Getting started with Microsoft DLP IR integration for data loss prevention
-
- UpdatedJan 30, 2025
- 3 minutes to read
- Yokohama
- Security Operations
Getting started with Microsoft DLP IR integration for data loss prevention
Review the following information before you start setting up your Microsoft DLP IR integration for data loss prevention.
API | Permission name | Type | Description | Required for which ServiceNow functionality? | Is Admin consent required? |
---|---|---|---|---|---|
Office 365 Management API | ActivityFeed.ReadDlp | Application | Read DLP policy events including detected sensitive data. | To ingest the DLP events from MSFT Purview to ServiceNow. Note: This permission is a must to get the MSFT data into ServiceNow. |
Yes |
Microsoft Graph API | Files.Read.All | Application | Read files in all site collections that you can access. | Download File: To download the attachment on the ServiceNow instance that caused the DLP event from OneDrive or SharePoint Note: This is optional. You can skip this API permission if you don't want to allow the
analysts to download the attachment that caused the DLP event. |
Yes |
Mail.Read | Application | Read mail in all mailboxes. | Download File: To download the email content (body and attachment) on the ServiceNow instance that caused the DLP event from Exchange. Note: This is optional. You can skip this API permission if you don't want to
allow the analysts to download the email content (body, attachment) that caused the DLP event. |
Yes | |
User.Read | Delegated | Sign in and read user profile. | This is the default permission that will be available for all new applications. | No |
Detected Sensitive Information (Optional)
The match content is stored externally in Azure Blob Storage or Amazon S3 bucket and will be pulled from external storage when the user views an incident.
Any one of the following permissions are required if the users would like to view Match Content/Detected Sensitive Information in DLP Core application:
- If you are a Microsoft Azure user, you must have the role Storage Blob Data Contributor to read, write, and delete blobs on Azure Storage.
- If you are an Amazon S3 user, you must create a policy which gives list, read, write, and delete access for the object in Amazon S3 Storage.