Control 1.12: Insider Risk Detection and Response - Portal Walkthrough
This playbook provides portal configuration guidance for Control 1.12.
Prerequisites
- Microsoft 365 E5 or E5 Insider Risk Management add-on
- Insider Risk Management roles assigned
- HR data connector configured (recommended)
- Investigation team trained
- Privacy settings reviewed with Legal
Step 1: Enable Insider Risk Management
Portal Path: Microsoft Purview > Insider risk management > Settings
- Navigate to Microsoft Purview Compliance Portal
- Go to Insider risk management
- Complete initial setup wizard:
- Accept terms and conditions
- Configure basic settings
- Navigate to Settings for detailed options
Step 2: Configure Analytics
Portal Path: Insider risk management > Settings > Analytics
- Go to Settings > Analytics
- Enable Insider risk analytics
- Wait 24-48 hours for initial analysis
- Review analytics dashboard for:
- Potential data leaks
- Security policy violations
- Risky user activity patterns
Step 3: Create Insider Risk Policies
Portal Path: Insider risk management > Policies > + Create policy
Policy 1: Data Theft by Departing Users
- Click + Create policy
- Template: Data theft by departing users
- Policy name:
FSI-DepartingUser-DataTheft - Users and groups: All users or Priority user groups
- Priority content:
- SharePoint sites (sensitive sites)
- Sensitivity labels (Confidential, MNPI)
- Sensitive info types (Financial SITs)
- Triggering event: HR connector (resignation date) or Microsoft Entra ID deletion
- Indicators:
- Downloading content from SharePoint
- Sending email with attachments outside org
- Uploading files to cloud storage
- Printing documents
- Copying to USB
- Click Create policy
Policy 2: Data Leaks (General)
- Click + Create policy
- Template: Data leaks
- Policy name:
FSI-DataLeaks-General - Users: All users
- Priority content: Sensitivity labels, Sensitive info types
- Indicators:
- Email to external recipients
- File sharing externally
- Endpoint exfiltration
- Cumulative exfiltration
- Policy settings: Include DLP policy matches as risk indicators
- Click Create policy
Policy 3: Security Policy Violations
- Click + Create policy
- Template: Security policy violations
- Policy name:
FSI-SecurityViolations - Indicators:
- Security alert indicators
- Defender for Endpoint alerts
- Failed authentication attempts
- Risky sign-in behavior
- Users: Priority users (agent administrators, developers)
- Click Create policy
Policy 4: Agent-Related Insider Risk
- Click + Create policy
- Template: Custom policy
- Policy name:
FSI-AgentRelated-InsiderRisk - Triggering event: Activity-based
- Indicators:
- Access to sensitive SharePoint sites (agent knowledge sources)
- Bulk download of agent-related content
- Modification of agent configurations
- Sharing agent access with unauthorized users
- Priority content: Agent knowledge base sites, Copilot Studio projects
- Click Create policy
Step 4: Configure Priority User Groups
Portal Path: Insider risk management > Settings > Priority user groups
- Go to Settings > Priority user groups
- Click + Create priority user group
- Create groups:
| Group Name | Users | Purpose |
|---|---|---|
| FSI-HighRiskUsers | Departing + PIP users | Enhanced monitoring |
| FSI-AgentAdmins | Power Platform admins | Agent access monitoring |
| FSI-TradingFloor | Trading staff | MNPI protection |
| FSI-CustomerData | Client-facing staff | NPI protection |
Step 5: Configure Data Connectors
Portal Path: Insider risk management > Settings > Data connectors
- Go to Settings > Data connectors
- Configure HR connector:
- Configure Azure Logic App or API
- Map fields (user ID, resignation date, termination date)
- Test connection
- Configure additional connectors as needed
Step 6: Configure Investigation Settings
Portal Path: Insider risk management > Settings > Investigation
- Go to Settings > Investigation
- Configure:
- Case name format: Auto-generate or custom
- Reviewer notifications: Email on new alerts
- Investigation duration: Track SLAs
- Evidence collection:
- Collect activity explorer data
- Preserve audit logs
- Enable content preview (with privacy controls)
Step 7: Set Up Alert Workflow
Portal Path: Insider risk management > Alerts
- Navigate to Alerts tab
- Configure alert triage:
- Needs review: Initial state
- Confirmed: Escalate to case
- Dismissed: False positive (document reason)
-
Resolved: No further action needed
-
Configure escalation SLAs:
- Low/Medium alerts: 48-hour review
- High/Critical alerts: 4-hour review
- Confirmed: Create case with investigator assignment
Back to Control 1.12 | PowerShell Setup | Verification Testing | Troubleshooting
Updated: January 2026 | Version: v1.2