
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
In a recent YouTube video, author Jonathan Edwards walks viewers through how to stop employees from stealing company data inside Microsoft 365. Framed as a practical demo, the piece focuses on Microsoft Purview Insider Risk Management and Data Loss Prevention (DLP), with a cameo by Charles Bell, Managing Partner at Hawthorne Bell LLP. Together, they illustrate how policy design, behavioral analytics, and identity safeguards can detect and prevent exfiltration before it harms the business. The tone is instructional, yet the message is clear: security must be proactive and contextual.
Edwards starts by defining Insider Risk Management and explaining the difference between “triggers” and “indicators,” a point that often confuses teams. He then moves into real-world examples, such as sending attachments to personal email, mass downloads from SharePoint, and after-hours access patterns. Importantly, the video shows these scenarios live in Microsoft 365, which helps viewers see how alerts surface and how investigations progress. As a result, the content remains grounded and immediately applicable.
The tutorial clarifies that triggers are the events that start a case, while indicators provide the behavioral context that elevates risk. Edwards demonstrates three policy templates: departing employee (“The Leaver”), external sharing to free domains (“The Oversharer”), and unusual access behavior (“The Curious Colleague”). He also covers detection groups, priority user groups, thresholds, and timeframes to tune sensitivity over specific periods. However, he notes a core tradeoff: tighter thresholds catch more issues but can create alert fatigue if not calibrated with business norms.
Beyond behavior analytics, the video highlights Microsoft Purview DLP as the guardrail that monitors and, when appropriate, blocks risky sharing across Exchange, SharePoint, OneDrive, Teams, and endpoints. Edwards shows how to prioritize content and enforce rules that protect sensitive files in motion and at rest. He also points to endpoint monitoring, including USB activity, and the Chrome Purview extension to close browser gaps. Moreover, complementary identity controls via Microsoft Entra ID Protection enable risk-based Conditional Access, reducing exposure from suspicious sign-ins.
The chaptered walkthrough covers licensing, prerequisites, IRM settings, detection options, and building both template-based and custom policies. Viewers see how to select indicators, set thresholds, and confirm detection logic before turning on enforcement. Edwards recommends starting in audit mode to measure impact and refine rules with real organizational data. This phased approach minimizes disruption and reduces the chance of blocking legitimate workflows.
According to the video, Purview DLP now reaches more locations, including Fabric and Power BI workspaces, some non-Microsoft cloud apps, and on-premises file shares. Insider Risk policies also feature refined templates and improved contextual scoring, which can sharpen signal-to-noise. Additionally, AI-assisted enforcement with Microsoft 365 Copilot is emerging, though teams should test carefully and document governance impacts. Consequently, organizations gain broader coverage—but also face greater responsibility to align policies with privacy and compliance requirements.
Ultimately, Edwards emphasizes balance. Strict rules may block leaks, yet they can erode user trust and slow collaboration if over-applied. Conversely, lenient settings improve productivity but invite blind spots and late detection. The video advises cross-functional governance with Legal, HR, and IT, transparent communication, and ongoing user training. With clear intent, measured rollouts, and continuous tuning, Microsoft 365 customers can reduce insider risk while keeping work moving.
Microsoft 365 data protection, prevent insider data theft, stop employees stealing data, insider threat Microsoft 365, Microsoft Purview DLP, DLP policies Microsoft 365, secure SharePoint and OneDrive, tenant security best practices