Oversharing Popups Playbook for Outlook desktop⚓︎
Introduction⚓︎
Emails containing a sensitivity label or sensitive information must be shared with intended recipients only. Previously available in AIP add-in, Oversharing popups is now avaialble in DLP for E5 users which enables an admin to show popups to end users sharing such labeled or sensitive emails in Outlook desktop and educate them about your organization’s policies. These can be configured to show a warning popup to users to verify the content that they're sending, or request them for business justification before sending out the email, or block them from sending a particularly labeled or sensitive email. For more information about custom settings in AIP Add-in, view our admin guide for the AIP client.
Scenarios in Scope⚓︎
Get a list of existing Oversharing Popup settings⚓︎
To determine whether your organization’s current configuration of oversharing popups in AIP add-in is available for preview, please run the following PowerShell cmdlets. You will need an administrator email with Compliance administrator or Global administrator role and the <policy name>
that is configured with oversharing popups.
- Connect to Security & Compliance PowerShell using an administrator email (Link)
- Once you have connected to the Security & Compliance PowerShell, get the label policy configuration:
PS C:\> (Get-LabelPolicy -Identity Global).settings
The PowerShell terminal will show the label policy configuration that includes all custom settings for that policy.
Scenarios in-scope for preview⚓︎
Previously available in AIP add-in, administrators can now use DLP to show popup messages to end users in Outlook desktop for windows for the scenarios below: 1) Warning messages that prompt users to verify the content that they're sending 2) Emails that require justification or explicit acknowledgement before they can be sent (DLP override) 3) Blocked emails that cannot be sent out
AIP Add-In Custom Setting | Configuration Scenario |
---|---|
OutlookWarnUntrustedCollaborationLabel / OutlookWarnTrustedDomains | #1 Warn Popup and Trusted Domains |
OutlookJustifyUntrustedCollaborationLabel / OutlookJustifyTrustedDomains | #2 Justify Popup and Trusted Domains |
OutlookBlockUntrustedCollaborationLabel / OutlookBlockTrustedDomains | #3 Block Popup and Trusted Domains |
OutlookUnlabeledCollaborationAction | #4 Unlabeled Content Predicate for any Popup |
OutlookOverrideUnlabeledCollaborationExtensions | #5 File Extension Predicate for any Popup |
OutlookCollaborationRule | #6 Customized Oversharing popups |
General guidance for DLP Configuration:⚓︎
Create and deploy a data loss prevention policy 1. Choose what you want to monitor 2. Choose the Policy Scoping(preview) 3. Choose where you want to monitor 4. Choose the conditions that must be matched for a policy to be applied to an item 5. Choose the action to take when the policy conditions are met For PowerShell configuration, refer to the PowerShell reference
DLP policies and rules can also be configured in PowerShell. To configure oversharing popups using PowerShell, first create a DLP policy and add DLP rules for each warn, justify or block popup type.
- Configure and scope your DLP Policy using New-DlpCompliancePolicy
- Configure each oversharing rule using New-DlpComplianceRule
To configure a new DLP policy:
PS C:\> New-DlpCompliancePolicy -Name <DLP Policy Name> -ExchangeLocation All
The sample DLP policy is scoped to all users in your organization. Scope your DLP Policies using -ExchangeSenderMemberOf
and -ExchangeSenderMemberOfException
.
Configuration Steps⚓︎
To get create and deploy DLP policies, view the Microsoft Purview DLP docs and create a policy matching scenario 2. For each AIP matched configuration, follow the "Steps to create policy for scenario 2" with the following modifications:
1. Warn Popup with Trusted Domains⚓︎
Skip step 17 and follow the rest of the steps. This ensures block access for everyone is not configured.
Once deployed, users see this warn popup on send:
To configure a new DLP rule:
PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator="Or";name="Default";labels=@(@{name=<Label GUID>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com")
2. Justify Popup with Trusted Domains⚓︎
Follow all steps and replace step 20 with the following:
- Select Allow overrides from M365 services and Require a business justification to override. (optional) To show the acknowledgement option, select Require the end user to explicitly acknowledge the override.
Once deployed, users see this justify popup (with optional acknowledgement option) on send:
To configure a new DLP rule:
PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -NotifyAllowOverride "WithJustification"
3. Block Popup with Trusted Domains⚓︎
Follow all steps.
Once deployed, users see this block popup on send:
To configure a new DLP rule:
PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com")
Info
In Outlook, untrusted recipients are listed in the policy tip while the email is drafted. Previously in AIP, untrusted recipients were shown in the popup dialogue.
4. Unlabeled Content/Message/Attachment Predicate for any Popup (Preview)⚓︎
UX instructions a. Choose “Content is not labeled” b. Choose the target scope for this predicate evaluation – i. Message & attachment (default): It helps detect if the entire email envelope is unlabeled. ii. Message only: It helps detect if message body is unlabeled. iii. Attachment only: It helps detect if any of the attachments is unlabeled.
PowerShell instructions:
i. Set-DlpComplianceRule -ContentIsNotLabeled $true
ii. Set-DlpComplianceRule -MessageIsNotLabeled $true
iii. Set-DlpComplianceRule -AttachmentIsNotLabeled $true
5. File Extension Predicate for any Popup (Preview)⚓︎
UX instructions a. Choose “File extension is” b. Input the extensions you wish to detect or exempt.
PowerShell instructions: Set-DlpComplianceRule -ContentExtensionMatchesWords docx
6. Customized Oversharing Popups (Preview)⚓︎
Create a JSON file (in UTF-8 encoded format with plain text content without any comments) for the customized Oversharing popups:
The above content could be uploaded for DLP using below options:
UX instructions:
PowerShell instructions:
$content = Get-Content "path to the JSON file" -Encoding utf8| Out-String
New/Set-DlpComplianceRule -Name <Rule_name> -Policy <Policy_name> -NotifyPolicyTipCustomDialog $content -NotifyPolicyTipDisplayOption Dialog
When the above cmdlet is executed, there will be some validation checks on the content passed through the JSON like char limit, formatting, mandatory presence of 1 default language, etc and the admin will be notified of any errors for correction.
Outlook desktop – custom pop-up visualization⚓︎
Based on the JSON file uploaded by the admin, Outlook will display the oversharing pop-up when users click on the (1) override link next to the policy tip or by clicking on (1) send. Some aspects of the dialog will vary depending on whether the matched rule was configured as a block or warn, also if there were overrides set.
Features and limitations of the dialog⚓︎
- The dialog title, body and override justifications options can be customized using the JSON file. Basic text formatting is allowed: bold, underline, italic and line break. Justification options can be up to 3 plus an option for free-text input.
- The text for Acknowledgement and False positive overrides is not customizable.
- Below is the required structure of the JSON files that admins will create to customize the dialog for matched rules. The Keys are all case sensitive. Formatting and dynamic tokens for matched conditions can only be used in the Body key.
Keys | Mandatory? | Rules/Notes |
---|---|---|
{} | Y | Container |
LocalizationData | Y | Array that contains all the language options. |
Language | Y | Specify language code: "en", "es", "fr", "de". |
Title | Y | Specify the title for the dialog. Limited to 80 characters. |
Body | Y | Specify the body for the dialog. Limited to 1000 characters. Dynamic tokens for matched conditions can be added in the body. |
Options | N | Up to three options can be included. One more can be added by setting HasFreeTextOption = true. |
HasFreeTextOption | N | This can be true or false, true will display a text box as a las option in the dialog. |
DefaultLanguage | Y | Must be one of the languages defined within the LocalizationData key. The user must include at least one. |
Dynamic tokens and text formatting in custom Oversharing dialog⚓︎
DCS sends Outlook the matched conditions data for each rule. The dynamic tokens for matched recipients, attachments and labels should be included in the DCS response to Outlook to be displayed. This can be reviewed in the fiddler trace.
Clause | Translation |
---|---|
%%MatchedRecipientsList%% | Display the matched recipients for a given DLP rule |
%%MatchedLabelName%% | Display the matched labels for a given DLP rule |
%%MatchedAttachmentName%% | Display the matched attachments for a given DLP rule |
Bold format | |
Italic format | |
Underline | |
Introduce a line break |
Custom Popup Example #1: Block users from sending emails with override options. Display matched recipients⚓︎
Popup Dialog
JSON File
Custom Popup Example #2: Warn users from sending emails with override options. Display matched recipients, label and attachment names.⚓︎
Popup Dialog
JSON File
7. Content/Message/Attachment contains Predicate for any Popup (Preview)⚓︎
UX instructions a. Choose “Content contains” b. Input the sensitivity labels or Sensitive info types that you want to detect c. Select the scope that you want to detect the above on - i. Message or attachment ii. Message only iii. Attachments only
PowerShell Instructions
Additional Customization Features⚓︎
Customize Policy Tips⚓︎
In DLP Rule configuration, select “Customize the policy tip text” and enter the custom text option.
Localize your custom policy tips with Set-DlpComplianceRule cmdlet
and -NotifyPolicyTipCustomTextTranslations in Security & Compliance PowerShell.
Customize Compliance URL for “Learn More”⚓︎
In DLP Rule configuration, select “Provide a compliance URL for the end user to learn more about your organization’s policies.”
When a user clicks “Learn more” in the popup body, the user will be redirected to the link configured.
Acknowledgement Option⚓︎
In DLP Rule configuration, select “Allow overrides from M365 services” and “Require the end user to explicitly acknowledge the override” to enable the new acknowledgement option.
If “Require a business justification to override” is selected, the business justification radio button options will be enabled in the popup UX. In Outlook, the acknowledgement option requires the user to explicitly check the box to enable send. Please note that it does NOT override DLP policy/rule at Exchange:
Features supported by DLP Oversharing dialog for E5 users⚓︎
- DLP Predicates
- Content/Message/Attachment contains Sensitive Info Types (Works for email and unencrypted Microsoft 365 and PDF files. The new predicates Message contains & Attachment contains dont support advanced classifiers)
- Content contains sensitivity labels (Works for email and Office & PDF file types)
- Content/Message/Attachment is not labeled
- Content is shared
- Sender is
- Sender is member of (Only Distribution lists, Azure-based Dynamic Distribution groups, and email-enabled Security groups are supported.)
- Sender domain is
- Recipient is
- Recipient is a member of (Only Distribution lists, Azure-based Dynamic Distribution groups, and email-enabled Security groups are supported.)
- Recipient domain is
- Subject contains words
- File extension is
- Advanced classifiers like Named Entities, Exact Data Match, Trainable Classifiers, Cred scan.
- Customizable Oversharing Popup with a custom title, body and dynamic variables as mentioned above in the table.