Skip to content

Update New-DlpComplianceRule.md #12755

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 19, 2025
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 7 additions & 16 deletions exchange/exchange-ps/exchange/New-DlpComplianceRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -305,31 +305,22 @@ New-DLPComplianceRule -Name "Contoso Rule 1" -Policy "Contoso Policy 1" -Advance

This example uses the AdvancedRule parameter to read the following complex condition from a file: "Content contains sensitive information: "Credit card number OR Highly confidential" AND (NOT (Sender is a member of "Jane's Team" OR Recipient is "adele@contoso.com")).


### Example 4
```powershell
$locations = '[{"Workload":"Applications","Location":"83ef198a-0396-4893-9d4f-d36efbffc8bd","LocationDisplayName":"Purview API Explorer","LocationSource":"Entra","LocationType":"Individual","Inclusions":[{"Type":"Tenant","Identity":"All"}]}]'

New-DlpCompliancePolicy -Name "Test Risky user Entra DLP Policy" -Mode Enable -Locations $locations

New-DlpComplianceRule -Name "Test Risky User Entra DLP Rule" -Policy "Test Risky user Entra DLP Policy" -SharedByIRMUserRisk @("FCB9FA93-6269-4ACF-A756-832E79B36A2A") -RestrictAccess @(@{setting="UploadText";value="Block"}) -GenerateAlert $true -GenerateIncidentReport @("siteadmin") -NotifyUser @("kyra@contoso.onmicrosoft.com")
```

This is an example of a risky user indicator rule.

### Example 5
```powershell
$myEntraAppId = "72e39dca-38f3-4814-b93b-a7ed0a5a4b74"
$myEntraAppId = ""

$myEntraAppName = "Contoso Demo"
$myEntraAppName = ""

$locations = '[{"Workload":"Applications","Location":$myEntraAppId,"LocationDisplayName":$myEntraAppName,"LocationSource":"Entra","LocationType":"Individual","Inclusions":[{"Type":"Tenant","Identity":"All"}]}]'
$locations = "[{`"Workload`":`"Applications`",`"Location`":`"$myEntraAppId`",`"LocationDisplayName`":`"$myEntraAppName`",`"LocationSource`":`"Entra`",`"LocationType`":`"Individual`",`"Inclusions`":[{`"Type`":`"Tenant`",`"Identity`":`"All`"}]}]"

New-DlpCompliancePolicy -Name "Entra DLP Policy for CC" -Mode Enable -Locations $locations
new-dlpcompliancepolicy -Name "Test Entra DLP" -Mode Enable -Locations $locations -EnforecementPlanes @("Entra")

New-DlpComplianceRule -Name "Entra DLP Rule for CC" -Policy "Entra DLP Rule for CC" -ContentContainsSensitiveInformation @{Name = "credit card number"} -GenerateAlert $true -GenerateIncidentReport @("siteadmin") -NotifyUser @("arpitha@contonso.onmicrosoft.com" )-RestrictAccess @(@{setting="UploadText";value="Block"})
new-dlpcompliancerule -Name "Test Entra Rule" -Policy "Test Entra DLP" -ContentContainsSensitiveInformation @{Name = "credit card number"} -GenerateAlert $true -GenerateIncidentReport @("siteadmin") -NotifyUser @("admin@contonso.onmicrosoft.com") -RestrictAccess @(@{setting="UploadText";value="Block"})
```

This is an example of a CCSI rule.
This is an example of applying a CCSI based DLP rule that should be handled by an entra-registered enterprise application in the tenant

## PARAMETERS

Expand Down