Module 4 - Power Platform Data Loss Prevention Policies
Module 4 - Power Platform Data Loss Prevention Policies
Microsoft
Services
Conditions and Terms of Use
Microsoft Confidential
This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is
provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or
software included in such packages is strictly prohibited.
The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether
express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-
infringement.
Training package content, including URLs and other Internet website references, is subject to change without notice. Because Microsoft must
respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft
cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies,
organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association
with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
They can act as guardrails to help prevent users from unintentionally exposing the data.
DLP policies can be scoped at the environment and tenant level offering flexibility to craft policies that are sensible and do not
block productivity.
DLP policies enforce rules of what connectors can be used together by classifying connectors as either Business, Non-Business
and Blocked.
Simply, if you put a connector in the business data only group, it can only be used with other connectors from that group in the
same app/flow.
Block third-party connectors where they can’t be used where a policy is applied to the environment level.
View Policies at
Your Tenant
• DLP policies are still managed from
Power Platform admin center
https://admin.powerplatform.micr
osoft.com/dlp
DLP Policies Scopes
There are three scope types in Power Platform DLP policies:
Apply to ALL Apply to ONLY selected Apply to ALL
environments environments environments EXCEPT
DLP Scopes If you are only an environment administrator, you will see a selection to
choose one of your environments to associate with the DLP policy.
If you are a tenant administrator, you will have the ability to apply to
• Create new DLP policy for default environment scope only by running below
command
• New-AdminDlpPolicy -DisplayName “Default DLP" -EnvironmentName Default-c3084e53-f35c-4fce-bc8c-
799d5bbe2814
Step 1) Create DLP Policy for Default
Environment Using PowerShell
Update Existing
DLP Policy using
PowerShell
Step 1) Get
DLP Policies
• Run Windows PowerShell as an
administrator
• Add Power Platform Admin account
(global admin) by running below
command
• Add-PowerAppsAccount
• This command will prompt a
window to type username and
password, use global admin
credentials then sign-in.
• Type command to get tenant’s
policies
• Get-AdminDlpPolicy
End of Lab Exercise
© 2015 Microsoft Corporation. All rights reserved.