Skip to content

Oversharing Popups Playbook⚓︎

Introduction⚓︎

Emails containing a sensitivity label or sensitive information must be shared with intended recipients only. Previously available in AIP add-in, Oversharing popups is now avaialble in DLP for E5 users which enables an admin to show popups to end users sharing such labeled or sensitive emails in Outlook desktop and educate them about your organization’s policies. These can be configured to show a warnign popup to users to verify the content that they're sending, or request them for business justification before sending out the email, or block them from sending a particularly labeled or sensitive email. For more information about custom settings in AIP Add-in, view our admin guide for the AIP client.

Scenarios in Scope⚓︎

Get a list of existing Oversharing Popup settings⚓︎

To determine whether your organization’s current configuration of oversharing popups in AIP add-in is available for preview, please run the following PowerShell cmdlets. You will need an administrator email with Compliance administrator or Global administrator role and the <policy name> that is configured with oversharing popups.

  1. Connect to Security & Compliance PowerShell using an administrator email (Link)
  2. Once you have connected to the Security & Compliance PowerShell, get the label policy configuration:

PS C:\> (Get-LabelPolicy -Identity Global).settings

The PowerShell terminal will show the label policy configuration that includes all custom settings for that policy.

Scenarios in-scope for preview⚓︎

Previously available in AIP add-in, administrators can now use DLP to show popup messages to end users in Outlook desktop for windows for the scenarios below: 1) Warning messages that prompt users to verify the content that they're sending 2) Emails that require justification or explicit acknowledgement before they can be sent (DLP override) 3) Blocked emails that cannot be sent out

AIP Add-In Custom Setting Configuration Scenario
OutlookWarnUntrustedCollaborationLabel / OutlookWarnTrustedDomains #1 Warn Popup and Trusted Domains
OutlookJustifyUntrustedCollaborationLabel / OutlookJustifyTrustedDomains #2 Justify Popup and Trusted Domains
OutlookBlockUntrustedCollaborationLabel / OutlookBlockTrustedDomains #3 Block Popup and Trusted Domains
OutlookUnlabeledCollaborationAction #4 Unlabeled Content Predicate for any Popup
OutlookOverrideUnlabeledCollaborationExtensions #5 File Extension Predicate for any Popup
OutlookCollaborationRule #6 Customized Oversharing popups

General guidance for DLP Configuration:⚓︎

Create and deploy a data loss prevention policy 1. Choose what you want to monitor 2. Choose the Policy Scoping(preview) 3. Choose where you want to monitor 4. Choose the conditions that must be matched for a policy to be applied to an item 5. Choose the action to take when the policy conditions are met For PowerShell configuration, refer to the PowerShell reference

Configuration Steps⚓︎

To get create and deploy DLP policies, view the Microsoft Purview DLP docs and create a policy matching scenario 2. For each AIP matched configuration, follow the "Steps to create policy for scenario 2" with the following modifications:

1. Warn Popup with Trusted Domains⚓︎

Skip step 17 and follow the rest of the steps. This ensures block access for everyone is not configured.

Once deployed, users see this warn popup on send:

image

2. Justify Popup with Trusted Domains⚓︎

Follow all steps and replace step 20 with the following:

  1. Select Allow overrides from M365 services and Require a business justification to override. (optional) To show the acknowledgement option, select Require the end user to explicitly acknowledge the override.

Once deployed, users see this justify popup (with optional acknowledgement option) on send:

image

3. Block Popup with Trusted Domains⚓︎

Follow all steps.

Once deployed, users see this block popup on send:

image

Info

In Outlook, untrusted recipients are listed in the policy tip while the email is drafted. Previously in AIP, untrusted recipients were shown in the popup dialogue.

4. Unlabeled Content Predicate for any Popup⚓︎

UX instructions a. Choose “Content is not labeled” b. Choose the target scope for this predicate evaluation – i. Message & attachment (default): It helps detect if the entire email envelope is unlabeled. ii. Message only: It helps detect if message body is unlabeled. iii. Attachment only: It helps detect if any of the attachments is unlabeled. image

PowerShell instructions: i. Set-DlpComplianceRule -ContentIsNotLabeled $true ii. Set-DlpComplianceRule -MessageIsNotLabeled $true iii. Set-DlpComplianceRule -AttachmentIsNotLabeled $true

5. File Extension Predicate for any Popup⚓︎

UX instructions a. Choose “File extension is” b. Input the extensions you wish to detect or exempt. image

6. Customized Popups⚓︎

Create a JSON file with content for the customized popups:

image

The above content could be uploaded for DLP using below steps:

$content = Get-Content "path to the JSON file" | Out-String

New/Set-DlpComplianceRule -Name <Rule_name> -Policy <Policy_name> -NotifyPolicyTipCustomDialog $content -NotifyPolicyTipDisplayOption Dialog

When the above cmdlet is executed, there will be some validation checks on the content passed through the JSON like char limit, formatting, mandatory presence of 1 default language, etc and the admin will be notified of any errors for correction.

Outlook desktop – custom pop-up visualization⚓︎

Based on the JSON file uploaded by the admin, Outlook will display the oversharing pop-up when users click on the (1) override link next to the policy tip or by clicking on (1) send. Some aspects of the dialog will vary depending on whether the matched rule was configured as a block or warn, also if there were overrides set.

image

Features and limitations of the dialog⚓︎

  1. The title and the body and override justifications options can be customized using the JSON file. Basic text formatting is allowed: bold, underline, italic and line break. Justification options can be up to 3 plus an option for free-text input.
  2. Text is not customizable for Acknowledgement and False positive overrides
  3. In the JSON file, a default language must be included along with other required languages.
  4. Matched recipients, labels and attachment names can be shown in the dialog by entering specific tokens into the JSON file.
  5. Recipients: %%MatchedRecipientsList%%
  6. Labels: %%MatchedLabelName%%
  7. Attachment name: %%MatchedAttachmentName%%

Custom Popup Example #1: Block users from sending emails with override options. Display matched recipients⚓︎

Popup Dialog

image

JSON File

image

Custom Popup Example #2: Warn users from sending emails with override options. Display matched recipients, label and attachment names.⚓︎

Popup Dialog

image

JSON File

image

PowerShell Instructions (Advanced)⚓︎

DLP policies and rules can also be configured in PowerShell. To configure oversharing popups using PowerShell, first create a DLP policy and add DLP rules for each warn, justify or block popup type.

  1. Configure and scope your DLP Policy using New-DlpCompliancePolicy
  2. Configure each oversharing rule using New-DlpComplianceRule

To configure a new DLP policy:

PS C:\> New-DlpCompliancePolicy -Name <DLP Policy Name> -ExchangeLocation All

The sample DLP policy is scoped to all users in your organization. Scope your DLP Policies using -ExchangeSenderMemberOf and -ExchangeSenderMemberOfException.

Parameter Configuration
-ContentContainsSensitiveInformation Configures one or more sensitivity label conditions. This sample includes one. At least one label is mandatory.
-ExceptIfRecipientDomainIs List of trusted domains.
-NotifyAllowOverride "WithJustification" enables justification radio buttons, "WithoutJustification" disables them.
-NotifyOverrideRequirements "WithAcknowledgement" enables the new acknowledgement option. Optional.

Scenario #1 Warn Popup and Trusted Domains⚓︎

To configure a new DLP rule:

PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator="Or";name="Default";labels=@(@{name=<Label GUID>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com")

Scenario #2 Justify Popup and Trusted Domains⚓︎

To configure a new DLP rule:

PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -NotifyAllowOverride "WithJustification"

Scenario #3 Block Popup and Trusted Domains⚓︎

To configure a new DLP rule:

PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com")

Additional Customization Features⚓︎

Customize Policy Tips⚓︎

In DLP Rule configuration, select “Customize the policy tip text” and enter the custom text option.

image

Localize your custom policy tips with Set-DlpComplianceRule cmdlet and -NotifyPolicyTipCustomTextTranslations in Security & Compliance PowerShell.

Customize Compliance URL for “Learn More”⚓︎

In DLP Rule configuration, select “Provide a compliance URL for the end user to learn more about your organization’s policies.”

image

When a user clicks “Learn more” in the popup body, the user will be redirected to the link configured.

image

New Feature: Acknowledgement Option⚓︎

In DLP Rule configuration, select “Allow overrides from M365 services” and “Require the end user to explicitly acknowledge the override” to enable the new acknowledgement option.

image

If “Require a business justification to override” is selected, the business justification radio button options will be enabled in the popup UX. In Outlook, the acknowledgement option requires the user to explicitly check the box to enable send:

image

Additional existing features supported by DLP Oversharing for E5 users⚓︎

Top DLP Predicates - Content contains Sensitive Info Types (Works for email and unencrypted Microsoft 365 and PDF files) - Content contains sensitivity labels (Works for email and Office & PDF file types) - Content is not labeled - Content is shared - Sender is - Sender is member of (Only Distribution lists, Azure-based Dynamic Distribution groups, and email-enabled Security groups are supported.) - Sender domain is - Recipient is - Recipient is a member of (Only Distribution lists, Azure-based Dynamic Distribution groups, and email-enabled Security groups are supported.) - Recipient domain is - Subject contains words Advanced classifiers like Named Entities, Exact Data Match, Trainable Classifiers, Cred scan