TrustRadius: an HG Insights company

Microsoft Purview Data Loss Prevention

Score7.8 out of 10

28 Reviews and Ratings

What is Microsoft Purview Data Loss Prevention?

Microsoft Purview Data Loss Prevention is used to provide intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. It also helps prevent data loss through identifying and preventing risky or inappropriate sharing, transfer, or use of sensitive data on endpoints, apps, and services.

Categories & Use Cases

Media

pre-built policy templates to easily get started
DLP analytics to help recommend new policies and fine tune existing ones
the step that enables one policy to be applied to several locations
then next step, that enables policies to be scoped to specific users and user groups
composite conditions using groups of AND /OR and exceptions with NOT
granular restrictions for different actions
configuring different restrictions for different groups of devices
custom user notifications and policy tips
policy creation in Simulation mode to gain confidence before deploying in production
a migration of existing DLP policies to Microsoft Purview DLP, which occurs automatically
a display DLP incidents within the context of Security incidents in Microsoft Defender XDR
viewable sensitive information and surrounding context relevant to an incident
manual remediation actions that can be run from the event page

1 / 13

Top Performing Features

  • Data Encryption

    Data encryption to ensure data privacy

    Category average: 8.3

Areas for Improvement

Microsoft Purview Data Loss Prevention Review

Use Cases and Deployment Scope

Our use cases are primarily helping customers around their regulatory requirements. Their requirements are to understand, discover sensitive information going outside their network, whether it be device or to another partner, another vendor that they're working with. They just need discovery around it. Now, recently we have also been engaged with customers around use cases where they want to understand what sensitive information is flowing into the AI space. So if users are accessing unapproved AI applications within the environment, they want to understand if any corporate sensitive information or corporate confidential files are going into those apps or not. So those are some use cases that we are currently working on.

Pros

  • I think from a coverage standpoint, it's pretty comprehensive. The areas it covers, of course, include the Microsoft stack, but also focus on using the definitive cloud apps integration to extend visibility and control to third-party cloud apps, endpoints, and even Macs. So those are capabilities.
  • Its comprehensiveness, its simplicity of creating the policies in one place, are definitely one of the plus points the solution has.

Cons

  • I mean, for the edge for business, there is one use case around using Microsoft Edge for business, understanding sensitive information flowing into AI sites. It currently depends on an Azure subscription. I would love to see if it could all be included as part of E5. The reason being, I don't know why it is that case, but it would be really beneficial if organizations that do not have to worry about ACR cost, they would be able to use this for all the users. Right now, we have to struggle with only limiting it to a few users, limiting the scope to only users because of the fear that we may not know what cost we would end up in when this is turned on. So that's kind of a challenge.

Return on Investment

  • Microsoft Purview Data Loss Prevention is definitely something... It's hard to give an ROI, unless you're talking to the right people. We try to speak to the legal compliance team, so that if the project is led by the legal team, they understand the risk around it. So the ROI is basically you not getting into, in legalities or in legal cases where somebody could, a customer or a partner that you're working with can sue you because you don't have these controls in place. That also helps you comply with certain regulatory requirements like ISO 27,001, at least have these enabled in monitoring mode, and have the discovery being done.
  • But overall, from starting with discovery and then having enforced protection, it really helps you understand the ROI from that pact. It may not have a real monetary value attached to it, but the monetary value may be attached. If you're talking to the legal guys, they understand how many from a data exfiltration standpoint, what incidents they have come across, and how much fines they have paid. So, having Microsoft Purview Data Loss Prevention is a low-hanging fruit. At least start enabling them to start seeing what's coming back in your tenant, and understand what data is being used and shared externally. So that's the ROI I see: protecting your compliance teams from any unintended fees or subpoenas, and getting around this.

Other Software Used

Microsoft Azure, Microsoft Dynamics 365

Usability

Microsoft Purview Data Loss Prevention Review

Use Cases and Deployment Scope

The reason it's important is that, as our company, we use it internally and as part of our platform. Our solution allows us to manage how users collaborate internally and externally within the organization, and we also use Microsoft Purview Data Loss Prevention and labels to drive our policy. So this way, we can automate how our solution will serve our customers, both internally and externally.

Pros

  • What it does do well, if you have it configured right, is when you start creating specific custom sensitive information types, especially when you drill down to things like exact data match and fingerprinting, it does a pretty good job of that. The challenge, as with most DLP solutions, is that out-of-the-box solutions tend to produce many false positives. And unfortunately, because of the way the solution has been positioned in the marketplace, a lot of people have a bad impression of it because it does not provide the level of out-of-the-box capability that some other solutions are offering.

Cons

  • I'd say over the last couple of years, there have been some great advancements in Microsoft Purview Data Loss Prevention, so I really do like that. I think some of the challenges I see with Microsoft Purview Data Loss Prevention today are in the first-party world; it does provide some real-time capabilities, but the alerting on DLP has a big lag. And some of our customers, actually, one of my customers in particular, whom I advise heavily, ran into a situation where they were getting hours of delays when they were getting critical, sensitive alerts. So being able to provide that in a more real-time way for both internal use within Microsoft and for third-party products, I think, would be significantly impactful. E-share, as a platform, also uses DLP in order to automate our policy, as I mentioned before. And some of that is a challenge because some of the capabilities we do need real-time information for aren't exposed to us based on the current capabilities that Firmy provides.

Return on Investment

  • From an ROI perspective, being able to have a robust DLP capability within 365 and with eShare, again, providing the defensive depth and keeping data 365 gives both us as well as our customers an ROI by being able to not use third party repositories to share data externally and by keeping data inside of 365. It gives me much more visibility into my data landscape. One of the things we advise our customers to do when they're starting to explore the advanced capabilities of Microsoft Purview Data Loss Prevention, for example, is to use that DLP product to monitor and understand the flows of sensitive data within the organization. By being able to look at that DLP, identify those sensitive niche types, and see which transactions occur internally within the organization, I get a clearer picture of what I'm doing.

Microsoft Purview Data Loss Prevention Review

Use Cases and Deployment Scope

It's for data protection, data loss protection. We use it for MIP labeling. It's to label the files with confidential sensitivity so they're not allowed to be sent outside the organization.

Pros

  • If the calls are set up right, if it sees files marked with certain labels like confidential, it will stop them from being sent out of the organization. So the data leakage is to a minimum.

Cons

  • I would say they improved a lot of their reporting. Where I would like to see them improve is probably by adding more features sooner.

Return on Investment

  • As a public company, I don't focus on ROI too much. Okay. But it has a positive impact because we're stopping data leakage.

Other Software Used

CrowdStrike Falcon

Usability

Microsoft Purview Data Loss Prevention Review

Use Cases and Deployment Scope

So we started using AIP, a previous version of Microsoft Purview Data Loss Prevention, because we had major data leakage of office documents being copied outside the organization, and we had no way to control it. So that's why we started implementing it when we originally did it nearly 10 years ago. Since then, the product has changed dramatically and gone into the cloud. It was before an on-premise type of product. So the business rationale for doing that is that we needed something that could provide a label of confidentiality to our most critical documents. So we could segment the access. So we will have access lists to it. It will get encrypted. So if you're not on the access list, you cannot access it. Also, if you try to open it from outside the organization and you don't have permission, you can't do it.

Pros

  • The ability to create groups of people that would access a certain label, having been able to organize the data access to the document access, and protecting repositories with the same level of criticality, regardless of where they're located in the company. That's quite good because we had a lot of document distribution, and it helped provide the same layer of protection regardless of where they're stored.
  • The other good thing is that it provided traceability of what was going on with the label. So I could understand how many people were trying to access a document that weren't meant to. So it gave me an idea of how well protection was working, not only because people who did have access accessed it, but also I could trace that people who didn't have access couldn't do it.

Cons

  • The main thing is that, within the product's story, some functionalities were deprecated, and traceability was one of them. That meant that before I could tell or pinpoint on a world map where a particular type of access attempt was happening, and now I cannot do that anymore. So that was useful because I could understand how far out a document made it, and then where the issue was. Was an employee trying to open it at home, or was it an external party altogether? I couldn't do that anymore.
  • The second bit that has room for improvement, is the fact that we have quite a lot of legacy documents that were labeled. So they are from previous versions of Office. And at the moment, since November last year, the already labeled documents are not being protected by the labels.

Return on Investment

  • This is a cybersecurity prevention component that we are looking at. I think it has paid for itself. However, the deprecation, some of the issues that I'm facing, like the lack of legacy support, reduced traceability, and some of the hiccups of implementing. So we cannot label more than 100,000 documents per day, or assess more than 4 million documents with Microsoft Purview Data Loss Prevention. We have a lot of documents. So, without doing that, is it repaying itself? We're paying for the product every year as part of the subscription model, so I'm not sure it will still pay for itself in the future if some of these issues can't be remediated quickly.

Microsoft Purview Data Loss Prevention Review

Use Cases and Deployment Scope

It addresses, for us, kind of security and managing the accounts that we have, and where everybody kind of goes, and how everybody accesses Microsoft, it keeps everything organized for us.

Pros

  • I think it does well in the dashboard. I prefer how it organizes everything in its columns. And then it's easy to traverse the dashboard. It doesn't get confusing, I feel like. When I'm clinging around things, and a lot of times with Microsoft, they're constantly improving things, and they'll change it on you, and then they'll get into it, and you're like, "Oh, this is new." But it makes it very simple to navigate, I think.

Cons

  • I think the only area I would probably suggest is the name change. I think Microsoft rebrands a lot of things, although they do the same thing, it starts to get confusing. If you spent five years learning Entra or the previous name of that, and then they change it on you, you slowly adjust. I think the rebranding of things, if they can explain it a little better, is what to me, the rebranding of the naming of specific apps inside of Entra that get changed, and then it'll slowly migrate you over to that. Obviously, they're trying to upgrade things, but I think the communication behind that has improved a little bit.

Return on Investment

  • I think managing costs was probably the biggest one as a nonprofit. We're always worried about the financial impact that any product can have. And as licenses get changed or they get shut down, dictated, we are migrating to the proper product without going over budget is always something we are concerned about. But for the most part, it's been positive. Microsoft works for us as nonprofits to make sure that we get very fair pricing.

Usability