| Status | |
| Owner | Hachem Osmani |
| Stakeholders | CISO |
Decision: Option 2 Re-adjusted DLP after Security Team Testing Decision made by: CISO Date: Online Meeting: M365 Workshop: DLP Framework day 1 [On-site & Online] |
Decision on what Data Loss Prevention policies should be activated on day 1 after migration taking into consideration that at the same time, Syensqo is not yet sufficiently mature to deploy DLP with broad enforcement without risk of business disruption.
Option 2: Re-adjusted DLP after Security Team Testing
DLP policies define the rules and detection mechanisms used to identify, monitor, and restrict the unauthorized sharing or exfiltration of sensitive information across Microsoft 365 services. These policies apply content inspection, pattern matching, and classification logic to emails, documents, and chat messages, enforcing actions such as blocking, auditing, or notifying users when sensitive data is at risk. DLP policies act as a core governance layer, ensuring that data handling complies with Syensqo’s security, regulatory, and compliance requirements across all supported workloads.
A policy can contain one or more rules, and each rule can consist of conditions and actions. For each rule, when the conditions are met, the actions are taken automatically. Rules are executed sequentially, starting with the highest-priority rule in each policy.

Copilot responds based on what a user is allowed to access. If SharePoint/OneDrive/Teams permissions are messy (“Everyone” access, legacy broad groups), Copilot can surface information more widely than intended.
Labels and Copilot
OneDrive/SharePoint/Teams sharing
Teams chats
On the device (if Endpoint DLP is enabled)
Option 1: M365 Native Backup
Option 2: 3rd Party Backup (Veeam)
Option 1: Designed DLP
Option 2: Re-adjusted DLP after Security Team Testing
| Name | Description | Option 1: Designed DLP | Option 2: Re-adjusted DLP after Security Team Testing |
| DLP-001-PCI-Exchange | Detects payment card information in Exchange emails sent internally. Notifies the sender with a policy tip to raise awareness of PCI handling requirements. Trusted Microsoft system emails are excluded to prevent false positives | ||
| DLP-001-PCI-SharePoint&OneDrive | Detects payment card information stored or shared internally in SharePoint and OneDrive. Generates user notifications to promote compliant handling of PCI data without blocking access. | ||
| DLP-001-PCI-Teams | Detects payment card information shared in Microsoft Teams chats and channels. Notifies users to discourage the use of Teams for transmitting PCI data while allowing collaboration to continue. | ||
| DLP-002-PII-Exchange | Exchange-only PII detection policy. | ||
| DLP-002-PII-Sharepoint&Ondrive | Protects files containing personal data in SharePoint Online and OneDrive. Enforces controls to prevent unauthorized sharing and data exposure. | ||
| DLP-002-PII-Teams | Teams PII detection policy. | ||
| DLP-003-FinancialInfo-Exchange | Detects global financial identifiers in Exchange emails for visibility and alerting. | ||
| DLP-003-FinancialInfo-SharePoint&OneDrive | Enforces protection for SharePoint Online and OneDrive by blocking external sharing of files containing financial information. Overrides are allowed only with valid business justification and all actions are logged for compliance and investigation. | ||
| DLP-003-FinancialInfo-Teams | Enforces protection in Microsoft Teams by restricting the sharing of messages containing financial information with external users. Prevents data exposure while allowing overrides with business justification and audit logging. | ||
| DLP-004-SyensqoSensitiveKeywords-Exchange | Enforces protection for Syensqo-defined sensitive corporate keywords across Exchange Online. Content containing sensitive keywords is blocked by default. Users may override the restriction only with a valid business justification, and all overrides are logged and alerted. | ||
| DLP-004-SyensqoSensitiveKeywords-SharePoint&OneDrive | Enforces protection for Syensqo-defined sensitive corporate keywords across SharePoint & OneDrive. Content containing sensitive keywords is blocked by default. Users may override the restriction only with a valid business justification, and all overrides are logged and alerted. | ||
| DLP-004-SyensqoSensitiveKeywords-Teams | Enforces protection for Syensqo-defined sensitive corporate keywords across Microsoft Teams. Content containing sensitive keywords is blocked by default. Users may override the restriction only with a valid business justification, and all overrides are logged and alerted. | ||
| DLP-005-Labels-CorporateToPersonalEmail-Exchange | This policy enforces controls to prevent Corporate information from being sent to personal email services such as Gmail, Yahoo, Outlook.com, or iCloud. Personal mailboxes are not governed by corporate security, retention, or legal controls, and therefore represent a high-risk channel for data exfiltration. The policy ensures that Corporate information remains within managed and auditable communication channels. | | |
| DLP-006-Labels-SensitivityLabel-SharePoint&OneDrive | Control sending of Internal-labeled emails outside the organization | ||
| DLP-006-Labels-SensitivityLabel-Exchange | Control sending of Internal-labeled emails outside the organization |
The following section describes relevant documentation:
Description | Repository | ||
| Syensqo - M365 Build - LLD Configuration | |||
| Syensqo - M365 Build - LLD | |||