ASD's Blueprint for Secure Cloud

Microsoft Purview

This section describes the configuration of Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Estimated reading time: 5 minutes

Automated configuration deployment and assessment

Overview

Some of the Purview configurations can be automatically deployed using Microsoft 365 Desired State Configuration (DSC).

Some of the Purview configurations cannot be assessed using a DSC blueprint. Please refer to those configuration pages to conduct a manual assessment.

ConfigurationBlueprint automation provided
Purview settingsNo
AuditNo
Compliance ManagerNo
Data Lifecycle ManagementYes (DSC)1,2
Data Loss PreventionYes (DSC)3,4
Information Protection
- Sensitivity labelsYes (DSC)5
- Publishing policiesYes (DSC)6
- Auto labeling policiesYes (DSC)3,4
- Sensitive info typesNo

1: Retention policies are deployed by the DSC Blueprint in a disabled stated and must be manually enabled.

2: The Teams private channel messages 7 year hold policy must be created manually.

3: Policy rules must be configured manually.

4: Policies are deployed in simulation mode and must be manually enabled.

5: The following sensitivity label configurations must be set manually:

  • apply a label to channel meetings, and
  • use Microsoft Entra Conditional Access to protect labeled SharePoint sites authentication context for each PROTECTED label.

6: The users and groups setting for the users up to PROTECTED policy must be set to the specific groups of users permitted access to PROTECTED information.

Desired State Configuration

Before using the below DSC file, please refer to the setup and automated deployment pages for instructions. Do not proceed with the automated deployment instructions until you’ve familiarised yourself with the addition configuration required below.

Desired State Configuration file
Download the Purview DSC file and rename the linked .txt file to .ps1.

Configuration data file
Download the configuration data file and rename the linked .txt file to .psd1.

Additional configuration

The following instructions replace step 4 Determine the required permissions for the targeted M365 service, on the automated deployment page, and use configurations from the M365DSC app created during the initial setup:

  1. On the Windows host used for deployment, in an elevated PowerShell prompt, install the Exchange Online PowerShell module if not already installed:
Install-Module ExchangeOnlineManagement
  1. Connect to Security & Compliance PowerShell with an account with permissions to configure roles:
Connect-IPPSsession
  1. Create a reference to the M365DSC service principal in Exchange Online, substituting the M365DSC app’s app ID and object ID:
New-ServicePrincipal -AppId '<App ID GUID>' -ObjectId '<Object ID GUID>' -DisplayName 'M365DSC'
  1. Add the M365DSC service principal to the eDiscovery Manager role group, substituting the M365DSC app’s object ID:
Add-RoleGroupMember -Identity eDiscoveryManager -Member '<Object ID GUID>'
  1. Add the M365DSC service principal to the list of eDiscovery Administrators, substituting the M365DSC app’s object ID:
Add-eDiscoveryCaseAdmin -User '<Object ID GUID>'
  1. If significant time has passed since performing the initial setup, you may need to re-authenticate before proceeding. Authenticate to your Entra ID tenant with an account with permissions to update the M365DSC app’s permissions:
$creds = Get-Credential
  1. Update the M365DSC app with the Exchange ManageAsApp permission, substituting location with the name of your working folder used in the DSC setup:
Update-M365DSCAzureAdApplication -ApplicationName 'M365DSC' -Type Certificate -CertificatePath 'C:\<location>\M365DSC.cer' -Permissions @( @{Api='Exchange';PermissionName='Exchange.ManageAsApp'} ) -AdminConsent -Credential $creds
  1. Assign the Entra, Compliance Administrator role to the M365DSC service principal.

  2. A one-time procedure is required to enable sensitivity labels for containers and to synchronise labels to Entra ID. Instructions for this procedure can be found here.

  3. A one-time procedure is required to turn on auditing. Confirm the status of auditing in the Purview portal by checking for the presence of a banner labelled “start recording user and admin activity” - select the banner to enable auditing. If no banner is present, auditing is already enabled. Alternative instructions for using PowerShell can be found here.


Settings

This section describes the configuration of settings within Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Audit

This section describes the configuration of audit logging within Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Compliance Manager

This section describes the configuration of Compliance Manager within Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Data Lifecycle Management

This section describes the configuration of Data Lifecycle Management within Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Data Loss Prevention

This section describes the configuration of Data Loss Prevention within Microsoft Purview associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Information Protection

This section describes the configuration of Information Protection within Microsoft Purview associated with systems built according to guidance in ASD's Blueprint for Secure Cloud.

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra