Information protection in Windows overview

Applies to:

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace.

Microsoft Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. This solution is delivered and managed as part of the unified Microsoft 365 information protection suite.

Microsoft Defender ATP applies the following methods to discover, classify, and protect data:

  • Data discovery - Identify sensitive data on Windows devices at risk
  • Data classification - Automatically classify data based on common Microsoft Information Protection (MIP) policies managed in Office 365 Security & Compliance Center. Auto-classification allows you to protect sensitive data even if the end user hasn’t manually classified it.
  • Data protection - Windows Information Protection (WIP) as outcome of Azure Information Protection label

Data discovery and data classification

Microsoft Defender ATP automatically discovers files with sensitivity labels and files that contain sensitive information types.

Sensitivity labels classify and help protect sensitive content.

Sensitive information types in the Office 365 data loss prevention (DLP) implementation fall under two categories:

  • Default
  • Custom

Default sensitive information types include information such as bank account numbers, social security numbers, or national IDs. For more information, see What the sensitive information type look for.

Custom types are ones that you define and is designed to protect a different type of sensitive information (for example, employee IDs or project numbers). For more information see, Create a custom sensitive information type.

When a file is created or edited on a Windows device, Microsoft Defender ATP scans the content to evaluate if it contains sensitive information.

Turn on the Azure Information Protection integration so that when a file that contains sensitive information is discovered by Microsoft Defender ATP though labels or information types, it is automatically forwarded to Azure Information Protection from the device.

Image of settings page with Azure Information Protection

The reported signals can be viewed on the Azure Information Protection – Data discovery dashboard.

Azure Information Protection - Data discovery dashboard

This dashboard presents a summarized discovery information of data discovered by bothMicrosoft Defender ATP and Azure Information Protection. Data from Microsoft Defender ATP is marked with Location Type - Endpoint.

Image of Azure Information Protection - Data discovery

Notice the Device Risk column on the right, this device risk is derived directly from Microsoft Defender ATP, indicating the risk level of the security device where the file was discovered, based on the active security threats detected by Microsoft Defender ATP.

Click on a device to view a list of files observed on this device, with their sensitivity labels and information types.

Note

Please allow approximately 15-20 minutes for the Azure Information Protection Dashboard Discovery to reflect discovered files.

Log Analytics

Data discovery based on Microsoft Defender ATP is also available in Azure Log Analytics, where you can perform complex queries over the raw data.

For more information on Azure Information Protection analytics, see Central reporting for Azure Information Protection.

Open Azure Log Analytics in Azure Portal and open a query builder (standard or classic).

To view Microsoft Defender ATP data, perform a query that contains:

InformationProtectionLogs_CL 
| where Workload_s == "Windows Defender" 

Prerequisites:

  • Customers must have a subscription for Azure Information Protection.
  • Enable Azure Information Protection integration in Microsoft Defender Security Center:
    • Go to Settings in Microsoft Defender Security Center, click on Advanced Settings under General.

Data protection

Endpoint data loss prevention

For data to be protected, they must first be identified through labels.

Sensitivity labels are created in Office 365 Security & Compliance Center. Microsoft Defender ATP then uses the labels to identify endpoints that need Windows Information Protection (WIP) applied on them.

When you create sensitivity labels, you can set the information protection functionalities that will be applied on the file. The setting that applies to Microsoft Defender ATP is the Endpoint data loss prevention.

For the endpoint data loss prevention, you'll need to turn on the Endpoint Data loss prevention and select Enable Windows end point protection (DLP for devices).

Image of Office 365 Security and Compliance sensitivity label

Once, the policy is set and published, Microsoft Defender ATP automatically enables WIP for labeled files. When a labeled file is created or modified on a Windows device, Microsoft Defender ATP automatically detects it and enables WIP on that file if its label corresponds with Office Security and Compliance (SCC) policy.

This functionality expands the coverage of WIP to protect files based on their label, regardless of their origin.

For more information, see Configure information protection in Windows.

Auto labeling

Auto labeling is another way to protect data and can also be configured in Office 365 Security & Compliance Center. Windows automatically detects when an Office file, PDF, CSV or TXT files are being created on a device and inspects it based on context to identify sensitive information types.

Those information types are evaluated against the auto-labeling policy. If a match is found, it is processed in the same way as if the file was labeled; the file is protected with Endpoint data loss prevention.

Note

Auto-labeling is supported in Office apps only when the Azure Information Protection unified labeling client is installed. When sensitive content is detected in email or documents matching the conditions you choose, a label can automatically be applied or a message can be shown to users recommending they apply it themselves.

For more information, see Configure information protection in Windows.