Portal Walkthrough: Control 1.17 - Endpoint Data Loss Prevention (Endpoint DLP)
Last Updated: February 2026 Portal: Microsoft Purview, Microsoft Defender for Endpoint Estimated Time: 4-6 hours for initial deployment
Prerequisites
- Microsoft 365 E5 or equivalent license
- Microsoft Defender for Endpoint deployed
- Purview Compliance Admin role
- Devices onboarded to Defender for Endpoint
Step-by-Step Configuration
Step 1: Verify Device Onboarding
- Open Microsoft Defender Portal
- Navigate to Assets > Devices
- Verify target devices appear with "Active" status
- For new devices, follow onboarding process via:
- Microsoft Intune
- Group Policy
- Local script
Step 2: Enable Endpoint DLP
- Open Microsoft Purview
- Navigate to Data loss prevention > Endpoint DLP settings
- Enable Endpoint DLP
- Configure global settings:
- Browser restrictions (Chrome, Firefox, Edge)
- Unallowed apps list
- Cloud services restrictions
Step 3: Configure Restricted Applications
- In Endpoint DLP settings > Restricted apps
- Add unauthorized applications:
- Telegram.exe - Discord.exe - WhatsApp.exe - Dropbox.exe (consumer) - GoogleDrive.exe (consumer) - Configure action: Block or Audit
Step 4: Configure USB/Removable Media Restrictions
- Navigate to Endpoint DLP settings > Device properties
- Configure allowed USB devices:
- Add approved hardware IDs (corporate-encrypted drives)
- Block all other removable storage
- Set action per zone:
- Zone 1: Audit
- Zone 2: Block with override
- Zone 3: Block (no override)
Step 5: Create Endpoint DLP Policy
- Navigate to Data loss prevention > Policies
- Create new policy:
- Name:
FSI-Endpoint-DLP-Zone3 - Location: Devices
- Conditions: Sensitive info types (financial data)
- Configure actions:
- USB transfer: Block
- Cloud upload: Block
- Print: Audit
- Clipboard: Block to unallowed apps
- Configure user notifications and policy tips
Step 6: Enable Just-in-Time Protection
- In Endpoint DLP settings
- Enable Always audit file activities for devices
- Configure offline cache for policy enforcement
Step 7: Enable Browser-Based DLP for Edge
- Navigate to Microsoft Purview Portal (https://purview.microsoft.com)
- Go to Solutions > Data loss prevention > Policies
- Create or edit a DLP policy
- In Locations, add Microsoft Edge for Business as a monitored location
- Configure policy rules to detect sensitive information types in browser interactions with AI web apps
- Set actions to Block, Warn, or Audit when sensitive data is detected in AI app text fields
No Device Onboarding Required
Browser-based DLP in Edge for Business operates independently of Defender for Endpoint device onboarding. This provides immediate DLP protection for AI web app usage without waiting for full MDE deployment.
Step 8: Configure Network Data Security
- Navigate to Microsoft Entra Admin Center (https://entra.microsoft.com)
- Go to Global Secure Access > Security profiles
- Create or edit a security profile
- Add DLP policy references to enforce sensitive data detection on network traffic
- Configure traffic filtering rules to monitor connections to known AI service endpoints
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| USB Transfer | Audit | Block with override | Block |
| Cloud Upload | Audit | Block with override | Block |
| Allowed | Audit | Block | |
| Clipboard | Allowed | Audit to unallowed | Block |
| Bluetooth | Allowed | Block | Block |
| Network Share | Audit | Audit | Block to unauthorized |
| Browser DLP (Edge) | Audit | Block with override | Block |
| Network DLP (GSA) | Not required | Recommended | Required |
FSI Example Configuration
Endpoint DLP Policy: FSI-Trading-Endpoints
Scope:
Device Groups: Trading Floor Workstations
Users: Trading Department
Protected Content:
- SSN (U.S. Social Security Number)
- Credit Card Number
- Bank Account Number (U.S.)
- Custom: FSI-CustomerAccountNumber
Restrictions:
USB Storage:
Action: Block
Override: Not allowed
Notification: "USB transfer of customer data is prohibited"
Cloud Services:
Action: Block
Services: Personal Dropbox, Google Drive, iCloud
Override: Not allowed
Print:
Action: Audit
Log: All print operations with sensitive data
Clipboard:
Action: Block to restricted apps
Restricted: Personal email, messaging apps
Notifications:
User: Policy tip with explanation
Admin: Alert on block events
Validation
After completing these steps, verify:
- Devices appear in Purview with healthy status
- USB transfer of labeled content is blocked/audited
- Cloud upload to unauthorized services triggers action
- User receives policy tip notification
- Events appear in Activity Explorer
Back to Control 1.17 | PowerShell Setup | Verification Testing | Troubleshooting