{"id":397,"date":"2026-05-05T10:48:17","date_gmt":"2026-05-05T10:48:17","guid":{"rendered":"https:\/\/myallcodes.in\/?p=397"},"modified":"2026-05-05T10:48:19","modified_gmt":"2026-05-05T10:48:19","slug":"microsoft-365-learning-day-23","status":"publish","type":"post","link":"https:\/\/myallcodes.in\/index.php\/2026\/05\/05\/microsoft-365-learning-day-23\/","title":{"rendered":"Microsoft 365 Learning \u2013 Day 23"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Insider Risk Management with Microsoft Purview Insider Risk Management<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfaf Objective<\/h2>\n\n\n\n<p>To detect and manage <strong>insider threats<\/strong> using Microsoft Purview.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\udde0 What is Insider Risk Management?<\/h1>\n\n\n\n<p>Microsoft Purview Insider Risk Management helps organizations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect risky user activities<\/li>\n\n\n\n<li>Prevent data leaks<\/li>\n\n\n\n<li>Investigate suspicious behavior<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udee0\ufe0f Prerequisites<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft 365 E5 \/ Insider Risk license<\/li>\n\n\n\n<li>Access to Purview Compliance Portal<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udd10 Step 1: Open Insider Risk Management<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to: <a href=\"https:\/\/compliance.microsoft.com\">https:\/\/compliance.microsoft.com<\/a><\/li>\n\n\n\n<li>Navigate to: <code>Insider Risk Management<\/code><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\u2699\ufe0f Step 2: Configure Settings<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Set up:\n<ul class=\"wp-block-list\">\n<li>Privacy settings<\/li>\n\n\n\n<li>Data sharing options<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Enable audit logs<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udccb Step 3: Create Risk Policy<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Click <strong>Create Policy<\/strong><\/li>\n\n\n\n<li>Choose template:<\/li>\n<\/ol>\n\n\n\n<p>Examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data theft<\/li>\n\n\n\n<li>Departing employee risk<\/li>\n\n\n\n<li>Security policy violations<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83c\udfaf Step 4: Define Users &amp; Scope<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Select users or groups<\/li>\n\n\n\n<li>Define monitoring scope<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udcca Step 5: Configure Indicators<\/h1>\n\n\n\n<p>Examples:<\/p>\n\n\n\n<p>\u2714 Large file downloads<br>\u2714 Sending sensitive emails<br>\u2714 Uploading data externally<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udea8 Step 6: Set Alerts<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define thresholds<\/li>\n\n\n\n<li>Enable notifications<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\uddea Step 7: Test Policy<\/h1>\n\n\n\n<p>Simulate:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data download<\/li>\n\n\n\n<li>External sharing<\/li>\n<\/ul>\n\n\n\n<p>\u2714 Alerts should trigger<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udd0d Step 8: Investigate Alerts<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to: <code>Alerts \u2192 Cases<\/code><\/li>\n\n\n\n<li>Review:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User activity<\/li>\n\n\n\n<li>Risk score<\/li>\n\n\n\n<li>Timeline<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udca1 Real-World Scenario<\/h1>\n\n\n\n<p>Employee planning to leave company:<\/p>\n\n\n\n<p>\u2714 Downloads sensitive data<br>\u2714 Shares files externally<\/p>\n\n\n\n<p>\ud83d\udc49 System detects unusual behavior and alerts admin<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\u2705 Key Takeaways<\/h1>\n\n\n\n<p>\u2714 Detect insider threats<br>\u2714 Monitor risky activities<br>\u2714 Protect sensitive data<br>\u2714 Strengthen internal security<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\udde0 Conclusion<\/h1>\n\n\n\n<p>Microsoft Purview Insider Risk Management is a critical tool for identifying and mitigating risks originating from within the organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Insider Risk Management with Microsoft Purview Insider Risk Management \ud83c\udfaf Objective To detect and manage insider threats using Microsoft Purview. \ud83e\udde0 What is Insider Risk Management? Microsoft Purview Insider Risk Management helps organizations: \ud83d\udee0\ufe0f Prerequisites \ud83d\udd10 Step 1: Open Insider Risk Management \u2699\ufe0f Step 2: Configure Settings \ud83d\udccb Step 3: Create Risk Policy Examples: \ud83c\udfaf\u2026 <span class=\"read-more\"><a href=\"https:\/\/myallcodes.in\/index.php\/2026\/05\/05\/microsoft-365-learning-day-23\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-397","post","type-post","status-publish","format-standard","hentry","category-power-shell-scripts"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":1,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/397\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}