Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Security»Data Loss Prevention in Microsoft Teams
    Security

    Data Loss Prevention in Microsoft Teams

    Peter KlapwijkBy Peter KlapwijkMarch 25, 2019Updated:December 3, 20195 Mins Read

    Since about a week Data Loss Prevention (DLP) is available in Microsoft Teams, for chat and channel messages. Data Loss Prevention in Teams will enable you to identify, monitor, and automatically protect sensitive information. With DLP we can create policies to prevent sensitive information (like credit card numbers, social security numbers, or health records) from being shared or leaking unintentionally. Policies will apply to both messages shared in private chat and channel conversations as stated in this article.
    DLP policies were already available for documents saved in Teams which are stored in a SharePoint library, this is now expanded to the chat and channel messages.

    In this article I setup Data Loss Prevention for internal sharing because of the easy testing with internal users, but probably in a production environment you will set this up to prevent sharing sensitive information with external users.
    I want the users get notified when a low value of sensitive information is shared, but dont want to block sharing this.
    I want to block sharing a high volume of sensitive information. In this case the low value is set to one and everything above is counted as high volume.

    Setup a Data Loss Prevention Policy

    Data Loss Prevention Policies are created from the Security and Compliance Center.

    1. Open the Security and Compliance Center – click Data loss prevention – Policy
    2. Click Create a policy

    We have the option to choose a DLP Policy template with pre-configured settings or create a custom policy. In this example I will test the policy using credit card numbers, so I choose Financial, US Financial Data and click Next.

    1. Give your DLP Policy a Name
    2. Fill in a description (Optional)
    3. Click Next

    On the next tab we need to choose the locations on which the DLP policy is applied. Choose Let me choose specific locations if you only want the policy to apply to Microsoft Teams and click Next.
    If you choose the default option, the policy is applied to Exchange, Teams, SharePoint and OneDrive.
    Click Next.

    1. Switch off all locations except Teams
    2. Click Next

    By default the policy is applied to all Teams accounts (private channels and Team channels), if needed you can choose the accounts yourself or exclude accounts.

    1. Check Use advanced settings
    2. Click Next

    The DLP policy contains two rules, one for low volume of content detected and one for high volume. A rule contains conditions and actions that define the protection requirements. You can edit all conditions and actions.
    Click Edit rule under Low volume to edit the low volume of content detected rule.

    The first thing we can edit is sensitive info type. By default the instance count in the low content rule is set from 1 to 9, for testing I changed them to 1 (min) and 1 (max).
    Under Content is shared, I set only with people inside my organization for testing. You probably leave this option set to with people outside my organization if you want to prevent sharing sensitive content with external users.

    If we scroll further down we see no actions are taken for low content detected (the content is not blocked), but user notifications are show in the chat client.
    Scroll down and click Save.

    We also need to edit the high volume of content detected rule. Because I set the instance count in the low content volume rule to 1, I need to set the minimum instance count in this rule to two, or we create a gap in the instance count.
    Again for testing I set Content is shared to people inside my organization for testing.

    For the high content rule an action is set to block sharing and access to sensitive content. I set the option to Everyone for testing only.
    This action needs to be set to actively block sharing sensitive information (credit card numbers in my case) in the Teams chat and private channels.

    If we scroll to the bottom of the rule we have the option to allow users to override the policy and share content (but require business justification to override) and we have options to send incident reports to administrators. I leave this default.
    Save this rule to return to the Policy settings tab and click Next.

    Check Yes if you want to start using the policy, but maybe it`s a better idea to first test the DLP policy so users can get familiar with DLP.
    Check the option of your choice and click Next.

    Review the settings and when everything is fine click Create.

    At my testing it took some time before the DLP policy was active in Teams.

    End-user experience

    It`s time to have a look at the user experience.
    Open the Teams app and try to send some sensitive information. In my example I tried to share multiple credit card numbers in the HR channel, which are immediately blocked with below message (sorry the printscreen is in Dutch).

    At the side of the other users in the channel who should have previously received the message with the credit card numbers, the message is blocked.

    If I only share one credit card number in a message, the message is not blocked, but only marked in Teams. The other users in the channel see the normal message.

    Depending on the reports settings you set, the user and/ or administrators receives an email report when sensitive information is shared using Teams.

    When working with external (guest) users in Teams, DLP in Teams chat and channels is a good extension of the capabilities we already had with DLP to keep sensitive data secure.
    Unfortunately at this moment it isn`t working as stable as expected. I see not always the creditcard numbers are recognized, so I hope this gets some improvement in the next weeks.

    Azure AD Conditional Access Data Loss Prevention EMS Microsoft 365 Security Teams Windows10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Enable passwordless authentication to Windows 10 with Feitian security keys

    November 30, 2019

    Secure SharePoint Online data

    September 7, 2018

    Enable SSO for Salesforce with Azure AD

    August 22, 2017
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}