Insider risk management

Note

Microsoft 365 compliance is now called Microsoft Purview and the solutions within the compliance area have been rebranded. For more information about Microsoft Purview, see the blog announcement.

Increasingly, employees have more access to create, manage, and share data across a broad spectrum of platforms and services. In most cases, organizations have limited resources and tools to identify and mitigate organization-wide risks while also meeting compliance requirements and employee privacy standards. These risks may include data theft by departing employees and data leaks of information outside your organization by accidental oversharing or malicious intent.

Microsoft Purview Insider Risk Management uses the full breadth of service and 3rd-party indicators to help you quickly identify, triage, and act on risky user activity. By using logs from Microsoft 365 and Microsoft Graph, insider risk management allows you to define specific policies to identify risk indicators. After identifying the risks, you can take action to mitigate these risks.

Watch the videos below to learn how insider risk management can help your organization prevent, detect, and contain risks:

Insider risk management solution & development:


Insider risk management workflow:

Configure insider risk management

Use the following steps to configure insider risk management for your organization:

Insider risk solution insider risk management steps.

  1. Learn about insider risk management
  2. Plan for insider risk management and verify licensing
  3. Configure insider risk management settings
  4. Configure permissions and policy prerequisites & connectors
  5. Create and configure insider risk management policies

More information about insider risk management