Governance Action.PNGApp does not equal.PNGMCAS Instances.PNG

 

You’ll notice that the policy has a couple matches. When you click into the matches, you’ll find the files that triggered the policy.

 

MIP Policy Matches inMCAS.PNG

 

There you have it! Your policies are working now and triggering any time you have matches.

Please let us know if you have any additional questions or if you’d like to see something else.

 

-------

Feedback 

Let us know if you have any feedback or relevant use cases/requirements for this portion of Cloud App Security by emailing CASFeedback@microsoft.com and mention the core area of concern.

 

Learn more 

For further information on how your organization can benefit from Microsoft Cloud App Security, connect with us at the links below: 

Join the conversation on Tech Community.  

Stay up to date—subscribe to our blog.  

Upload a log file from your network firewall or enable logging via Microsoft Defender for Endpoint to discover Shadow IT in your network. 

Learn more—download Top 20 use cases for CASB

Connect your cloud apps to detect suspicious user activity and exposed sensitive data. 

Search documentation on Microsoft Cloud App Security.  

Enable out-of-the-box anomaly detection policies and start detecting cloud threats in your environment. 

Understand your licensing options .  

Continue with more advanced use cases across information protection, compliance, and more. 

Follow the Microsoft Cloud App Security Ninja blog and learn about Ninja Training.  

Go deeper with these interactive guides: 

·         Discover and manage cloud app usage with Microsoft Cloud App Security 

·         Protect and control information with Microsoft Cloud App Security 

·         Detect threats and manage alerts with Microsoft Cloud App Security 

·         Automate alerts management with Microsoft Power Automate and Cloud App Security  

 

To experience the benefits of full-featured CASB, sign up for a free trial—Microsoft Cloud App Security. 

 

Follow us on LinkedIn as #CloudAppSecurity. To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity on Twitter, and Microsoft Security on LinkedIn for the latest news and updates on cybersecurity. 

5 Comments
Iron Contributor

@Hello @Sarahzin_Shane 

Is the Microsoft DLP works with only cloud based Microsoft products?

Microsoft

Hi @Riyad Amin! Microsoft DLP for MCAS is only cloud based apps. Overall Microsoft DLP can be applied at https://docs.microsoft.com/en-us/Microsoft-365/compliance/data-loss-prevention-policies?view=o365-wo.... :)

Copper Contributor

Hi @Sarahzin_Shane,

 

During testing, I noticed DLP alerts generated from MCAS based off unified DLP policies were only available to manage through the MCAS portal. Is there by chance any future plans to integrate such MCAS DLP alerts with the other unified DLP alerts in the M365 Compliance portal? Though, I would understand if there are some major difficulties with achieving that.

 

Thanks!

Brass Contributor

What happens when you have conflicting DLP policies - One in the compliance center and one in MCAS, which one takes precedence? Is it recommended to use the DLP policy in the compliance center? Looks like the MCAS file policy offers more governance actions. 

Brass Contributor

I noticed in the DLP policy you have restrict third party apps which includes ones like Webex and G-suite that aren't included when you're in the MCAS policy. Is this because you haven't done the integration in MCAS and that's why it's not displayed or are these two pieces separate from one another? Thanks in advance. 

Version history
Last update:
‎Nov 02 2021 04:59 PM
Updated by: